Accepted Papers

ClickMiner: Towards Forensic Reconstruction of User-Browser Interactions from Network Traces
Christopher Neasbitt (University of Georgia); Roberto Perdisci (University of Georgia and Georgia Institute of Technology); Kang Li (University of Georgia); Terry Nelms (Damballa Inc. and Georgia Institute of Technology)

Uncovering Large Groups of Active Malicious Accounts in Online Social Networks
Qiang Cao (Duke University); Xiaowei Yang (Duke University); Jieqi Yu (Facebook Inc.); Christopher Palow (Facebook Inc.)

Location Privacy Protection for Smartphone Users
Kassem Fawaz (University of Michigan); Kang G.Shin (University of Michigan)

Increasing Security Sensitivity With Social Proof: A Large-Scale Experimental Confirmation
Sauvik Das (Carnegie Mellon University); Adam D.I. Kramer (Facebook, Inc.); Laura A. Dabbish (Carnegie Mellon University); Jason I. Hong (Carnegie Mellon University)

Are You Ready to Lock? Understanding User Motivations for Smartphone Locking Behaviors
Serge Egelman (UC Berkeley and ICSI); Sakshi Jain (UC Berkeley); Rebecca Pottenger (UC Berkeley); Kerwell Liao (Google, Inc.); Sunny Consolvo (Google, Inc.); David Wagner (UC Berkeley)

Code Injection Attacks on HTML5-based Mobile Apps: Characterization, Detection and Mitigation
Xing Jin (Syracuse University); Xunchao Hu (Syracuse University); Kailiang Ying (Syracuse University); Wenliang Du (Syracuse University); Heng Yin (Syracuse University); Gautam Nagesh Peri (Syracuse University)

A Computationally Complete Symbolic Attacker for Equivalence Properties
Gergei Bana (INRIA Paris-Rocquencourt); Hubert Comon-Lundh (École Normale Supérieure de Cachan)

Optimal Average-Complexity Ideal-Security Order-Preserving Encryption
Florian Kerschbaum (SAP), Axel Schroepfer (SAP)

Structural Data De-anonymization: Quantification, Practice, and Implications
Shouling Ji (Georgia Institute of Technology); Weiqing Li (Georgia Institute of Technology); Mudhakar Srivatsa (IBM T.J. Watson Research Center); Raheem Beyah (Georgia Institute of Technology)

Clubbing Seals: Exploring the Ecosystem of Third-party Security Seals
Tom Van Goethem (KU Leuven); Frank Piessens (KU Leuven); Wouter Joosen (KU Leuven); Nick Nikiforakis (Stony Brook University)

PrivEx: Private Collection of Traffic Statistics for Anonymous Communication Networks
Tariq Elahi (University of Waterloo); George Danezis (University College London); Ian Goldberg (University of Waterloo)

RockJIT: Securing Just-In-Time Compilation Using Modular Control-Flow Integrity
Ben Niu (Lehigh University); Gang Tan (Lehigh University)

Consequences of Connectivity: Characterizing Account Hijacking on Twitter
Kurt Thomas (UC Berkeley); Frank Li (UC Berkeley); Chris Grier (UC Berkeley and ICSI); and Vern Paxson (UC Berkeley and ICSI)

System-level non-interference for constant-time cryptography
Gilles Barthe (IMDEA Software Institute); Gustavo Betarte (Universidad de la República); Juan Diego (Universidad de la República); Carlos Luna (Universidad de la República); David Pichardie (ENS Rennes / IRISA / INRIA)

VoIP Fraud: Identifying a Wolf in Sheep's Clothing
Hemant Sengar (VoDaSec Solutions)

Reuse It Or Lose It: More Efficient Secure Computation Through Reuse of Encrypted Values
Benjamin Mood (University of Florida); Debayan Gupta (Yale University); Kevin Butler (University of Florida); Joan Feigenbaum (Yale University)

