Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
SP
SP 2016
Generate Citations
2016 IEEE Symposium on Security and Privacy (SP)
May 22 2016 to May 26 2016
San Jose, CA, USA
Table of Contents
[Title page i]
Freely available from IEEE.
pp. i-i
[Title page iii]
Freely available from IEEE.
pp. iii-iii
[Copyright notice]
Freely available from IEEE.
pp. iv-iv
Table of contents
Freely available from IEEE.
pp. v-x
Message from the General Chair
Freely available from IEEE.
pp. xi-xiii
Message from the Program Committee Co-Chairs
Freely available from IEEE.
pp. xiv-xiv
Organizing Committee
Freely available from IEEE.
pp. xv-xvi
Program Committee
Freely available from IEEE.
pp. xvii-xviii
External Reviewers
Freely available from IEEE.
pp. xix-xxi
HDFI: Hardware-Assisted Data-Flow Isolation
Freely available from IEEE.
pp. 1-17
by
Chengyu Song
,
Hyungon Moon
,
Monjur Alam
,
Insu Yun
,
Byoungyoung Lee
,
Taesoo Kim
,
Wenke Lee
,
Yunheung Paek
A2: Analog Malicious Hardware
Freely available from IEEE.
pp. 18-37
by
Kaiyuan Yang
,
Matthew Hicks
,
Qing Dong
,
Todd Austin
,
Dennis Sylvester
Cache Storage Channels: Alias-Driven Attacks and Verified Countermeasures
Freely available from IEEE.
pp. 38-55
by
Roberto Guanciale
,
Hamed Nemati
,
Christoph Baumann
,
Mads Dam
Shreds: Fine-Grained Execution Units with Private Memory
Freely available from IEEE.
pp. 56-71
by
Yaohui Chen
,
Sebassujeen Reymondjohnson
,
Zhichuang Sun
,
Long Lu
CaSE: Cache-Assisted Secure Execution on ARM Processors
Freely available from IEEE.
pp. 72-90
by
Ning Zhang
,
Kun Sun
,
Wenjing Lou
,
Y. Thomas Hou
Back in Black: Towards Formal, Black Box Analysis of Sanitizers and Filters
Freely available from IEEE.
pp. 91-109
by
George Argyros
,
Ioannis Stais
,
Aggelos Kiayias
,
Angelos D. Keromytis
LAVA: Large-Scale Automated Vulnerability Addition
Freely available from IEEE.
pp. 110-121
by
Brendan Dolan-Gavitt
,
Patrick Hulin
,
Engin Kirda
,
Tim Leek
,
Andrea Mambretti
,
Wil Robertson
,
Frederick Ulrich
,
Ryan Whelan
Prepose: Privacy, Security, and Reliability for Gesture-Based Programming
Freely available from IEEE.
pp. 122-137
by
Lucas Silva Figueiredo
,
Benjamin Livshits
,
David Molnar
,
Margus Veanes
SOK: (State of) The Art of War: Offensive Techniques in Binary Analysis
Freely available from IEEE.
pp. 138-157
by
Yan Shoshitaishvili
,
Ruoyu Wang
,
Christopher Salls
,
Nick Stephens
,
Mario Polino
,
Andrew Dutcher
,
John Grosen
,
Siji Feng
,
Christophe Hauser
,
Christopher Kruegel
,
Giovanni Vigna
Helping Johnny to Analyze Malware: A Usability-Optimized Decompiler and Malware Analysis User Study
Freely available from IEEE.
pp. 158-177
by
Khaled Yakdan
,
Sergej Dechand
,
Elmar Gerhards-Padilla
,
Matthew Smith
A Practical Oblivious Map Data Structure with Secure Deletion and History Independence
Freely available from IEEE.
pp. 178-197
by
Daniel S. Roche
,
Adam Aviv
,
Seung Geol Choi
TaoStore: Overcoming Asynchronicity in Oblivious Data Storage
Freely available from IEEE.
