173 | -- | 188 | Yves Younan, Pieter Philippaerts, Frank Piessens, Wouter Joosen, Sven Lachmund, Thomas Walter. Filter-resistant code injection on ARM |
189 | -- | 199 | Vlasti Broucek, Paul Turner, Mark Zimmerli. Managing university internet access: balancing the need for security, privacy and digital evidence |
201 | -- | 214 | Da Lin, Mark Stamp. Hunting for undetectable metamorphic viruses |
215 | -- | 219 | Iain Sutherland, Gareth Davies, Andrew Blyth. Malware and steganography in hard disk firmware |
221 | -- | 232 | Gérard Wagener, Radu State, Alexandre Dulaunoy, Thomas Engel. Heliza: talking dirty to the attackers |