Multi-ciphersuite security of the Secure Shell (SSH) protocol
Florian Bergsma (Ruhr-University Bochum); Benjamin Dowling (Queensland University of Technology); Florian Kohlar (Ruhr-University Bochum); Jörg Schwenk (Ruhr-University Bochum); Douglas Stebila (Queensland University of Technology);

AutoCog: Measuring the Description-to-permission Fidelity in Android Applications
Zhengyang Qu (Northwestern Univ., US); Vaibhav Rastogi (Northwestern Univ., US); Xinyi Zhang (Fudan Univ., China); Yan Chen (Northwestern Univ., US); Tiantian Zhu (Northeastern Univ., China); Zhong Chen (Wind Mobile, Canada)

Blind Recognition of Touched Keys on Mobile Devices
Qinggang Yue (University of Massachusetts Lowell); Zhen Ling (Southeast University, China); Xinwen Fu (University of Massachusetts Lowell); Benyuan Liu (University of Massachusetts Lowell); Kui Ren (University at Buffalo); Wei Zhao (University of Macau)

Controlled Functional Encryption
Muhammad Naveed (UIUC); Shashank Agrawal (UIUC); Manoj Prabhakaran (UIUC); XiaoFeng Wang (Indiana Univ. Bloomington); Erman Ayday (École polytechnique fédérale de Lausanne); Jean-Pierre Hubaux (École polytechnique fédérale de Lausanne); Carl A. Gunter (UIUC)

Context-free Attacks Using Keyboard Acoustic Emanations
Tong Zhu (Tsinghua University and Tsinghua National Lab IOT Center WuXi); Qiang Ma (Tsinghua University and Tsinghua National Lab IOT Center WuXi); Shanfeng Zhang (Tsinghua University and Hong Kong University of Science and Technology); Yunhao Liu (Tsinghua University and Tsinghua National Lab IOT Center WuXi)

Routing Bottlenecks in the Internet – Causes, Exploits, and Countermeasures
Min Suk Kang (Carnegie Mellon University); Virgil Gligor (Carnegie Mellon University)

Breaking Integrated Circuit Device Security through Test Mode Silicon Reverse Engineering
Markus Kammerstetter (Vienna University of Technology); Markus Muellner (Vienna University of Technology); Daniel Burian (Vienna University of Technology); Christian Platzer (Vienna University of Technology); Wolfgang Kastner (Vienna University of Technology);

Mayhem in the Push Clouds: Understanding and Mitigating Security Hazards in Mobile Push-Messaging Services
Tongxin Li (Peking University); Xiaoyong Zhou (Indiana University Bloomington); Luyi Xing (Indiana University Bloomington); Yeonjoon Lee (Indiana University Bloomington); Muhammad Naveed (University of Illinois at Urbana-Champaign); XiaoFeng Wang (Indiana University Bloomington); Xinhui Han (Peking University)

ATRA: Address Translation Redirection Attack against Hardware-based External Monitors
Daehee Jang (KAIST); Hojoon Lee (KAIST); Minsu Kim (KAIST); Daehyeok Kim (KAIST); Daegyeong Kim (KAIST); Brent Byunghoon Kang (KAIST)

Synthesis of Fault Attacks on Cryptographic Implementations
Gilles Barthe (IMDEA Software Institute); François Dupressoir (IMDEA Software Institute); Pierre-Alain Fouque (Université de Rennes and Institut Universitaire de France); Benjamin Grégoire (INRIA); Jean-Christophe Zapalowicz (INRIA)

Private-by-Design Advertising Meets the Real World
Alexey Reznichenko (MPI-SWS); Paul Francis (MPI-SWS)

Fully Secure and Fast Signing from Obfuscation
Kim Ramchen (University of Texas at Austin); Brent Waters (University of Texas at Austin)

Fail-Secure Access Control
Petar Tsankov (ETH Zurich); Srdjan Marinovic (ETH Zurich); Mohammad Torabi Dashti (ETH Zurich); David Basin (ETH Zurich)

