Abstract is missing.
- JSand: complete client-side sandboxing of third-party JavaScript without browser modificationsPieter Agten, Steven Van Acker, Yoran Brondsema, Phu H. Phung, Lieven Desmet, Frank Piessens. 1-10 [doi]
- One year of SSL internet measurementOlivier Levillain, Arnaud Ébalard, Benjamin Morin, Hervé Debar. 11-20 [doi]
- Dissecting ghost clicks: ad fraud via misdirected human clicksSumayah A. Alrwais, Alexandre Gerber, Christopher W. Dunn, Oliver Spatscheck, Minaxi Gupta, Eric Osterweil. 21-30 [doi]
- Permission evolution in the Android ecosystemXuetao Wei, Lorenzo Gomez, Iulian Neamtiu, Michalis Faloutsos. 31-40 [doi]
- Practicality of accelerometer side channels on smartphonesAdam J. Aviv, Benjamin Sapp, Matt Blaze, Jonathan M. Smith. 41-50 [doi]
- Analysis of the communication between colluding applications on modern smartphonesClaudio Marforio, Hubert Ritzdorf, Aurélien Francillon, Srdjan Capkun. 51-60 [doi]
- Enabling trusted scheduling in embedded systemsRamya Jayaram Masti, Claudio Marforio, Aanjhan Ranganathan, Aurélien Francillon, Srdjan Capkun. 61-70 [doi]
- TRESOR-HUNT: attacking CPU-bound encryptionErik-Oliver Blass, William Robertson. 71-78 [doi]
- When hardware meets software: a bulletproof solution to forensic memory acquisitionAlessandro Reina, Aristide Fattori, Fabio Pagani, Lorenzo Cavallaro, Danilo Bruschi. 79-88 [doi]
- Tapas: design, implementation, and usability evaluation of a password managerDaniel McCarney, David Barrera, Jeremy Clark, Sonia Chiasson, Paul C. van Oorschot. 89-98 [doi]
- On automated image choice for secure and usable graphical passwordsPaul Dunphy, Patrick Olivier. 99-108 [doi]
- Building better passwords using probabilistic techniquesShiva Houshmand, Sudhir Aggarwal. 109-118 [doi]
- Cloud-based push-styled mobile botnets: a case study of exploiting the cloud to device messaging serviceShuang Zhao, Patrick P. C. Lee, John C. S. Lui, Xiaohong Guan, Xiaobo Ma, Jing Tao. 119-128 [doi]
- Disclosure: detecting botnet command and control servers through large-scale NetFlow analysisLeyla Bilge, Davide Balzarotti, William K. Robertson, Engin Kirda, Christopher Kruegel. 129-138 [doi]
- Security economics: a personal perspectiveRoss Anderson. 139-144 [doi]
- Trust engineering: rejecting the tyranny of the weakest linkSusan D. Alexander. 145-148 [doi]
- SensorSift: balancing sensor data privacy and utility in automated face understandingMiro Enev, Jaeyeon Jung, Liefeng Bo, Xiaofeng Ren, Tadayoshi Kohno. 149-158 [doi]
- Biometric authentication on a mobile device: a study of user effort, error and task disruptionShari Trewin, Calvin Swart, Larry Koved, Jacquelyn Martino, Kapil Singh, Shay Ben-David. 159-168 [doi]
- BetterAuth: web authentication revisitedMartin Johns, Sebastian Lekies, Bastian Braun, Benjamin Flesch. 169-178 [doi]
- Using memory management to detect and extract illegitimate code for malware analysisCarsten Willems, Felix C. Freiling, Thorsten Holz. 179-188 [doi]
- Down to the bare metal: using processor features for binary analysisCarsten Willems, Ralf Hund, Andreas Fobian, Dennis Felsch, Thorsten Holz, Amit Vasudevan. 189-198 [doi]
- Augmenting vulnerability analysis of binary codeSean Heelan, Agustin Gianni. 199-208 [doi]
- ThinAV: truly lightweight mobile cloud-based anti-malwareChris Jarabek, David Barrera, John Aycock. 209-218 [doi]
