Abstract is missing.
- Malware Guard Extension: Using SGX to Conceal Cache AttacksMichael Schwarz, Samuel Weiser, Daniel Gruss, Clémentine Maurice, Stefan Mangard. 3-24 [doi]
- On the Trade-Offs in Oblivious Execution TechniquesShruti Tople, Prateek Saxena. 25-47 [doi]
- MemPatrol: Reliable Sideline Integrity Monitoring for High-Performance SystemsMyoung Jin Nam, Wonhong Nam, Jin-Young Choi, Periklis Akritidis. 48-69 [doi]
- Measuring and Defeating Anti-Instrumentation-Equipped MalwareMario Polino, Andrea Continella, Sebastiano Mariani, Stefano D'Alessio, Lorenzo Fontana, Fabio Gritti, Stefano Zanero. 73-96 [doi]
- DynODet: Detecting Dynamic Obfuscation in MalwareDanny Kim, Amir Majlesi-Kupaei, Julien Roy, Kapil Anand, Khaled Elwazeer, Daniel Buettner, Rajeev Barua. 97-118 [doi]
- Finding the Needle: A Study of the PE32 Rich Header and Respective Malware TriageGeorge D. Webster, Bojan Kolosnjaji, Christian von Pentz, Julian Kirsch, Zachary D. Hanif, Apostolis Zarras, Claudia Eckert. 119-138 [doi]
- Last Line of Defense: A Novel IDS Approach Against Advanced Threats in Industrial Control SystemsMark Luchs, Christian Doerr. 141-160 [doi]
- LED-it-GO: Leaking (A Lot of) Data from Air-Gapped Computers via the (Small) Hard Drive LEDMordechai Guri, Boris Zadov, Yuval Elovici. 161-184 [doi]
- A Stealth, Selective, Link-Layer Denial-of-Service Attack Against Automotive NetworksAndrea Palanca, Eric Evenchick, Federico Maggi, Stefano Zanero. 185-206 [doi]
- Quincy: Detecting Host-Based Code Injection Attacks in Memory DumpsThomas Barabosch, Niklas Bergmann, Adrian Dombeck, Elmar Padilla. 209-229 [doi]
- SPEAKER: Split-Phase Execution of Application ContainersLingguang Lei, Jianhua Sun, Kun Sun, Chris Shenefiel, Rui Ma, Yuewu Wang, Qi Li. 230-251 [doi]
- Deep Ground Truth Analysis of Current Android MalwareFengguo Wei, Yuping Li, Sankardas Roy, Xinming Ou, Wu Zhou. 252-276 [doi]
- HumIDIFy: A Tool for Hidden Functionality Detection in FirmwareSam L. Thomas, Flavio D. Garcia, Tom Chothia. 279-300 [doi]
- BinShape: Scalable and Robust Binary Library Function Identification Using Function ShapeParia Shirani, Lingyu Wang 0001, Mourad Debbabi. 301-324 [doi]
- SCVD: A New Semantics-Based Approach for Cloned Vulnerable Code DetectionDeqing Zou, Hanchao Qi, Zhen Li, Song Wu, Hai Jin, Guozhong Sun, Sujuan Wang, Yuyi Zhong. 325-344 [doi]
- On the Privacy Impacts of Publicly Leaked Password DatabasesOlivier Heen, Christoph Neumann. 347-365 [doi]
- Unsupervised Detection of APT C&C Channels using Web Request GraphsPavlos Lamprakis, Ruggiero Dargenio, David Gugelmann, Vincent Lenders, Markus Happe, Laurent Vanbever. 366-387 [doi]
- Measuring Network Reputation in the Ad-Bidding ProcessYizheng Chen, Yacin Nadji, Rosa Romero Gómez, Manos Antonakakis, David Dagon. 388-409 [doi]