Main Track Accepted Papers

  • Reducing the "Tax" of Reliability: A Hardware-Aware Method for Agile Data Persistence in Mobile Devices. Meng Wang, Huxiang Chen (University of Florida), Tao Li (NSF/University of Florida)

  • Statistical Model Checking for hybrid Petri Nets with multiple general transitions.Carina Pilch(Westfälische Wilhelms-Universität Münster), Anne Remke (Westfälische Wilhelms-Universität Münster)

  • IM-Visor: A Pre-IME Guard to Prevent IME Apps from Stealing Sensitive Keystrokes Using TrustZone.Chen Tian, Yazhe Wang (State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences); Peng Liu (College of Information Sciences and Technology, Pennsylvania State University, University Park); Qihui Zhou, Chengyi Zhang (State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences)

  • Ghost Installer in the Shadow: Security Analysis of App Installation on Android. Yeonjoon Lee (Indiana University Bloomington); Tongxin Li (Peking University); Nan Zhang (Indiana University Bloomington); Soteris Demetriou (University of Illinois at Urbana-Champaign); Mingming Zha (Chinese Academy of Sciences); XiaoFeng Wang (Indiana University Bloomington); Kai Chen (Chinese Academy of Sciences); Xiaoyong Zhou (Samsung Research America); Xinhui Han (Peking University); Michael Grace (m1.grace@samsung.com)

  • Athena: A Framework for Scalable Anomaly Detection in Software-Defined Networks.Seunghyeon Lee, Jinwoo Kim, Seungwon Shin (KAIST); Phillip Porras, Vinod Yegneswaran (SRI International)

  • Concolic Execution on Small-Size Binary Codes: Challenges and Empirical Study [Practical Experience Report]. Hui Xu (CUHK); Yangfan Zhou, Yu Kang (Fudan University), Michael R Lyu (CUHK)

  • Towards Secure and Verifiable Database-driven Spectrum Sharing. Zhili Chen (Anhui University); Lin Chen (University of Paris-Sud); Hong Zhong (Anhui University)

  • Exploring the Potential for Collaborative Data Compression and Hard-Error Tolerance in Resistive Memories.Amin Jadidi, Mohammad Arjomand (Pennsylvania State University); Mohammad Khavari Tavana, David Kaeli (Northeastern University); Mahmut Kandemir, Chita Das (Pennsylvania State University)

  • Multimodal Indexable Encryption for Mobile Cloud-based Applications . Bernardo Ferreira, João Leitão, Henrique Domingos (FCT/UNL & NOVA LINCS)

  • I know nothing about you but here is what you might like .Rachid Guerraoui (EPFL); Anne-Marie Kermarrec (Inria); Rhicheek Patra (EPFL); Mahammad Valiyev (TU Munich); Jingjing Wang (EPFL)

  • Counting in the Dark: Caches Discovery and Enumeration in the Internet . Amit Klein, Haya Shulman, Michael Waidner (Fraunhofer SIT)

  • What You See is Not What You Get! Thwarting Just-in-Time ROP with Chameleon .Ping Chen, Jun Xu (College of Information Sciences and Technology, The Pennsylvania State University); Zhisheng Hu (School of Electrical Engineering and Computer Sci- ence,Pennsylvania State University); Xinyu Xing (College of Information Sciences and Technology, The Pennsylvania State University); Minghui Zhu (School of Electrical Engineering and Computer Sci- ence,Pennsylvania State University); Bing Mao (State Key Laboratory for Novel Software Technology, Nanjing University); Peng Liu (College of Information Sciences and Technology, The Pennsylvania State University)

  • ATTAIN: An Attack Injection Framework for Software-Defined Networking .Benjamin E. Ujcich, Uttam Thakore, William H. Sanders (University of Illinois at Urbana-Champaign)

  • Sensor-based Implicit Authentication of Smartphone Users . Wei-Han Lee, Ruby Lee (Princeton University)

  • Smart Maintenance via Dynamic Fault Tree Analysis: A Case Study on Singapore MRT System [Practical Experience Report] Authors: Yan Liu, Yue Wu (Advanced Digital Science Center); Zbigniew Kalbarczyk (University of Illinois at Urbana-Champaign)

  • StatSym: Vulnerable Path Discovery through Statistics-guided Symbolic Execution Authors: Fan Yao, Yongbo Li, Yurong Chen, Hongfa Xue, Guru Venkataramani, Tian Lan, (The George Washington University)

  • Bloom Filters and LSTM Networks For Multi-level Anomaly Detection in Industrial Control Systems Authors: Cheng Feng, Tingting Li, Deeph Chana (Institute for Security Science and Technology, Imperial College London)

  • Analysing Selfishness Flooding with SEINE Authors: Guido Lena Cota (Università degli Studi di Milano); Sonia Ben Mokhtar (LIRIS-CNRS-INSA Lyon); Gabriele Gianini (Università degli Studi di Milano); Julia Lawall, Gilles Muller (Sorbonne Universités, Inria, CNRS, UPMC, LIP6); Ernesto Damiani (Università degli Studi di Milano, EBTIC/Khalifa University); Lionel Brunie (LIRIS-CNRS-INSA Lyon)

