Abstract is missing.
- Data Structure Archaeology: Scrape Away the Dirt and Glue Back the Pieces! - (Or: Automated Techniques to Recover Split and Merged Variables)Asia Slowinska, István Haller, Andrei Bacs, Silviu Baranga, Herbert Bos. 1-20 [doi]
- Identifying Shared Software Components to Support Malware ForensicsBrian Ruttenberg, Craig Miles, Lee Kellogg, Vivek Notani, Michael Howard, Charles LeDoux, Arun Lakhotia, Avi Pfeffer. 21-40 [doi]
- Instruction-Level Steganography for Covert Trigger-Based Malware - (Extended Abstract)Dennis Andriesse, Herbert Bos. 41-50 [doi]
- AndRadar: Fast Discovery of Android Applications in Alternative MarketsMartina Lindorfer, Stamatis Volanis, Alessandro Sisto, Matthias Neugschwandtner, Elias Athanasopoulos, Federico Maggi, Christian Platzer, Stefano Zanero, Sotiris Ioannidis. 51-71 [doi]
- Attacks on Android ClipboardXiao Zhang, Wenliang Du. 72-91 [doi]
- I Sensed It Was You: Authenticating Mobile Users with Sensor-Enhanced Keystroke DynamicsCristiano Giuffrida, Kamil Majdanik, Mauro Conti, Herbert Bos. 92-111 [doi]
- AV-Meter: An Evaluation of Antivirus Scans and LabelsAziz Mohaisen, Omar Alrawi. 112-131 [doi]
- PExy: The Other Side of Exploit KitsGiancarlo De Maio, Alexandros Kapravelos, Yan Shoshitaishvili, Christopher Kruegel, Giovanni Vigna. 132-151 [doi]
- Metadata-Driven Threat Classification of Network Endpoints Appearing in MalwareAndrew G. West, Aziz Mohaisen. 152-171 [doi]
- Parallelization of Network Intrusion Detection Systems under Attack ConditionsRené Rietz, Michael Vogel, Franka Schuster, Hartmut König. 172-191 [doi]
- Phoenix: DGA-Based Botnet Tracking and IntelligenceStefano Schiavoni, Federico Maggi, Lorenzo Cavallaro, Stefano Zanero. 192-211 [doi]
- Quantifiable Run-Time Kernel Attack Surface ReductionAnil Kurmus, Sergej Dechand, Rüdiger Kapitza. 212-234 [doi]
- Bee Master: Detecting Host-Based Code Injection AttacksThomas Barabosch, Sebastian Eschweiler, Elmar Gerhards-Padilla. 235-254 [doi]
- Diagnosis and Emergency Patch Generation for Integer Overflow ExploitsTielei Wang, Chengyu Song, Wenke Lee. 255-275 [doi]