


default search action
37th SP 2016: San Jose, CA, USA
- IEEE Symposium on Security and Privacy, SP 2016, San Jose, CA, USA, May 22-26, 2016. IEEE Computer Society 2016, ISBN 978-1-5090-0824-7
Hardware and Private Execution
- Chengyu Song
, Hyungon Moon, Monjur Alam, Insu Yun, Byoungyoung Lee, Taesoo Kim, Wenke Lee, Yunheung Paek:
HDFI: Hardware-Assisted Data-Flow Isolation. 1-17 - Kaiyuan Yang
, Matthew Hicks, Qing Dong, Todd M. Austin, Dennis Sylvester:
A2: Analog Malicious Hardware. 18-37 - Roberto Guanciale
, Hamed Nemati
, Christoph Baumann, Mads Dam:
Cache Storage Channels: Alias-Driven Attacks and Verified Countermeasures. 38-55 - Yaohui Chen, Sebassujeen Reymondjohnson, Zhichuang Sun, Long Lu:
Shreds: Fine-Grained Execution Units with Private Memory. 56-71 - Ning Zhang, Kun Sun
, Wenjing Lou, Yiwei Thomas Hou:
CaSE: Cache-Assisted Secure Execution on ARM Processors. 72-90
Analyze Me
- George Argyros, Ioannis Stais
, Aggelos Kiayias, Angelos D. Keromytis:
Back in Black: Towards Formal, Black Box Analysis of Sanitizers and Filters. 91-109 - Brendan Dolan-Gavitt, Patrick Hulin, Engin Kirda, Tim Leek, Andrea Mambretti
, William K. Robertson, Frederick Ulrich, Ryan Whelan:
LAVA: Large-Scale Automated Vulnerability Addition. 110-121 - Lucas Silva Figueiredo
, Benjamin Livshits, David Molnar, Margus Veanes:
Prepose: Privacy, Security, and Reliability for Gesture-Based Programming. 122-137 - Yan Shoshitaishvili, Ruoyu Wang, Christopher Salls, Nick Stephens, Mario Polino, Andrew Dutcher, John Grosen, Siji Feng, Christophe Hauser, Christopher Krügel, Giovanni Vigna:
SOK: (State of) The Art of War: Offensive Techniques in Binary Analysis. 138-157 - Khaled Yakdan, Sergej Dechand, Elmar Gerhards-Padilla, Matthew Smith
:
Helping Johnny to Analyze Malware: A Usability-Optimized Decompiler and Malware Analysis User Study. 158-177
Oblivious and Snarky
- Daniel S. Roche
, Adam J. Aviv
, Seung Geol Choi:
A Practical Oblivious Map Data Structure with Secure Deletion and History Independence. 178-197 - Cetin Sahin, Victor Zakhary, Amr El Abbadi, Huijia Lin, Stefano Tessaro:
TaoStore: Overcoming Asynchronicity in Oblivious Data Storage. 198-217 - Samee Zahur, Xiao Wang
, Mariana Raykova, Adrià Gascón, Jack Doerner, David Evans, Jonathan Katz:
Revisiting Square-Root ORAM: Efficient Random Access in Multi-party Computation. 218-234 - Antoine Delignat-Lavaud, Cédric Fournet, Markulf Kohlweiss
, Bryan Parno:
Cinderella: Turning Shabby X.509 Certificates into Elegant Anonymous Credentials with the Magic of Verifiable Computation. 235-254
Call Me on Usable Security
- Elissa M. Redmiles, Amelia R. Malone, Michelle L. Mazurek:
I Think They're Trying to Tell Me Something: Advice Sources and Selection for Digital Security. 272-288 - Yasemin Acar, Michael Backes, Sascha Fahl, Doowon Kim
, Michelle L. Mazurek, Christian Stransky:
You Get Where You're Looking for: The Impact of Information Sources on Code Security. 289-305 - Matthew Tischer, Zakir Durumeric, Sam Foster, Sunny Duan, Alec Mori, Elie Bursztein, Michael D. Bailey:
Users Really Do Plug in USB Drives They Find. 306-319 - Huahong Tu
, Adam Doupé, Ziming Zhao, Gail-Joon Ahn
:
