Title Authors
Developing TrustZone User Interface for Mobile OS using Delegation Integration Model Kailiang Ying (Syracuse University), Priyank Thavai (Syracuse University) and Wenliang Du (Syracuse University)
Understanding the Responsiveness of Mobile App Developers to Software Library Updates Tatsuhiko Yasumatsu (Waseda University), Takuya Watanabe (NTT Secure Platform Laboratories / Waseda University), Fumihiro Kanei (NTT), Eitaro Shioji (NTT), Mitsuaki Akiyama (NTT), and Tatsuya Mori (Waseda University / RIKEN AIP)
ACMiner: Extraction and Analysis of Authorization Checks in Android’s Middleware Sigmund Albert Gorski Iii (North Carolina State University), Benjamin Andow (North Carolina State University), Adwait Nadkarni (William and Mary Univ.), Sunil Manandhar (William and Mary Univ.), William Enck (North Carolina State University), Eric Bodden (Paderborn University) and Alexandre Bartel (University of Luxembourg)
REAPER: Real-time App Analysis for Augmenting the Android Permission System Michalis Diamantaris (FORTH), Elias P. Papadopoulos (FORTH), Evangelos P. Markatos (FORTH), Sotiris Ioannidis (FORTH) and Jason Polakis (University of Illinois at Chicago)
Verifiable Round-Robin Scheme for Smart Homes Nisha Panwar (University of California, Irvine), Shantanu Sharma (University of California, Irvine), Guoxi Wang (University of California, Irvine), Sharad Mehrotra (University of California, Irvine) and Nalini Venkatasubramanian (University of California, Irvine)
Dynamic Groups and Attribute-Based Access Control for Next-Generation Smart Car Maanak Gupta (University of Texas at San Antonio), James Benson (University of Texas at San Antonio), Farhan Patwa (University of Texas at San Antonio) and Ravi Sandhu (University of Texas at San Antonio)
A Study of Data Store-based Home Automation Kaushal Kafle (William & Mary University), Kevin Moran (William & Mary University), Sunil Manandhar (William & Mary University), Adwait Nadkarni (William & Mary University)and Denys Poshyvanyk (William & Mary University)
Detection of Threats to IoT Devices Using Scalable VPN-forwarded Honeypots Amit Tambe (Singapore University of Technology and Design), Yan Lin Aung (Singapore University of Technology and Design), Ragav Sridharan (Singapore University of Technology and Design), Martin Ochoa (Universidad del Rosario), Nils Ole Tippenhauer (Center for It-Security, Privacy & Accountability (CISPA)), Asaf Shabtai (Ben Gurion University of the Negev), and Yuval Elovici (Singapore University of Technology and Design)
Deep Neural Networks Classification over Encrypted Data Ehsan Hesamifard (University of North Texas), Hassan Takabi (University of North Texas) and Mehdi Ghasemi (University of Saskatchewan)
Attribute Compartmentation and Greedy UCC Discovery for High-Dimensional Data Anonymization Nikolai Jannik Podlesny (Hasso-Plattner-Institute), Anne V.D.M. Kayem (Hasso-Plattner-Institute), and Christoph Meinel (Hasso-Plattner-Institute)
Curie: Policy-based Secure Data Exchange Z. Berkay Celik (The Pennsylvania State University), Abbas Acar (Florida International University), Hidayet Aksu (Florida International University), Ryan Sheatsley (The Pennsylvania State University), A. Selcuk Uluagac (Florida International University), and Patrick McDaniel (The Pennsylvania State University)
Result-Based Detection of Insider Threats to Relational Databases Asmaa Sallam (Purdue University), and Elisa Bertino (Purdue University)
Specification and analysis of ABAC policies via the category-based metamodel Maribel Fernandez (Kings College London), Ian Mackie (LIX) and Bhavani Thuraisingham (The University of Texas at Dallas)
Results in Workflow Resiliency: Complexity, New Formulation, and ASP Encoding Philip W. L. Fong (University of Calgary)
