


default search action
EuroS&P 2016: Saarbrücken, Germany
- IEEE European Symposium on Security and Privacy, EuroS&P 2016, Saarbrücken, Germany, March 21-24, 2016. IEEE 2016, ISBN 978-1-5090-1751-5

- Eyal Ronen, Adi Shamir:

Extended Functionality Attacks on IoT Devices: The Case of Smart Lights. 3-12 - Daniel Schoepe, Musard Balliu, Benjamin C. Pierce, Andrei Sabelfeld:

Explicit Secrecy: A Policy for Taint Tracking. 15-30 - Celina G. Val, Michael A. Enescu, Sam Bayless, William Aiello, Alan J. Hu:

Precisely Measuring Quantitative Information Flow: 10K Lines of Code and Beyond. 31-46 - Stefano Calzavara

, Ilya Grishchenko
, Matteo Maffei:
HornDroid: Practical and Sound Static Analysis of Android Applications by SMT Solving. 47-62 - Bridger Hahn, Rishab Nithyanand, Phillipa Gill, Rob Johnson:

Games without Frontiers: Investigating Video Games as a Covert Channel. 63-77 - Hugo Krawczyk, Hoeteck Wee:

The OPTLS Protocol and TLS 1.3. 81-96 - Sjouke Mauw, Jorge Toro-Pozo

, Rolando Trujillo-Rasua
:
A Class of Precomputation-Based Distance-Bounding Protocols. 97-111 - Benjamin Mood, Debayan Gupta, Henry Carter

, Kevin R. B. Butler
, Patrick Traynor:
Frigate: A Validated, Extensible, and Efficient Compiler and Interpreter for Secure Computation. 112-127 - Pei Wang, Shuai Wang

, Jiang Ming, Yufei Jiang, Dinghao Wu:
Translingual Obfuscation. 128-144 - Dominique Devriese

, Lars Birkedal
, Frank Piessens:
Reasoning about Object Capabilities with Logical Relations and Effect Parametricity. 147-162 - Marco Guarnieri

, Srdjan Marinovic, David A. Basin:
Strong and Provably Secure Database Access Control. 163-178 - Xinyang Ge, Nirupama Talele, Mathias Payer, Trent Jaeger:

Fine-Grained Control-Flow Integrity for Kernel Software. 179-194 - Galini Tsoukaneri, George Theodorakopoulos

, Hugh Leather
, Mahesh K. Marina:
On the Inference of User Paths from Anonymized Mobility Data. 199-213 - Robert Annessi, Martin Schmiedecker:

NavigaTor: Finding Faster Paths to Anonymity. 214-226 - Ralf Küsters, Tomasz Truderung:

Security Analysis of Re-Encryption RPC Mix Nets. 227-242 - Manuel Barbosa

, Bernardo Portela
, Guillaume Scerri, Bogdan Warinschi:
Foundations of Hardware-Based Attested Computation and Application to SGX. 245-260 - Ashokkumar C.

, Ravi Prakash Giri, Bernard L. Menezes:
Highly Efficient Algorithms for AES Key Retrieval in Cache Access Attacks. 261-275 - Stanislaw Jarecki, Aggelos Kiayias, Hugo Krawczyk, Jiayu Xu:

Highly-Efficient and Composable Password-Protected Secret Sharing (Or: How to Protect Your Bitcoin Wallet Online). 276-291 - Alex Biryukov

, Daniel Dinu, Dmitry Khovratovich:
Argon2: New Generation of Memory-Hard Functions for Password Hashing and Other Applications. 292-302 - Kartik Nayak, Srijan Kumar

, Andrew Miller, Elaine Shi:
Stubborn Mining: Generalizing Selfish Mining and Combining with an Eclipse Attack. 305-320 - Christian Mainka

, Vladislav Mladenov, Jörg Schwenk:
Do Not Trust Me: Using Malicious IdPs for Analyzing and Attacking Single Sign-on. 321-336 - Ning Zhang, He Sun, Kun Sun, Wenjing Lou, Yiwei Thomas Hou

:
CacheKit: Evading Memory Introspection Using Cache Incoherence. 337-352 - Andreas Gutmann, Karen Renaud

, Joseph Maguire
, Peter Mayer
, Melanie Volkamer, Kanta Matsuura
, Jörn Müller-Quade:
ZeTA-Zero-Trust Authentication: Relying on Innate Human Ability, Not Technology. 357-371 - Nicolas Papernot, Patrick D. McDaniel, Somesh Jha, Matt Fredrikson

, Z. Berkay Celik, Ananthram Swami:
The Limitations of Deep Learning in Adversarial Settings. 372-387 - Suphannee Sivakorn, Iasonas Polakis, Angelos D. Keromytis:

I am Robot: (Deep) Learning to Break Semantic Image CAPTCHAs. 388-403 - Pawel Szalachowski, Laurent Chuat, Adrian Perrig

:
PKI Safety Net (PKISN): Addressing the Too-Big-to-Be-Revoked Problem of the TLS Ecosystem. 407-422 - Sylvain Frey, Yehia Elkhatib

, Awais Rashid
, Karolina Follis
, John Edward Vidler, Nicholas J. P. Race
, Christopher Edwards:
It Bends But Would It Break? Topological Analysis of BGP Infrastructures in Europe. 423-438 - Vincent F. Taylor, Riccardo Spolaor, Mauro Conti

, Ivan Martinovic:
AppScanner: Automatic Fingerprinting of Smartphone Apps from Encrypted Network Traffic. 439-454 - Tilman Frosch, Christian Mainka

, Christoph Bader, Florian Bergsma, Jörg Schwenk, Thorsten Holz
:
How Secure is TextSecure? 457-472 - Steve Kremer

, Peter B. Rønne
:
To Du or Not to Du: A Security Analysis of Du-Vote. 473-486

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














