default search action
36th SP 2015: San Jose, CA, USA
- 2015 IEEE Symposium on Security and Privacy, SP 2015, San Jose, CA, USA, May 17-21, 2015. IEEE Computer Society 2015, ISBN 978-1-4673-6949-7
Hardware-Aided Security
- Le Guan, Jingqiang Lin, Bo Luo, Jiwu Jing, Jing Wang:
Protecting Private Keys against Memory Disclosure Attacks Using Hardware Transactional Memory. 3-19 - Robert N. M. Watson, Jonathan Woodruff, Peter G. Neumann, Simon W. Moore, Jonathan Anderson, David Chisnall, Nirav H. Dave, Brooks Davis, Khilan Gudka, Ben Laurie, Steven J. Murdoch, Robert M. Norton, Michael Roe, Stacey D. Son, Munraj Vadera:
CHERI: A Hybrid Capability-System Architecture for Scalable Software Compartmentalization. 20-37 - Felix Schuster, Manuel Costa, Cédric Fournet, Christos Gkantsidis, Marcus Peinado, Gloria Mainar-Ruiz, Mark Russinovich:
VC3: Trustworthy Data Analytics in the Cloud Using SGX. 38-54 - Fengwei Zhang, Kevin Leach, Angelos Stavrou, Haining Wang, Kun Sun:
Using Hardware Features for Increased Debugging Transparency. 55-69 - Ulrich Rührmair, J. L. Martinez-Hurtado, Xiaolin Xu, Christian Kraeh, Christian Hilgers, Dima Kononchuk, Jonathan J. Finley, Wayne P. Burleson:
Virtual Proofs of Reality and their Physical Implementation. 70-85
Cryptocurrencies and Cybercrime
- Ittay Eyal:
The Miner's Dilemma. 89-103 - Joseph Bonneau, Andrew Miller, Jeremy Clark, Arvind Narayanan, Joshua A. Kroll, Edward W. Felten:
SoK: Research Perspectives and Challenges for Bitcoin and Cryptocurrencies. 104-121 - Alex Biryukov, Ivan Pustogarov:
Bitcoin over Tor isn't a Good Idea. 122-134 - Mohammad Taha Khan, Xiang Huo, Zhou Li, Chris Kanich:
Every Second Counts: Quantifying the Negative Externalities of Cybercrime via Typosquatting. 135-150 - Kurt Thomas, Elie Bursztein, Chris Grier, Grant Ho, Nav Jagpal, Alexandros Kapravelos, Damon McCoy, Antonio Nappa, Vern Paxson, Paul Pearce, Niels Provos, Moheeb Abu Rajab:
Ad Injection at Scale: Assessing Deceptive Advertisement Modifications. 151-167
Protocols and Network Security
- Liang Zhu, Zi Hu, John S. Heidemann, Duane Wessels, Allison Mankin, Nikita Somaiya:
Connection-Oriented DNS to Improve Privacy and Security. 171-186 - Ryan Rasti, Mukul Murthy, Nicholas Weaver, Vern Paxson:
Temporal Lensing and Its Application in Pulsing Denial-of-Service Attacks. 187-198 - Matthias Schäfer, Vincent Lenders, Jens B. Schmitt:
Secure Track Verification. 199-213 - Robert Lychev, Samuel Jero, Alexandra Boldyreva, Cristina Nita-Rotaru:
How Secure and Quick is QUIC? Provable Security and Performance Analyses. 214-231 - Nik Unger, Sergej Dechand, Joseph Bonneau, Sascha Fahl, Henning Perl, Ian Goldberg, Matthew Smith:
SoK: Secure Messaging. 232-249
Cryptographic Protocols
- Craig Costello, Cédric Fournet, Jon Howell, Markulf Kohlweiss, Benjamin Kreuter, Michael Naehrig, Bryan Parno, Samee Zahur:
Geppetto: Versatile Verifiable Computation. 253-270 - Michael Backes, Manuel Barbosa, Dario Fiore, Raphael M. Reischuk:
ADSNARK: Nearly Practical and Privacy-Preserving Proofs on Authenticated Data. 271-286 - Eli Ben-Sasson, Alessandro Chiesa, Matthew Green, Eran Tromer, Madars Virza:
