Abstract is missing.
- Ensemble Learning for Low-Level Hardware-Supported Malware DetectionKhaled N. Khasawneh, Meltem Ozsoy, Caleb Donovick, Nael B. Abu-Ghazaleh, Dmitry V. Ponomarev. 3-25 [doi]
- Physical-Layer Detection of Hardware KeyloggersRyan M. Gerdes, Saptarshi Mallick. 26-47 [doi]
- Reverse Engineering Intel Last-Level Cache Complex Addressing Using Performance CountersClémentine Maurice, Nicolas Le Scouarnec, Christoph Neumann, Olivier Heen, Aurélien Francillon. 48-65 [doi]
- Hardware-Assisted Fine-Grained Code-Reuse Attack DetectionPinghai Yuan, Qingkai Zeng, Xuhua Ding. 66-85 [doi]
- Haetae: Scaling the Performance of Network Intrusion Detection with Many-Core ProcessorsJaehyun Nam, Muhammad Jamshed, Byungkwon Choi, Dongsu Han, KyoungSoo Park. 89-110 [doi]
- Demystifying the IP BlackspaceQuentin Jacquemart, Pierre-Antoine Vervier, Guillaume Urvoy-Keller, Ernst W. Biersack. 111-132 [doi]
- Providing Dynamic Control to Passive Network Security MonitoringJohanna Amann, Robin Sommer. 133-152 [doi]
- Probabilistic Inference on Integrity for Access Behavior Based Malware DetectionWeixuan Mao, Zhongmin Cai, Don Towsley, Xiaohong Guan. 155-176 [doi]
- Counteracting Data-Only Malware with Code Pointer ExaminationThomas Kittel, Sebastian Vogl, Julian Kirsch, Claudia Eckert. 177-197 [doi]
- Xede: Practical Exploit Early DetectionMeining Nie, Purui Su, Qi Li, Zhi Wang, Lingyun Ying, Jinlong Hu, Dengguo Feng. 198-221 [doi]
- Preventing Exploits in Microsoft Office Documents Through Content RandomizationCharles Smutz, Angelos Stavrou. 225-246 [doi]
- Improving Accuracy of Static Integer Overflow Detection in BinaryYang Zhang, Xiaoshan Sun, Yi Deng, Liang Cheng, Shuke Zeng, Yu Fu, Dengguo Feng. 247-269 [doi]
- A Formal Framework for Program Anomaly DetectionXiaokui Shu, Danfeng (Daphne) Yao, Barbara G. Ryder. 270-292 [doi]
- jÄk: Using Dynamic Analysis to Crawl and Test Modern Web ApplicationsGiancarlo Pellegrino, Constantin Tschürtz, Eric Bodden, Christian Rossow. 295-316 [doi]
- WYSISNWIV: What You Scan Is Not What I VisitQilang Yang, Dimitrios Damopoulos, Georgios Portokalidis. 317-338 [doi]
- SDN Rootkits: Subverting Network Operating Systems of Software-Defined NetworksChristian Röpke, Thorsten Holz. 339-356 [doi]
- AppSpear: Bytecode Decrypting and DEX Reassembling for Packed Android MalwareWenbo Yang, Yuanyuan Zhang, Juanru Li, Junliang Shu, Bodong Li, Wenjun Hu, Dawu Gu. 359-381 [doi]
- HelDroid: Dissecting and Detecting Mobile RansomwareNicoló Andronio, Stefano Zanero, Federico Maggi. 382-404 [doi]
- Continuous Authentication on Mobile Devices Using Power Consumption, Touch Gestures and Physical Movement of UsersRahul Murmuria, Angelos Stavrou, Daniel Barbará, Dan Fleck. 405-424 [doi]
- Privacy Risk Assessment on Online PhotosHaitao Xu, Haining Wang, Angelos Stavrou. 427-447 [doi]
- Privacy is Not an Option: Attacking the IPv6 Privacy ExtensionJohanna Ullrich, Edgar R. Weippl. 448-468 [doi]
- Evaluation of Intrusion Detection Systems in Virtualized Environments Using Attack InjectionAleksandar Milenkoski, Bryan D. Payne, Nuno Antunes, Marco Vieira, Samuel Kounev, Alberto Avritzer, Matthias Luft. 471-492 [doi]
- Security Analysis of PHP Bytecode Protection MechanismsDario Weißer, Johannes Dahse, Thorsten Holz. 493-514 [doi]
- Radmin: Early Detection of Application-Level Resource Exhaustion and Starvation AttacksMohamed Elsabagh, Daniel Barbará, Dan Fleck, Angelos Stavrou. 515-537 [doi]
- Towards Automatic Inference of Kernel Object Semantics from Binary CodeJunyuan Zeng, Zhiqiang Lin. 538-561 [doi]
- BotWatcher - Transparent and Generic Botnet TrackingThomas Barabosch, Adrian Dombeck, Khaled Yakdan, Elmar Gerhards-Padilla. 565-587 [doi]
- Elite: Automatic Orchestration of Elastic Detection Services to Secure Cloud HostingYangyi Chen, Vincent Bindschaedler, Xiaofeng Wang, Stefan Berger, Dimitrios E. Pendarakis. 588-614 [doi]
- AmpPot: Monitoring and Defending Against Amplification DDoS AttacksLukas Krämer, Johannes Krupp, Daisuke Makita, Tomomi Nishizoe, Takashi Koide, Katsunari Yoshioka, Christian Rossow. 615-636 [doi]