Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
SP
SP 2015
Generate Citations
2015 IEEE Symposium on Security and Privacy (SP)
May 17 2015 to May 21 2015
San Jose, CA, USA
Table of Contents
[Title page i]
Freely available from IEEE.
pp. i-i
[Title page iii]
Freely available from IEEE.
pp. iii-iii
[Copyright notice]
Freely available from IEEE.
pp. iv-iv
Table of contents
Freely available from IEEE.
pp. v-x
Message from the General Chair
Freely available from IEEE.
pp. xi-xiii
Organizing Committee
Freely available from IEEE.
pp. xiv-xv
Program Committee
Freely available from IEEE.
pp. xvi-xvii
External Reviewers
Freely available from IEEE.
pp. xviii-xix
Protecting Private Keys against Memory Disclosure Attacks Using Hardware Transactional Memory
Freely available from IEEE.
pp. 3-19
by
Le Guan
,
Jingqiang Lin
,
Bo Luo
,
Jiwu Jing
,
Jing Wang
CHERI: A Hybrid Capability-System Architecture for Scalable Software Compartmentalization
Freely available from IEEE.
pp. 20-37
by
Robert N.M. Watson
,
Jonathan Woodruff
,
Peter G. Neumann
,
Simon W. Moore
,
Jonathan Anderson
,
David Chisnall
,
Nirav Dave
,
Brooks Davis
,
Khilan Gudka
,
Ben Laurie
,
Steven J. Murdoch
,
Robert Norton
,
Michael Roe
,
Stacey Son
,
Munraj Vadera
VC3: Trustworthy Data Analytics in the Cloud Using SGX
Freely available from IEEE.
pp. 38-54
by
Felix Schuster
,
Manuel Costa
,
Cédric Fournet
,
Christos Gkantsidis
,
Marcus Peinado
,
Gloria Mainar-Ruiz
,
Mark Russinovich
Using Hardware Features for Increased Debugging Transparency
Freely available from IEEE.
pp. 55-69
by
Fengwei Zhang
,
Kevin Leach
,
Angelos Stavrou
,
Haining Wang
,
Kun Sun
Virtual Proofs of Reality and their Physical Implementation
Freely available from IEEE.
pp. 70-85
by
Ulrich Rührmair
,
J.L. Martinez-Hurtado
,
Xiaolin Xu
,
Christian Kraeh
,
Christian Hilgers
,
Dima Kononchuk
,
Jonathan J. Finley
,
Wayne P. Burleson
The Miner's Dilemma
Freely available from IEEE.
pp. 89-103
by
Ittay Eyal
SoK: Research Perspectives and Challenges for Bitcoin and Cryptocurrencies
Freely available from IEEE.
pp. 104-121
by
Joseph Bonneau
,
Andrew Miller
,
Jeremy Clark
,
Arvind Narayanan
,
Joshua A. Kroll
,
Edward W. Felten
Bitcoin over Tor isn't a Good Idea
Freely available from IEEE.
pp. 122-134
by
Alex Biryukov
,
Ivan Pustogarov
Every Second Counts: Quantifying the Negative Externalities of Cybercrime via Typosquatting
Freely available from IEEE.
pp. 135-150
by
Mohammad Taha Khan
,
Xiang Huo
,
Zhou Li
,
Chris Kanich
Ad Injection at Scale: Assessing Deceptive Advertisement Modifications
Freely available from IEEE.
pp. 151-167
by
Kurt Thomas
,
Elie Bursztein
,
Chris Grier
,
Grant Ho
,
Nav Jagpal
,
Alexandros Kapravelos
,
Damon Mccoy
,
Antonio Nappa
,
Vern Paxson
,
Paul Pearce
,
Niels Provos
,
Moheeb Abu Rajab
Connection-Oriented DNS to Improve Privacy and Security
Freely available from IEEE.
