Abstract is missing.
- A Vision for Enhancing Security of Cryptography in ExecutablesOtto Brechelmacher, Willibald Krenn, Thorsten Tarrach. 1-8 [doi]
- Enforcing Full-Stack Memory-Safety in Cyber-Physical SystemsEyasu Getahun Chekole, Sudipta Chattopadhyay, MartÃn Ochoa, Huaqun Guo. 9-26 [doi]
- Model Checking the Information Flow Security of Real-Time SystemsChristopher Gerking, David Schubert, Eric Bodden. 27-43 [doi]
- Off-Limits: Abusing Legacy x86 Memory Segmentation to Spy on Enclaved ExecutionJago Gyselinck, Jo Van Bulck, Frank Piessens, Raoul Strackx. 44-60 [doi]
- One Leak Is Enough to Expose Them All - From a WebRTC IP Leak to Web-Based Network ScanningMohammadreza Hazhirpasand, Mohammad Ghafari. 61-76 [doi]
- PrivacyMeter: Designing and Developing a Privacy-Preserving Browser ExtensionOleksii Starov, Nick Nikiforakis. 77-95 [doi]
- Security Analysis of Drone Communication ProtocolsChristian Bunse, Sebastian Plotz. 96-107 [doi]
- Idea: Automatic Localization of Malicious Behaviors in Android Malware with Hidden Markov ModelsAleieldin Salem, Tabea Schmidt, Alexander Pretschner. 108-115 [doi]
- Idea: Benchmarking Android Data Leak Detection ToolsClaudio Corrodi, Timo Spring, Mohammad Ghafari, Oscar Nierstrasz. 116-123 [doi]
- Idea: Visual Analytics for Web SecurityVictor Le Pochat, Tom van Goethem, Wouter Joosen. 124-132 [doi]