| Title/Authors | Title | Research Artifacts 
										[?]  A research
											artifact is any by-product of a research project that is not
											directly included in the published research paper. In Computer
											Science research this is often source code and data sets, but
											it could also be media, documentation, inputs to proof
											assistants, shell-scripts to run experiments, etc. 
									 | Details | 
|---|
| A multi-cloud based privacy-preserving data publishing scheme for the internet of things Lei Yang, Abdulmalik Humayed, Fengjun Li | A multi-cloud based privacy-preserving data publishing scheme for the internet of thingsDetails |  | Discussion Comments:
										0
									 
										Verification:
										Authors have
										not verified
										information
									 | 
| Life-experience passwords (LEPs) Simon S. Woo, Elsi Kaiser, Ron Artstein, Jelena Mirkovic | Life-experience passwords (LEPs)Details |  | Discussion Comments:
										0
									 
										Verification:
										Authors have
										not verified
										information
									 | 
| An ultra-lightweight white-box encryption scheme for securing resource-constrained IoT devices Yang Shi, Wujing Wei, Zongjian He, Hongfei Fan | An ultra-lightweight white-box encryption scheme for securing resource-constrained IoT devicesDetails |  | Discussion Comments:
										0
									 
										Verification:
										Authors have
										not verified
										information
									 | 
| ELAR: extremely lightweight auditing and repairing for cloud security Tran Phuong Thao, Kazumasa Omote | ELAR: extremely lightweight auditing and repairing for cloud securityDetails |  | Discussion Comments:
										0
									 
										Verification:
										Authors have
										not verified
										information
									 | 
| Reliably determining data leakage in the presence of strong attackers Riccardo Bortolameotti, Andreas Peter, Maarten H. Everts, Willem Jonker, Pieter H. Hartel | Reliably determining data leakage in the presence of strong attackersDetails |  | Author Comments:
										The dataset we used for the results in 8.2 contained sensitive information, therefore we cannot share it. The code is not available anymore, however it was a script implementing the formula discussed in Section 7.3.
									 Discussion Comments:
										0
									 
										Sharing:
										Not able to share produced artifacts
									 
										Verification:
										Authors have
										verified
										information
									 | 
| Mark R. Beaumont, Jim McCarthy, Toby C. Murray | Details |  | Discussion Comments:
										0
									 
										Verification:
										Authors have
										not verified
										information
									 | 
| ShieldFS: a self-healing, ransomware-aware filesystem Andrea Continella, Alessandro Guagnelli, Giovanni Zingaro, Giulio De Pasquale, Alessandro Barenghi, Stefano Zanero, Federico Maggi | ShieldFS: a self-healing, ransomware-aware filesystemDetails | Author Comments:
									 Discussion Comments:
										0
									 
										Sharing:
										Research produced artifacts
									 
										Verification:
										Authors have
										verified
										information
									 | |
| RevProbe: detecting silent reverse proxies in malicious server infrastructures Antonio Nappa, Rana Faisal Munir, Irfan Khan Tanoli, Christian Kreibich, Juan Caballero | RevProbe: detecting silent reverse proxies in malicious server infrastructuresDetails |  | Discussion Comments:
										0
									 
										Verification:
										Authors have
										not verified
										information
									 | 
| The Achilles heel of OAuth: a multi-platform study of OAuth-based authentication Hui Wang, Yuanyuan Zhang, Juanru Li, Dawu Gu | The Achilles heel of OAuth: a multi-platform study of OAuth-based authenticationDetails |  | Discussion Comments:
										0
									 
										Verification:
										Authors have
										not verified
										information
									 | 
| HERCULE: attack story reconstruction via community discovery on correlated log graph Kexin Pei, Zhongshu Gu, Brendan Saltaformaggio, Shiqing Ma, Fei Wang, Zhiwei Zhang, Luo Si, Xiangyu Zhang, Dongyan Xu | HERCULE: attack story reconstruction via community discovery on correlated log graphDetails |  | Discussion Comments:
										0
									 
