Abstract is missing.
- Register Expansion and SemaCall: 2 Low-overhead Dynamic Watermarks Suitable for Automation in LLVMDavid Schwarzbeck, Daniela Novac, Michael Philippsen. 1-10 [doi]
- IlluminaTEE: Effective Man-At-The-End Attacks from within ARM TrustZoneMatti Schulze, Christian Lindenmeier, Jonas Röckl, Felix C. Freiling. 11-21 [doi]
- K-Hunt++: Improved Dynamic Cryptographic Key ExtractionThomas Faingnaert, Willem Van Iseghem, Bjorn De Sutter. 22-29 [doi]
- Anti-Cheat: Attacks and the Effectiveness of Client-Side DefencesSam Collins, Alex Poulopoulos, Marius Muench, Tom Chothia. 30-43 [doi]
- Tools and Models for Software Reverse Engineering ResearchThomas Faingnaert, Tab Zhang, Willem Van Iseghem, Gertjan Everaert, Bart Coppens 0001, Christian S. Collberg, Bjorn De Sutter. 44-58 [doi]
- Ghost in the SAM: Stealthy, Robust, and Privileged Persistence through Invisible AccountsSebastián R. Castro, Alvaro A. Cárdenas. 59-72 [doi]