pp. 171-186
by
Liang Zhu
,
Zi Hu
,
John Heidemann
,
Duane Wessels
,
Allison Mankin
,
Nikita Somaiya
Temporal Lensing and Its Application in Pulsing Denial-of-Service Attacks
Freely available from IEEE.
pp. 187-198
by
Ryan Rasti
,
Mukul Murthy
,
Nicholas Weaver
,
Vern Paxson
Secure Track Verification
Freely available from IEEE.
pp. 199-213
by
Matthias Schäfer
,
Vincent Lenders
,
Jens Schmitt
How Secure and Quick is QUIC? Provable Security and Performance Analyses
Freely available from IEEE.
pp. 214-231
by
Robert Lychev
,
Samuel Jero
,
Alexandra Boldyreva
,
Cristina Nita-Rotaru
SoK: Secure Messaging
Freely available from IEEE.
pp. 232-249
by
Nik Unger
,
Sergej Dechand
,
Joseph Bonneau
,
Sascha Fahl
,
Henning Perl
,
Ian Goldberg
,
Matthew Smith
Geppetto: Versatile Verifiable Computation
Freely available from IEEE.
pp. 253-270
by
Craig Costello
,
Cédric Fournet
,
Jon Howell
,
Markulf Kohlweiss
,
Benjamin Kreuter
,
Michael Naehrig
,
Bryan Parno
,
Samee Zahur
ADSNARK: Nearly Practical and Privacy-Preserving Proofs on Authenticated Data
Freely available from IEEE.
pp. 271-286
by
Michael Backes
,
Manuel Barbosa
,
Dario Fiore
,
Raphael M. Reischuk
Secure Sampling of Public Parameters for Succinct Zero Knowledge Proofs
Freely available from IEEE.
pp. 287-304
by
Eli Ben-Sasson
,
Alessandro Chiesa
,
Matthew Green
,
Eran Tromer
,
Madars Virza
Forward Secure Asynchronous Messaging from Puncturable Encryption
Freely available from IEEE.
pp. 305-320
by
Matthew D. Green
,
Ian Miers
Riposte: An Anonymous Messaging System Handling Millions of Users
Freely available from IEEE.
pp. 321-338
by
Henry Corrigan-Gibbs
,
Dan Boneh
,
David Mazières
Privacy and Access Control for Outsourced Personal Records
Freely available from IEEE.
pp. 341-358
by
Matteo Maffei
,
Giulio Malavolta
,
Manuel Reinert
,
Dominique Schröder
ObliVM: A Programming Framework for Secure Computation
Freely available from IEEE.
pp. 359-376
by
Chang Liu
,
Xiao Shaun Wang
,
Kartik Nayak
,
Yan Huang
,
Elaine Shi
GraphSC: Parallel Secure Computation Made Easy
Freely available from IEEE.
pp. 377-394
by
Kartik Nayak
,
Xiao Shaun Wang
,
Stratis Ioannidis
,
Udi Weinsberg
,
Nina Taft
,
Elaine Shi
Malicious-Client Security in Blind Seer: A Scalable Private DBMS
Freely available from IEEE.
pp. 395-410
by
Ben A. Fisch
,
Binh Vo
,
Fernando Krell
,
Abishek Kumarasubramanian
,
Vladimir Kolesnikov
,
Tal Malkin
,
Steven M. Bellovin
TinyGarble: Highly Compressed and Scalable Sequential Garbled Circuits
Freely available from IEEE.
pp. 411-428
by
Ebrahim M. Songhori
,
Siam U. Hussain
,
Ahmad-Reza Sadeghi
,
Thomas Schneider
,
Farinaz Koushanfar
SurroundWeb: Mitigating Privacy Concerns in a 3D Web Browser
Freely available from IEEE.
pp. 431-446
by
John Vilk
,
David Molnar
,
Benjamin Livshits
,
Eyal Ofek
,
Chris Rossbach
,
Alexander Moshchuk
,
Helen J. Wang
,
Ran Gal
GenoGuard: Protecting Genomic Data against Brute-Force Attacks
Freely available from IEEE.
