Volume 26, Number 6, 2018
Systematic parsing of X.509: Eradicating security issues with a parse tree.

Alessandro Barenghi Nicholas Mainardi Gerardo Pelosi

Privacy-preserving verifiable elastic net among multiple institutions in the cloud.

Jun Zhang Meiqi He Gongxian Zeng Siu-Ming Yiu

Surviving unpatchable vulnerabilities through heterogeneous network hardening options.

Daniel Borbor Lingyu Wang Sushil Jajodia Anoop Singhal

Towards designing robust CAPTCHAs.

David Lorenzi Emre Uzun Jaideep Vaidya Shamik Sural Vijayalakshmi Atluri


Volume 26, Number 4, 2018
Assuring BetterTimes.

Per A. Hallgren Ravi Kishore Martín Ochoa Andrei Sabelfeld

The impact of application context on privacy and performance of keystroke authentication systems.

Kiran S. Balagani Paolo Gasti Aaron Elliott Azriel Richardson Mike O'Neal

Invalid certificates in modern browsers: A socio-technical analysis.

Rosario Giustolisi Giampaolo Bella Gabriele Lenzini

Abstractions for security protocol verification.

Thanh Binh Nguyen Christoph Sprenger Cas Cremers

Automated and efficient analysis of administrative temporal RBAC policies with role hierarchies.

Silvio Ranise Anh Tuan Truong Luca Viganò


Volume 26, Number 3, 2018
Automated reasoning for equivalences in the applied pi calculus with barriers.

Bruno Blanchet Ben Smyth

Low-deterministic security for low-nondeterministic programs.

Simon Bischof Joachim Breitner Jürgen Graf Martin Hecker Martin Mohr Gregor Snelting

Short voice imitation man-in-the-middle attacks on Crypto Phones: Defeating humans and machines.

Maliheh Shirvanian Nitesh Saxena Dibya Mukhopadhyay

Accessing mobile user's privacy based on IME personalization: Understanding and practical attacks.

Wenrui Diao Rui Liu Xiangyu Liu Zhe Zhou Zhou Li Kehuan Zhang


Volume 26, Number 2, 2018
A side-channel attack on smartphones: Deciphering key taps using built-in microphones.

Haritabh Gupta Shamik Sural Vijayalakshmi Atluri Jaideep Vaidya

Reasoning about firewall policies through refinement and composition.

Ultan Neville Simon N. Foley

Sharing-habits based privacy control in social networks.

Silvie Levy Ehud Gudes Nurit Gal-Oz

Enforcing authorizations while protecting access confidentiality.

Sabrina De Capitani di Vimercati Sara Foresti Stefano Paraboschi Gerardo Pelosi Pierangela Samarati