Secure Sampling of Public Parameters for Succinct Zero Knowledge Proofs. 287-304 - Matthew D. Green, Ian Miers:
Forward Secure Asynchronous Messaging from Puncturable Encryption. 305-320 - Henry Corrigan-Gibbs, Dan Boneh, David Mazières:
Riposte: An Anonymous Messaging System Handling Millions of Users. 321-338
ORAM and Secure Multi-party Computation
- Matteo Maffei, Giulio Malavolta, Manuel Reinert, Dominique Schröder:
Privacy and Access Control for Outsourced Personal Records. 341-358 - Chang Liu, Xiao Shaun Wang, Kartik Nayak, Yan Huang, Elaine Shi:
ObliVM: A Programming Framework for Secure Computation. 359-376 - Kartik Nayak, Xiao Shaun Wang, Stratis Ioannidis, Udi Weinsberg, Nina Taft, Elaine Shi:
GraphSC: Parallel Secure Computation Made Easy. 377-394 - Ben A. Fisch, Binh Vo, Fernando Krell, Abishek Kumarasubramanian, Vladimir Kolesnikov, Tal Malkin, Steven M. Bellovin:
Malicious-Client Security in Blind Seer: A Scalable Private DBMS. 395-410 - Ebrahim M. Songhori, Siam U. Hussain, Ahmad-Reza Sadeghi, Thomas Schneider, Farinaz Koushanfar:
TinyGarble: Highly Compressed and Scalable Sequential Garbled Circuits. 411-428
Security du Jour
- John Vilk, David Molnar, Benjamin Livshits, Eyal Ofek, Christopher J. Rossbach, Alexander Moshchuk, Helen J. Wang, Ran Gal:
SurroundWeb: Mitigating Privacy Concerns in a 3D Web Browser. 431-446 - Zhicong Huang, Erman Ayday, Jacques Fellay, Jean-Pierre Hubaux, Ari Juels:
GenoGuard: Protecting Genomic Data against Brute-Force Attacks. 447-462 - Yinzhi Cao, Junfeng Yang:
Towards Making Systems Forget with Machine Unlearning. 463-480 - Rahul Chatterjee, Joseph Bonneau, Ari Juels, Thomas Ristenpart:
Cracking-Resistant Password Vaults Using Natural Language Encoders. 481-498 - David Bernhard, Véronique Cortier, David Galindo, Olivier Pereira, Bogdan Warinschi:
SoK: A Comprehensive Analysis of Game-Based Ballot Privacy Definitions. 499-516
Protocols
- Boyuan He, Vaibhav Rastogi, Yinzhi Cao, Yan Chen, V. N. Venkatakrishnan, Runqing Yang, Zhenrui Zhang:
Vetting SSL Usage in Applications with SSLINT. 519-534 - Benjamin Beurdouche, Karthikeyan Bhargavan, Antoine Delignat-Lavaud, Cédric Fournet, Markulf Kohlweiss, Alfredo Pironti, Pierre-Yves Strub, Jean Karim Zinzindohoue:
A Messy State of the Union: Taming the Composite State Machines of TLS. 535-552 - Joppe W. Bos, Craig Costello, Michael Naehrig, Douglas Stebila:
Post-Quantum Key Exchange for the TLS Protocol from the Ring Learning with Errors Problem. 553-570 - Michel Abdalla, Fabrice Benhamouda, Philip MacKenzie:
Security of the J-PAKE Password-Authenticated Key Exchange Protocol. 571-587
Side Channels
- Gorka Irazoqui Apecechea, Thomas Eisenbarth, Berk Sunar:
S$A: A Shared Cache Attack That Works across Cores and Defies VM Sandboxing - and Its Application to AES. 591-604 - Fangfei Liu, Yuval Yarom, Qian Ge, Gernot Heiser, Ruby B. Lee:
Last-Level Cache Side-Channel Attacks are Practical. 605-622 - Marc Andrysco, David Kohlbrenner, Keaton Mowery, Ranjit Jhala, Sorin Lerner, Hovav Shacham:
