List of accepted papers

  • GRIM: Leveraging GPUs for Kernel Integrity Monitoring
    Lazaros Koromilas, Giorgos Vasiliadis (Qatar Computing Research Institute, HBKU),  Elias Athanasopoulos (VU University Amsterdam), and Sotiris Ioannidis (FORTH)
  • Taming Transactions: Towards Hardware-Assisted Control Flow Integrity using Transactional Memory
    Marius Muench (Eurecom), Fabio Pagani (Eurecom), Yan Shoshitaishvili (University of California, Santa Barbara), Christopher Kruegel (University of California, Santa Barbara), Giovanni Vigna (University of California, Santa Barbara), and Davide Balzarotti (Eurecom)
  • Uses and Abuses of Server-Side Requests
    Giancarlo Pellegrino (Saarland University), Onur Catakoglu (Eurecom), Davide Balzarotti (Eurecom), and Christian Rossow (Saarland University)
  • Identifying Extension-based Ad Injection via Fine-grained Web Content Provenance
    Sajjad Arshad (Northeastern University), Amin Kharraz (Northeastern University), and William Robertson (Northeastern University)
  • Trellis: Privilege Separation for Multi-User Applications Made Easy
    Andrea Mambretti (Northeastern University), Kaan Onarlioglu (Northeastern University), Collin Mulliner (Northeastern University), William Robertson (Northeastern University), Engin Kirda (Northeastern University), Federico Maggi (Politecnico di Milano), and Stefano Zanero (Politecnico di Milano)
  • A Look into 30 Years of Malware Development from a Software Metrics Perspective
    Alejandro Calleja (Universidad Carlos III de Madrid), Juan Tapiador (Universidad Carlos III de Madrid), and Juan Caballero (IMDEA Software Institute)
  • Small Changes, Big Changes: An Updated View on the Android Permission System
    Yury Zhauniarovich (Qatar Computing Research Institute, HBKU) and Olga Gadyatskaya (SnT, University of Luxembourg)
  • Who Gets the Boot? Analyzing Victimization by DDoS-as-a-Service
    Arman Noroozian (Delft University of Technology), Maciej Korczynski (Delft University of Technology), Carlos Hernandez Ganan (Delft University of Technology), Daisuke Makita (Yokohama National University), Katsunari Yoshioka (Yokohama National University), and Michel van Eeten (Delft University of Technology)
  • APDU-level attacks in PKCS#11 devices
    Claudio Bozzato (Ca’ Foscari University), Riccardo Focardi (Ca’ Foscari University), Francesco Palmarini (Ca’ Foscari University), and Graham Steel (Cryptosense)
  • CloudRadar: A Real-Time Side-Channel Attack Detection System in Clouds
    Tianwei Zhang (Princeton University), Yinqian Zhang (Ohio State University),  and Ruby B. Lee (Princeton University)
  • The Abuse Sharing Economy: Understanding the Limits of Threat Exchanges
    Kurt Thomas (Google), Rony Amira (Google), Adi Ben-Yoash (Google), Ari Berger (Google), Ori Folger (Google), Amir Hardon (Google), Elie Bursztein (Google), and Michael Bailey (University of Illinois at Urbana-Champaign)
  • SANDPRINT: Fingerprinting Malware Sandboxes to Provide Intelligence for Sandbox Evasion
    Akira Yokoyama (Yokohama National University), Kou Ishii (Yokohama National University), Rui Tanabe (Yokohama National University), Yinmin Papa (Yokohama National University), Katsunari Yoshioka (Yokohama National University), Tsutomu Matsumoto (Yokohama National University), Takahiro Kasama (National Institute of Information and Communications Technology), Daisuke Inoue (National Institute of Information and Communications Technology), Michael Brengel (CISPA, Saarland University), Michael Backes (CISPA, Saarland University & MPI-SWS), and Christian Rossow (CISPA, Saarland University)
  • Enabling Network Security Through Active DNS Datasets
    Athanasios Kountouras (Georgia Institute of Technology), Panagiotis Kintis (Georgia Institute of Technology), Chaz Lever (Georgia Institute of Technology), Yizheng Chen (Georgia Institute of Technology), Yacin Nadji (Netrisk), David Dagon (Georgia Institute of Technology), Manos Antonakakis (Georgia Institute of Technology), and Rodney Joffe (Neustar)
  • A Formal Framework for Environmentally Sensitive Malware
    Jeremy Blackthorne (Rensselaer Polytechnic Institute), Benjamin Kaiser (Rensselaer Polytechnic Institute), and Bulent Yener (Rensselaer Polytechnic Institute)
  • AVClass: A Tool for Massive Malware Labeling
    Marcos Sebastian (IMDEA Software Institute), Richard Rivera (IMDEA Software Institute & Universidad Politécnica de Madrid), Platon Kotzias (IMDEA Software Institute & Universidad Politécnica de Madrid), and Juan Caballero (IMDEA Software Institute)
  • Semantics-Preserving Dissection of JavaScript Exploits via Dynamic JS-Binary Analysis
    Xunchao Hu (Syracuse University), Aravind Prakash (Binghamton University), Jinghan Wang (Syracuse University), Rundong Zhou (Syracuse University), Yao Cheng (Syracuse University), and Heng Yin (Syracuse University)
  • Automatic Uncovering of Tap Points From Kernel Executions
    Junyuan Zeng (University of Texas at Dallas), Yangchun Fu (University of Texas at Dallas), and Zhiqiang Lin (University of Texas at Dallas)
  • Blender: Self-randomizing Address Space Layout for Android Apps
    Mingshen Sun (The Chinese University of Hong Kong), John C.S. Lui (The Chinese University of Hong Kong), and Yajin Zhou (Qihoo 360 Technology Co. Ltd.)
  • Detecting Stack Layout Corruptions with Robust Stack Unwinding
    Yangchun Fu (University of Texas at Dallas), Junghwan Rhee (NEC Laboratories America), Zhiqiang Lin (University of Texas at Dallas), Zhichun Li (NEC Laboratories America), Hui Zhang (NEC Laboratories America), and Guofei Jiang (NEC Laboratories America)
  • The Messenger Shoots Back: Network Operator Based IMSI Catcher Detection
    Adrian Dabrowski (SBA Research), Georg Petzl (T-Mobile Austria), and Edgar R. Weippl (SBA Research)
  • On the Feasibility of TTL-based Filtering for DRDoS Mitigation
    Michael Backes (CISPA, Saarland University & MPI-SWS), Thorsten Holz (Horst Görtz Institute for IT-Security, Ruhr University Bochum) Christian Rossow (CISPA, Saarland University), Teemu Rytilahti (Horst Görtz Institute for IT-Security, Ruhr University Bochum), Milivoj Simeonovski (CISPA, Saarland University), and Ben Stock (CISPA, Saarland University)