Multi-Stage Key Exchange and the Case of Google's QUIC Protoco
Marc Fischlin (TU Darmstadt); Felix Günther (TU Darmstadt)

Information Leaks Without Memory Disclosures: Remote Side Channel Attacks on Diversified Code
Jeff Seibert (MIT Lincoln Laboratory); Hamed Okhravi (MIT Lincoln Laboratory); Eric Soderstrom (MIT CSAIL)

Outsourced Proofs of Retrievability
Frederik Armknecht (University of Mannheim); Jens-Matthias Bohli (NEC Laboratories Europe); Ghassan O. Karame (NEC Laboratories Europe); Zongren Liu (NEC Laboratories Europe); Christian A. Reuter (University of Mannheim)

Harvesting high value foreign currency transactions from EMV contactless cards without the PIN
Martin Emms (Newcastle University); Budi Arief (Newcastle University); Leo Freitas (Newcastle University); Joseph Hannon (Newcastle University); Aad van Moorsel (Newcastle University)

Toward Robust Hidden Volumes using Write-Only Oblivious RAM
Erik-Oliver Blass (Northeastern University); Travis Mayberry (Northeastern University); Guevara Noubir (Northeastern University); Kaan Onarlioglu (Northeastern University)

Oblivious Data Structures
Xiao Shaun Wang (University of Maryland); Kartik Nayak (University of Maryland); Chang Liu (University of Maryland); T-H. Hubert Chan (University of Hong Kong); Elaine Shi (University of Maryland); Emil Stefanov (University of California, Berkeley); Yan Huang (Indiana University, Bloomington)

Security Analysis of the Estonian Internet Voting System
Drew Springall (University of Michigan); Travis Finkenauer (University of Michigan); Zakir Durumeric (University of Michigan); Jason Kitcat (Open Rights Group, U.K.); Harri Hursti (University of Michigan); Margaret MacAlpine (University of Michigan); J. Alex Halderman (University of Michigan)

Faces in the Distorting Mirror: Revisiting Photo-based Social Authentication
Iasonas Polakis (Columbia University); Panagiotis Ilia (FORTH); Federico Maggi (Politecnico Di Milano); Marco Lancini (CEFRIEL); Georgios Kontaxis (Columbia University); Stefano Zanero (Politecnico Di Milano); Sotiris Ioannidis (FORTH); Angelos D. Keromytis (Columbia University)

Blind Transmitter Authentication for Spectrum Security and Enforcement
Vireshwar Kumar (Virginia Tech); Jung-Min Park (Virginia Tech); Kaigui Bian (Peking University)

World-Driven Access Control for Continuous Sensing
Franziska Roesner (University of Washington); David Molnar (Microsoft Research); Alexander Moshchuk (Microsoft Research); Tadayoshi Kohno (University of Washington); Helen J. Wang (Microsoft Research)

Moving Targets: Security and Rapid-Release in Firefox
Sandy Clark (University of Pennsylvania); Michael Collis (University of Pennsylvania); Matt Blaze (University of Pennsylvania); Jonathan Smith (University of Pennsylvania)

Dialing Back Abuse on Phone Verified Accounts
Kurt Thomas (Google); Dima Iatskiv (Google); Elie Bursztein (Google); Tadek Pietraszek (Google); Chris Grier (UC Berkeley; ICSI); Damon McCoy (George Mason University)

Automating Information Flow Analysis of Low Level Code
Musard Balliu (KTH Royal Institute of Technology); Mads Dam (KTH Royal Institute of Technology); Roberto Guanciale (KTH Royal Institute of Technology)

OAuth Demystified for Mobile Application Developers
Eric Chen (Carnegie Mellon University); Yutong Pei (Carnegie Mellon University); Yuan Tian (Carnegie Mellon University); Robert Kotcher (Carnegie Mellon University); Patrick Tague (Carnegie Mellon University); Shuo Chen (Microsoft Research)

Community-Enhanced De-anonymization of Online Social Networks
Shirin Nilizadeh (Indiana University Bloomington); Apu Kapadia (Indiana University Bloomington); Yong-Yeol Ahn (Indiana University Bloomington)

