Abstract is missing.
- Cutting the Gordian Knot: A Look Under the Hood of Ransomware AttacksAmin Kharraz, William K. Robertson, Davide Balzarotti, Leyla Bilge, Engin Kirda. 3-24 [doi]
- "Nice Boots!" - A Large-Scale Analysis of Bootkits and New Ways to Stop ThemBernhard Grill, Andrei Bacs, Christian Platzer, Herbert Bos. 25-45 [doi]
- C5: Cross-Cores Cache Covert ChannelClémentine Maurice, Christoph Neumann, Olivier Heen, Aurélien Francillon. 46-64 [doi]
- Intrusion Detection for Airborne Communication Using PHY-Layer InformationMartin Strohmeier, Vincent Lenders, Ivan Martinovic. 67-77 [doi]
- That Ain't You: Blocking Spearphishing Through Behavioral ModellingGianluca Stringhini, Olivier Thonnard. 78-97 [doi]
- Robust and Effective Malware Detection Through Quantitative Data Flow Graph MetricsTobias Wüchner, Martín Ochoa, Alexander Pretschner. 98-118 [doi]
- Jackdaw: Towards Automatic Reverse Engineering of Large Datasets of BinariesMario Polino, Andrea Scorti, Federico Maggi, Stefano Zanero. 121-143 [doi]
- Fine-Grained Control-Flow Integrity Through Binary HardeningMathias Payer, Antonio Barresi, Thomas R. Gross. 144-164 [doi]
- Powerslave: Analyzing the Energy Consumption of Mobile Antivirus SoftwareIasonas Polakis, Michalis Diamantaris, Thanasis Petsas, Federico Maggi, Sotiris Ioannidis. 165-184 [doi]
- The Role of Cloud Services in Malicious Software: Trends and InsightsXiao Han, Nizar Kheir, Davide Balzarotti. 187-204 [doi]
- Capturing DDoS Attack Dynamics Behind the Scenesan Wang, Aziz Mohaisen, Wentao Chang, Songqing Chen. 205-215 [doi]
- Quit Playing Games with My Heart: Understanding Online Dating ScamsJingMin Huang, Gianluca Stringhini, Peng Yong. 216-236 [doi]
- More Guidelines Than Rules: CSRF Vulnerabilities from Noncompliant OAuth 2.0 ImplementationsEthan Shernan, Henry Carter, Dave Tian, Patrick Traynor, Kevin R. B. Butler. 239-260 [doi]
- May I? - Content Security Policy Endorsement for Browser ExtensionsDaniel Hausknecht, Jonas Magazinius, Andrei Sabelfeld. 261-281 [doi]
- On the Security and Engineering Implications of Finer-Grained Access Controls for Android Developers and UsersYanick Fratantonio, Antonio Bianchi, William K. Robertson, Manuel Egele, Christopher Kruegel, Engin Kirda, Giovanni Vigna. 282-303 [doi]
- Identifying Intrusion Infections via Probabilistic Inference on Bayesian NetworkYuan Yang, Zhongmin Cai, Weixuan Mao, Zhihai Yang. 307-326 [doi]
- Controlled Data Sharing for Collaborative Predictive BlacklistingJulien Freudiger, Emiliano De Cristofaro, Alejandro E. Brito. 327-349 [doi]