1 | -- | 0 | Pieter Philippaerts, Yves Younan, Stijn Muylle, Frank Piessens, Sven Lachmund, Thomas Walter. CPM: Masking Code Pointers to Prevent Code Injection Attacks |
2 | -- | 0 | William E. Cobb, Rusty O. Baldwin, Eric D. Laspe. Leakage Mapping: A Systematic Methodology for Assessing the Side-Channel Information Leakage of Cryptographic Implementations |
3 | -- | 0 | David A. Basin, Vincent Jugé, Felix Klaedtke, Eugen Zalinescu. Enforceable Security Policies Revisited |
4 | -- | 0 | Jason Crampton, Gregory Gutin, Anders Yeo. On the Parameterized Complexity and Kernelization of the Workflow Satisfiability Problem |