pp. 447-462
by
Zhicong Huang
,
Erman Ayday
,
Jacques Fellay
,
Jean-Pierre Hubaux
,
Ari Juels
Towards Making Systems Forget with Machine Unlearning
Freely available from IEEE.
pp. 463-480
by
Yinzhi Cao
,
Junfeng Yang
Cracking-Resistant Password Vaults Using Natural Language Encoders
Freely available from IEEE.
pp. 481-498
by
Rahul Chatterjee
,
Joseph Bonneau
,
Ari Juels
,
Thomas Ristenpart
SoK: A Comprehensive Analysis of Game-Based Ballot Privacy Definitions
Freely available from IEEE.
pp. 499-516
by
David Bernhard
,
Véronique Cortier
,
David Galindo
,
Olivier Pereira
,
Bogdan Warinschi
Vetting SSL Usage in Applications with SSLINT
Freely available from IEEE.
pp. 519-534
by
Boyuan He
,
Vaibhav Rastogi
,
Yinzhi Cao
,
Yan Chen
,
V.N. Venkatakrishnan
,
Runqing Yang
,
Zhenrui Zhang
A Messy State of the Union: Taming the Composite State Machines of TLS
Freely available from IEEE.
pp. 535-552
by
Benjamin Beurdouche
,
Karthikeyan Bhargavan
,
Antoine Delignat-Lavaud
,
Cédric Fournet
,
Markulf Kohlweiss
,
Alfredo Pironti
,
Pierre-Yves Strub
,
Jean Karim Zinzindohoue
Post-Quantum Key Exchange for the TLS Protocol from the Ring Learning with Errors Problem
Freely available from IEEE.
pp. 553-570
by
Joppe W. Bos
,
Craig Costello
,
Michael Naehrig
,
Douglas Stebila
Security of the J-PAKE Password-Authenticated Key Exchange Protocol
Freely available from IEEE.
pp. 571-587
by
Michel Abdalla
,
Fabrice Benhamouda
,
Philip MacKenzie
S$A: A Shared Cache Attack That Works across Cores and Defies VM Sandboxing -- and Its Application to AES
Freely available from IEEE.
pp. 591-604
by
Gorka Irazoqui
,
Thomas Eisenbarth
,
Berk Sunar
Last-Level Cache Side-Channel Attacks are Practical
Freely available from IEEE.
pp. 605-622
by
Fangfei Liu
,
Yuval Yarom
,
Qian Ge
,
Gernot Heiser
,
Ruby B. Lee
On Subnormal Floating Point and Abnormal Timing
Freely available from IEEE.
pp. 623-639
by
Marc Andrysco
,
David Kohlbrenner
,
Keaton Mowery
,
Ranjit Jhala
,
Sorin Lerner
,
Hovav Shacham
Controlled-Channel Attacks: Deterministic Side Channels for Untrusted Operating Systems
Freely available from IEEE.
pp. 640-656
by
Yuanzhong Xu
,
Weidong Cui
,
Marcus Peinado
SoK: Deep Packer Inspection: A Longitudinal Study of the Complexity of Run-Time Packers
Freely available from IEEE.
pp. 659-673
by
Xabier Ugarte-Pedrero
,
Davide Balzarotti
,
Igor Santos
,
Pablo G. Bringas
A Generic Approach to Automatic Deobfuscation of Executable Code
Freely available from IEEE.
pp. 674-691
by
Babak Yadegari
,
Brian Johannesmeyer
,
Ben Whitely
,
Saumya Debray
The Attack of the Clones: A Study of the Impact of Shared Code on Vulnerability Patching
Freely available from IEEE.
