The Community for Technology Leaders
Green Image
TABLE OF CONTENTS
Issue No. 02 - Mar./Apr. (vol. 15)
ISSN: 1540-7993

Front Cover (PDF)

pp. c1

Table of Contents (PDF)

pp. 3-4

Masthead (PDF)

pp. 7

Selected Papers from the 2016 IEEE Symposium on Security and Privacy (PDF)

Terry Benzel , University of Southern California Information Sciences Institute
pp. 11-13

Prepose: Privacy, Security, and Reliability for Gesture-Based Programming (Abstract)

Lucas Silva Figueiredo , Federal University of Pernambuco
David Molnar , Microsoft Research
Margus Veanes , Microsoft Research
Benjamin Livshits , Microsoft Research
pp. 14-23

Security Implications of Permission Models in Smart-Home Application Frameworks (Abstract)

Earlence Fernandes , University of Michigan
Amir Rahmati , University of Michigan
Jaeyeon Jung , Samsung
Atul Prakash , University of Michigan
pp. 24-30

The Perils of User Tracking Using Zero-Permission Mobile Apps (Abstract)

Sashank Narain , Northeastern University
Triet D. Vo-Huu , Northeastern University
Kenneth Block , Northeastern University
Guevara Noubir , Northeastern University
pp. 32-41

Apple ZeroConf Holes: How Hackers Can Steal iPhone Photos (Abstract)

Xiaolong Bai , Tsinghua University
Luyi Xing , Indiana University Bloomington
Nan Zhang , Indiana University Bloomington
XiaoFeng Wang , Indiana University Bloomington
Xiaojing Liao , Georgia Tech
Tongxin Li , Peking University
Shi-Min Hu , Tsinghua University
pp. 42-49

How Internet Resources Might Be Helping You Develop Faster but Less Securely (Abstract)

Yasemin Acar , CISPA, Saarland University
Michael Backes , CISPA, Saarland University
Sascha Fahl , CISPA, Saarland University
Doowon Kim , University of Maryland
Michelle L. Mazurek , University of Maryland
Christian Stransky , CISPA, Saarland University
pp. 50-60

The Danger of USB Drives (Abstract)

Matthew Tischer , University of Illinois at Urbana-Champaign
Zakir Durumeric , University of Michigan
Michael Bailey , University of Illinois at Urbana-Champaign
pp. 62-69

Dawn of the Dead Domain: Measuring the Exploitation of Residual Trust in Domains (Abstract)

Chaz Lever , Georgia Tech
Robert J. Walls , Worcester Polytechnic Institute
Yacin Nadji , Georgia Tech
David Dagon , Georgia Tech
Patrick McDaniel , Pennsylvania State University
Manos Antonakakis , Georgia Tech
pp. 70-77

Does the Online Card Payment Landscape Unwittingly Facilitate Fraud? (Abstract)

Mohammed Aamir Ali , Newcastle University
Budi Arief , University of Kent
Martin Emms , Newcastle University
Aad van Moorsel , Newcastle University
pp. 78-86

ACM CCS 2016 Interviews, Part 1 (Abstract)

Ahmad-Reza Sadeghi , Technische Universität Darmstadt
Shaza Zeitouni , Technische Universität Darmstadt
pp. 88-91

Security Challenges and Opportunities of Software-Defined Networking (Abstract)

Marc C. Dacier , Qatar Computing Research Institute
Hartmut Konig , Brandenburg University of Technology Cottbus
Radoslaw Cwalinski , Brandenburg University of Technology Cottbus
Frank Kargl , University of Ulm
Sven Dietrich , City University of New York
pp. 96-100
75 ms
(Ver 3.3 (11022016))