Abstract is missing.
- Optimization to the Rescue: Evading Binary Code Stylometry with Adversarial Use of Code OptimizationsBen Jacobsen, Sazzadur Rahaman, Saumya Debray. 1-10 [doi]
- A Framework for Automatic Exploit Generation for JIT CompilersXiyu Kang, Saumya Debray. 11-19 [doi]
- A DCA-resistant Implementation of SM4 for the White-box ContextTingting Lin, Manfred von Willich, Dafu Lou, Phil Eisen. 21-33 [doi]
- LLWM & IR-Mark: Integrating Software Watermarks into an LLVM-based FrameworkDaniela Novac, Christian Eichler, Michael Philippsen. 35-41 [doi]
- Tarnhelm: Isolated, Transparent & Confidential Execution of Arbitrary Code in ARM's TrustZoneDavide Quarta, Michele Ianni, Aravind Machiry, Yanick Fratantonio, Eric Gustafson, Davide Balzarotti, Martina Lindorfer, Giovanni Vigna, Christopher Kruegel. 43-57 [doi]
- PERFUME: Programmatic Extraction and Refinement for Usability of Mathematical ExpressionNicolaas Weideman, Virginia K. Felkner, Wei-Cheng Wu, Jonathan May, Christophe Hauser, Luis Garcia. 59-69 [doi]