pp. 198-217
by
Cetin Sahin
,
Victor Zakhary
,
Amr El Abbadi
,
Huijia Lin
,
Stefano Tessaro
Revisiting Square-Root ORAM: Efficient Random Access in Multi-party Computation
Freely available from IEEE.
pp. 218-234
by
Samee Zahur
,
Xiao Wang
,
Mariana Raykova
,
Adrià Gascón
,
Jack Doerner
,
David Evans
,
Jonathan Katz
Cinderella: Turning Shabby X.509 Certificates into Elegant Anonymous Credentials with the Magic of Verifiable Computation
Freely available from IEEE.
pp. 235-254
by
Antoine Delignat-Lavaud
,
Cédric Fournet
,
Markulf Kohlweiss
,
Bryan Parno
PhotoProof: Cryptographic Image Authentication for Any Set of Permissible Transformations
Freely available from IEEE.
pp. 255-271
by
Assa Naveh
,
Eran Tromer
I Think They're Trying to Tell Me Something: Advice Sources and Selection for Digital Security
Freely available from IEEE.
pp. 272-288
by
Elissa M. Redmiles
,
Amelia R. Malone
,
Michelle L. Mazurek
You Get Where You're Looking for: The Impact of Information Sources on Code Security
Freely available from IEEE.
pp. 289-305
by
Yasemin Acar
,
Michael Backes
,
Sascha Fahl
,
Doowon Kim
,
Michelle L. Mazurek
,
Christian Stransky
Users Really Do Plug in USB Drives They Find
Freely available from IEEE.
pp. 306-319
by
Matthew Tischer
,
Zakir Durumeric
,
Sam Foster
,
Sunny Duan
,
Alec Mori
,
Elie Bursztein
,
Michael Bailey
SoK: Everyone Hates Robocalls: A Survey of Techniques Against Telephone Spam
Freely available from IEEE.
pp. 320-338
by
Huahong Tu
,
Adam Doupé
,
Ziming Zhao
,
Gail-Joon Ahn
Sending Out an SMS: Characterizing the Security of the SMS Ecosystem with Public Gateways
Freely available from IEEE.
pp. 339-356
by
Bradley Reaves
,
Nolen Scaife
,
Dave Tian
,
Logan Blue
,
Patrick Traynor
,
Kevin R. B. Butler
Following Devil's Footprints: Cross-Platform Analysis of Potentially Harmful Libraries on Android and iOS
Freely available from IEEE.
pp. 357-376
by
Kai Chen
,
Xueqiang Wang
,
Yi Chen
,
Peng Wang
,
Yeonjoon Lee
,
XiaoFeng Wang
,
Bin Ma
,
Aohui Wang
,
Yingjun Zhang
,
Wei Zou
TriggerScope: Towards Detecting Logic Bombs in Android Applications
Freely available from IEEE.
pp. 377-396
by
Yanick Fratantonio
,
Antonio Bianchi
,
William Robertson
,
Engin Kirda
,
Christopher Kruegel
,
Giovanni Vigna
Inferring User Routes and Locations Using Zero-Permission Mobile Sensors
Freely available from IEEE.
pp. 397-413
by
Sashank Narain
,
Triet D. Vo-Huu
,
Kenneth Block
,
Guevara Noubir
No Pardon for the Interruption: New Inference Attacks on Android Through Interrupt Timing Analysis
Freely available from IEEE.
pp. 414-432
by
Wenrui Diao
,
Xiangyu Liu
,
Zhou Li
,
Kehuan Zhang
SoK: Lessons Learned from Android Security Research for Appified Software Platforms
Freely available from IEEE.
pp. 433-451
by
Yasemin Acar
,
Michael Backes
,
Sven Bugiel
,
Sascha Fahl
,
Patrick McDaniel
,
Matthew Smith
Key Confirmation in Key Exchange: A Formal Treatment and Implications for TLS 1.3
Freely available from IEEE.
