Abstract is missing.
- Privacy Impact Assessment: Comparing Methodologies with a Focus on PracticalityTamas Bisztray, Nils Gruschka. 3-19 [doi]
- Rotten Cellar: Security and Privacy of the Browser Cache RevisitedFlorian Dehling, Tobias Mengel, Luigi Lo Iacono. 20-36 [doi]
- Improving Privacy Through Fast Passive Wi-Fi ScanningFrederik Goovaerts, Gunes Acar, Rafael Galvez, Frank Piessens, Mathy Vanhoef. 37-52 [doi]
- Cronus: Everlasting Privacy with Audit and CastThomas Haines. 53-68 [doi]
- Using Partial Signatures in Intrusion Detection for Multipath TCPZeeshan Afzal, Johan Garcia, Stefan Lindskog, Anna Brunström. 71-86 [doi]
- Analysis of Topology Poisoning Attacks in Software-Defined NetworkingThanh Bui, Markku Antikainen, Tuomas Aura. 87-102 [doi]
- Client-Side Vulnerabilities in Commercial VPNsThanh Bui, Siddharth Prakash Rao, Markku Antikainen, Tuomas Aura. 103-119 [doi]
- Securing Optical Networks by Modern Cryptographic TechniquesJoo Yeon Cho. 120-133 [doi]
- A Roadmap for Improving the Impact of Anti-ransomware ResearchJamie Pont, Osama Abu Oun, Calvin Brierley, Budi Arief, Julio Hernandez-Castro. 137-154 [doi]
- An Experimental Analysis of Cryptojacking AttacksPer Håkon Meland, Bent Heier Johansen, Guttorm Sindre. 155-170 [doi]
- My Smartwatch Is Mine - Machine Learning Based Theft Detection of SmartwatchesChristian Roth, Mirja Nitschke, Christian Hutzler, Maximilian Koller, Rolf Küffner, Marc Roßberger, Dogan Kesdogan. 171-187 [doi]
- Even Turing Should Sometimes Not Be Able to Tell: Mimicking Humanoid Usage Behavior for Exploratory Studies of Online ServicesStephan Wiefling, Nils Gruschka, Luigi Lo Iacono. 188-203 [doi]
- A Study of Security Vulnerabilities and Software Weaknesses in VehiclesWenjun Xiong, Melek Gülsever, Koray Mustafa Kaya, Robert Lagerström. 204-218 [doi]
- Experimental Analysis of the Laser-Induced Instruction Skip Fault ModelJean-Max Dutertre, Timothée Riom, Olivier Potin, Jean-Baptiste Rigaud. 221-237 [doi]
- Can Microkernels Mitigate Microarchitectural Attacks?Gunnar Grimsdal, Patrik Lundgren, Christian Vestlund, Felipe Boeira, Mikael Asplund. 238-253 [doi]
- MicroSCOPE: Enabling Access Control in Searchable Encryption with the Use of Attribute-Based Encryption and SGXAntonis Michalas, Alexandros Bakas, Hai-Van Dang, Alexandr Zaltiko. 254-270 [doi]
- VMIGuard: Detecting and Preventing Service Integrity Violations by Malicious Insiders Using Virtual Machine IntrospectionStewart Sentanoe, Benjamin Taubmann, Hans P. Reiser. 271-282 [doi]