Abstract is missing.
- Driving in the Cloud: An Analysis of Drive-by Download Operations and Abuse ReportingAntonio Nappa, M. Zubair Rafique, Juan Caballero. 1-20 [doi]
- ProVeX: Detecting Botnets with Encrypted Command and Control ChannelsChristian Rossow, Christian J. Dietrich. 21-40 [doi]
- Exploring Discriminatory Features for Automated Malware ClassificationGuanhua Yan, Nathan Brown, Deguang Kong. 41-61 [doi]
- PeerRush: Mining for Unwanted P2P TrafficBabak Rahbarinia, Roberto Perdisci, Andrea Lanzi, Kang Li. 62-82 [doi]
- Early Detection of Outgoing Spammers in Large-Scale Service Provider NetworksYehonatan Cohen, Daniel Gordon, Danny Hendler. 83-101 [doi]
- PreparedJS: Secure Script-Templates for JavaScriptMartin Johns. 102-121 [doi]
- Securing Legacy Firefox Extensions with SENTINELKaan Onarlioglu, Mustafa Battal, William K. Robertson, Engin Kirda. 122-138 [doi]
- Weaknesses in Defenses against Web-Borne Malware - (Short Paper)Gen Lu, Saumya K. Debray. 139-149 [doi]
- SMS-Based One-Time Passwords: Attacks and Defense - (Short Paper)Collin Mulliner, Ravishankar Borgaonkar, Patrick Stewin, Jean-Pierre Seifert. 150-159 [doi]
- Towards the Protection of Industrial Control Systems - Conclusions of a Vulnerability Analysis of Profinet IOAndreas Paul, Franka Schuster, Hartmut König. 160-176 [doi]
- HeapSentry: Kernel-Assisted Protection against Heap OverflowsNick Nikiforakis, Frank Piessens, Wouter Joosen. 177-196 [doi]
- Preventing Backdoors in Server Applications with a Separated Software Architecture - (Short Paper)Felix Schuster, Stefan Rüster, Thorsten Holz. 197-206 [doi]