Efficient and Precise Information Flow Control for Machine Code through Demand-Driven Secure Multi-Execution Tobias Pfeffer (TU Berlin), Thomas Göthel (TU Berlin), and Sabine Glesner (TU Berlin)
PoLPer: Process-Aware Restriction of Over-Privileged Setuid Calls in Legacy Applications Yuseok Jeon (Purdue University), Junghwan Rhee (NEC Laboratories America), Chung Hwan Kim (NEC Laboratories America), Zhichun Li (NEC Laboratories America), Mathias Payer (Purdue University), Byoungyoung Lee (Seoul National University) and Zhenyu Wu (NEC Laboratories America)
Extracting Secrets from Encrypted Virtual Machines Mathias Morbitzer (Fraunhofer), Manuel Huber (Fraunhofer), and Julian Horsch (Fraunhofer)
Careful-Packing: A Practical and Scalable Anti-Tampering Software Protection enforced by Trusted Computing Flavio Toffalini (Singapore University of Technology and Design), Martín Ochoa (Universidad del Rosario), Jun Sun (Singapore University of Technology and Design), and Jianying Zhou (Singapore University of Technology and Design)
Behind Enemy Lines: Exploring Trusted Data Stream Processing on Untrusted Systems Cory Thoma (University of Pittsburgh), Adam J. Lee (University of Pittsburgh), and Alexandros Labrinidis (University of Pittsburgh)
A Practical Intel SGX Setting for Linux Containers in the Cloud Dave Tian (University of Florida), Joseph Choi (University of Florida), Grant Hernandez (University of Florida), Patrick Traynor (University of Florida), and Kevin Butler (University of Florida)
Limitless HTTP in an HTTPS World: Inferring the Semantics of the HTTPS Protocol without Decryption Blake Anderson (Cisco), Andrew Chi (The University of North Carolina at Chapel Hill), Scott Dunlop (Cisco) and David McGrew (Cisco)
Client Diversity Factor in HTTPS Webpage Fingerprinting Hasan Alan (The University of North Carolina at Chapel Hill) and Jasleen Kaur (The University of North Carolina at Chapel Hill)
Adversarial Author Attribution in Open-source Projects Alina Matyukhina (University of New Brunswick), Natalia Stakhanova (University of New Brunswick), Mila Dalla Preda (University of Verona), and Celine Perley (University of New Brunswick)
Understanding and Predicting Private Interactions in Underground Forums Zhibo Sun (Arizona State University), Carlos E. Rubio-Medrano (Arizona State University), Ziming Zhao (Arizona State University), Tiffany Bao (Arizona State University), Adam Doupé (Arizona State University), and Gail-Joon Ahn (Arizona State University)
BootKeeper: Validating Software Integrity Properties on Boot Firmware Images Ronny Chevalier (CentraleSupélec), Stefano Cristalli (University of Milan), Christophe Hauser (University of Southern California), Yan Shoshitaishvili (Arizona State University), Ruoyu Wang (University of California, Santa Barbara), Christopher Kruegel (University of California, Santa Barbara), Giovanni Vigna (University of California, Santa Barbara), Danilo Bruschi (University of Milan) and Andrea Lanzi (University of Milan)
MimosaFTL: Adding Secure and Practical Ransomware Defense Strategy to Flash Translation Layer Peiying Wang (Institute of Information Engineering,Chinese Academy of Sciences), Shijie Jia (Institute of Information Engineering,Chinese Academy of Sciences), Bo Chen (Michigan Technological University), Luning Xia (Institute of Information Engineering,Chinese Academy of Sciences) and Peng Liu (The Pennsylvania State University)
BlAnC: Blockchain-based Anonymous and Decentralized Credit Networks Gaurav Panwar (New Mexico State University), Satyajayant Misra (New Mexico State University), and Roopa Vishwanathan (New Mexico State University).
SKA-CaNPT: Secure Key Agreement using Cancelable and Noninvertible Biometrics based on Periodic Transformation Laleh Eskandarian (Sabancı University), Dilara Akdoğan (Sabancı University), Duygu Karaoğlan Altop (Sabancı University), and Albert Levi (Sabancı University)