Modelling Bitcoin Contracts by Timed Automata 
        Marcin Andrychowicz, Stefan Dziembowski, Daniel Malinowski, Lukasz Mazurek
 ArgSEC, A Security Administrator's Assistant 
        Andy Applebaum, Karl Levitt, Jeff Rowe
 The Case for Provenance as a First Class Citizen in the Linux Kernel 
        Adam Bates, Kevin R. B. Butler, Thomas Moyer
 Succinct Non-Interactive Zero Knowledge for a von Neumann Architecture 
        Eli Ben-Sasson, Alessandro Chiesa, Eran Tromer, Madars Virza
 Towards a framework for Network-based Malware detection System 
        Abimael Carrasquillo, Albert E. Maldonado, Eric Santos, José Ortiz-Ubarri
 Toward Understanding Spamming Behavior in Public Forums 
        Euijin Choo, Ting Yu, Min Chi
 Fingerprinting Smartphones Through Speaker 
        Anupam Das, Nikita Borisov
 Insight into Virus Spreading in Social Networks via Percolation Theory 
        Anahita Davoudi
 The Security Cards: A Security Threat Brainstorming Toolkit 
        Tamara Denning, Batya Friedman, Tadayoshi Kohno
 Security Quotient - Defined 
        Naga Sushma Devarapalli
 Proofs of Space 
        Stefan Dziembowski, Sebastian Faust, Vladimir Kolmogorov, Krzysztof Pietrzak
 Analyzing the Data Semantics of Security Patches 
        Robin Gonzalez, Michael E. Locasto
 Stigmalware: Investigating the Prevalence of Malware in the Clinical Domain
        Sai R. Gouravajhala, Amir Rahmati, Evan Chavis, Denis Foo Kune, Peter Honeyman, Michael Bailey, Kevin Fu
 iSecureRing : Forensic ready Secure iOS apps for jailbroken iPhones 
        Jayaprakash Govindaraj, Rashmi Ainahalli Mata, Robin Verma, Gaurav Gupta
 Design and Automatic Evaluation of Control Flow Obfuscators in a Dynamic Attack Context 
        Geoffroy Gueguen, Sébastien Josse, Ludovic Me
 Risk-based Approach: A New Perspective on Declassification and Endorsement 
        Yunchuan Guo, Lihua Yin, Liang Chang, Athanasios V. Vasilakos
 Mobile Security for Dummies: Designing Mobile Security Interfaces for the Non-Expert with Predictive Human Performance Modelling 
        Ann-Marie Horcher
 Multi-Sign-on; Authentication collecter 
        Takashi Ishizuka, Hajime Iwata, Manabu Okamoto
 I Know Where You've Been: Geo-Inference Attacks via the Browser Cache 
        Yaoqi Jia, Xinshu Dong, Zhenkai Liang, Prateek Saxena
 Optimization based Data De-anonymization 
        Shouling Ji, Weiqing Li, Jing S. He, Mudhakar Srivatsa, Raheem Beyah
 Statistical coding scheme for the protection of cryptographic systems against brute-force attack 
        Hyun-Ju Jo, Ji Won Yoon
 Detection and Prevention of Web-based Device Fingerprinting 
        Daehyeok Kim
 Specification and Verification of Confidentiality in Component-Based Systems 
        Max E. Kramer, Anton Hergenroder, Martin Hecker, Simon Greiner, Kaibin Bao
 Di-PriDA: A Privacy-preserving Meter Querying System for Smart Grid Load Balancing 
        Xiaojing Liao, David Formby, Carson Day, Raheem A. Beyah
 Mobile Security Threat and Countermeasure 
        Zuleika G. Lopez
 Detecting Unexpected Behaviors in HTML5 Mobile Apps using Difference in Execution Context 
        Jian Mao, Yaoqi Jia, Xinshu Dong, Yue Chen, Ruilong Wang, Zhenkai Liang
 Quantifying Information Flow for Dynamic Secrets 
        Piotr Mardziel, Mario S. Alvim, Michael Hicks, Michael R. Clarkson
 Exploitation of vulnerabilities - if, when and how often 
        Kartik Nayak, Daniel Marino, Petros Efstathopoulos, Tudor Dumitras
 Power Replay Attack in Electronic Door Locks 
        Seongyeol Oh, Joon-sung Yang, Andrea Bianchi, Hyoungshick Kim
 Hide me if you can. Location Blurring on Firefox OS. 
        Marta Piekarska
 TRESPASS: Plug-and-Play Attacker Profiles for Security Risk Analysis 
        Wolter Pieters, Dina Hadziosmanovic, Aleksandr Lenin, Lorena Montoya, Jan Willemson
 Large-Scale Tor Experimentation 
        Sukhbir Singh, Ian Goldberg, David Taylor
 Time Randomization to Thwart Concurrency Bug Exploitation 
        David Tagatac, Sal Stolfo
 Practical Website Fingerprinting on Tor 
        Tao Wang, Ian Goldberg
 Oblivious Data Structures 
        Xiao Wang, Kartik Nayak, Chang Liu, Elaine Shi, Emil Stefanov, Yan Huang
 A Study of Smartphone User Privacy from the Advertiser's Perspective 
        Yan Wang, Yingying Chen, Fan Ye, Jie Yang, Hongbo Liu
 A Precise and General Inter-component Data Flow Analysis Framework for Security Vetting of Android Apps 
        Fengguo Wei, Sankardas Roy, Xinming Ou, Robby
 Distributed Delegation of Computation with Verification Outsourcing 
        Gang Xu, George Amariucai, Yong Guan
 Maxwell: User-Driven Information Flow Control for Android 
        Jun Yuan, Rob Johnson
 Cloud-Entry: Elusive Tor Entry Points in Cloud 
        Zhenlong Yuan, Xiaoxian Chen, Yibo Xue, Yingfei Dong
 HTTP Botnet Resilient to Takedown 
        Chia-Mu Yu
 Targeted Therapy for Program Bugs 
        Qiang Zeng, Mingyi Zhao, Peng Liu