IEEE S&P 2015 55 papers accepted. Updated on 2023-10-06. You can find the lastest information here. Protecting Private Keys against Memory Disclosure Attacks Using Hardware Transactional Memory. CHERI: A Hybrid Capability-System Architecture for Scalable Software Compartmentalization. VC3: Trustworthy Data Analytics in the Cloud Using SGX. Using Hardware Features for Increased Debugging Transparency. Virtual Proofs of Reality and their Physical Implementation. The Miner's Dilemma. SoK: Research Perspectives and Challenges for Bitcoin and Cryptocurrencies. Bitcoin over Tor isn't a Good Idea. Every Second Counts: Quantifying the Negative Externalities of Cybercrime via Typosquatting. Ad Injection at Scale: Assessing Deceptive Advertisement Modifications. Connection-Oriented DNS to Improve Privacy and Security. Temporal Lensing and Its Application in Pulsing Denial-of-Service Attacks. Secure Track Verification. How Secure and Quick is QUIC? Provable Security and Performance Analyses. SoK: Secure Messaging. Geppetto: Versatile Verifiable Computation. ADSNARK: Nearly Practical and Privacy-Preserving Proofs on Authenticated Data. Secure Sampling of Public Parameters for Succinct Zero Knowledge Proofs. Forward Secure Asynchronous Messaging from Puncturable Encryption. Riposte: An Anonymous Messaging System Handling Millions of Users. Privacy and Access Control for Outsourced Personal Records. ObliVM: A Programming Framework for Secure Computation. GraphSC: Parallel Secure Computation Made Easy. Malicious-Client Security in Blind Seer: A Scalable Private DBMS. TinyGarble: Highly Compressed and Scalable Sequential Garbled Circuits. SurroundWeb: Mitigating Privacy Concerns in a 3D Web Browser. GenoGuard: Protecting Genomic Data against Brute-Force Attacks. Towards Making Systems Forget with Machine Unlearning. Cracking-Resistant Password Vaults Using Natural Language Encoders. SoK: A Comprehensive Analysis of Game-Based Ballot Privacy Definitions. Vetting SSL Usage in Applications with SSLINT. A Messy State of the Union: Taming the Composite State Machines of TLS. Post-Quantum Key Exchange for the TLS Protocol from the Ring Learning with Errors Problem. Security of the J-PAKE Password-Authenticated Key Exchange Protocol. S$A: A Shared Cache Attack That Works across Cores and Defies VM Sandboxing - and Its Application to AES. Last-Level Cache Side-Channel Attacks are Practical. On Subnormal Floating Point and Abnormal Timing. Controlled-Channel Attacks: Deterministic Side Channels for Untrusted Operating Systems. SoK: Deep Packer Inspection: A Longitudinal Study of the Complexity of Run-Time Packers. A Generic Approach to Automatic Deobfuscation of Executable Code. The Attack of the Clones: A Study of the Impact of Shared Code on Vulnerability Patching. Cross-Architecture Bug Search in Binary Executables. Program-Adaptive Mutational Fuzzing. Counterfeit Object-oriented Programming: On the Difficulty of Preventing Code Reuse Attacks in C++ Applications. Readactor: Practical Code Randomization Resilient to Memory Disclosure. Missing the Point(er): On the Effectiveness of Code Pointer Integrity. Automatic Inference of Search Patterns for Taint-Style Vulnerabilities. Micro-Policies: Formally Verified, Tag-Based Security Monitors. Securing Multiparty Online Services Via Certification of Symbolic Transactions. Understanding and Monitoring Embedded Web Scripts. High System-Code Security with Low Overhead. Caelus: Verifying the Consistency of Cloud Services with Battery-Powered Devices. Effective Real-Time Android Application Auditing. Leave Me Alone: App-Level Protection against Runtime Information Gathering on Android. What the App is That? Deception and Countermeasures in the Android User Interface.