Abstract is missing.
- Automated CPE Labeling of CVE Summaries with Machine LearningEmil Wåreus, Martin Hell. 3-22 [doi]
- Backstabber's Knife Collection: A Review of Open Source Software Supply Chain AttacksMarc Ohm, Henrik Plate, Arnold Sykosch, Michael Meier 0001. 23-43 [doi]
- Putting Attacks in Context: A Building Automation Testbed for Impact Assessment from the Victim's PerspectiveHerson Esquivel-Vargas, Marco Caselli, Geert Jan Laanstra, Andreas Peter. 44-64 [doi]
- Fast and Furious: Outrunning Windows Kernel Notification Routines from User-ModePierre Ciholas, Jose Miguel Such, Angelos K. Marnerides, Benjamin Green 0001, Jiajie Zhang, Utz Roedig. 67-88 [doi]
- HAEPG: An Automatic Multi-hop Exploitation Generation FrameworkZixuan Zhao, Yan Wang, Xiaorui Gong. 89-109 [doi]
- Understanding Android VoIP Security: A System-Level Vulnerability AssessmentEn He, Daoyuan Wu, Robert H. Deng. 110-131 [doi]
- Web Runner 2049: Evaluating Third-Party Anti-bot ServicesBabak Amin Azad, Oleksii Starov, Pierre Laperdrix, Nick Nikiforakis. 135-159 [doi]
- Short Paper - Taming the Shape Shifter: Detecting Anti-fingerprinting BrowsersBabak Amin Azad, Oleksii Starov, Pierre Laperdrix, Nick Nikiforakis. 160-170 [doi]
- It Never Rains but It Pours: Analyzing and Detecting Fake Removal Information Advertisement SitesTakashi Koide, Daiki Chiba 0001, Mitsuaki Akiyama, Katsunari Yoshioka, Tsutomu Matsumoto. 171-191 [doi]
- On the Security of Application Installers and Online Software RepositoriesMarcus Botacin, Giovanni Bertão, Paulo L. de Geus, André Grégio, Christopher Kruegel, Giovanni Vigna. 192-214 [doi]
- Distributed Heterogeneous N-Variant ExecutionAlexios Voulimeneas, Dokyung Song, Fabian Parzefall, Yeoul Na, Per Larsen, Michael Franz, Stijn Volckaert. 217-237 [doi]
- Sec2graph: Network Attack Detection Based on Novelty Detection on Graph Structured DataLaetitia Leichtnam, Eric Totel, Nicolas Prigent, Ludovic Mé. 238-258 [doi]
- Efficient Context-Sensitive CFI Enforcement Through a Hardware MonitorSadullah Canakci, Leila Delshadtehrani, Boyou Zhou, Ajay Joshi, Manuel Egele. 259-279 [doi]