


default search action
EuroS&P 2016: Saarbrücken, Germany
- IEEE European Symposium on Security and Privacy, EuroS&P 2016, Saarbrücken, Germany, March 21-24, 2016. IEEE 2016, ISBN 978-1-5090-1751-5
- Eyal Ronen, Adi Shamir:
Extended Functionality Attacks on IoT Devices: The Case of Smart Lights. 3-12 - Daniel Schoepe, Musard Balliu, Benjamin C. Pierce, Andrei Sabelfeld:
Explicit Secrecy: A Policy for Taint Tracking. 15-30 - Celina G. Val, Michael A. Enescu, Sam Bayless, William Aiello, Alan J. Hu:
Precisely Measuring Quantitative Information Flow: 10K Lines of Code and Beyond. 31-46 - Stefano Calzavara
, Ilya Grishchenko
, Matteo Maffei:
HornDroid: Practical and Sound Static Analysis of Android Applications by SMT Solving. 47-62 - Bridger Hahn, Rishab Nithyanand, Phillipa Gill, Rob Johnson:
Games without Frontiers: Investigating Video Games as a Covert Channel. 63-77 - Hugo Krawczyk, Hoeteck Wee:
The OPTLS Protocol and TLS 1.3. 81-96 - Sjouke Mauw, Jorge Toro-Pozo
, Rolando Trujillo-Rasua
:
A Class of Precomputation-Based Distance-Bounding Protocols. 97-111 - Benjamin Mood, Debayan Gupta, Henry Carter
, Kevin R. B. Butler
, Patrick Traynor:
Frigate: A Validated, Extensible, and Efficient Compiler and Interpreter for Secure Computation. 112-127 - Pei Wang, Shuai Wang
, Jiang Ming, Yufei Jiang, Dinghao Wu:
Translingual Obfuscation. 128-144 - Dominique Devriese
, Lars Birkedal, Frank Piessens:
Reasoning about Object Capabilities with Logical Relations and Effect Parametricity. 147-162 - Marco Guarnieri
, Srdjan Marinovic, David A. Basin:
Strong and Provably Secure Database Access Control. 163-178 - Xinyang Ge, Nirupama Talele, Mathias Payer, Trent Jaeger:
Fine-Grained Control-Flow Integrity for Kernel Software. 179-194 - Galini Tsoukaneri, George Theodorakopoulos
, Hugh Leather
, Mahesh K. Marina:
On the Inference of User Paths from Anonymized Mobility Data. 199-213 - Robert Annessi, Martin Schmiedecker:
NavigaTor: Finding Faster Paths to Anonymity. 214-226 - Ralf Küsters, Tomasz Truderung:
Security Analysis of Re-Encryption RPC Mix Nets. 227-242 - Manuel Barbosa
, Bernardo Portela
, Guillaume Scerri, Bogdan Warinschi:
Foundations of Hardware-Based Attested Computation and Application to SGX. 245-260 - Ashokkumar C.
, Ravi Prakash Giri, Bernard L. Menezes:
Highly Efficient Algorithms for AES Key Retrieval in Cache Access Attacks. 261-275 - Stanislaw Jarecki, Aggelos Kiayias, Hugo Krawczyk, Jiayu Xu:
Highly-Efficient and Composable Password-Protected Secret Sharing (Or: How to Protect Your Bitcoin Wallet Online). 276-291 - Alex Biryukov
, Daniel Dinu, Dmitry Khovratovich:
Argon2: New Generation of Memory-Hard Functions for Password Hashing and Other Applications. 292-302 - Kartik Nayak, Srijan Kumar
, Andrew Miller, Elaine Shi:
Stubborn Mining: Generalizing Selfish Mining and Combining with an Eclipse Attack. 305-320 - Christian Mainka
, Vladislav Mladenov, Jörg Schwenk:
Do Not Trust Me: Using Malicious IdPs for Analyzing and Attacking Single Sign-on. 321-336 - Ning Zhang, He Sun, Kun Sun, Wenjing Lou, Yiwei Thomas Hou
:
CacheKit: Evading Memory Introspection Using Cache Incoherence. 337-352 - Andreas Gutmann, Karen Renaud
, Joseph Maguire
, Peter Mayer
, Melanie Volkamer, Kanta Matsuura
, Jörn Müller-Quade:
ZeTA-Zero-Trust Authentication: Relying on Innate Human Ability, Not Technology. 357-371 - Nicolas Papernot, Patrick D. McDaniel, Somesh Jha, Matt Fredrikson
, Z. Berkay Celik, Ananthram Swami:
The Limitations of Deep Learning in Adversarial Settings. 372-387 - Suphannee Sivakorn, Iasonas Polakis, Angelos D. Keromytis:
I am Robot: (Deep) Learning to Break Semantic Image CAPTCHAs. 388-403 - Pawel Szalachowski, Laurent Chuat, Adrian Perrig
:
PKI Safety Net (PKISN): Addressing the Too-Big-to-Be-Revoked Problem of the TLS Ecosystem. 407-422 - Sylvain Frey, Yehia Elkhatib
, Awais Rashid
, Karolina Follis
, John Edward Vidler, Nicholas J. P. Race
, Christopher Edwards:
It Bends But Would It Break? Topological Analysis of BGP Infrastructures in Europe. 423-438 - Vincent F. Taylor, Riccardo Spolaor, Mauro Conti
, Ivan Martinovic:
AppScanner: Automatic Fingerprinting of Smartphone Apps from Encrypted Network Traffic. 439-454 - Tilman Frosch, Christian Mainka
, Christoph Bader, Florian Bergsma, Jörg Schwenk, Thorsten Holz
:
How Secure is TextSecure? 457-472 - Steve Kremer
, Peter B. Rønne
:
To Du or Not to Du: A Security Analysis of Du-Vote. 473-486

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.