Do You Hear What I Hear? Fingerprinting Smart Devices Through Embedded Acoustic Components
Anupam Das (University of Illinois at Urbana-Champaign); Nikita Borisov (University of Illinois at Urbana-Champaign); Matthew Caesar (University of Illinois at Urbana-Champaign)

Algebraic MACs and Keyed-Verification Anonymous Credentials
Melissa Chase (Microsoft Research); Sarah Meiklejohn (University College London); Greg Zaverucha (Microsoft Research)

From Patches to Honey-Patches: Lightweight Attacker-Misdirection, Deception, and Disinformation
Frederico Araujo (The University of Texas at Dallas); Kevin W. Hamlen (The University of Texas at Dallas); Sebastian Biedermann (TU Darmstadt); Stefan Katzenbeisser (TU Darmstadt)

A Tale of Two Kernels: Towards Ending Kernel Hardening Wars with Split Kernel
Anil Kurmus (IBM Research - Zurich); Robby Zippel (IBM Research - Zurich)

A Nearly Four-Year Longitudinal Study of Search-Engine Poisoning
Nektarios Leontiadis (Carnegie Mellon University); Tyler Moore (Southern Methodist University); Nicolas Christin (Carnegie Mellon University)

Your Online Interests – Pwned! A Pollution Attack Against Targeted Advertising
Wei Meng (Georgia Institute of Technology); Xinyu Xing (Georgia Institute of Technology); Anmol Sheth (Technicolor); Wenke Lee (Georgia Institute of Technology)

A New Additive Homomorphic Encryption based on the co-ACD Problem
Jung Hee Cheon (Seoul National University); Hyung Tae Lee (Nanyang Technological University); Jae Hong Seo (Myongji University)

MACE: Detecting Privilege Escalation Vulnerabilities in Web Applications
Maliheh Monshizadeh (University of Illinois at Chicago); Prasad Naldurg (IBM Research India); V. N. Venkatakrishnan (University of Illinois at Chicago)

Securing SSL Certificate Validation through Dynamic Linking
Adam Bates (University of Florida); Joe Pletcher (University of Oregon); Tyler Nichols (University of Oregon); Braden Hollembaek (iSEC Partners); Jing (Dave) Tian (University of Florida); Abdulrahman Alkhelaifi (University of Oregon); Kevin R. B. Butler (University of Florida)

Deniable Liaisons
Abhinav Narain (Georgia Institute of Technology); Nick Feamster (Georgia Institute of Technology); Alex Snoeren (University of California, San Diego)

Decide Now or Decide Later? Quantifying the Tradeoff between Prospective and Retrospective Access Decisions
Wen Zhang (Vanderbilt University); You Chen(Vanderbilt University); Thaddeus R. Cybulski (Northwestern University); Daniel Fabbri (Vanderbilt University); Carl A. Gunter(University of Illinois); Patrick Lawlor (Northwestern University); David Liebovitz(Northwestern University); Bradley Malin(Vanderbilt University)

ARMlock: Hardware-based Fault Isolation for ARM
Yajin Zhou (North Carolina State University); Xiaoguang Wang (Xi'an Jiaotong University); Yue Chen (Florida State University); Zhi Wang (Florida State University)

Optimal Geo-Indistinguishable Mechanisms for Location Privacy
Nicolás E. Bordenabe (INRIA and École Polytechnique); Konstantinos Chatzikokolakis (CNRS and École Polytechnique); Catuscia Palamidessi (INRIA and École Polytechnique)

Real Threats to Your Data Bills: Security Loopholes and Defenses in Mobile Data Charging
Chunyi Peng (Ohio State University); Chi-yu Li (University of California, Los Angeles); Hongyi Wang (University of California, Los Angeles); Guan-hua Tu (University of California, Los Angeles); Songwu Lu (University of California, Los Angeles)

