Abstract is missing.
- Modeling the Trust Boundaries Created by Securable ObjectsMatt Miller. [doi]
- There Is No Free Phish: An Analysis of Free and Live Phishing KitsMarco Cova, Christopher Kruegel, Giovanni Vigna. [doi]
- Engineering Heap Overflow Exploits with JavaScriptMark Daniel, Jake Honoroff, Charlie Miller. [doi]
- Exploitable Redirects on the Web: Identification, Prevalence, and DefenseCraig A. Shue, Andrew J. Kalafut, Minaxi Gupta. [doi]
- Insecure Context Switching: Inoculating Regular Expressions for SurvivabilityWill Drewry, Tavis Ormandy. [doi]
- Reverse Engineering Python ApplicationsAaron Portnoy, Ali-Rizvi Santiago. [doi]
- Towards Systematic Evaluation of the Evadability of Bot/Botnet Detection MethodsElizabeth Stinson, John C. Mitchell. [doi]
- Experiences with Model Inference Assisted FuzzingJoachim Viide, Aki Helin, Marko Laakso, Pekka Pietikäinen, Mika Seppänen, Kimmo Halunen, Rauli Puuperä, Juha Röning. [doi]