On Subnormal Floating Point and Abnormal Timing. 623-639 - Yuanzhong Xu, Weidong Cui, Marcus Peinado:
Controlled-Channel Attacks: Deterministic Side Channels for Untrusted Operating Systems. 640-656
Malware and Program Analysis
- Xabier Ugarte-Pedrero, Davide Balzarotti, Igor Santos, Pablo García Bringas:
SoK: Deep Packer Inspection: A Longitudinal Study of the Complexity of Run-Time Packers. 659-673 - Babak Yadegari, Brian Johannesmeyer, Ben Whitely, Saumya Debray:
A Generic Approach to Automatic Deobfuscation of Executable Code. 674-691 - Antonio Nappa, Richard Johnson, Leyla Bilge, Juan Caballero, Tudor Dumitras:
The Attack of the Clones: A Study of the Impact of Shared Code on Vulnerability Patching. 692-708 - Jannik Pewny, Behrad Garmany, Robert Gawlik, Christian Rossow, Thorsten Holz:
Cross-Architecture Bug Search in Binary Executables. 709-724 - Sang Kil Cha, Maverick Woo, David Brumley:
Program-Adaptive Mutational Fuzzing. 725-741
Memory Integrity
- Felix Schuster, Thomas Tendyck, Christopher Liebchen, Lucas Davi, Ahmad-Reza Sadeghi, Thorsten Holz:
Counterfeit Object-oriented Programming: On the Difficulty of Preventing Code Reuse Attacks in C++ Applications. 745-762 - Stephen Crane, Christopher Liebchen, Andrei Homescu, Lucas Davi, Per Larsen, Ahmad-Reza Sadeghi, Stefan Brunthaler, Michael Franz:
Readactor: Practical Code Randomization Resilient to Memory Disclosure. 763-780 - Isaac Evans, Sam Fingeret, Julian Gonzalez, Ulziibayar Otgonbaatar, Tiffany Tang, Howard E. Shrobe, Stelios Sidiroglou-Douskos, Martin C. Rinard, Hamed Okhravi:
Missing the Point(er): On the Effectiveness of Code Pointer Integrity. 781-796 - Fabian Yamaguchi, Alwin Maier, Hugo Gascon, Konrad Rieck:
Automatic Inference of Search Patterns for Taint-Style Vulnerabilities. 797-812 - Arthur Azevedo de Amorim, Maxime Dénès, Nick Giannarakis, Catalin Hritcu, Benjamin C. Pierce, Antal Spector-Zabusky, Andrew Tolmach:
Micro-Policies: Formally Verified, Tag-Based Security Monitors. 813-830
Security du Jour II
- Eric Yawei Chen, Shuo Chen, Shaz Qadeer, Rui Wang:
Securing Multiparty Online Services Via Certification of Symbolic Transactions. 833-849 - Yuchen Zhou, David Evans:
Understanding and Monitoring Embedded Web Scripts. 850-865 - Jonas Wagner, Volodymyr Kuznetsov, George Candea, Johannes Kinder:
High System-Code Security with Low Overhead. 866-879 - Beom Heyn Kim, David Lie:
Caelus: Verifying the Consistency of Cloud Services with Battery-Powered Devices. 880-896
Android Security
- Mingyuan Xia, Lu Gong, Yuanhao Lyu, Zhengwei Qi, Xue Liu:
Effective Real-Time Android Application Auditing. 899-914 - Nan Zhang, Kan Yuan, Muhammad Naveed, Xiao-yong Zhou, XiaoFeng Wang:
Leave Me Alone: App-Level Protection against Runtime Information Gathering on Android. 915-930 - Antonio Bianchi, Jacopo Corbetta, Luca Invernizzi, Yanick Fratantonio, Christopher Kruegel, Giovanni Vigna:
What the App is That? Deception and Countermeasures in the Android User Interface. 931-948
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.