The Web never forgets: Persistent tracking mechanisms in the wild
Gunes Acar (KU Leuven/iMinds), Christian Eubank (Princeton Universit), Steven Englehardt (Princeton Universit), Marc Juarez (KU Leuven/iMinds), Arvind Narayanan (Princeton Universit), Claudia Diaz (KU Leuven/iMinds)

RAPPOR: Randomized Aggregatable Privacy-Preserving Ordinal Response
Ulfar Erlingsson (Google Inc.); Vasyl Pihur (Google Inc.); Aleksandra Korolova (University of Southern California)

Mechanized Network Origin and Path Authenticity Proofs
Fuyuan Zhang (Carnegie Mellon University); Limin Jia (Carnegie Mellon University); Cristina Basescu (ETH Zurich); Tiffany Hyun-Jin Kim (Carnegie Mellon University); Yih-Chun Hu (UIUC); Adrian Perrig (ETH Zurich)

Formatted Encryption beyond Regular Languages
Daniel Luchaup (University of Wisconsin at Madison); Thomas Shrimpton (Portland State University); Thomas Ristenpart (University of Wisconsin at Madison); Somesh Jha (University of Wisconsin at Madison)

AutoProbe: Towards Automatic Active Malicious Server Probing Using Dynamic Binary Analysis
Zhaoyan Xu (Texas A&M University); Antonio Nappa (IMDEA Software Institute); Robert Baykov (Texas A&M University); Guangliang Yang (Texas A&M University); Juan Caballero (IMDEA Software Institute); Guofei Gu (Texas A&M University)

Rosemary: A Robust, Secure, and High-performance Network Operating System
Seungwon Shin (KAIST); Yongjoo Song (Atto-Research); Taekyung Lee (Atto-Research); Sangho Lee (Atto-Research); Jaewoong Chung (Atto-Research); Phillip Porras (SRI International); Vinod Yegneswaran (SRI International); Jiseong Noh (KAIST); Brent Byunghoon Kang (KAIST)

ALITHEIA: Towards Practical Verifiable Graph Processing
Yupeng Zhang (University of Maryland); Charalampos Papamanthou (University of Maryland); Jonathan Katz (University of Maryland)

PoliCert: Secure and Flexible TLS Certificate Management
Pawel Szalachowski (ETH Zurich); Stephanos Matsumoto (CMU/ETH Zurich); Adrian Perrig (ETH Zurich)

Cross-Tenant Side-Channel Attacks in PaaS Clouds
Yinqian Zhang (University of North Carolina at Chapel Hill); Ari Juels (Cornell Tech); Michael K. Reiter (University of North Carolina at Chapel Hill); Thomas Ristenpart (University of Wisconsin, Madison)

Amandroid: A Precise and General Inter-component Data Flow Analysis Framework for Security Vetting of Android Apps
Fengguo Wei (Kansas State University), Sankardas Roy (Kansas State University), Xinming Ou (Kansas State University) and Robby (Kansas State University)

Semantics-Aware Android Malware Classification Using Weighted Contextual API Dependency Graphs
Mu Zhang (Syracuse University); Yue Duan (Syracuse University); Heng Yin (Syracuse University); Zhiruo Zhao (Syracuse University)

A Systematic Approach to Developing and Evaluating Website Fingerprinting Defenses
Xiang Cai (Stony Brook University); Rishab Nithyanand (Stony Brook University); Tao Wang (University of Waterloo); Rob Johnson (Stony Brook University); Ian Goldberg (University of Waterloo)

Code Reuse Attacks in PHP: Automated POP Chain Generation
Johannes Dahse (Ruhr-Universität Bochum); Nikolai Krein (Ruhr-Universität Bochum); Thorsten Holz (Ruhr-Universität Bochum)

SCORAM: Oblivious RAM for Secure Computation
Xiao Shaun Wang (University of Maryland); Yan Huang (Indiana University, Bloomington); T-H. Hubert Chan (University of Hong Kong); abhi shelat (University of Virginia); Elaine Shi (University of Maryland)

