Abstract is missing.
- CastSan: Efficient Detection of Polymorphic C++ Object Type Confusions with LLVMPaul Muntean, Sebastian Wuerl, Jens Grossklags, Claudia Eckert. 3-25 [doi]
- On Leveraging Coding Habits for Effective Binary Authorship AttributionSaed Alrabaee, Paria Shirani, Lingyu Wang 0001, Mourad Debbabi, Aiman Hanna. 26-47 [doi]
- Synthesis of a Permissive Security MonitorNarges Khakpour, Charilaos Skandylas. 48-65 [doi]
- MobileFindr: Function Similarity Identification for Reversing Mobile BinariesYibin Liao, Ruoyan Cai, Guodong Zhu, Yue Yin, Kang Li 0001. 66-83 [doi]
- Strain: A Secure Auction for BlockchainsErik-Oliver Blass, Florian Kerschbaum. 87-110 [doi]
- Channels: Horizontal Scaling and Confidentiality on Permissioned BlockchainsElli Androulaki, Christian Cachin, Angelo De Caro, Eleftherios Kokoris-Kogias. 111-131 [doi]
- Stay On-Topic: Generating Context-Specific Fake Restaurant ReviewsMika Juuti, Bo Sun, Tatsuya Mori, N. Asokan. 132-151 [doi]
- Efficient Proof Composition for Verifiable ComputationJulien Keuffer, Refik Molva, Hervé Chabanne. 152-171 [doi]
- Navigating the Samsung TrustZone and Cache-Attacks on the Keymaster TrustletBen Lapid, Avishai Wool. 175-196 [doi]
- Combination of Hardware and Software: An Efficient AES Implementation Resistant to Side-Channel Attacks on All Programmable SoCJingquan Ge, Neng Gao, Chenyang Tu, Ji Xiang, Zeyi Liu, Jun Yuan. 197-217 [doi]
- How Secure Is Green IT? The Case of Software-Based Energy Side ChannelsHeiko Mantel, Johannes Schickel, Alexandra Weber, Friedrich Weber. 218-239 [doi]
- Phishing Attacks Modifications and EvolutionsQian Cui, Guy-Vincent Jourdan, Gregor von Bochmann, Iosif-Viorel Onut, Jason Flood. 243-262 [doi]
- SILK-TV: Secret Information Leakage from Keystroke Timing VideosKiran S. Balagani, Mauro Conti, Paolo Gasti, Martin Georgiev, Tristan Gurtler, Daniele Lain, Charissa Miller, Kendall Molas, Nikita Samarin, Eugen Saraci, Gene Tsudik, Lynn Wu. 263-280 [doi]
- A Formal Approach to Analyzing Cyber-Forensics EvidenceErisa Karafili, Matteo Cristani, Luca Viganò 0001. 281-301 [doi]
- Beneath the Bonnet: A Breakdown of Diagnostic SecurityJan Van den Herrewegen, Flavio D. Garcia. 305-324 [doi]
- Extending Automated Protocol State Learning for the 802.11 4-Way HandshakeChris McMahon Stone, Tom Chothia, Joeri de Ruiter. 325-345 [doi]
- Automatic Detection of Various Malicious Traffic Using Side Channel Features on TCP PacketsGeorge Stergiopoulos, Alexander Talavari, Evangelos Bitsikas, Dimitris Gritzalis. 346-362 [doi]
- PwIN - Pwning Intel piN: Why DBI is Unsuitable for Security ApplicationsJulian Kirsch, Zhechko Zhechev, Bruno Bierbaumer, Thomas Kittel 0001. 363-382 [doi]
- POR for Security Protocol Equivalences - Beyond Action-DeterminismDavid Baelde, Stéphanie Delaune, Lucca Hirschi. 385-405 [doi]
- Automated Identification of Desynchronisation Attacks on Shared SecretsSjouke Mauw, Zach Smith, Jorge Toro-Pozo, Rolando Trujillo-Rasua. 406-426 [doi]
- Stateful Protocol CompositionAndreas Victor Hess, Sebastian Alexander Mödersheim, Achim D. Brucker. 427-446 [doi]
- Towards Understanding Privacy Implications of Adware and Potentially Unwanted ProgramsTobias Urban, Dennis Tatang, Thorsten Holz, Norbert Pohlmann. 449-469 [doi]
- Anonymous Single-Sign-On for n Designated Services with TraceabilityJinguang Han, Liqun Chen, Steve Schneider, Helen Treharne, Stephan Wesemeyer. 470-490 [doi]
- Efficiently Deciding Equivalence for Standard Primitives and PhasesVéronique Cortier, Antoine Dallon, Stéphanie Delaune. 491-511 [doi]
- DigesTor: Comparing Passive Traffic Analysis Attacks on TorKatharina Kohls, Christina Pöpper. 512-530 [doi]
- Deriving a Cost-Effective Digital Twin of an ICS to Facilitate Security EvaluationRon Bitton, Tomer Gluck, Orly Stan, Masaki Inokuchi, Yoshinobu Ohta, Yoshiyuki Yamada, Tomohiko Yagyu, Yuval Elovici, Asaf Shabtai. 533-554 [doi]
- Tracking Advanced Persistent Threats in Critical Infrastructures Through Opinion DynamicsJuan Enrique Rubio, Rodrigo Roman, Cristina Alcaraz, Yan Zhang. 555-574 [doi]
- Hide Your Hackable Smart Home from Remote Attacks: The Multipath Onion IoT GatewaysLei Yang, Chris Seasholtz, Bo Luo, FengJun Li. 575-594 [doi]
- SCIoT: A Secure and sCalable End-to-End Management Framework for IoT DevicesMoreno Ambrosin, Mauro Conti, Ahmad Ibrahim 0002, Ahmad-Reza Sadeghi, Matthias Schunter. 595-617 [doi]