Abstract is missing.
- Unity in Diversity: Phylogenetic-inspired Techniques for Reverse Engineering and Detection of Malware FamiliesWei Ming Khoo, Pietro Lio'. 3-10 [doi]
- Detecting Insufficient Access Control in Web ApplicationsGeorge Noseevich, Andrew Petukhov. 11-18 [doi]
- I/O Attacks in Intel PC-based Architectures and CountermeasuresFernand Lone Sang, Vincent Nicomette, Yves Deswarte. 19-26 [doi]
- CAPTCHuring Automated (Smart) Phone AttacksIasonas Polakis, Georgios Kontaxis, Sotiris Ioannidis. 27-34 [doi]
- Outsourcing Malicious Infrastructure to the CloudGeorgios Kontaxis, Iasonas Polakis, Sotiris Ioannidis. 35-42 [doi]
- Demarcation of Security in Authentication ProtocolsNaveed Ahmed, Christian Damsgaard Jensen. 43-50 [doi]
- The MINESTRONE Architecture Combining Static and Dynamic Analysis Techniques for Software SecurityAngelos D. Keromytis, Salvatore J. Stolfo, Junfeng Yang, Angelos Stavrou, Anup K. Ghosh, Dawson R. Engler, Marc Dacier, Matthew C. Elder, Darrell M. Kienzle. 53-56 [doi]
- The Free Secure Network Systems Group: Secure Peer-to-Peer Networking and BeyondChristian Grothoff. 57-58 [doi]
- Adapting Econometric Models, Technical Analysis and Correlation Data to Computer Security DataSpyros K. Kollias, Vasileios Vlachos, Alexandros Papanikolaou, Vassilis Assimakopoulos. 59-62 [doi]
- A Trustworthy Architecture for Wireless Industrial Sensor Networks: Research Roadmap of EU TWISNet Trust and Security ProjectMarkus Wehner, Sven Zeisberg, Alexis Olivereau, Nouha Oualha, Laura Gheorghe, Emil Slusanschi, Basil Hess, Felix von Reischach, Mike Ludwig, David Bateman. 63-66 [doi]
- Mapping Systems Security Research at ChalmersMagnus Almgren, Zhang Fu, E. Jonsson, Pierre Kleberger, Andreas Larsson, Farnaz Moradi, Tomas Olovsson, Marina Papatriantafilou, L. Pirzadeh, Philippas Tsigas. 67-70 [doi]
- Exploring the Landscape of CybercrimeZinaida Benenson, Andreas Dewald, Hans-Georg Eßer, Felix C. Freiling, Tilo Müller, Christian Moch, Stefan Vömel, Sebastian Schinzel, Michael Spreitzenbarth, Ben Stock, Johannes Stüttgen. 71-74 [doi]
- CLEARER: CrySyS Laboratory Security and Privacy Research RoadmapLevente Buttyán, Márk Félegyházi, Boldizsár Bencsáth. 75-78 [doi]
- Towards Malware-Resistant Networking EnvironmentDennis Gamayunov. 79-82 [doi]
- Research Roadmap on Security MeasurementsXenofontas Dimitropoulos. 83-85 [doi]
- From SSIR to CIDre: A New Security Research Group in Rennes, FranceEmmanuelle Anceaume, Christophe Bidan, Sébastien Gambs, Guillaume Hiet, Michel Hurfin, Ludovic Mé, Guillaume Piolle, Nicolas Prigent, Eric Totel, Frederic Tronel, Valérie Viet Triem Tong. 86-89 [doi]
- Building a Long Term Strategy for International Collaboration in Trustworthy ICT: Security, Privacy and Trust in Global Networks and ServicesJames Clarke, Neeraj Suri, Michel Riguidel, Aljosa Pasic. 90-93 [doi]
- System Security Research at NewcastleJeff Yan. 94-95 [doi]
- Security Research at NASK: Supporting the Operational Needs of a CERT Team and MorePiotr Kijewski, Adam Kozakiewicz. 96-99 [doi]
- The Security Aspects of the Research Activities in IICT-BASKiril Boyanov. 100-102 [doi]
- Less is More - A Secure Microkernel-Based Operating SystemAdam Lackorzynski, Alexander Warg. 103-106 [doi]
- Computer Security and Machine Learning: Worst Enemies or Best Friends?Konrad Rieck. 107-110 [doi]
- Systems Security at VU University AmsterdamHerbert Bos, Lorenzo Cavallaro, Andrew S. Tanenbaum. 111-114 [doi]
- System Security Research at Birmingham: Current Status and Some Future WorkMarco Cova. 115-118 [doi]
- The SPARCHS Project: Hardware Support for Software SecuritySimha Sethumadhavan, Salvatore J. Stolfo, Angelos D. Keromytis, Junfeng Yang, David I. August. 119-122 [doi]
- Malicious Website Detection: Effectiveness and Efficiency IssuesBirhanu Eshete, Adolfo Villafiorita, Komminist Weldemariam. 123-126 [doi]
- Systems Security Research at Politecnico di MilanoFederico Maggi, Stefano Zanero. 127-130 [doi]
- Systems Security Research at Ruhr-University BochumThorsten Holz. 131-134 [doi]