- Abusing cloud-based browsers for fun and profitVasant Tendulkar, Ryan Snyder, Joe Pletcher, Kevin R. B. Butler, Ashwin Shashidharan, William Enck. 219-228 [doi]
- Iris: a scalable cloud file system with efficient integrity checksEmil Stefanov, Marten van Dijk, Ari Juels, Alina Oprea. 229-238 [doi]
- Malicious PDF detection using metadata and structural featuresCharles Smutz, Angelos Stavrou. 239-248 [doi]
- Jarhead analysis and detection of malicious Java appletsJohannes Schlumberger, Christopher Kruegel, Giovanni Vigna. 249-257 [doi]
- Hi-Fi: collecting high-fidelity whole-system provenanceDevin J. Pohly, Stephen E. McLaughlin, Patrick McDaniel, Kevin R. B. Butler. 259-268 [doi]
- Transforming commodity security policies to enforce Clark-Wilson integrityDivya Muthukumaran, Sandra Rueda, Nirupama Talele, Hayawardh Vijayakumar, Jason Teutsch, Trent Jaeger. 269-278 [doi]
- CodeShield: towards personalized application whitelistingChristopher S. Gates, Ninghui Li, Jing Chen, Robert Proctor. 279-288 [doi]
- Using automated model analysis for reasoning about security of web protocolsApurva Kumar. 289-298 [doi]
- Securing untrusted code via compiler-agnostic binary rewritingRichard Wartell, Vishwath Mohan, Kevin W. Hamlen, Zhiqiang Lin. 299-308 [doi]
- Code shredding: byte-granular randomization of program layout for detecting code-reuse attacksEitaro Shioji, Yuhei Kawakoya, Makoto Iwamura, Takeo Hariu. 309-318 [doi]
- Distributed application tamper detection via continuous software updatesChristian S. Collberg, Sam Martin, Jonathan Myers, Jasvir Nagra. 319-328 [doi]
- VAMO: towards a fully automated malware clustering validity analysisRoberto Perdisci, Manchon U. 329-338 [doi]
- Towards network containment in malware analysis systemsMariano Graziano, Corrado Leita, Davide Balzarotti. 339-348 [doi]
- Lines of malicious code: insights into the malicious software industryMartina Lindorfer, Alessandro Di Federico, Federico Maggi, Paolo Milani Comparetti, Stefano Zanero. 349-358 [doi]
- Generalized vulnerability extrapolation using abstract syntax treesFabian Yamaguchi, Markus Lottmann, Konrad Rieck. 359-368 [doi]
- XIAO: tuning code clones at hands of engineers in practiceYingnong Dang, Dongmei Zhang, Song Ge, Chengyun Chu, Yingjun Qiu, Tao Xie. 369-378 [doi]
- Self-healing multitier architectures using cascading rescue pointsAngeliki Zavou, Georgios Portokalidis, Angelos D. Keromytis. 379-388 [doi]
- Twitter games: how successful spammers pick targetsVasumathi Sridharan, Vaibhav Shankar, Minaxi Gupta. 389-398 [doi]
- All your face are belong to us: breaking Facebook's social authenticationIasonas Polakis, Marco Lancini, Georgios Kontaxis, Federico Maggi, Sotiris Ioannidis, Angelos D. Keromytis, Stefano Zanero. 399-408 [doi]
- Enabling private conversations on TwitterIndrajeet Singh, Michael Butkiewicz, Harsha V. Madhyastha, Srikanth V. Krishnamurthy, Sateesh Addepalli. 409-418 [doi]
- Separation virtual machine monitorsJohn McDermott, Bruce E. Montrose, Margery Li, James Kirby, Myong H. Kang. 419-428 [doi]
- Efficient protection of kernel data structures via object partitioningAbhinav Srivastava, Jonathon T. Giffin. 429-438 [doi]
- TrueErase: per-file secure deletion for the storage data pathSarah M. Diesburg, Christopher R. Meyers, Mark J. Stanovich, Michael Mitchell, Justin Marshall, Julia Gould, An-I Andy Wang, Geoff Kuenning. 439-448 [doi]