Abstract is missing.
- Understanding the prevalence and use of alternative plans in malware with network gamesYacin Nadji, Manos Antonakakis, Roberto Perdisci, Wenke Lee. 1-10 [doi]
- FORECAST: skimming off the malware creamMatthias Neugschwandtner, Paolo Milani Comparetti, Grégoire Jacob, Christopher Kruegel. 11-20 [doi]
- Detecting malware's failover C&C strategies with squeezeMatthias Neugschwandtner, Paolo Milani Comparetti, Christian Platzer. 21-30 [doi]
- Distilling critical attack graph surface iteratively through minimum-cost SAT solvingHeqing Huang, Su Zhang, Xinming Ou, Atul Prakash, Karem A. Sakallah. 31-40 [doi]
- RIPE: runtime intrusion prevention evaluatorJohn Wilander, Nick Nikiforakis, Yves Younan, Mariam Kamkar, Wouter Joosen. 41-50 [doi]
- Hit 'em where it hurts: a live security exercise on cyber situational awarenessAdam Doupé, Manuel Egele, Benjamin Caillat, Gianluca Stringhini, Gorkem Yakin, Ali Zand, Ludovico Cavedon, Giovanni Vigna. 51-61 [doi]
- "Mix-in-Place" anonymous networking using secure function evaluationNilesh Nipane, Italo Dacosta, Patrick Traynor. 63-72 [doi]
- Security through amnesia: a software-based solution to the cold boot attack on disk encryptionPatrick Simmons. 73-82 [doi]
- Private search in the real worldVasilis Pappas, Mariana Raykova 0001, Binh Vo, Steven M. Bellovin, Tal Malkin. 83-92 [doi]
- The socialbot network: when bots socialize for fame and moneyYazan Boshmaf, Ildar Muslukhov, Konstantin Beznosov, Matei Ripeanu. 93-102 [doi]
- Detecting and resolving privacy conflicts for collaborative data sharing in online social networksHongxin Hu, Gail-Joon Ahn, Jan Jorgensen. 103-112 [doi]
- Social snapshots: digital forensics for online social networksMarkus Huber, Martin Mulazzani, Manuel Leithner, Sebastian Schrittwieser, Gilbert Wondracek, Edgar Weippl. 113-122 [doi]
- A peel of onionPaul F. Syverson. 123-137 [doi]
- The science of cyber security experimentation: the DETER projectTerry Benzel. 137-148 [doi]
- Facing the facts about image type in recognition-based graphical passwordsMax Hlywa, Robert Biddle, Andrew S. Patrick. 149-158 [doi]
- PhorceField: a phish-proof password ceremonyMichael Hart, Claude Castille, Manoj Harpalani, Jonathan Toohill, Rob Johnson. 159-168 [doi]
- Dynamic sample size detection in continuous authentication using sequential samplingAhmed Awad E. Ahmed, Issa Traoré. 169-176 [doi]
- Improving robustness of DNS to software vulnerabilitiesAhmed Khurshid, Firat Kiyak, Matthew Caesar. 177-186 [doi]
- Enabling secure VM-vTPM migration in private cloudsBoris Danev, Ramya Jayaram Masti, Ghassan Karame, Srdjan Capkun. 187-196 [doi]
- Exposing invisible timing-based traffic watermarks with BACKLITXiapu Luo, Peng Zhou, Junjie Zhang, Roberto Perdisci, Wenke Lee, Rocky K. C. Chang. 197-206 [doi]
- Exploring the potential benefits of expanded rate limiting in Tor: slow and steady wins the race with TortoiseW. Brad Moore, Chris Wacek, Micah Sherr. 207-216 [doi]
- "Super nodes" in Tor: existence and security implicationChenglong Li, Yibo Xue, Yingfei Dong, Dongsheng Wang. 217-226 [doi]
- Smart metering de-pseudonymizationMarek Jawurek, Martin Johns, Konrad Rieck. 227-236 [doi]
- SEMAGE: a new image-based two-factor CAPTCHAShardul Vikram, Yinan Fan, Guofei Gu. 237-246 [doi]
- BLOCK: a black-box approach for detection of state violation attacks towards web applicationsXiaowei Li 0003, Yuan Xue. 247-256 [doi]
- A server- and browser-transparent CSRF defense for web 2.0 applicationsRiccardo Pelizzi, R. Sekar. 257-266 [doi]
- ASIDE: IDE support for web application securityJing Xie, Bill Chu, Heather Richter Lipford, John T. Melton. 267-276 [doi]
- Tracking payment card data flow using virtual machine state introspectionJennia Hizver, Tzi-cker Chiueh. 277-285 [doi]
- An empirical study of visual security cues to prevent the SSLstripping attackDongwan Shin, Rodrigo Lopes. 287-296 [doi]
- AdSentry: comprehensive and flexible confinement of JavaScript-based advertisementsXinshu Dong, Minh Tran, Zhenkai Liang, Xuxian Jiang. 297-306 [doi]
- WebJail: least-privilege integration of third-party components in web mashupsSteven Van Acker, Philippe De Ryck, Lieven Desmet, Frank Piessens, Wouter Joosen. 307-316 [doi]
- Key escrow from a safe distance: looking back at the Clipper ChipMatt Blaze. 317-321 [doi]
- Reliable telemetry in white spaces using remote attestationOmid Fatemieh, Michael LeMay, Carl A. Gunter. 323-332 [doi]
- Don't Bump, Shake on It: the exploitation of a popular accelerometer-based smart phone exchange and its secure replacementAhren Studer, Timothy Passaro, Lujo Bauer. 333-342 [doi]
- Attacks on WebView in the Android systemTongbo Luo, Hao Hao, Wenliang Du, Yifei Wang, Heng Yin. 343-352 [doi]
- Mitigating code-reuse attacks with control-flow lockingTyler K. Bletsch, Xuxian Jiang, Vincent W. Freeh. 353-362 [doi]
- deRop: removing return-oriented programming from malwareKangjie Lu, Dabi Zou, Weiping Wen, Debin Gao. 363-372 [doi]
- Static detection of malicious JavaScript-bearing PDF documentsPavel Laskov, Nedim Srndic. 373-382 [doi]
- Nexat: a history-based approach to predict attacker actionsCasey Cipriano, Ali Zand, Amir Houmansadr, Christopher Kruegel, Giovanni Vigna. 383-392 [doi]
- From prey to hunter: transforming legacy embedded devices into exploitation sensor gridsAng Cui, Jatin Kataria, Salvatore J. Stolfo. 393-402 [doi]
- BareBox: efficient malware analysis on bare-metalDhilung Kirat, Giovanni Vigna, Christopher Kruegel. 403-412 [doi]
- Automated remote repair for mobile malwareYacin Nadji, Jonathon T. Giffin, Patrick Traynor. 413-422 [doi]