Efficiently Verifiable Computation on Encrypted Data
Dario Fiore (IMDEA Software Institute); Rosario Gennaro (CUNY); Valerio Pastro (CUNY)

Characterizing Large-Scale Click Fraud in ZeroAccess
Paul Pearce (UC Berkeley/ICSI); Vacha Dave (Microsoft); Chris Grier (UC Berkeley/ICSI); Kirill Levchenko (UC San Diego); Saikat Guha (Microsoft Research); Damon McCoy (George Mason University); Vern Paxson (UC Berkeley/ICSI); Stefan Savage (UC San Diego); Geoffrey Voelker (UC San Diego)

Verifying Curve25519 Software
Yu-Fang Chen (Academia Sinica Taiwan); Chang-Hong Hsu (University of Michigan); Hsin-Hung Lin (Kyushu University); Peter Schwabe (Radboud University Nijmegen); Ming-Hsien Tsai (Academia Sinica Taiwan); Bow-Yaw Wang (Academia Sinica Taiwan); Bo-Yin Yang (Academia Sinica Taiwan); Shang-Yi Yang (Academia Sinica Taiwan)

(Nothing else) MATor(s): Monitoring the Anonymity of Tor's Path Selection
Michael Backes (Saarland University, CISPA); Aniket Kate (Saarland University, MMCI); Sebastian Meiser (Saarland University, CISPA); Esfandiar Mohammadi (Saarland University, CISPA)

S3: A Symbolic String Solver for Vulnerability Detection in Web Applications
Minh-Thai Trinh (National University of Singapore); Duc-Hiep Chu (National University of Singapore); Joxan Jaffar (National University of Singapore)

Taking Authenticated Range Queries to Arbitrary Dimensions
Dimitrios Papadopoulos (Boston University); Stavros Papadopoulos (Intel Labs and MIT); Nikos Triandopoulos (RSA Laboratories and Boston University)

Practical UC security with a global random oracle
Ran Canetti (Boston University and Tel-Aviv University); Abhishek Jain (Boston University and MIT); Alessandra Scafuro (UCLA)

RevCast: Fast, Private Certificate Revocation over FM Radio
Aaron Schulman (Stanford University); Dave Levin (University of Maryland); Neil Spring (University of Maryland)

How to Use Bitcoin to Incentivize Correct Computations
Ranjit Kumaresan (Technion); Iddo Bentov (Technion)

Vulnerability and Protection of Channel State Information in Multiuser MIMO Networks
Yu-Chih Tung (University of Michigan); Sihui Han (University of Michigan); Dongyao Chen (University of Michigan); Kang G. Shin (University of Michigan)

Wiretapping via Mimicry: Short Voice Imitation Man-in-the-Middle Attacks on Crypto Phones
Maliheh Shirvanian (University of Alabama at Birmingham); Nitesh Saxena (University of Alabama at Birmingham)

DeTrust: Defeating Hardware Trust Verification with Stealthy Implicitly-Triggered Hardware Trojans
Jie Zhang (The Chinese University of Hong Kong); Feng Yuan (The Chinese University of Hong Kong); Qiang Xu (The Chinese University of Hong Kong)

Security Vulnerability in Processor-Interconnect Router Design
Won Jun Song (KAIST); John Kim (KAIST); Jae W. Lee (Sungkyunkwan University); Dennis Abts (Google)

A Threat for Tablet PCs in Public Space: Remote Visualization of Screen Images Using EM Emanation
Yuichi Hayashi (Tohoku University); Naofumi Homma (Tohoku University); Mamoru Miura (Tohoku University); Takafumi Aoki (Tohoku University); Hideaki Sone (Tohoku University)

Founding Digital Currency on Secure Computation
Karim El Defrawy (HRL Laboratories); Joshua Lampkins (UCLA)

The Last Mile: An Empirical Study of Some Timing Channels on seL4
David Cock (NICTA and UNSW); Qian Ge (NICTA and UNSW); Toby Murray (NICTA and UNSW); Gernot Heiser (NICTA and UNSW)

