Abstract is missing.
- Protecting against DNS Reflection Attacks with Bloom FiltersSebastiano Di Paola, Dario Lombardo. 1-16 [doi]
- Effective Network Vulnerability Assessment through Model AbstractionSu Zhang, Xinming Ou, John Homer. 17-34 [doi]
- Decoy Document Deployment for Effective Masquerade Attack DetectionMalek Ben Salem, Salvatore J. Stolfo. 35-54 [doi]
- Reverse Social Engineering Attacks in Online Social NetworksDanesh Irani, Marco Balduzzi, Davide Balzarotti, Engin Kirda, Calton Pu. 55-74 [doi]
- Timing Attacks on PIN Input in VoIP Networks (Short Paper)Ge Zhang, Simone Fischer-Hübner. 75-84 [doi]
- Biting the Hand That Serves You: A Closer Look at Client-Side Flash Proxies for Cross-Domain RequestsMartin Johns, Sebastian Lekies. 85-103 [doi]
- Mitigating Cross-Site Form History Spamming Attacks with Domain-Based RankingChuan Yue. 104-123 [doi]
- Escape from Monkey Island: Evading High-Interaction HoneyclientsAlexandros Kapravelos, Marco Cova, Christopher Kruegel, Giovanni Vigna. 124-143 [doi]
- An Assessment of Overt Malicious Activity Manifest in Residential NetworksGregor Maier, Anja Feldmann, Vern Paxson, Robin Sommer, Matthias Vallentin. 144-163 [doi]
- What s Clicking What? Techniques and Innovations of Today s ClickbotsBrad Miller, Paul Pearce, Chris Grier, Christian Kreibich, Vern Paxson. 164-183 [doi]
- MISHIMA: Multilateration of Internet Hosts Hidden Using Malicious Fast-Flux Agents (Short Paper)Greg Banks, Aristide Fattori, Richard A. Kemmerer, Christopher Kruegel, Giovanni Vigna. 184-193 [doi]
- Code Pointer Masking: Hardening Applications against Code Injection AttacksPieter Philippaerts, Yves Younan, Stijn Muylle, Frank Piessens, Sven Lachmund, Thomas Walter. 194-213 [doi]
- Operating System Interface Obfuscation and the Revealing of Hidden OperationsAbhinav Srivastava, Andrea Lanzi, Jonathon T. Giffin, Davide Balzarotti. 214-233 [doi]