57 | -- | 0 | Konrad Rieck. Vulnerability analysis |
59 | -- | 0 | Collin Mulliner, William K. Robertson, Engin Kirda. On the misuse of graphical user interface elements to implement security controls |
67 | -- | 0 | Sai Prashanth Chandramouli, Ziming Zhao, Adam Doupé, Gail-Joon Ahn. E-mail Header Injection Vulnerabilities |
73 | -- | 0 | Christian Wressnegger, Fabian Yamaguchi, Alwin Maier, Konrad Rieck. 64-Bit Migration Vulnerabilities |
83 | -- | 0 | Jannik Pewny, Behrad Garmany, Robert Gawlik, Christian Rossow, Thorsten Holz. Cross-architecture bug search in binary executables |
93 | -- | 0 | Sergey Bratus, Anna Shubina. Exploitation as code reuse: On the need of formalization |
101 | -- | 0 | Fabian Yamaguchi. Pattern-based methods for vulnerability discovery |