A11y Attacks: Exploiting Accessibility in Operating Systems
Yeongjin Jang (Georgia Institute of Technology); Chengyu Song (Georgia Institute of Technology); Simon P. Chung (Georgia Institute of Technology); Tielei Wang (Georgia Institute of Technology); Wenke Lee (Georgia Institute of Technology)

Searchable Encryption with Secure and Efficient Updates
Florian Hahn (SAP), Florian Kerschbaum (SAP)

ARPKI: Attack Resilient Public-key Infrastructure
David Basin - ETH Zurich, Switzerland; Cas Cremers - University of Oxford, UK; Tiffany Hyun-Jin Kim - Carnegie Mellon University, USA; Adrian Perrig - ETH Zurich, Switzerland; Ralf Sasse - ETH Zurich, Switzerland; Pawel Szalachowski - ETH Zurich, Switzerland

Acoustic Fingerprinting Revisited: Generate Stable Device ID Stealthy with Inaudible Sound
Zhe Zhou (The Chinese University of Hong Kong); Wenrui Diao (The Chinese University of Hong Kong); Xiangyu Liu (The Chinese University of Hong Kong); Kehuan Zhang (The Chinese University of Hong Kong)

Hey, NSA: Stay Away from my Market! Future Proofing App Markets against Powerful Attackers
Sascha Fahl (Fraunhofer, FKIE Bonn); Sergej Dechand (University of Bonn); Henning Perl (Fraunhofer, FKIE Bonn); Felix Fischer (University of Hannover); Jaromir Smrcek (Zoner, Inc.); Matthew Smith (University of Bonn)

PixelVault: Using GPUs for Securing Cryptographic Operations
Giorgos Vasiliadis (FORTH); Elias Athanasopoulos (FORTH); Michalis Polychronakis (Columbia University); Sotiris Ioannidis (FORTH)

ShadowCrypt: Encrypted Web Applications for Everyone
Warren He (University of California Berkeley); Devdatta Akhawe (University of California Berkeley); Sumeet Jain (University of California Berkeley); Elaine Shi (University of Maryland); Dawn Song (University of California Berkeley)

VerSum: Verifiable Computations over Large Public Logs
Jelle van den Hooff (MIT); M. Frans Kaashoek (MIT); Nickolai Zeldovich (MIT)

An Epidemiological Study of Malware Encounters in a Large Enterprise
Ting-Fang Yen (E8 Security); Victor Heorhiadi (University of North Carolina at Chapel Hill); Alina Oprea (RSA Laboratories); Michael K. Reiter (University of North Carolina at Chapel Hill); Ari Juels (Cornell Tech)

The UNIX Process Identity Crisis: A Standards-Driven Approach to Setuid
Mark Dittmer (University of Waterloo); Mahesh V. Tripunitara (University of Waterloo)

Context-Based Zero-Interaction Pairing and Key Evolution for Advanced Personal Devices
Markus Miettinen (TU Darmstadt); Majid Sobhani (TU Darmstadt); Thien Duc Nguyen (TU Darmstadt); Ahmad-Reza Sadeghi (TU Darmstadt); N. Asokan (Aalto University and University of Helsinki)

Detection of On-Road Vehicles Emanating GPS Interference
Gorkem Kar (Rutgers University); Hossen Mustafa (University of South Carolina); Yan Wang (Stevens Institute of Technology); Yingying Chen (Stevens Institute of Technology); Wenyuan Xu (University of South Carolina); Marco Gruteser (Rutgers University); Tam Vu (University of Colorado Denver)

Aletheia: Improving the Usability of Static Security Analysis
Omer Tripp (IBM T.J. Watson Research Center); Salvatore Guarnieri (IBM T.J. Watson Research Center); Marco Pistoia (IBM T.J. Watson Research Center); Aleksandr Aravkin (IBM T.J. Watson Research Center)

