Abstract is missing.
- A Journey Through Android App Analysis: Solutions and Open ChallengesJacques Klein. 1-6 [doi]
- BadUSB-C: Revisiting BadUSB with Type-CFengwei Zhang. 7-9 [doi]
- A Systematic Hardening of Java's Information HidingPhilipp Holzinger, Eric Bodden. 11-22 [doi]
- Crafting Adversarial Email Content against Machine Learning Based Spam Email DetectionChenran Wang, Danyi Zhang, Suye Huang, Xiangyang Li, Leah Ding. 23-28 [doi]
- Secure Distributed Applications the Decent WayHaofan Zheng, Owen Arden. 29-42 [doi]
- Verification Method of Key-Exchange Protocols With a Small Amount of Input Using Tamarin ProverMisato Nakabayashi, Yuki Okano. 43-50 [doi]
- TRAITOR: A Low-Cost Evaluation Platform for Multifault InjectionLudovic Claudepierre, Pierre-Yves PĂ©neau, Damien Hardy, Erven Rohou. 51-56 [doi]