IEEE S&P 2015

55 papers accepted.

Updated on 2023-10-06.

You can find the lastest information here.


Protecting Private Keys against Memory Disclosure Attacks Using Hardware Transactional Memory.

CHERI: A Hybrid Capability-System Architecture for Scalable Software Compartmentalization.

VC3: Trustworthy Data Analytics in the Cloud Using SGX.

Using Hardware Features for Increased Debugging Transparency.

Virtual Proofs of Reality and their Physical Implementation.

The Miner's Dilemma.

SoK: Research Perspectives and Challenges for Bitcoin and Cryptocurrencies.

Bitcoin over Tor isn't a Good Idea.

Every Second Counts: Quantifying the Negative Externalities of Cybercrime via Typosquatting.

Ad Injection at Scale: Assessing Deceptive Advertisement Modifications.

Connection-Oriented DNS to Improve Privacy and Security.

Temporal Lensing and Its Application in Pulsing Denial-of-Service Attacks.

Secure Track Verification.

How Secure and Quick is QUIC? Provable Security and Performance Analyses.

SoK: Secure Messaging.

Geppetto: Versatile Verifiable Computation.

ADSNARK: Nearly Practical and Privacy-Preserving Proofs on Authenticated Data.

Secure Sampling of Public Parameters for Succinct Zero Knowledge Proofs.

Forward Secure Asynchronous Messaging from Puncturable Encryption.

Riposte: An Anonymous Messaging System Handling Millions of Users.

Privacy and Access Control for Outsourced Personal Records.

ObliVM: A Programming Framework for Secure Computation.

GraphSC: Parallel Secure Computation Made Easy.

Malicious-Client Security in Blind Seer: A Scalable Private DBMS.

TinyGarble: Highly Compressed and Scalable Sequential Garbled Circuits.

SurroundWeb: Mitigating Privacy Concerns in a 3D Web Browser.

GenoGuard: Protecting Genomic Data against Brute-Force Attacks.

Towards Making Systems Forget with Machine Unlearning.

Cracking-Resistant Password Vaults Using Natural Language Encoders.

SoK: A Comprehensive Analysis of Game-Based Ballot Privacy Definitions.

Vetting SSL Usage in Applications with SSLINT.

A Messy State of the Union: Taming the Composite State Machines of TLS.

Post-Quantum Key Exchange for the TLS Protocol from the Ring Learning with Errors Problem.

Security of the J-PAKE Password-Authenticated Key Exchange Protocol.

S$A: A Shared Cache Attack That Works across Cores and Defies VM Sandboxing - and Its Application to AES.

Last-Level Cache Side-Channel Attacks are Practical.

On Subnormal Floating Point and Abnormal Timing.

Controlled-Channel Attacks: Deterministic Side Channels for Untrusted Operating Systems.

SoK: Deep Packer Inspection: A Longitudinal Study of the Complexity of Run-Time Packers.

A Generic Approach to Automatic Deobfuscation of Executable Code.

The Attack of the Clones: A Study of the Impact of Shared Code on Vulnerability Patching.

Cross-Architecture Bug Search in Binary Executables.

Program-Adaptive Mutational Fuzzing.

Counterfeit Object-oriented Programming: On the Difficulty of Preventing Code Reuse Attacks in C++ Applications.

Readactor: Practical Code Randomization Resilient to Memory Disclosure.

Missing the Point(er): On the Effectiveness of Code Pointer Integrity.

Automatic Inference of Search Patterns for Taint-Style Vulnerabilities.

Micro-Policies: Formally Verified, Tag-Based Security Monitors.

Securing Multiparty Online Services Via Certification of Symbolic Transactions.

Understanding and Monitoring Embedded Web Scripts.

High System-Code Security with Low Overhead.

Caelus: Verifying the Consistency of Cloud Services with Battery-Powered Devices.

Effective Real-Time Android Application Auditing.

Leave Me Alone: App-Level Protection against Runtime Information Gathering on Android.

What the App is That? Deception and Countermeasures in the Android User Interface.