Optimizing Obfuscation: Avoiding Barrington's Theorem
Prabhanjan Ananth (UCLA); Divya Gupta (UCLA); Yuval Ishai (Technion and UCLA); Amit Sahai (UCLA)

Collaborative verification of information flow for a high-assurance app store
Michael D. Ernst (Univ. of Washington); René Just (Univ. of Washington); Suzanne Millstein (Univ. of Washington); Werner Dietl (Univ. of Waterloo); Stuart Pernsteiner (Univ. of Washington); Franziska Roesner (Univ. of Washington); Karl Koscher (Univ. of Washington); Paulo Barros (Univ. of Washington); Ravi Bhoraskar (Univ. of Washington); Seungyeop Han (Univ. of Washington); Paul Vines (Univ. of Washington); Edward X. Wu (Univ. of Washington)

Hypervision Across Worlds: Real-time Kernel Protection from the ARM TrustZone Secure World
Ahmed Azab (Samsung Research America); Peng Ning (Samsung Research America/ NC State University); Jitesh Shah (Samsung Research America); Quan Chen (NC State University); Rohan Bhutkar (Samsung Research America); Guruprasad Ganesh (Samsung Research America); Jia Ma (Samsung Research America); Wenbo Shen (NC State University)

Watching the Watchers: Inferring TV Content From Outdoor Light Effusions
Yi Xu (University of North Carolina at Chapel Hill); Fabian Monrose (University of North Carolina at Chapel Hill); Jan-Michael Frahm (University of North Carolina at Chapel Hill);

Beware, Your Hands Reveal Your Secrets
Diksha Shukla (Syracuse University); Rajesh Kumar (Syracuse University); Abdul Serwadda (Syracuse University); Vir V. Phoha (Syracuse University)

Beyond Pattern Matching: A Concurrency Model for Stateful Deep Packet Inspection
Lorenzo De Carli (University of Wisconsin-Madison); Robin Sommer (ICSI/LBNL); Somesh Jha (University of Wisconsin-Madison)

Security Analyses of Click-based Graphical Passwords via Image Point Memorability
Bin B. Zhu (Microsoft Research Asia); Jeff Yan (Newcastle University); Dongchen Wei (Sichuan University); Maowei Yang (Sichuan University)

Quantifying Web-Search Privacy
Arthur Gervais (ETH Zurich); Reza Shokri (ETH Zurich); Adish Singla (ETH Zurich); Srdjan Capkun (ETH Zurich); Vincent Lenders (Armasuisse)

A Critical Evaluation of Website Fingerprinting Attacks
Marc Juarez (KU Leuven and iMinds); Sadia Afroz (University of California, Berkeley), Gunes Acar (KU Leuven and iMinds), Claudia Diaz (KU Leuven and iMinds), Rachel Greenstadt (Drexel University)

On The Security of Mobile Cockpit Information Systems
Devin Lundberg (UC San Diego); Brown Farinholt (UC San Diego); Edward Sullivan (UC San Diego); Ryan Mast (UC San Diego); Stephen Checkoway (Johns Hopkins University), Stefan Savage (UC San Diego); Alex Snoeren (UC San Diego); Kirill Levchenko (UC San Diego)

Characterization of Real-Life PRNGs under Partial State Corruption
Sylvain Ruhault (Ecole Normale Supérieure and Oppida); Mario Cornejo (Ecole Normale Supérieure and INRIA)

You Can Run but You Can't Read: Preventing Disclosure Exploits in Executable Code
Michael Backes (Max-Planck-Institute for Software Systems and Saarland University); Thorsten Holz (Ruhr-Universität Bochum); Benjamin Kollenda (Ruhr-Universität Bochum); Philipp Koppe (Ruhr-Universität Bochum); Stefan Nürnberger (Saarland University); Jannik Pewny (Ruhr-Universität Bochum)

Deanonymisation of clients in Bitcoin P2P network
Alex Biryukov (University of Luxembourg); Dmitry Khovratovich (University of Luxembourg); Ivan Pustogarov (University of Luxembourg)