Abstract is missing.
- Designed to Fail: A USB-Connected Reader for Online BankingArjan Blom, Gerhard de Koning Gans, Erik Poll, Joeri de Ruiter, Roel Verdult. 1-16 [doi]
- Security Add-Ons for Mobile PlatformsBenjamin Adolphi, Hanno Langweg. 17-30 [doi]
- THAPS: Automated Vulnerability Scanning of PHP ApplicationsTorben Jensen, Heine Pedersen, Mads Chr. Olesen, René Rydhof Hansen. 31-46 [doi]
- Cyber Security Exercises and Competitions as a Platform for Cyber Security ExperimentsTeodor Sommestad, Jonas Hallberg. 47-60 [doi]
- The Development of Cyber Security Warning, Advice and Report PointsTony Proctor. 61-72 [doi]
- Towards an Empirical Examination of IT Security Infrastructures in SMERamona Groner, Philipp Brune. 73-88 [doi]
- How to Select a Security Requirements Method? A Comparative Study with Students and PractitionersFabio Massacci, Federica Paci. 89-104 [doi]
- There Is Safety in Numbers: Preventing Control-Flow Hijacking by DuplicationJob Noorman, Nick Nikiforakis, Frank Piessens. 105-120 [doi]
- Coinductive Unwinding of Security-Relevant HyperpropertiesDimiter Milushev, Dave Clarke. 121-136 [doi]
- Retooling and Securing Systemic DebuggingBjörn Ståhl, Per Mellstrand. 137-152 [doi]
- Cracking Associative PasswordsKirsi Helkala, Nils Kalstad Svendsen, Per Thorsheim, Anders Wiehe. 153-168 [doi]
- A Hybrid Approach for Highly Available and Secure Storage of Pseudo-SSO CredentialsJan Zibuschka, Lothar Fritsch. 169-183 [doi]
- Assessing the Quality of Packet-Level Traces Collected on Internet Backbone LinksBehrooz Sangchoolie, Mazdak Rajabi Nasab, Tomas Olovsson, Wolfgang John. 184-198 [doi]
- Everything But the Kitchen Sink: Determining the Effect of Multiple Attacks on Privacy Preserving Technology UsersJason W. Clark. 199-214 [doi]
- Can We Identify Manipulative Behavior and the Corresponding Suspects on Review Websites Using Supervised Learning?Huiying Duan, Cäcilia Zirn. 215-230 [doi]
- Privacy-Friendly Cloud Storage for the Data Track - An Educational Transparency ToolTobias Pulls. 231-246 [doi]