


default search action
36th SP 2015: San Jose, CA, USA
- 2015 IEEE Symposium on Security and Privacy, SP 2015, San Jose, CA, USA, May 17-21, 2015. IEEE Computer Society 2015, ISBN 978-1-4673-6949-7
Hardware-Aided Security
- Le Guan, Jingqiang Lin, Bo Luo
, Jiwu Jing, Jing Wang:
Protecting Private Keys against Memory Disclosure Attacks Using Hardware Transactional Memory. 3-19 - Robert N. M. Watson, Jonathan Woodruff
, Peter G. Neumann, Simon W. Moore
, Jonathan Anderson
, David Chisnall, Nirav H. Dave, Brooks Davis, Khilan Gudka, Ben Laurie, Steven J. Murdoch
, Robert M. Norton
, Michael Roe, Stacey D. Son, Munraj Vadera:
CHERI: A Hybrid Capability-System Architecture for Scalable Software Compartmentalization. 20-37 - Felix Schuster, Manuel Costa, Cédric Fournet, Christos Gkantsidis, Marcus Peinado, Gloria Mainar-Ruiz, Mark Russinovich:
VC3: Trustworthy Data Analytics in the Cloud Using SGX. 38-54 - Fengwei Zhang, Kevin Leach, Angelos Stavrou
, Haining Wang, Kun Sun
:
Using Hardware Features for Increased Debugging Transparency. 55-69 - Ulrich Rührmair, J. L. Martinez-Hurtado, Xiaolin Xu, Christian Kraeh, Christian Hilgers, Dima Kononchuk, Jonathan J. Finley, Wayne P. Burleson:
Virtual Proofs of Reality and their Physical Implementation. 70-85
Cryptocurrencies and Cybercrime
- Ittay Eyal:
The Miner's Dilemma. 89-103 - Joseph Bonneau, Andrew Miller, Jeremy Clark, Arvind Narayanan, Joshua A. Kroll, Edward W. Felten:
SoK: Research Perspectives and Challenges for Bitcoin and Cryptocurrencies. 104-121 - Alex Biryukov
, Ivan Pustogarov:
Bitcoin over Tor isn't a Good Idea. 122-134 - Mohammad Taha Khan, Xiang Huo, Zhou Li
, Chris Kanich:
Every Second Counts: Quantifying the Negative Externalities of Cybercrime via Typosquatting. 135-150 - Kurt Thomas, Elie Bursztein, Chris Grier, Grant Ho, Nav Jagpal, Alexandros Kapravelos, Damon McCoy, Antonio Nappa
, Vern Paxson, Paul Pearce, Niels Provos, Moheeb Abu Rajab:
Ad Injection at Scale: Assessing Deceptive Advertisement Modifications. 151-167
Protocols and Network Security
- Liang Zhu, Zi Hu, John S. Heidemann, Duane Wessels, Allison Mankin, Nikita Somaiya:
Connection-Oriented DNS to Improve Privacy and Security. 171-186 - Ryan Rasti, Mukul Murthy, Nicholas Weaver, Vern Paxson:
Temporal Lensing and Its Application in Pulsing Denial-of-Service Attacks. 187-198 - Matthias Schäfer, Vincent Lenders
, Jens B. Schmitt:
Secure Track Verification. 199-213 - Robert Lychev, Samuel Jero, Alexandra Boldyreva, Cristina Nita-Rotaru:
How Secure and Quick is QUIC? Provable Security and Performance Analyses. 214-231 - Nik Unger, Sergej Dechand, Joseph Bonneau, Sascha Fahl, Henning Perl, Ian Goldberg, Matthew Smith
:
SoK: Secure Messaging. 232-249
Cryptographic Protocols
- Craig Costello
, Cédric Fournet, Jon Howell, Markulf Kohlweiss
, Benjamin Kreuter, Michael Naehrig, Bryan Parno, Samee Zahur:
Geppetto: Versatile Verifiable Computation. 253-270 - Michael Backes, Manuel Barbosa
, Dario Fiore, Raphael M. Reischuk:
ADSNARK: Nearly Practical and Privacy-Preserving Proofs on Authenticated Data. 271-286 - Eli Ben-Sasson, Alessandro Chiesa, Matthew Green, Eran Tromer, Madars Virza:
