Abstract is missing.
- Security Testing Beyond Functional TestsMohammad Torabi Dashti, David A. Basin. 1-19 [doi]
- Progress-Sensitive Security for SPARKWillard Rafnsson, Deepak Garg 0001, Andrei Sabelfeld. 20-37 [doi]
- Sound and Precise Cross-Layer Data Flow TrackingEnrico Lovat, Martín Ochoa, Alexander Pretschner. 38-55 [doi]
- Automatically Extracting Threats from Extended Data Flow DiagramsBernhard J. Berger, Karsten Sohr, Rainer Koschke. 56-71 [doi]
- On the Static Analysis of Hybrid Mobile Apps - A Report on the State of Apache Cordova NationAchim D. Brucker, Michael Herzberg. 72-88 [doi]
- Semantics-Based Repackaging Detection for Mobile AppsQuanlong Guan, Heqing Huang, Weiqi Luo, Sencun Zhu. 89-105 [doi]
- Accelerometer-Based Device Fingerprinting for Multi-factor Mobile AuthenticationTom van Goethem, Wout Scheepers, Davy Preuveneers, Wouter Joosen. 106-121 [doi]
- POODLEs, More POODLEs, FREAK Attacks Too: How Server Administrators Responded to Three Serious Web VulnerabilitiesBenjamin Fogel, Shane Farmer, Hamza Alkofahi, Anthony Skjellum, Munawar Hafiz. 122-137 [doi]
- HexPADS: A Platform to Detect "Stealth" AttacksMathias Payer. 138-154 [doi]
- Analyzing the Gadgets - Towards a Metric to Measure Gadget QualityAndreas Follner, Alexandre Bartel, Eric Bodden. 155-172 [doi]
- Empirical Analysis and Modeling of Black-Box Mutational FuzzingMingyi Zhao, Peng Liu 0005. 173-189 [doi]
- On the Security Cost of Using a Free and Open Source Component in a Proprietary ProductStanislav Dashevskyi, Achim D. Brucker, Fabio Massacci. 190-206 [doi]
- Idea: Usable Platforms for Secure Programming - Mining Unix for Insight and GuidelinesSven Türpe. 207-215 [doi]
- AppPAL for Android - Capturing and Checking Mobile App PoliciesJoseph Hallett, David Aspinall 0001. 216-232 [doi]
- Inferring Semantic Mapping Between Policies and Code: The Clue is in the LanguagePauline Anthonysamy, Matthew John Edwards, Chris Weichel, Awais Rashid. 233-250 [doi]
- Idea: Supporting Policy-Based Access Control on Database SystemsJasper Bogaerts, Bert Lagaisse, Wouter Joosen. 251-259 [doi]
- Idea: Enforcing Security Properties by Solving Behavioural EquationsEric Rothstein Morris, Joachim Posegga. 260-268 [doi]