Abstract is missing.
- Subverting Operating System Properties Through Evolutionary DKOM AttacksMariano Graziano, Lorenzo Flore, Andrea Lanzi, Davide Balzarotti. 3-24 [doi]
- DeepFuzz: Triggering Vulnerabilities Deeply Hidden in Binaries - (Extended Abstract)Konstantin Böttinger, Claudia Eckert. 25-34 [doi]
- AutoRand: Automatic Keyword Randomization to Prevent Injection AttacksJeff H. Perkins, Jordan Eikenberry, Alessandro Coglio, Daniel Willenson, Stelios Sidiroglou-Douskos, Martin C. Rinard. 37-57 [doi]
- AVRAND: A Software-Based Defense Against Code Reuse Attacks for AVR Embedded DevicesSergio Pastrana, Juan E. Tapiador, Guillermo Suarez-Tangil, Pedro Peris-López. 58-77 [doi]
- Towards Vulnerability Discovery Using Staged Program AnalysisBhargava Shastry, Fabian Yamaguchi, Konrad Rieck, Jean-Pierre Seifert. 78-97 [doi]
- Comprehensive Analysis and Detection of Flash-Based MalwareChristian Wressnegger, Fabian Yamaguchi, Daniel Arp, Konrad Rieck. 101-121 [doi]
- Reviewer Integration and Performance Measurement for Malware DetectionBrad Miller, Alex Kantchelian, Michael Carl Tschantz, Sadia Afroz, Rekha Bachwani, Riyaz Faizullabhoy, Ling Huang, Vaishaal Shankar, Tony Wu, George Yiu, Anthony D. Joseph, J. D. Tygar. 122-141 [doi]
- On the Lack of Consensus in Anti-Virus Decisions: Metrics and Insights on Building Ground Truths of Android MalwareMédéric Hurier, Kevin Allix, Tegawendé F. Bissyandé, Jacques Klein, Yves Le Traon. 142-162 [doi]
- Probfuscation: An Obfuscation Approach Using Probabilistic Control FlowsAndre Pawlowski, Moritz Contag, Thorsten Holz. 165-185 [doi]
- RAMBO: Run-Time Packer Analysis with Multiple Branch ObservationXabier Ugarte-Pedrero, Davide Balzarotti, Igor Santos, Pablo Garcia Bringas. 186-206 [doi]
- Detecting Hardware-Assisted VirtualizationMichael Brengel, Michael Backes 0001, Christian Rossow. 207-227 [doi]
- Financial Lower Bounds of Online Advertising Abuse - A Four Year Case Study of the TDSS/TDL4 BotnetYizheng Chen, Panagiotis Kintis, Manos Antonakakis, Yacin Nadji, David Dagon, Wenke Lee, Michael Farrell. 231-254 [doi]
- Google Dorks: Analysis, Creation, and New DefensesFlavio Toffalini, Maurizio Abbà, Damiano Carra, Davide Balzarotti. 255-275 [doi]
- Flush+Flush: A Fast and Stealthy Cache AttackDaniel Gruss, Clémentine Maurice, Klaus Wagner, Stefan Mangard. 279-299 [doi]
- Rowhammer.js: A Remote Software-Induced Fault Attack in JavaScriptDaniel Gruss, Clémentine Maurice, Stefan Mangard. 300-321 [doi]
- Detile: Fine-Grained Information Leak Detection in Script EnginesRobert Gawlik, Philipp Koppe, Benjamin Kollenda, Andre Pawlowski, Behrad Garmany, Thorsten Holz. 322-342 [doi]
- Understanding the Privacy Implications of ECS - (Extended Abstract)Panagiotis Kintis, Yacin Nadji, David Dagon, Michael Farrell, Manos Antonakakis. 343-353 [doi]
- Analysing the Security of Google's Implementation of OpenID ConnectWanpeng Li, Chris J. Mitchell. 357-376 [doi]
- Leveraging Sensor Fingerprinting for Mobile Device AuthenticationThomas Hupperich, Henry Hosseini, Thorsten Holz. 377-396 [doi]
- MtNet: A Multi-Task Neural Network for Dynamic Malware ClassificationWenyi Huang, Jack W. Stokes. 399-418 [doi]
- Adaptive Semantics-Aware Malware ClassificationBojan Kolosnjaji, Apostolis Zarras, Tamas K. Lengyel, George D. Webster, Claudia Eckert. 419-439 [doi]