Secure Sampling of Public Parameters for Succinct Zero Knowledge Proofs. 287-304 - Matthew D. Green, Ian Miers:
Forward Secure Asynchronous Messaging from Puncturable Encryption. 305-320 - Henry Corrigan-Gibbs, Dan Boneh, David Mazières:
Riposte: An Anonymous Messaging System Handling Millions of Users. 321-338
ORAM and Secure Multi-party Computation
- Matteo Maffei, Giulio Malavolta
, Manuel Reinert, Dominique Schröder
:
Privacy and Access Control for Outsourced Personal Records. 341-358 - Chang Liu, Xiao Shaun Wang
, Kartik Nayak, Yan Huang, Elaine Shi:
ObliVM: A Programming Framework for Secure Computation. 359-376 - Kartik Nayak, Xiao Shaun Wang
, Stratis Ioannidis
, Udi Weinsberg, Nina Taft, Elaine Shi:
GraphSC: Parallel Secure Computation Made Easy. 377-394 - Ben A. Fisch, Binh Vo, Fernando Krell, Abishek Kumarasubramanian, Vladimir Kolesnikov, Tal Malkin, Steven M. Bellovin:
Malicious-Client Security in Blind Seer: A Scalable Private DBMS. 395-410 - Ebrahim M. Songhori
, Siam U. Hussain, Ahmad-Reza Sadeghi, Thomas Schneider
, Farinaz Koushanfar
:
TinyGarble: Highly Compressed and Scalable Sequential Garbled Circuits. 411-428
Security du Jour
- John Vilk, David Molnar, Benjamin Livshits, Eyal Ofek
, Christopher J. Rossbach, Alexander Moshchuk, Helen J. Wang, Ran Gal:
SurroundWeb: Mitigating Privacy Concerns in a 3D Web Browser. 431-446 - Zhicong Huang, Erman Ayday, Jacques Fellay
, Jean-Pierre Hubaux, Ari Juels:
GenoGuard: Protecting Genomic Data against Brute-Force Attacks. 447-462 - Yinzhi Cao, Junfeng Yang:
Towards Making Systems Forget with Machine Unlearning. 463-480 - Rahul Chatterjee, Joseph Bonneau, Ari Juels, Thomas Ristenpart:
Cracking-Resistant Password Vaults Using Natural Language Encoders. 481-498 - David Bernhard, Véronique Cortier, David Galindo
, Olivier Pereira, Bogdan Warinschi:
SoK: A Comprehensive Analysis of Game-Based Ballot Privacy Definitions. 499-516
Protocols
- Boyuan He, Vaibhav Rastogi, Yinzhi Cao, Yan Chen, V. N. Venkatakrishnan, Runqing Yang, Zhenrui Zhang:
Vetting SSL Usage in Applications with SSLINT. 519-534 - Benjamin Beurdouche, Karthikeyan Bhargavan, Antoine Delignat-Lavaud, Cédric Fournet, Markulf Kohlweiss
, Alfredo Pironti, Pierre-Yves Strub, Jean Karim Zinzindohoue:
A Messy State of the Union: Taming the Composite State Machines of TLS. 535-552 - Joppe W. Bos
, Craig Costello
, Michael Naehrig, Douglas Stebila
:
Post-Quantum Key Exchange for the TLS Protocol from the Ring Learning with Errors Problem. 553-570 - Michel Abdalla
, Fabrice Benhamouda
, Philip MacKenzie:
Security of the J-PAKE Password-Authenticated Key Exchange Protocol. 571-587
Side Channels
- Gorka Irazoqui Apecechea, Thomas Eisenbarth
, Berk Sunar:
S$A: A Shared Cache Attack That Works across Cores and Defies VM Sandboxing - and Its Application to AES. 591-604 - Fangfei Liu, Yuval Yarom
, Qian Ge, Gernot Heiser, Ruby B. Lee:
Last-Level Cache Side-Channel Attacks are Practical. 605-622 - Marc Andrysco, David Kohlbrenner, Keaton Mowery, Ranjit Jhala, Sorin Lerner, Hovav Shacham:
