Accepted papers

A Bytecode Interpreter for Secure Program Execution in Untrusted Main Memory
Maximilian Seitzer, Michael Gruhn and Tilo Müller
A Practical Approach for Adaptive Data Structure Layout Randomization
Ping Chen, Jun Xu, Zhiqiang Lin, Dongyan Xu, Bing Mao and Peng Liu
A Symmetric-Key Based Proofs of Retrievability Supporting Public Verification
Chaowen Guan, Kui Ren, Fangguo Zhang, Florian Kerschbaum and Jia Yu
A Theory of Gray Security Policies
Donald Ray and Jay Ligatti
Accountable Authority Ciphertext-Policy Attribute-Based Encryption with White-Box Traceability and Public Auditing in the Cloud
Jianting Ning, Zhenfu Cao, Xiaolei Dong and Lifei Wei
Accurate Specification for Robust Detection of Malicious Behavior in Mobile Environments
Sufatrio, Tong-Wei Chua, Darell J. J. Tan and Vrizlynn L. L. Thing
All Your Voices Are Belong to Us: Stealing Voices to Fool Humans and Machines
Dibya Mukhopadhyay, Maliheh Shirvanian and Nitesh Saxena
Analyzing the BrowserID SSO System with Primary Identity Providers Using an Expressive Model of the Web
Daniel Fett, Ralf Kuesters and Guido Schmitz
Attribute Based Broadcast Encryption with Short Ciphertext and Decryption Key
Tran Viet Xuan Phuong, Guomin Yang and Willy Susilo
Balloon: A Forward-Secure Append-Only Persistent Authenticated Data Structure
Tobias Pulls and Roel Peeters
Batch Verifiable Computation of Polynomials on Outsourced Data
Liang Feng Zhang and Reihaneh Safavi-Naini
Challenging the Trustworthyness of PGP: Is the Web-of-Trust Tear-proof?
Alessandro Barenghi, Alessandro Di Federico, Gerardo Pelosi and Stefano Sanfilippo
Checking Interaction-Based Declassification Policies for Android Using Symbolic Execution
Kristopher Micinski, Jonathan Fetter-Degges, Jinseong Jeon, Jeffrey Foster and Michael Clarkson
Checking trace equivalence: How to get rid of nonces?
Rémy Chrétien, Veronique Cortier and Stephanie Delaune
CloudBI: Practical Privacy-Preserving Outsourcing of Biometric Identification in the Cloud
Qian Wang, Shengshan Hu, Kui Ren, Meiqi He, Minxin Du and Zhibo Wang
Computational Soundness for Interactive Primitives
Michael Backes, Esfandiar Mohammadi and Tim Ruffing
Confidence analysis for nuclear arms control: SMT abstractions of Bayesian Belief Networks
Paul Beaumont, Neil Evans, Michael Huth and Tom Plant
DexHunter: Toward Extracting Hidden Code from Packed Android Applications
Yueqian Zhang, Xiapu Luo and Haoyang Yin
DNS-Scopy: Towards Security of Internet Naming Infrastructure
Haya Shulman and Michael Waidner
DTLS-HIMMO: Achieving DTLS certificate security with symmetric key overhead
Oscar Garcia-Morchon, Ronald Rietman, Sahil Sharma, Ludo Tolhuizen and Jose-Luis Torre-Arce
Efficient Message Authentication Codes with Combinatorial Group Testing
Kazuhiko Minematsu
Efficient Zero-Knowledge Proofs for Commitments from Learning With Errors over Rings
Fabrice Benhamouda, Stephan Krenn, Vadim Lyubashevsky and Krzysztof Pietrzak
Enabling Privacy-assured Similarity Retrieval over Millions of Encrypted Records
Xingliang Yuan, Helei Cui, Xinyu Wang and Cong Wang
Enhancing Java Runtime Environment for Smart Cards Against Runtime Attacks
Raja Naeem Akram and Konstantinos Markantonakis
Extended Proxy-Assisted Approach: Achieving Revocable Fine-Grained Cloud Data Encryption
Yanjiang Yang, Joseph Liu, Alexander Liang, Raymond Choo and Jianying Zhou
Factorization of Behavioral Integrity
Ximeng Li, Flemming Nielson and Hanne Riis Nielson
FP-Block: usable web privacy by controlling browser fingerprinting
Christof Torres, Hugo Jonker and Sjouke Mauw
Identifying Arbitrary Memory Access Vulnerabilities in Privilege-Separated Software
Hong Hu, Zheng Leong Chua, Zhenkai Liang and Prateek Saxena
Interleaving Cryptanalytic Time-memory Trade-offs on Non-Uniform Distributions