pp. 452-469
by
Marc Fischlin
,
Felix Günther
,
Benedikt Schmidt
,
Bogdan Warinschi
Automated Analysis and Verification of TLS 1.3: 0-RTT, Resumption and Delayed Authentication
Freely available from IEEE.
pp. 470-485
by
Cas Cremers
,
Marko Horvat
,
Sam Scott
,
Thyla van der Merwe
Multiple Handshakes Security of TLS 1.3 Candidates
Freely available from IEEE.
pp. 486-505
by
Xinyu Li
,
Jing Xu
,
Zhenfeng Zhang
,
Dengguo Feng
,
Honggang Hu
Downgrade Resilience in Key-Exchange Protocols
Freely available from IEEE.
pp. 506-525
by
Karthikeyan Bhargavan
,
Christina Brzuska
,
Cédric Fournet
,
Matthew Green
,
Markulf Kohlweiss
,
Santiago Zanella-Béguelin
Keeping Authorities "Honest or Bust" with Decentralized Witness Cosigning
Freely available from IEEE.
pp. 526-545
by
Ewa Syta
,
Iulia Tamas
,
Dylan Visher
,
David Isaac Wolinsky
,
Philipp Jovanovic
,
Linus Gasser
,
Nicolas Gailly
,
Ismail Khoffi
,
Bryan Ford
Synthesizing Plausible Privacy-Preserving Location Traces
Freely available from IEEE.
pp. 546-563
by
Vincent Bindschaedler
,
Reza Shokri
A Method for Verifying Privacy-Type Properties: The Unbounded Case
Freely available from IEEE.
pp. 564-581
by
Lucca Hirschi
,
David Baelde
,
Stéphanie Delaune
Distillation as a Defense to Adversarial Perturbations Against Deep Neural Networks
Freely available from IEEE.
pp. 582-597
by
Nicolas Papernot
,
Patrick McDaniel
,
Xi Wu
,
Somesh Jha
,
Ananthram Swami
Algorithmic Transparency via Quantitative Input Influence: Theory and Experiments with Learning Systems
Freely available from IEEE.
pp. 598-617
by
Anupam Datta
,
Shayak Sen
,
Yair Zick
Talos: Neutralizing Vulnerabilities with Security Workarounds for Rapid Response
Freely available from IEEE.
pp. 618-635
by
Zhen Huang
,
Mariana DAngelo
,
Dhaval Miyani
,
David Lie
Security Analysis of Emerging Smart Home Applications
Freely available from IEEE.
pp. 636-654
by
Earlence Fernandes
,
Jaeyeon Jung
,
Atul Prakash
Staying Secure and Unprepared: Understanding and Mitigating the Security Risks of Apple ZeroConf
Freely available from IEEE.
pp. 655-674
by
Xiaolong Bai
,
Luyi Xing
,
Nan Zhang
,
XiaoFeng Wang
,
Xiaojing Liao
,
Tongxin Li
,
Shi-Min Hu
MitM Attack by Name Collision: Cause Analysis and Vulnerability Assessment in the New gTLD Era
Freely available from IEEE.
pp. 675-690
by
Qi Alfred Chen
,
Eric Osterweil
,
Matthew Thomas
,
Z. Morley Mao
Domain-Z: 28 Registrations Later Measuring the Exploitation of Residual Trust in Domains
Freely available from IEEE.
pp. 691-706
by
Chaz Lever
,
Robert Walls
,
Yacin Nadji
,
David Dagon
,
Patrick McDaniel
,
Manos Antonakakis
Seeking Nonsense, Looking for Trouble: Efficient Promotional-Infection Detection through Semantic Inconsistency Search
Freely available from IEEE.
pp. 707-723
by
Xiaojing Liao
,
Kan Yuan
,
XiaoFeng Wang
,
Zhongyu Pei
,
Hao Yang
,
Jianjun Chen
,
Haixin Duan
,
Kun Du
,
Eihal Alowaisheq
,
Sumayah Alrwais
,
Luyi Xing
,
Raheem Beyah
The Cracked Cookie Jar: HTTP Cookie Hijacking and the Exposure of Private Information
Freely available from IEEE.