										Verification:
										Authors have
										not verified
										information
									 | 
| Catching predators at watering holes: finding and understanding strategically compromised websites Sumayah A. Alrwais, Kan Yuan, Eihal Alowaisheq, Xiaojing Liao, Alina Oprea, XiaoFeng Wang, Zhou Li | Catching predators at watering holes: finding and understanding strategically compromised websitesDetails |  | Discussion Comments:
										0
									 
										Verification:
										Authors have
										not verified
										information
									 | 
| You can promote, but you can't hide: large-scale abused app detection in mobile app stores Zhen Xie, Sencun Zhu, Qing Li, Wenjing Wang | You can promote, but you can't hide: large-scale abused app detection in mobile app storesDetails |  | Discussion Comments:
										0
									 
										Verification:
										Authors have
										not verified
										information
									 | 
| Eduard Marin, Dave Singelée, Flavio D. Garcia, Tom Chothia, Rik Willems, Bart Preneel | Details |  | Discussion Comments:
										0
									 
										Verification:
										Authors have
										not verified
										information
									 | 
| Code obfuscation against symbolic execution attacks Sebastian Banescu, Christian S. Collberg, Vijay Ganesh, Zack Newsham, Alexander Pretschner | Code obfuscation against symbolic execution attacksDetails | Author Comments:
									 Discussion Comments:
										0
									 
										Sharing:
										Research produced artifacts
									 
										Verification:
										Authors have
										verified
										information
									 | |
| Trace-free memory data structure forensics via past inference and future speculations Pengfei Sun, Rui Han, Mingbo Zhang, Saman A. Zonouz | Trace-free memory data structure forensics via past inference and future speculationsDetails |  | Discussion Comments:
										0
									 
										Verification:
										Authors have
										not verified
										information
									 | 
| CPAC: securing critical infrastructure with cyber-physical access control Sriharsha Etigowni, Dave (Jing) Tian, Grant Hernandez, Saman A. Zonouz, Kevin R. B. Butler | CPAC: securing critical infrastructure with cyber-physical access controlDetails |  | Discussion Comments:
										0
									 
										Verification:
										Authors have
										not verified
										information
									 | 
| Swords and shields: a study of mobile game hacks and existing defenses Yuan Tian, Eric Y. Chen, Xiaojun Ma, Shuo Chen, Xiao Wang, Patrick Tague | Swords and shields: a study of mobile game hacks and existing defensesDetails |  | Discussion Comments:
										0
									 
										Verification:
										Authors have
										not verified
										information
									 | 
| EvilCoder: automated bug insertion Jannik Pewny, Thorsten Holz | EvilCoder: automated bug insertionDetails | Author Comments:
									 Discussion Comments:
										0
									 
										Sharing:
										Research produced artifacts
									 
										Verification:
										Authors have
										verified
										information
									 | |
| The cloudier side of cryptographic end-to-end verifiable voting: a security analysis of Helios Nicholas Chang-Fong, Aleksander Essex | The cloudier side of cryptographic end-to-end verifiable voting: a security analysis of HeliosDetails |  | Discussion Comments:
										0
									 
										Verification:
										Authors have
										not verified
										information
									 | 
| VulPecker: an automated vulnerability detection system based on code similarity analysis Zhen Li, Deqing Zou, Shouhuai Xu, Hai Jin, Hanchao Qi, Jie Hu | VulPecker: an automated vulnerability detection system based on code similarity analysisDetails |  | Discussion Comments:
										0
									 
										Verification:
										Authors have
										not verified
										information
									 | 
| VTPin: practical VTable hijacking protection for binaries Pawel Sarbinowski, Vasileios P. Kemerlis, Cristiano Giuffrida, Elias Athanasopoulos | VTPin: practical VTable hijacking protection for binariesDetails | Author Comments:
									 Discussion Comments:
										0
									 
										Sharing:
										Research produced artifacts
									 
										Verification:
										Authors have
										verified
										information
									 | |
| Multi-receiver GPS spoofing detection: error models and realization Kai Jansen, Nils Ole Tippenhauer, Christina Pöpper | Multi-receiver GPS spoofing detection: error models and realizationDetails |  | Discussion Comments:
										0
									 
