Abstract is missing.
- A Primitive for Revealing Stealthy Peripheral-Based Attacks on the Computing Platform's Main MemoryPatrick Stewin. 1-20 [doi]
- Hypervisor Memory ForensicsMariano Graziano, Andrea Lanzi, Davide Balzarotti. 21-40 [doi]
- Server-Side Code Injection Attacks: A Historical PerspectiveJakob Fritz, Corrado Leita, Michalis Polychronakis. 41-61 [doi]
- Check My Profile: Leveraging Static Analysis for Fast and Accurate Detection of ROP GadgetsBlaine Stancill, Kevin Z. Snow, Nathan Otterness, Fabian Monrose, Lucas Davi, Ahmad-Reza Sadeghi. 62-81 [doi]
- Systematic Analysis of Defenses against Return-Oriented ProgrammingRichard Skowyra, Kelly Casteel, Hamed Okhravi, Nickolai Zeldovich, William W. Streilein. 82-102 [doi]
- SILVER: Fine-Grained and Transparent Protection Domain Primitives in Commodity OS KernelXi Xiong, Peng Liu 0005. 103-122 [doi]
- API Chaser: Anti-analysis Resistant Malware AnalyzerYuhei Kawakoya, Makoto Iwamura, Eitaro Shioji, Takeo Hariu. 123-143 [doi]
- FIRMA: Malware Clustering and Network Signature Generation with Mixed Network BehaviorsM. Zubair Rafique, Juan Caballero. 144-163 [doi]
- Deobfuscating Embedded Malware Using Probable-Plaintext AttacksChristian Wressnegger, Frank Boldewin, Konrad Rieck. 164-183 [doi]
- Detecting Traditional Packers, DecisivelyDenis Bueno, Kevin J. Compton, Karem A. Sakallah, Michael Bailey. 184-203 [doi]
- Side-Channel Attacks on the Yubikey 2 One-Time Password GeneratorDavid Oswald, Bastian Richter, Christof Paar. 204-222 [doi]
- Active Credential Leakage for Observing Web-Based Attack CycleMitsuaki Akiyama, Takeshi Yagi, Kazufumi Aoki, Takeo Hariu, Youki Kadobayashi. 223-243 [doi]
- Behavior Decomposition: Aspect-Level Browser Extension Clustering and Its Security ImplicationsBin Zhao, Peng Liu. 244-264 [doi]
- Tamper-Resistant LikeJacking ProtectionMartin Johns, Sebastian Lekies. 265-285 [doi]
- Deconstructing the Assessment of Anomaly-based Intrusion DetectorsArun Viswanathan, Kymie Tan, Clifford Neuman. 286-306 [doi]
- Practical Context-Aware Permission Control for Hybrid Mobile ApplicationsKapil Singh. 307-327 [doi]
- Understanding SMS Spam in a Large Cellular Network: Characteristics, Strategies and DefensesNan Jiang, Yu Jin 0001, Ann Skudlark, Zhi-Li Zhang. 328-347 [doi]
- Mobile Malware Detection Based on Energy Fingerprints - A Dead End?Johannes Hoffmann, Stephan Neumann, Thorsten Holz. 348-368 [doi]
- Holiday Pictures or Blockbuster Movies? Insights into Copyright Infringement in User Uploads to One-Click File HostersTobias Lauinger, Kaan Onarlioglu, Chaabane Abdelberi, Engin Kirda, William K. Robertson, Mohamed Ali Kâafar. 369-389 [doi]
- Connected Colors: Unveiling the Structure of Criminal NetworksYacin Nadji, Manos Antonakakis, Roberto Perdisci, Wenke Lee. 390-410 [doi]
- CloudFence: Data Flow Tracking as a Cloud ServiceVasilis Pappas, Vasileios P. Kemerlis, Angeliki Zavou, Michalis Polychronakis, Angelos D. Keromytis. 411-431 [doi]
- Practical Attacks against the I2P NetworkChristoph Egger, Johannes Schlumberger, Christopher Kruegel, Giovanni Vigna. 432-451 [doi]