| On Omitting Commits and Committing Omissions: Preventing Git Metadata Tampering That (Re)introduces Software Vulnerabilities | USENIX Security '16 | Santiago Torres-Arias, Anil Kumar Ammula, Reza Curtmola, Justin Cappos |
| FlowFence: Practical Data Protection for Emerging IoT Application Frameworks | USENIX Security '16 | Earlence Fernandes, Justin Paupore, Amir Rahmati, Daniel Simionato, Mauro Conti, Atul Prakash |
| Towards Measuring and Mitigating Social Engineering Software Download Attacks | USENIX Security '16 | Terry Nelms, Roberto Perdisci, Manos Antonakakis, Mustaque Ahamad |
| Egalitarian Computing | USENIX Security '16 | Alex Biryukov, Dmitry Khovratovich |
| Micro-Virtualization Memory Tracing to Detect and Prevent Spraying Attacks | USENIX Security '16 | Stefano Cristalli, Mattia Pagnozzi, Mariano Graziano, Andrea Lanzi, Davide Balzarotti |
| Specification Mining for Intrusion Detection in Networked Control Systems | USENIX Security '16 | Marco Caselli, Emmanuele Zambon, Johanna Amann, Robin Sommer, Frank Kargl |
| An In-Depth Analysis of Disassembly on Full-Scale x86/x64 Binaries | USENIX Security '16 | Dennis Andriesse, Xi Chen, Victor van der Veen, Asia Slowinska, Herbert Bos |
| APISan: Sanitizing API Usages through Semantic Cross-Checking | USENIX Security '16 | Insu Yun, Changwoo Min, Xujie Si, Yeongjin Jang, Taesoo Kim, Mayur Naik |
| Post-quantum Key Exchange—A New Hope | USENIX Security '16 | Erdem Alkim, Léo Ducas, Thomas Pöppelmann, Peter Schwabe |
| Lock It and Still Lose It —on the (In)Security of Automotive Remote Keyless Entry Systems | USENIX Security '16 | Flavio D. Garcia, David Oswald, Timo Kasper, Pierre Pavlidès |
| Sanctum: Minimal Hardware Extensions for Strong Software Isolation | USENIX Security '16 | Victor Costan, Ilia Lebedev, Srinivas Devadas |
| Undermining Information Hiding (and What to Do about It) | USENIX Security '16 | Enes Göktaş, Robert Gawlik, Benjamin Kollenda, Elias Athanasopoulos, Georgios Portokalidis, Cristiano Giuffrida, Herbert Bos |
| Website-Targeted False Content Injection by Network Operators | USENIX Security '16 | Gabi Nakibly, Jaime Schcolnik, Yossi Rubin |
| Investigating Commercial Pay-Per-Install and the Distribution of Unwanted Software | USENIX Security '16 | Kurt Thomas, Juan A. Elices Crespo, Ryan Rasti, Jean-Michel Picod, Cait Phillips, Marc-André Decoste, Chris Sharp, Fabio Tirelo, Ali Tofigh, Marc-Antoine Courteau, Lucas Ballard, Robert Shield, Nav Jagpal, Moheeb Abu Rajab, Panayiotis Mavrommatis, Niels Provos, Elie Bursztein, Damon McCoy |
| Fingerprinting Electronic Control Units for Vehicle Intrusion Detection | USENIX Security '16 | Kyong-Tak Cho, Kang G. Shin |
| überSpark: Enforcing Verifiable Object Abstractions for Automated Compositional Security Analysis of a Hypervisor | USENIX Security '16 | Amit Vasudevan, Sagar Chaki, Petros Maniatis, Limin Jia, Anupam Datta |
| Defending against Malicious Peripherals with Cinch | USENIX Security '16 | Sebastian Angel, Riad S. Wahby, Max Howald, Joshua B. Leners, Michael Spilo, Zhen Sun, Andrew J. Blumberg, Michael Walfish |
| zxcvbn: Low-Budget Password Strength Estimation | USENIX Security '16 | Daniel Lowe Wheeler |
| Optimized Invariant Representation of Network Traffic for Detecting Unseen Malware Variants | USENIX Security '16 | Karel Bartos, Michal Sofka, Vojtech Franc |
| Mirror: Enabling Proofs of Data Replication and Retrievability in the Cloud | USENIX Security '16 | Frederik Armknecht, Ludovic Barman, Jens-Matthias Bohli, Ghassan O. Karame |
| Thoth: Comprehensive Policy Compliance in Data Retrieval Systems | USENIX Security '16 | Eslam Elnikety, Aastha Mehta, Anjo Vahldiek-Oberwagner, Deepak Garg, Peter Druschel |
| k-fingerprinting: A Robust Scalable Website Fingerprinting Technique | USENIX Security '16 | Jamie Hayes, George Danezis |
| A Comprehensive Measurement Study of Domain Generating Malware | USENIX Security '16 | Daniel Plohmann, Khaled Yakdan, Michael Klatt, Johannes Bader, Elmar Gerhards-Padilla |
| An Empirical Study of Textual Key-Fingerprint Representations | USENIX Security '16 | Sergej Dechand, Dominik Schürmann, Karoline Busse, Yasemin Acar, Sascha Fahl, Matthew Smith |
| Ariadne: A Minimal Approach to State Continuity | USENIX Security '16 | Raoul Strackx, Frank Piessens |