										Verification:
										Authors have
										not verified
										information
									 | 
| Timing-based reconnaissance and defense in software-defined networks John Sonchack, Anurag Dubey, Adam J. Aviv, Jonathan M. Smith, Eric Keller | Timing-based reconnaissance and defense in software-defined networksDetails |  | Discussion Comments:
										0
									 
										Verification:
										Authors have
										not verified
										information
									 | 
| Device fingerprinting for augmenting web authentication: classification and analysis of methods Furkan Alaca, Paul C. van Oorschot | Device fingerprinting for augmenting web authentication: classification and analysis of methodsDetails |  | Discussion Comments:
										0
									 
										Verification:
										Authors have
										not verified
										information
									 | 
| FASE: functionality-aware security enforcement Petar Tsankov, Marco Pistoia, Omer Tripp, Martin T. Vechev, Pietro Ferrara | FASE: functionality-aware security enforcementDetails |  | Discussion Comments:
										0
									 
										Verification:
										Authors have
										not verified
										information
									 | 
| CASTLE: CA signing in a touch-less environment Stephanos Matsumoto, Samuel Steffen, Adrian Perrig | CASTLE: CA signing in a touch-less environmentDetails |  | Discussion Comments:
										0
									 
										Verification:
										Authors have
										not verified
										information
									 | 
| Location-enhanced authentication using the IoT: because you cannot be in two places at once Ioannis Agadakos, Per A. Hallgren, Dimitrios Damopoulos, Andrei Sabelfeld, Georgios Portokalidis | Location-enhanced authentication using the IoT: because you cannot be in two places at onceDetails |  | Author Comments:
									 Discussion Comments:
										0
									 
										Sharing:
										Not able to share produced artifacts
									 
										Verification:
										Authors have
										verified
										information
									 | 
| Intelligent, automated red team emulation Andy Applebaum, Doug Miller, Blake Strom, Chris Korban, Ross Wolf | Intelligent, automated red team emulationDetails |  | Author Comments:
									 Discussion Comments:
										0
									 
										Sharing:
										Not able to share produced artifacts
									 
										Verification:
										Authors have
										verified
										information
									 | 
| Bootstrapping and maintaining trust in the cloud Nabil Schear, Patrick T. Cable II, Thomas M. Moyer, Bryan Richard, Robert Rudd | Bootstrapping and maintaining trust in the cloudDetails |  | Discussion Comments:
										0
									 
										Verification:
										Authors have
										not verified
										information
									 | 
| CoKey: fast token-based cooperative cryptography Julian Horsch, Sascha Wessel, Claudia Eckert | CoKey: fast token-based cooperative cryptographyDetails | Discussion Comments:
										0
									 
										Verification:
										Authors have
										not verified
										information
									 | |
| Babins Shrestha, Manar Mohamed, Sandeep Tamrakar, Nitesh Saxena | Details |  | Discussion Comments:
										0
									 
										Verification:
										Authors have
										not verified
										information
									 | 
| Adaptive encrypted traffic fingerprinting with bi-directional dependence Khaled Al-Naami, Swarup Chandra, Ahmad M. Mustafa, Latifur Khan, Zhiqiang Lin, Kevin W. Hamlen, Bhavani M. Thuraisingham | Adaptive encrypted traffic fingerprinting with bi-directional dependenceDetails |  | Discussion Comments:
										0
									 
										Verification:
										Authors have
										not verified
										information
									 | 
| Using image saliency and regions of interest to encourage stronger graphical passwords Mohammad N. AlShehri, Heather Crawford | Using image saliency and regions of interest to encourage stronger graphical passwordsDetails |  | Discussion Comments:
										0
									 
										Verification:
										Authors have
										not verified
										information
									 | 
| Formal security analysis of smart embedded systems Farid Molazem Tabrizi, Karthik Pattabiraman | Formal security analysis of smart embedded systemsDetails |  | Discussion Comments:
										0
									 
										Verification:
										Authors have
										not verified
										information
									 | 
| A security analysis of automated chinese turing tests Abdalnaser Algwil, Dan Ciresan, Bei-Bei Liu, Jeff Yan | A security analysis of automated chinese turing testsDetails |  | Discussion Comments:
										0
									 
