Abstract is missing.
- Detecting spammers on social networksGianluca Stringhini, Christopher Kruegel, Giovanni Vigna. 1-9 [doi]
- Toward worm detection in online social networksWei Xu, Fangfang Zhang, Sencun Zhu. 11-20 [doi]
- Who is tweeting on Twitter: human, bot, or cyborg?Zi Chu, Steven Gianvecchio, Haining Wang, Sushil Jajodia. 21-30 [doi]
- Cujo: efficient detection and prevention of drive-by-download attacksKonrad Rieck, Tammo Krueger, Andreas Dewald. 31-39 [doi]
- Fast and practical instruction-set randomization for commodity systemsGeorgios Portokalidis, Angelos D. Keromytis. 41-48 [doi]
- G-Free: defeating return-oriented programming through gadget-less binariesKaan Onarlioglu, Leyla Bilge, Andrea Lanzi, Davide Balzarotti, Engin Kirda. 49-58 [doi]
- Towards practical anonymous password authenticationYanjiang Yang, Jianying Zhou, Jun Wen Wong, Feng Bao. 59-68 [doi]
- Securing interactive sessions using mobile device through visual channel and visual inspectionChengfang Fang, Ee-Chien Chang. 69-78 [doi]
- Exploring usability effects of increasing security in click-based graphical passwordsElizabeth Stobert, Alain Forget, Sonia Chiasson, Paul C. van Oorschot, Robert Biddle. 79-88 [doi]
- Security analysis of a fingerprint-protected USB driveBenjamin Rodes, Xunhua Wang. 89-96 [doi]
- A quantitative analysis of the insecurity of embedded network devices: results of a wide-area scanAng Cui, Salvatore J. Stolfo. 97-106 [doi]
- Multi-vendor penetration testing in the advanced metering infrastructureStephen E. McLaughlin, Dmitry Podkuiko, Sergei Miadzvezhanka, Adam Delozier, Patrick Drew McDaniel. 107-116 [doi]
- Network intrusion detection: dead or alive?Giovanni Vigna. 117-126 [doi]
- Barriers to science in securityTom Longstaff, David M. Balenson, Mark Matties. 127-129 [doi]
- Friends of an enemy: identifying local members of peer-to-peer botnets using mutual contactsBaris Coskun, Sven Dietrich, Nasir D. Memon. 131-140 [doi]
- The case for in-the-lab botnet experimentation: creating and taking down a 3000-node botnetJoan Calvet, Carlton R. Davis, José M. Fernandez, Jean-Yves Marion, Pier-Luc St-Onge, Wadie Guizani, Pierre-Marc Bureau, Anil Somayaji. 141-150 [doi]
- Conficker and beyond: a large-scale empirical studySeungwon Shin, Guofei Gu. 151-160 [doi]
- Spam mitigation using spatio-temporal reputations from blacklist historyAndrew G. West, Adam J. Aviv, Jian Chang, Insup Lee. 161-170 [doi]
- Breaking e-banking CAPTCHAsShujun Li, S. Amier Haider Shah, M. Asad Usman Khan, Syed Ali Khayam, Ahmad-Reza Sadeghi, Roland Schmitz. 171-180 [doi]
- FIRM: capability-based inline mediation of Flash behaviorsZhou Li, Xiaofeng Wang. 181-190 [doi]
- T-DRE: a hardware trusted computing base for direct recording electronic vote machinesRoberto Gallo, Henrique Kawakami, Ricardo Dahab, Rafael Azevedo, Saulo Lima, Guido Araujo. 191-198 [doi]
- Hardware assistance for trustworthy systems through 3-D integrationJonathan Valamehr, Mohit Tiwari, Timothy Sherwood, Ryan Kastner, Ted Huffmire, Cynthia E. Irvine, Timothy E. Levin. 199-210 [doi]
- SCA-resistant embedded processors: the next generationStefan Tillich, Mario Kirschbaum, Alexander Szekely. 211-220 [doi]
- Porscha: policy oriented secure content handling in AndroidMachigar Ongtang, Kevin R. B. Butler, Patrick Drew McDaniel. 221-230 [doi]
- Kells: a protection framework for portable dataKevin R. B. Butler, Stephen E. McLaughlin, Patrick Drew McDaniel. 231-240 [doi]
- Keeping data secret under full compromise using porter devicesChristina Pöpper, David A. Basin, Srdjan Capkun, Cas J. F. Cremers. 241-250 [doi]
- Familiarity breeds contempt: the honeymoon effect and the role of legacy code in zero-day vulnerabilitiesSandy Clark, Stefan Frei, Matt Blaze, Jonathan M. Smith. 251-260 [doi]
- Quantifying information leaks in softwareJonathan Heusser, Pasquale Malacaria. 261-269 [doi]
- Analyzing and improving Linux kernel memory protection: a model checking approachSiarhei Liakh, Michael C. Grace, Xuxian Jiang. 271-280 [doi]
- Back to BerferdWilliam R. Cheswick. 281-286 [doi]
- Comprehensive shellcode detection using runtime heuristicsMichalis Polychronakis, Kostas G. Anagnostakis, Evangelos P. Markatos. 287-296 [doi]
- Cross-layer comprehensive intrusion harm analysis for production workload server systemsShengzhi Zhang, Xiaoqi Jia, Peng Liu, Jiwu Jing. 297-306 [doi]
- Forenscope: a framework for live forensicsEllick Chan, Shivaram Venkataraman, Francis M. David, Amey Chaugule, Roy H. Campbell. 307-316 [doi]
- A multi-user steganographic file system on untrusted shared storageJin Han, Meng Pan, Debin Gao, HweeHwa Pang. 317-326 [doi]
- Heap Taichi: exploiting memory allocation granularity in heap-spraying attacksYu Ding, Tao Wei, Tielei Wang, Zhenkai Liang, Wei Zou. 327-336 [doi]
- SCOBA: source code based attestation on custom softwareLiang Gu, Yao Guo, Anbang Ruan, Qingni Shen, Hong Mei. 337-346 [doi]
- Paranoid Android: versatile protection for smartphonesGeorgios Portokalidis, Philip Homburg, Kostas Anagnostakis, Herbert Bos. 347-356 [doi]
- Exploiting smart-phone USB connectivity for fun and profitZhaohui Wang, Angelos Stavrou. 357-366 [doi]
- Defending DSSS-based broadcast communication against insider jammers via delayed seed-disclosureAn Liu, Peng Ning, Huaiyu Dai, Yao Liu, Cliff Wang. 367-376 [doi]
- Always up-to-date: scalable offline patching of VM images in a compute cloudWu Zhou, Peng Ning, Xiaolan Zhang, Glenn Ammons, Ruowen Wang, Vasanth Bala. 377-386 [doi]
- A framework for testing hardware-software security architecturesJeffrey S. Dwoskin, Mahadevan Gomathisankaran, Yu-Yuan Chen, Ruby B. Lee. 387-397 [doi]
- Two methodologies for physical penetration testing using social engineeringTrajce Dimkov, Wolter Pieters, Pieter H. Hartel. 399-408 [doi]