pp. 692-708
by
Antonio Nappa
,
Richard Johnson
,
Leyla Bilge
,
Juan Caballero
,
Tudor Dumitras
Cross-Architecture Bug Search in Binary Executables
Freely available from IEEE.
pp. 709-724
by
Jannik Pewny
,
Behrad Garmany
,
Robert Gawlik
,
Christian Rossow
,
Thorsten Holz
Program-Adaptive Mutational Fuzzing
Freely available from IEEE.
pp. 725-741
by
Sang Kil Cha
,
Maverick Woo
,
David Brumley
Counterfeit Object-oriented Programming: On the Difficulty of Preventing Code Reuse Attacks in C++ Applications
Freely available from IEEE.
pp. 745-762
by
Felix Schuster
,
Thomas Tendyck
,
Christopher Liebchen
,
Lucas Davi
,
Ahmad-Reza Sadeghi
,
Thorsten Holz
Readactor: Practical Code Randomization Resilient to Memory Disclosure
Freely available from IEEE.
pp. 763-780
by
Stephen Crane
,
Christopher Liebchen
,
Andrei Homescu
,
Lucas Davi
,
Per Larsen
,
Ahmad-Reza Sadeghi
,
Stefan Brunthaler
,
Michael Franz
Missing the Point(er): On the Effectiveness of Code Pointer Integrity
Freely available from IEEE.
pp. 781-796
by
Isaac Evans
,
Sam Fingeret
,
Julian Gonzalez
,
Ulziibayar Otgonbaatar
,
Tiffany Tang
,
Howard Shrobe
,
Stelios Sidiroglou-Douskos
,
Martin Rinard
,
Hamed Okhravi
Automatic Inference of Search Patterns for Taint-Style Vulnerabilities
Freely available from IEEE.
pp. 797-812
by
Fabian Yamaguchi
,
Alwin Maier
,
Hugo Gascon
,
Konrad Rieck
Micro-Policies: Formally Verified, Tag-Based Security Monitors
Freely available from IEEE.
pp. 813-830
by
Arthur Azevedo de Amorim
,
Maxime Dénès
,
Nick Giannarakis
,
Catalin Hritcu
,
Benjamin C. Pierce
,
Antal Spector-Zabusky
,
Andrew Tolmach
Securing Multiparty Online Services Via Certification of Symbolic Transactions
Freely available from IEEE.
pp. 833-849
by
Eric Y. Chen
,
Shuo Chen
,
Shaz Qadeer
,
Rui Wang
Understanding and Monitoring Embedded Web Scripts
Freely available from IEEE.
pp. 850-865
by
Yuchen Zhou
,
David Evans
High System-Code Security with Low Overhead
Freely available from IEEE.
pp. 866-879
by
Jonas Wagner
,
Volodymyr Kuznetsov
,
George Candea
,
Johannes Kinder
Caelus: Verifying the Consistency of Cloud Services with Battery-Powered Devices
Freely available from IEEE.
pp. 880-896
by
Beom Heyn Kim
,
David Lie
Effective Real-Time Android Application Auditing
Freely available from IEEE.
pp. 899-914
by
Mingyuan Xia
,
Lu Gong
,
Yuanhao Lyu
,
Zhengwei Qi
,
Xue Liu
Leave Me Alone: App-Level Protection against Runtime Information Gathering on Android
Freely available from IEEE.
pp. 915-930
by
Nan Zhang
,
Kan Yuan
,
Muhammad Naveed
,
Xiaoyong Zhou
,
Xiaofeng Wang
What the App is That? Deception and Countermeasures in the Android User Interface
Freely available from IEEE.
pp. 931-948
by
Antonio Bianchi
,
Jacopo Corbetta
,
Luca Invernizzi
,
Yanick Fratantonio
,
Christopher Kruegel
,
Giovanni Vigna
Author index
Freely available from IEEE.
pp. 949-952
[Publishers information]
Freely available from IEEE.
pp. 954-954
Showing 65 out of 65