  • DyDroid : Measuring Dynamic Code Loading and Its Security Implications in Android Applications Authors: Zhengyang Qu (Northwestern University); Shahid Alam (Qatar University); Yan Chen (Northwestern University); Xiaoyong Zhou (Google); Wangjun Hong (Northwestern University); Ryan Riley (Qatar University)

  • The Balance Attack Against Proof-Of-Work Blockchains: The R3 Consortium as an Example Authors: Christopher Natoli, Vincent Gramoli (Data61-CSIRO and University of Sydney)

  • JGRE: An Analysis of JNI Global Reference Exhaustion Vulnerabilities in Android Authors: Yacong Gu (Institute of Software, Chinese Academy of Sciences); Kun Sun (George Mason University); Purui Su (Institute of Software, Chinese Academy of Sciences); Qi Li (Tsinghua University); Yemian Lu, Lingyun Ying, Dengguo Feng (Institute of Software, Chinese Academy of Sciences)

  • Secure Live Migration of SGX Enclaves on Untrusted Cloud Authors: Jinyu Gu, Zhichao Hua, Yubin Xia, Haibo Chen (Shanghai Key Laboratory of Scalable Computing and Systems &Institute of Parallel and Distributed Systems, Shanghai Jiao Tong University); Binyu Zang (Institute of Parallel and Distributed Systems, Shanghai Jiao Tong University); Haibing Guan (Shanghai Key Laboratory of Scalable Computing, Shanghai Jiao Tong University); Jinming Li (Huawei)

  • An Energy-Efficient Distributed Protocol for Detecting Measurement Errors in Wireless Sensor Networks Authors: Varun Badrinath Krishna, Michael J. Rausch, Benjamin E. Ujcich, Indranil Gupta, William H. Sanders (University of Illinois at Urbana-Champaign)

  • Voiceprint: A Novel Sybil Attack Detection Method for VANETs Authors: Yuan Yao (Northwestern Polytechnical University); Bin Xiao (The Hong Kong Polytechnic University); Gaofei Wu (Northwestern Polytechnical University); Xue Liu (McGill Univerisity); Zhiwen Yu, Kailong Zhang, Xingshe Zhou (Northwestern Polytechnical University)

  • Fast Atomic Multicast Paulo Coelho (University of Lugano); Nicolas Schiper (EPFL); Fernando Pedone (University of Lugano)

  • Deadline-Aware Multipath Communication: An Optimization Problem Laurent Chuat, Adrian Perrig (ETH Zurich); Yih-Chun Hu (University of Illinois at Urbana-Champaign)
  • Agora: A Dependable High-Performance Coordination Service for Multi-Cores Rainer Schiekofer (Friedrich-Alexander-Universität Erlangen-Nürnberg); Johannes Behl (TU Braunschweig); Tobias Distler (Friedrich-Alexander-Universität Erlangen-Nürnberg)

  • Entropy-Based Security Analytics: Measurements from a Critical Information System Marcello Cinque, Raffaele Della Corte, Antonio Pecchia (Federico II University of Naples, Italy)

  • Information Leakage in Encrypted Deduplication via Frequency Analysis Jingwei Li (University of Electronic Science and Technology of China); Chuan Qin, Patrick P. C. Lee (The Chinese University of Hong Kong); Xiaosong Zhang (University of Electronic Science and Technology of China)

  • Fex: A Software Systems Evaluator [Tool/Demo] Oleksii Oleksenko, Dmitrii Kuvaiskii, Pramod Bhatotia, Christof Fetzer (TU Dresden)

  • Rollback and Forking Detection for Trusted Execution Environments using Lightweight Collective Memory Marcus Brandenburger, Christian Cachin (IBM Research - Zurich); Matthias Lorenz, Rüdiger Kapitza (TU Braunschweig)

  • ContainerLeaks: Emerging Security Threats of Information Leakages in Container Clouds Xing Gao (College of William and Mary); Zhongshu Gu, Mehmet Kayaalp, Dimitrios Pendarakis (IBM T.J. Watson Research Center); Haining Wang (University of Delaware)

  • Speeding up Consensus by Chasing Fast Decisions Balaji Arun, Sebastiano Peluso, Roberto Palmieri, Giuliano Losa, Binoy Ravindran (Virginia Tech)

  • Privacy Disclosure Through Smart Meters: Reactive Power Based Attack and Defense Jingyao Fan (The Pennsylvania State University); Qinghua Li (University of Arkansas); Guohong Cao (The Pennsylvania State University)

  • RL-BLH: Learning-Based Battery Control for Cost Savings and Privacy Preservation for Smart Meters Jinkyu Koo, Xiaojun Lin, Saurabh Bagchi (Purdue University)

