Abstract is missing.
- Control-Flow Integrity in Web ApplicationsBastian Braun, Patrick Gemein, Hans P. Reiser, Joachim Posegga. 1-16 [doi]
- Using Security Policies to Automate Placement of Network Intrusion PreventionNirupama Talele, Jason Teutsch, Trent Jaeger, Robert F. Erbacher. 17-32 [doi]
- Idea: Callee-Site Rewriting of Sealed System LibrariesPhilipp von Styp-Rekowsky, Sebastian Gerling, Michael Backes, Christian Hammer. 33-41 [doi]
- Towards Unified Authorization for AndroidMichael J. May, Karthikeyan Bhargavan. 42-57 [doi]
- Model-Based Usage Control Policy DerivationPrachi Kumari, Alexander Pretschner. 58-74 [doi]
- Compositional Verification of Application-Level Security PropertiesLinda Ariani Gunawan, Peter Herrmann. 75-90 [doi]
- Towards Verifying Voter Privacy through UnlinkabilityDenis Butin, David Gray, Giampaolo Bella. 91-106 [doi]
- Confidentiality for Probabilistic Multi-threaded Programs and Its VerificationTri Minh Ngo, Mariëlle Stoelinga, Marieke Huisman. 107-122 [doi]
- A Fully Homomorphic Crypto-Processor DesignPeter T. Breuer, Jonathan P. Bowen. 123-138 [doi]
- dkal ⋆ : Constructing Executable Specifications of Authorization ProtocolsJean-Baptiste Jeannin, Guido de Caso, Juan Chen, Yuri Gurevich, Prasad Naldurg, Nikhil Swamy. 139-154 [doi]
- A Formal Approach for Inspecting Privacy and Trust in Advanced Electronic ServicesKoen Decroix, Jorn Lapon, Bart De Decker, Vincent Naessens. 155-170 [doi]
- Idea: Writing Secure C Programs with SecProveMyla Archer, Elizabeth I. Leonard, Constance L. Heitmeyer. 171-180 [doi]
- Anatomy of Exploit Kits - Preliminary Analysis of Exploit Kits as Software ArtefactsVadim Kotov, Fabio Massacci. 181-196 [doi]
- An Empirical Study on the Effectiveness of Security Code ReviewAnne Edmundson, Brian Holtkamp, Emanuel Rivera, Matthew Finifter, Adrian Mettler, David Wagner. 197-212 [doi]
- Eliminating SQL Injection and Cross Site Scripting Using Aspect Oriented ProgrammingBojan Simic, James Walden. 213-228 [doi]