										Verification:
										Authors have
										not verified
										information
									 | 
| Sanitizing data is not enough!: towards sanitizing structural artifacts in flash media Bo Chen, Shijie Jia, Luning Xia, Peng Liu | Sanitizing data is not enough!: towards sanitizing structural artifacts in flash mediaDetails |  | Discussion Comments:
										0
									 
										Verification:
										Authors have
										not verified
										information
									 | 
| Gametrics: towards attack-resilient behavioral authentication with simple cognitive games Manar Mohamed, Nitesh Saxena | Gametrics: towards attack-resilient behavioral authentication with simple cognitive gamesDetails |  | Discussion Comments:
										0
									 
										Verification:
										Authors have
										not verified
										information
									 | 
| Amplifying side channels through performance degradation Thomas Allan, Billy Bob Brumley, Katrina E. Falkner, Joop van de Pol, Yuval Yarom | Amplifying side channels through performance degradationDetails |  | Discussion Comments:
										0
									 
										Verification:
										Authors have
										not verified
										information
									 | 
| Auror: defending against poisoning attacks in collaborative deep learning systems Shiqi Shen, Shruti Tople, Prateek Saxena | Auror: defending against poisoning attacks in collaborative deep learning systemsDetails |  | Discussion Comments:
										0
									 
										Verification:
										Authors have
										not verified
										information
									 | 
| Inferring browser activity and status through remote monitoring of storage usage Hyungsub Kim, Sangho Lee, Jong Kim | Inferring browser activity and status through remote monitoring of storage usageDetails |  | Discussion Comments:
										0
									 
										Verification:
										Authors have
										not verified
										information
									 | 
| Spicy: a unified deep packet inspection framework for safely dissecting all your data Robin Sommer, Johanna Amann, Seth Hall | Spicy: a unified deep packet inspection framework for safely dissecting all your dataDetails | Discussion Comments:
										0
									 
										Verification:
										Authors have
										not verified
										information
									 | |
| Pileus: protecting user resources from vulnerable cloud services Yuqiong Sun, Giuseppe Petracca, Xinyang Ge, Trent Jaeger | Pileus: protecting user resources from vulnerable cloud servicesDetails |  | Author Comments:
									 Discussion Comments:
										0
									 
										Sharing:
										Research produced no artifacts
									 
										Verification:
										Authors have
										verified
										information
									 | 
| Efficient, adversarial neighbor discovery using logical channels on Microsoft Azure Mehmet Sinan Inci, Gorka Irazoqui, Thomas Eisenbarth, Berk Sunar | Efficient, adversarial neighbor discovery using logical channels on Microsoft AzureDetails |  | Discussion Comments:
										0
									 
										Verification:
										Authors have
										not verified
										information
									 | 
| Cypider: building community-based cyber-defense infrastructure for android malware detection ElMouatez Billah Karbab, Mourad Debbabi, Abdelouahid Derhab, Djedjiga Mouheb | Cypider: building community-based cyber-defense infrastructure for android malware detectionDetails |  | Discussion Comments:
										0
									 
										Verification:
										Authors have
										not verified
										information
									 | 
| Decomposition of MAC address structure for granular device inference Jeremy Martin, Erik C. Rye, Robert Beverly | Decomposition of MAC address structure for granular device inferenceDetails |  | Discussion Comments:
										0
									 
										Verification:
										Authors have
										not verified
										information
									 | 
| Thang Hoang, Attila Altay Yavuz, Jorge Guajardo | Details | Discussion Comments:
										0
									 
										Verification:
										Authors have
										not verified
										information
									 | |
| LMP: light-weighted memory protection with hardware assistance Wei Huang, Zhen Huang, Dhaval Miyani, David Lie | LMP: light-weighted memory protection with hardware assistanceDetails |  | Discussion Comments:
										0
									 
										Verification:
										Authors have
										not verified
										information
									 | 
| Understanding and defending the binder attack surface in Android Huan Feng, Kang G. Shin | Understanding and defending the binder attack surface in AndroidDetails |  | Discussion Comments:
										0
									 
										Verification:
										Authors have
										not verified
										information
									 |