Abstract is missing.
- Information Flow: A Unified Basis for Vulnerability Mitigation, Malware Defense and Attack Scenario ReconstructionR. Sekar 0001. 1-2 [doi]
- Binary Quilting to Generate Patched Executables without CompilationAnthony Saieva, Gail E. Kaiser. 3-8 [doi]
- On the Generation of Disassembly Ground Truth and the Evaluation of DisassemblersKaiyuan Li, Maverick Woo, Limin Jia. 9-14 [doi]
- Evolution of Cyber-Security Research in an Industrial SettingAlexey Loginov. 15 [doi]
- Hunting Garbage Collection Related Concurrency Bugs through Critical Condition RestorationHanhan Zhou, Tian Lan, Guru Venkataramani. 17-22 [doi]
- On the Impact of Exception Handling Compatibility on Binary InstrumentationSoumyakant Priyadarshan, Huan Nguyen 0004, R. Sekar 0001. 23-28 [doi]
- Automatic Feature Isolation in Network Protocol Software ImplementationsZe Zhang, Qingzhao Zhang, Brandon Nguyen, Sanjay Sri Vallabh Singapuram, Z. Morley Mao, Scott A. Mahlke. 29-34 [doi]
- Remote Control of iOS Devices via Accessibility FeaturesNikola Lukic, Saghar Talebipour, Nenad Medvidovic. 35-40 [doi]