Abstract is missing.
- Malrec: Compact Full-Trace Malware Recording for Retrospective Deep AnalysisGiorgio Severi, Tim Leek, Brendan Dolan-Gavitt. 3-23 [doi]
- MemScrimper: Time- and Space-Efficient Storage of Malware Sandbox Memory DumpsMichael Brengel, Christian Rossow. 24-45 [doi]
- Spearphishing Malware: Do We Really Know the Unknown?Yanko Baychev, Leyla Bilge. 46-66 [doi]
- Honey, I Shrunk Your App Security: The State of Android App HardeningVincent Haupert, Dominik Maier, Nicolas Schneider, Julian Kirsch, Tilo Müller. 69-91 [doi]
- GuardION: Practical Mitigation of DMA-Based Rowhammer Attacks on ARMVictor van der Veen, Martina Lindorfer, Yanick Fratantonio, Harikrishnan Padmanabha Pillai, Giovanni Vigna, Christopher Kruegel, Herbert Bos, Kaveh Razavi. 92-113 [doi]
- BINARM: Scalable and Efficient Detection of Vulnerabilities in Firmware Images of Intelligent Electronic DevicesParia Shirani, Leo Collard, Basile L. Agba, Bernard Lebel, Mourad Debbabi, Lingyu Wang 0001, Aiman Hanna. 114-138 [doi]
- Update State Tampering: A Novel Adversary Post-compromise Technique on Cyber ThreatsSung Jin Kim, Byung Joon Kim, Hyoung-Chun Kim, Dong-Hoon Lee. 141-161 [doi]
- Evasive Malware via Identifier ImplantingRui Tanabe, Wataru Ueno, Kou Ishii, Katsunari Yoshioka, Tsutomu Matsumoto, Takahiro Kasama, Daisuke Inoue, Christian Rossow. 162-184 [doi]
- On the Weaknesses of Function Table RandomizationMoritz Contag, Robert Gawlik, Andre Pawlowski, Thorsten Holz. 185-207 [doi]
- FraudBuster: Temporal Analysis and Detection of Advanced Financial FraudsMichele Carminati, Alessandro Baggio, Federico Maggi, Umberto Spagnolini, Stefano Zanero. 211-233 [doi]
- No Random, No Ransom: A Key to Stop Cryptographic RansomwareZiya Alper Genç, Gabriele Lenzini, Peter Y. A. Ryan. 234-255 [doi]
- Hidden in Plain Sight: Filesystem View Separation for Data Integrity and DeceptionTeryl Taylor, Frederico Araujo, Anne Kohlbrenner, Marc Ph. Stoecklin. 256-278 [doi]
- Knockin' on Trackers' Door: Large-Scale Automatic Analysis of Web TrackingIskander Sánchez-Rola, Igor Santos. 281-302 [doi]
- JaSt: Fully Syntactic Detection of Malicious (Obfuscated) JavaScriptAurore Fass, Robert P. Krawczyk, Michael Backes 0001, Ben Stock. 303-325 [doi]
- Bytecode Corruption Attacks Are Real - And How to Defend Against ThemTaemin Park, Julian Lettner, Yeoul Na, Stijn Volckaert, Michael Franz. 326-348 [doi]
- ELISA: ELiciting ISA of Raw Binaries for Fine-Grained Code and Data SeparationPietro De Nicolao, Marcello Pogliani, Mario Polino, Michele Carminati, Davide Quarta, Stefano Zanero. 351-371 [doi]
- Symbolic Deobfuscation: From Virtualized Code Back to the OriginalJonathan Salwan, Sébastien Bardin, Marie-Laure Potet. 372-392 [doi]
- Extended Abstract: Toward Systematically Exploring Antivirus EnginesDavide Quarta, Federico Salvioni, Andrea Continella, Stefano Zanero. 393-403 [doi]