SoK: Everyone Hates Robocalls: A Survey of Techniques Against Telephone Spam. 320-338 - Bradley Reaves, Nolen Scaife
, Dave Tian, Logan Blue, Patrick Traynor, Kevin R. B. Butler
:
Sending Out an SMS: Characterizing the Security of the SMS Ecosystem with Public Gateways. 339-356
Phoning it in
- Kai Chen, Xueqiang Wang
, Yi Chen, Peng Wang, Yeonjoon Lee
, XiaoFeng Wang, Bin Ma, Aohui Wang, Yingjun Zhang, Wei Zou:
Following Devil's Footprints: Cross-Platform Analysis of Potentially Harmful Libraries on Android and iOS. 357-376 - Yanick Fratantonio, Antonio Bianchi, William K. Robertson, Engin Kirda, Christopher Kruegel, Giovanni Vigna:
TriggerScope: Towards Detecting Logic Bombs in Android Applications. 377-396 - Sashank Narain, Triet D. Vo-Huu, Kenneth Block, Guevara Noubir:
Inferring User Routes and Locations Using Zero-Permission Mobile Sensors. 397-413 - Wenrui Diao
, Xiangyu Liu, Zhou Li
, Kehuan Zhang:
No Pardon for the Interruption: New Inference Attacks on Android Through Interrupt Timing Analysis. 414-432 - Yasemin Acar, Michael Backes, Sven Bugiel, Sascha Fahl, Patrick D. McDaniel, Matthew Smith
:
SoK: Lessons Learned from Android Security Research for Appified Software Platforms. 433-451
Key Exchange and Certificates
- Marc Fischlin, Felix Günther, Benedikt Schmidt, Bogdan Warinschi:
Key Confirmation in Key Exchange: A Formal Treatment and Implications for TLS 1.3. 452-469 - Cas Cremers, Marko Horvat, Sam Scott, Thyla van der Merwe:
Automated Analysis and Verification of TLS 1.3: 0-RTT, Resumption and Delayed Authentication. 470-485 - Xinyu Li, Jing Xu, Zhenfeng Zhang, Dengguo Feng, Honggang Hu:
Multiple Handshakes Security of TLS 1.3 Candidates. 486-505 - Karthikeyan Bhargavan, Christina Brzuska, Cédric Fournet, Matthew Green, Markulf Kohlweiss
, Santiago Zanella Béguelin
:
Downgrade Resilience in Key-Exchange Protocols. 506-525 - Ewa Syta
, Iulia Tamas, Dylan Visher, David Isaac Wolinsky, Philipp Jovanovic, Linus Gasser, Nicolas Gailly, Ismail Khoffi, Bryan Ford
:
Keeping Authorities "Honest or Bust" with Decentralized Witness Cosigning. 526-545
Learning about Privacy
- Vincent Bindschaedler
, Reza Shokri
:
Synthesizing Plausible Privacy-Preserving Location Traces. 546-563 - Lucca Hirschi, David Baelde, Stéphanie Delaune:
A Method for Verifying Privacy-Type Properties: The Unbounded Case. 564-581 - Nicolas Papernot, Patrick D. McDaniel, Xi Wu, Somesh Jha, Ananthram Swami:
Distillation as a Defense to Adversarial Perturbations Against Deep Neural Networks. 582-597 - Anupam Datta, Shayak Sen, Yair Zick
:
Algorithmic Transparency via Quantitative Input Influence: Theory and Experiments with Learning Systems. 598-617
Vulnerabilities
- Zhen Huang
, Mariana D'Angelo, Dhaval Miyani, David Lie:
Talos: Neutralizing Vulnerabilities with Security Workarounds for Rapid Response. 618-635 - Earlence Fernandes, Jaeyeon Jung, Atul Prakash
:
Security Analysis of Emerging Smart Home Applications. 636-654 - Xiaolong Bai, Luyi Xing, Nan Zhang, XiaoFeng Wang, Xiaojing Liao, Tongxin Li, Shi-Min Hu:
Staying Secure and Unprepared: Understanding and Mitigating the Security Risks of Apple ZeroConf. 655-674
Don't Go on the Web
