Volume 27, Number 6, 2019
A multi-server oblivious dynamic searchable encryption framework.

Thang Hoang Attila A. Yavuz F. Betül Durak Jorge Guajardo

Decoupling coding habits from functionality for effective binary authorship attribution.

Saed Alrabaee Paria Shirani Lingyu Wang Mourad Debbabi Aiman Hanna

How persuasive is a phishing email? A phishing game for phishing awareness.

Rubia Fatima Affan Yasin Lin Liu Jianmin Wang


Volume 27, Number 5, 2019
Towards the optimal performance of integrating Warm and Delay against remote cache timing side channels on block ciphers.

Ziqiang Ma Quanwei Cai Jingqiang Lin Bo Luo Jiwu Jing

Tracking APTs in industrial ecosystems: A proof of concept.

Juan E. Rubio Rodrigo Roman Cristina Alcaraz Yan Zhang

Using side channel TCP features for real-time detection of malware connections.

George Stergiopoulos Georgia Chronopoulou Evangelos Bitsikas Nikolaos Tsalis Dimitris Gritzalis


Volume 27, Number 3, 2019
Collusion attacks and fair time-locked deposits for fast-payment transactions in Bitcoin.

Xingjie Yu Michael Thang Shiwen Yingjiu Li Robert Huijie Deng

Last man standing: Static, decremental and dynamic resiliency via controller synthesis.

Matteo Zavatteri Luca Viganò

A method for unbounded verification of privacy-type properties.

Lucca Hirschi David Baelde Stéphanie Delaune


Volume 27, Number 1, 2019
Verifying constant-time implementations by abstract interpretation.

Sandrine Blazy David Pichardie Alix Trieu

Privacy implications of room climate data.

Frederik Armknecht Zinaida Benenson Philipp Morgner Christian Müller Christian Riess

Per-session security: Password-based cryptography revisited.

Grégory Demay Peter Gazi Ueli Maurer Björn Tackmann

A catalogue associating security patterns and attack steps to design secure applications.

Sébastien Salva Loukmen Regainia

Group ORAM for privacy and access control in outsourced personal records.

Matteo Maffei Giulio Malavolta Manuel Reinert Dominique Schröder