Abstract is missing.
- Intel Software Guard Extensions: Introduction and Open Research ChallengesMatthias Schunter. 1 [doi]
- Beyond the Attack Surface: Assessing Security Risk with Random Walks on Call GraphsNuthan Munaiah, Andrew Meneely. 3-14 [doi]
- ROP Gadget Prevalence and Survival under Compiler-based Binary Diversification SchemesJoel Coffman, Daniel M. Kelly, Christopher C. Wellons, Andrew S. Gearhart. 15-26 [doi]
- Defeating MBA-based ObfuscationNinon Eyrolles, Louis Goubin, Marion Videau. 27-38 [doi]
- VOT4CS: A Virtualization Obfuscation Tool for C#Sebastian Banescu, Ciprian Lucaci, Benjamin Krämer, Alexander Pretschner. 39-49 [doi]
- Binary Permutation Polynomial Inversion and Application to Obfuscation TechniquesLucas Barhelemy, Ninon Eyrolles, Guénaël Renault, Raphaël Roblin. 51-59 [doi]
- StIns4CS: A State Inspection Tool for C#Amjad Ibrahim, Sebastian Banescu. 61-71 [doi]
- Reactive Attestation: Automatic Detection and Reaction to Software Tampering AttacksAlessio Viticchié, Cataldo Basile, Andrea Avancini, Mariano Ceccato, Bert Abrath, Bart Coppens. 73-84 [doi]
- Attacking White-Box AES ConstructionsBrendan McMillion, Nick Sullivan. 85-90 [doi]
- The ASPIRE Framework for Software ProtectionBjorn De Sutter, Cataldo Basile, Mariano Ceccato, Paolo Falcarin, Michael Zunke, Brecht Wyseur, Jerome D'Annoville. 91-92 [doi]