- Qi Alfred Chen, Eric Osterweil
, Matthew Thomas, Zhuoqing Morley Mao:
MitM Attack by Name Collision: Cause Analysis and Vulnerability Assessment in the New gTLD Era. 675-690 - Chaz Lever, Robert J. Walls, Yacin Nadji, David Dagon, Patrick D. McDaniel, Manos Antonakakis:
Domain-Z: 28 Registrations Later Measuring the Exploitation of Residual Trust in Domains. 691-706 - Xiaojing Liao, Kan Yuan, XiaoFeng Wang, Zhongyu Pei, Hao Yang, Jianjun Chen, Hai-Xin Duan, Kun Du, Eihal Alowaisheq, Sumayah A. Alrwais, Luyi Xing, Raheem A. Beyah
:
Seeking Nonsense, Looking for Trouble: Efficient Promotional-Infection Detection through Semantic Inconsistency Search. 707-723 - Suphannee Sivakorn, Iasonas Polakis, Angelos D. Keromytis:
The Cracked Cookie Jar: HTTP Cookie Hijacking and the Exposure of Private Information. 724-742 - Luca Invernizzi, Kurt Thomas, Alexandros Kapravelos, Oxana Comanescu, Jean-Michel Picod, Elie Bursztein:
Cloak of Visibility: Detecting When Machines Browse a Different Web. 743-758
Applied Cryptography
- Riad S. Wahby, Max Howald, Siddharth Garg, Abhi Shelat, Michael Walfish:
Verifiable ASICs. 759-778 - Véronique Cortier, David Galindo
, Ralf Küsters, Johannes Müller
, Tomasz Truderung:
SoK: Verifiability Notions for E-Voting Protocols. 779-798 - Rahul Chatterjee, Anish Athayle, Devdatta Akhawe, Ari Juels, Thomas Ristenpart:
pASSWORD tYPOS and How to Correct Them Securely. 799-818 - William C. Garrison III, Adam Shull, Steven A. Myers, Adam J. Lee
:
On the Practicality of Cryptographically Enforcing Dynamic Access Control Policies in the Cloud. 819-838 - Ahmed E. Kosba, Andrew Miller, Elaine Shi, Zikai Wen
, Charalampos Papamanthou:
Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts. 839-858
What? You Want More?
- Cristina Basescu, Yue-Hsun Lin, Haoming Zhang, Adrian Perrig:
High-Speed Inter-Domain Fault Localization. 859-877 - Pierre Laperdrix, Walter Rudametkin, Benoit Baudry:
Beauty and the Beast: Diverting Modern Web Browsers to Build Unique Browser Fingerprints. 878-894 - Nikolaos Karapanos, Alexandros Filios, Raluca Ada Popa, Srdjan Capkun:
Verena: End-to-End Integrity Protection for Web Applications. 895-913 - Michael Carl Tschantz, Sadia Afroz, anonymous, Vern Paxson:
SoK: Towards Grounding Censorship Circumvention in Empiricism. 914-933
Low-Level Attacks and Defenses
- Victor van der Veen, Enes Göktas, Moritz Contag, Andre Pawlowski, Xi Chen, Sanjay Rawat, Herbert Bos
, Thorsten Holz
, Elias Athanasopoulos, Cristiano Giuffrida
:
A Tough Call: Mitigating Advanced Code-Reuse Attacks at the Binary Level. 934-953 - Kevin Z. Snow, Roman Rogowski, Jan Werner, Hyungjoon Koo
, Fabian Monrose, Michalis Polychronakis:
Return to the Zombie Gadgets: Undermining Destructive Code Reads via Code Inference Attacks. 954-968 - Hong Hu, Shweta Shinde
, Sendroiu Adrian, Zheng Leong Chua, Prateek Saxena, Zhenkai Liang
:
Data-Oriented Programming: On the Expressiveness of Non-control Data Attacks. 969-986 - Erik Bosman, Kaveh Razavi, Herbert Bos
, Cristiano Giuffrida
:
Dedup Est Machina: Memory Deduplication as an Advanced Exploitation Vector. 987-1004

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.