On Subnormal Floating Point and Abnormal Timing. 623-639 - Yuanzhong Xu, Weidong Cui, Marcus Peinado:
Controlled-Channel Attacks: Deterministic Side Channels for Untrusted Operating Systems. 640-656
Malware and Program Analysis
- Xabier Ugarte-Pedrero, Davide Balzarotti, Igor Santos, Pablo García Bringas
:
SoK: Deep Packer Inspection: A Longitudinal Study of the Complexity of Run-Time Packers. 659-673 - Babak Yadegari, Brian Johannesmeyer, Ben Whitely, Saumya Debray:
A Generic Approach to Automatic Deobfuscation of Executable Code. 674-691 - Antonio Nappa
, Richard Johnson, Leyla Bilge, Juan Caballero, Tudor Dumitras:
The Attack of the Clones: A Study of the Impact of Shared Code on Vulnerability Patching. 692-708 - Jannik Pewny, Behrad Garmany, Robert Gawlik, Christian Rossow, Thorsten Holz
:
Cross-Architecture Bug Search in Binary Executables. 709-724 - Sang Kil Cha, Maverick Woo, David Brumley
:
Program-Adaptive Mutational Fuzzing. 725-741
Memory Integrity
- Felix Schuster, Thomas Tendyck, Christopher Liebchen, Lucas Davi, Ahmad-Reza Sadeghi, Thorsten Holz
:
Counterfeit Object-oriented Programming: On the Difficulty of Preventing Code Reuse Attacks in C++ Applications. 745-762 - Stephen Crane, Christopher Liebchen, Andrei Homescu, Lucas Davi, Per Larsen, Ahmad-Reza Sadeghi, Stefan Brunthaler
, Michael Franz:
Readactor: Practical Code Randomization Resilient to Memory Disclosure. 763-780 - Isaac Evans, Sam Fingeret, Julian Gonzalez, Ulziibayar Otgonbaatar, Tiffany Tang, Howard E. Shrobe, Stelios Sidiroglou-Douskos, Martin C. Rinard, Hamed Okhravi
:
Missing the Point(er): On the Effectiveness of Code Pointer Integrity. 781-796 - Fabian Yamaguchi, Alwin Maier, Hugo Gascon, Konrad Rieck:
Automatic Inference of Search Patterns for Taint-Style Vulnerabilities. 797-812 - Arthur Azevedo de Amorim, Maxime Dénès, Nick Giannarakis, Catalin Hritcu, Benjamin C. Pierce, Antal Spector-Zabusky, Andrew Tolmach:
Micro-Policies: Formally Verified, Tag-Based Security Monitors. 813-830
Security du Jour II
- Eric Yawei Chen, Shuo Chen, Shaz Qadeer, Rui Wang:
Securing Multiparty Online Services Via Certification of Symbolic Transactions. 833-849 - Yuchen Zhou, David Evans
:
Understanding and Monitoring Embedded Web Scripts. 850-865 - Jonas Wagner, Volodymyr Kuznetsov, George Candea, Johannes Kinder:
High System-Code Security with Low Overhead. 866-879 - Beom Heyn Kim
, David Lie:
Caelus: Verifying the Consistency of Cloud Services with Battery-Powered Devices. 880-896
Android Security
- Mingyuan Xia, Lu Gong, Yuanhao Lyu, Zhengwei Qi, Xue Liu:
Effective Real-Time Android Application Auditing. 899-914 - Nan Zhang, Kan Yuan, Muhammad Naveed, Xiao-yong Zhou, XiaoFeng Wang:
Leave Me Alone: App-Level Protection against Runtime Information Gathering on Android. 915-930 - Antonio Bianchi, Jacopo Corbetta, Luca Invernizzi, Yanick Fratantonio, Christopher Kruegel, Giovanni Vigna:
What the App is That? Deception and Countermeasures in the Android User Interface. 931-948

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.