Abstract is missing.
- Are All Firewall Systems Equally Powerful?Lorenzo Ceragioli, Pierpaolo Degano, Letterio Galletta. 1-17 [doi]
- Unacceptable Behavior: Robust PDF Malware Detection Using Abstract InterpretationAlexander Jordan, François Gauthier, Behnaz Hassanshahi, David Zhao. 19-30 [doi]
- High-Level Cryptographic AbstractionsChristopher Kane, Bo Lin, Saksham Chand, Scott D. Stoller, Yanhong A. Liu. 31-43 [doi]
- An Empirical Study of Information Flows in Real-World JavaScriptCristian-Alexandru Staicu, Daniel Schoepe, Musard Balliu, Michael Pradel, Andrei Sabelfeld. 45-59 [doi]
- Simple Noninterference by NormalizationCarlos Tomé Cortiñas, Nachiappan Valliappan. 61-72 [doi]