  • Exploring the Long Tail of (Malicious) Software Downloads Babak Rahbarinia (Auburn University Montgomery); Marco Balduzzi (Trend Micro Inc.); Roberto Perdisci (University of Georgia)

  • Detecting Passive Cheats in Online Games via Performance-Skillfulness Inconsistency Daiping Liu (University of Delaware); Xing Gao (College of William and Mary); Mingwei Zhang (Intel Labs); Haining Wang (University of Delaware); Angelos Stavrou (George Mason University)

  • What Can We Learn from Four Years of Data Center Hardware Failures? Guosai Wang, Wei Xu (Institute for Interdisciplinary Information Sciences, Tsinghua University)

  • Dependability-aware design space exploration for optimal synthesis parameters tuning Ilya Tuzov, Juan Carlos Ruiz, David de Andres (ITACA-UPV)

  • Towards Automated Discovery of Crash-Resistant Primitives in Binaries Benjamin Kollenda (Ruhr-Universität Bochum); Enes Goktas (Vrije Universiteit Amsterdam); Tim Blazytko, Philipp Koppe, Robert Gawlik (Ruhr-Universität Bochum); R.K. Konoth, Cristiano Giuffrida, Herbert Bos (Vrije Universiteit Amsterdam); Thorsten Holz (Ruhr-Universität Bochum)

  • Load-Optimal Local Fast Rerouting for Dependable Networks Yvonne-Anne Pignolet (ABB Research, Switzerland); Stefan Schmid (Aalborg Uni, Denmark & TU Berlin, Germany); Gilles Tredan (LAAS, CNRS, Toulouse, France)

  • Demonstrating a Tool for Injection Attack Prevention in MySQL [Tool/Demo] Ibéria Medeiros (LaSIGE, Faculdade de Ciências da Universidade de Lisboa); Miguel Beatriz (INESC-ID, Instituto Superior Técnico da Universidade de Lisboa); Nuno Neves (LaSIGE, Faculdade de Ciências da Universidade de Lisboa); Miguel Correia (INESC-ID, Instituto Superior Técnico da Universidade de Lisboa)

  • JMake: Dependable Compilation for Kernel Janitors Julia Lawall, Gilles Muller (Sorbonne Universites/Inria/UPMC/LIP6)

  • One Bit is (Not) Enough: An Empirical Study of the Impact of Single and Multiple Bit-Flip Errors Behrooz Sangchoolie (Chalmers University of Technology); Karthik Pattabiraman (University of British Columbia); Johan Karlsson (Chalmers University of Technology)

  • Attacker-Induced Traffic Flow Instability in a Stream of Semi-Automated Vehicles Daniel D. Dunn, Samuel A. Mitchell, Imran Sajjad (Utah State University); Ryan M. Gerdes (Virginia Tech); Rajnikant Sharma (University of Cincinnati); Ming Li (University of Arizona)

  • BinWrite: Efficient Static Binary Rewriting for Security [Tool/Demo]William Hawkins, Jason D. Hiser, Michele Co, Anh Nguyen-Tuong, Jack W. Davidson (University of Virginia)

  • Compromising Security of Economic Dispatch in Power System Operations Devendra Shelar (Massachusetts Institute of Technology); Pengfei Sun (Rutgers University); Saurabh Amin (Massachusetts Institute of Technology); Saman Zonouz (Rutgers University)

  • Revisiting Random Walk based Sybil Detection in Online Social Networks Jinyuan Jia, Neil Zhenqiang Gong (Iowa State University)

  • Analyzing Operational Behavior of Stateful Protocol Implementations for Detecting Semantic Bugs Endadul Hoque (Purdue University); Omar Chowdhury (University of Iowa); Sze Yiu Chau (Purdue University); Cristina Nita-Rotaru (Northeastern University); Ninghui Li (Purdue University)

  • Secure Causal Atomic Broadcast, Revisited Sisi Duan (Oak Ridge National Laboratory); Michael K. Reiter (University of North Carolina at Chapel Hill); Haibin Zhang (University of Connecticut)

  • DynaMiner: Leveraging Offline Infection Analytics for On-the-Wire Malware Detection Birhanu Eshete, V.N. Venkatakrishnan (University of Illinois at Chicago)

  • Secure Tera-scale Data Crunching with a Small TCB Bruno Vavala (Carnegie Mellon University (U.S.) & University of Lisbon (Portugal)); Nuno Neves (University of Lisbon (Portugal)); Peter Steenkiste (Carnegie Mellon University (U.S.))

  • Function Interface Analysis: A Principled Approach for Function Recognition in COTS Binaries Rui Qiao, R Sekar (Stony Brook University)

  • pbSE: Phase-based Symbolic Execution Qixue Xiao, Yu Chen (Tsinghua University); Chenggang Wu (Institute of Computing Technology Chinese Academy of Sciences); Kang Li (Dept. of Computer Science Athens, Georgia)