Gildas Avoine, Xavier Carpent and Cédric Lauradoux
Learning from Others: User Anomaly Detection Using Anomalous Samples from Other Users
Youngja Park, Ian Molloy, Suresh Chari, Zenglin Xu, Chris Gates and Ninghui Li
Leveraging Real-Life Facts to Make Random Passwords More Memorable
Mahdi Nasrullah Al-Ameen, Kanis Fatema, Matthew Wright and Shannon Scielzo
Lightweight and Flexible Trust Assessment Modules for the Internet of Things
Jan Tobias Muehlberg, Job Noorman and Frank Piessens
Making any Identity Based Encryption Accountable, Efficiently
Aggelos Kiayias and Qiang Tang
Making Bitcoin Exchanges Transparent
Christian Decker, James Guthrie, Jochen Seidel and Roger Wattenhofer
Mind-Reading: Privacy Attacks Exploiting Cross-App KeyEvent Injections
Wenrui Diao, Xiangyu Liu, Zhe Zhou, Kehuan Zhang and Zhou Li
Oblivious Maximum Bipartite Matching Size Algorithm with Applications to Secure Fingerprint Identification
Marina Blanton and Siddharth Saraph
On Security of Content-based Video Stream Authentication
Swee-Won Lo, Zhuo Wei, Robert Deng and Xuhua Ding
On the Fly Design and Co-simulation of Responses against Simultaneous Attacks
Léa Samarji, Nora Cuppens-Boulahia, Frédéric Cuppens, Serge Papillon, Waël Kanoun and Samuel Dubus
Practical Memory Deduplication Attacks in Sandboxed Javascript
Daniel Gruss, David Bidner and Stefan Mangard
Practical Threshold Password-Authenticated Secret Sharing Protocol
Xun Yi, Feng Hao, Liqun Chen and Joseph Liu
Privacy-preserving Context-aware Recommender Systems: Analysis and New Solutions
Qiang Tang and Jun Wang
Privacy-Preserving Link Prediction in Decentralized Online Social Networks
Yao Zheng, Bing Wang, Wenjing Lou and Y. Thomas Hou
Privacy-Preserving Observation in Public Spaces
Florian Kerschbaum and Hoon Wei Lim
Rich Queries on Encrypted Data: Beyond Exact Matches
Sky Faber, Stanislaw Jarecki, Hugo Krawczyk, Quan Nguyen, Marcel C. Rosu and Michael Steiner
Server-Aided Revocable Identity-Based Encryption
Baodong Qin, Robert Deng, Yingjiu Li and Shengli Liu
Short Accountable Ring Signatures Based on DDH
Jonathan Bootle, Andrea Cerulli, Pyrros Chaidos, Essam Ghadafi, Jens Groth and Christophe Petit
Should Cyber-Insurance Providers Invest in Software Security?
Aron Laszka and Jens Grossklags
Small Subgroup Attacks on TLS-ECDH
Tibor Jager, Jörg Schwenk and Juraj Somorovsky
Small Tweaks do Not Help: Differential Power Analysis of MILENAGE Implementations in 3G/4G USIM Cards
Junrong Liu, Yu Yu, Francois-Xavier Standaert, Zheng Guo, Dawu Gu, Wei Sun, Yijie Ge, Rong Fu and Xinjun Xie
The Emperor’s New Password Creation Policies
Ding Wang and Ping Wang
Towards Attack-Resistant Peer-Assisted Indoor Localization
Jingyu Hua, Shaoyong Du and Sheng Zhong
Transforming Out Timing Leaks, More or Less
Heiko Mantel and Artem Starostin
Trustworthy prevention of code injection in Linux on embedded devices
Hind Chfouka, Hamed Nemati, Roberto Guanciale, Mads Dam and Patrik Ekdahl
Typing and Compositionality for Security Protocols: A Generalization to the Geometric Fragment
Omar Almousa, Sebastian A. Mödersheim, Paolo Modesti and Luca Viganò
Updatable Hash Proof System and Its Applications
Rupeng Yang, Qiuliang Xu, Yongbin Zhou, Rui Zhang, Chengyu Hu and Zuoxia Yu
vBox: Proactively Establishing Secure Channels between Wireless Devices without Prior Knowledge
Wei Wang, Jingqiang Lin, Zhan Wang, Ze Wang and Luning Xia
Verifiably Encrypted Signatures: Security Revisited and a New Construction
Christian Hanser, Max Rabkin and Dominique Schröder
Waiting for CSP — Securing Legacy Web Applications with JSAgents
Joerg Schwenk, Mario Heiderich and Marcus Niemietz
Web-to-Application Injection Attacks on Android: Characterization and Detection
Behnaz Hassanshahi, Yaoqi Jia, Roland Yap, Prateek Saxena and Zhenkai Liang