Abstract is missing.
- Why allowing profile name reuse is a bad ideaEnrico Mariconti, Jeremiah Onaolapo, Syed Sharique Ahmad, Nicolas Nikiforou, Manuel Egele, Nick Nikiforakis, Gianluca Stringhini. [doi]
- A transparent defense against USB eavesdropping attacksMatthias Neugschwandtner, Anton Beitler, Anil Kurmus. [doi]
- LockDown: an operating system for achieving service continuity by quarantining principalsGedare Bloom, Gabriel Parmer, Rahul Simha. [doi]
- METAlloc: efficient and comprehensive metadata management for software security hardeningIstván Haller, Erik van der Kouwe, Cristiano Giuffrida, Herbert Bos. [doi]
- DCSP: performant certificate revocation a DNS-based approachAntonios A. Chariton, Eirini Degkleri, Panagiotis Papadopoulos, Panagiotis Ilia, Evangelos P. Markatos. [doi]
- TOFU for OpenPGPNeal H. Walfield, Werner Koch. 2 [doi]
- A text-mining approach to explain unwanted behavioursWei Chen, David Aspinall, Andrew D. Gordon, Charles A. Sutton, Igor Muttik. 4 [doi]