pp. 724-742
by
Suphannee Sivakorn
,
Iasonas Polakis
,
Angelos D. Keromytis
Cloak of Visibility: Detecting When Machines Browse a Different Web
Freely available from IEEE.
pp. 743-758
by
Luca Invernizzi
,
Kurt Thomas
,
Alexandros Kapravelos
,
Oxana Comanescu
,
Jean-Michel Picod
,
Elie Bursztein
Verifiable ASICs
Freely available from IEEE.
pp. 759-778
by
Riad S. Wahby
,
Max Howald
,
Siddharth Garg
,
Abhi Shelat
,
Michael Walfish
SoK: Verifiability Notions for E-Voting Protocols
Freely available from IEEE.
pp. 779-798
by
Véronique Cortier
,
David Galindo
,
Ralf Küsters
,
Johannes Müller
,
Tomasz Truderung
pASSWORD tYPOS and How to Correct Them Securely
Freely available from IEEE.
pp. 799-818
by
Rahul Chatterjee
,
Anish Athayle
,
Devdatta Akhawe
,
Ari Juels
,
Thomas Ristenpart
On the Practicality of Cryptographically Enforcing Dynamic Access Control Policies in the Cloud
Freely available from IEEE.
pp. 819-838
by
William C. Garrison
,
Adam Shull
,
Steven Myers
,
Adam J. Lee
Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts
Freely available from IEEE.
pp. 839-858
by
Ahmed Kosba
,
Andrew Miller
,
Elaine Shi
,
Zikai Wen
,
Charalampos Papamanthou
High-Speed Inter-Domain Fault Localization
Freely available from IEEE.
pp. 859-877
by
Cristina Basescu
,
Yue-Hsun Lin
,
Haoming Zhang
,
Adrian Perrig
Beauty and the Beast: Diverting Modern Web Browsers to Build Unique Browser Fingerprints
Freely available from IEEE.
pp. 878-894
by
Pierre Laperdrix
,
Walter Rudametkin
,
Benoit Baudry
Verena: End-to-End Integrity Protection for Web Applications
Freely available from IEEE.
pp. 895-913
by
Nikolaos Karapanos
,
Alexandros Filios
,
Raluca Ada Popa
,
Srdjan Capkun
SoK: Towards Grounding Censorship Circumvention in Empiricism
Freely available from IEEE.
pp. 914-933
by
Michael Carl Tschantz
,
Sadia Afroz
,
Name withheld on request
,
Vern Paxson
A Tough Call: Mitigating Advanced Code-Reuse Attacks at the Binary Level
Freely available from IEEE.
pp. 934-953
by
Victor van der Veen
,
Enes Göktas
,
Moritz Contag
,
Andre Pawoloski
,
Xi Chen
,
Sanjay Rawat
,
Herbert Bos
,
Thorsten Holz
,
Elias Athanasopoulos
,
Cristiano Giuffrida
Return to the Zombie Gadgets: Undermining Destructive Code Reads via Code Inference Attacks
Freely available from IEEE.
pp. 954-968
by
Kevin Z. Snow
,
Roman Rogowski
,
Jan Werner
,
Hyungjoon Koo
,
Fabian Monrose
,
Michalis Polychronakis
Data-Oriented Programming: On the Expressiveness of Non-control Data Attacks
Freely available from IEEE.
pp. 969-986
by
Hong Hu
,
Shweta Shinde
,
Sendroiu Adrian
,
Zheng Leong Chua
,
Prateek Saxena
,
Zhenkai Liang
Dedup Est Machina: Memory Deduplication as an Advanced Exploitation Vector
Freely available from IEEE.
pp. 987-1004
by
Erik Bosman
,
Kaveh Razavi
,
Herbert Bos
,
Cristiano Giuffrida
Author index
Freely available from IEEE.
pp. 1005-1008
Publisher's Information
Freely available from IEEE.
pp. 1010-1010
Showing 66 out of 66