Abstract is missing.
- Minemu: The World's Fastest Taint TrackerErik Bosman, Asia Slowinska, Herbert Bos. 1-20 [doi]
- Dymo: Tracking Dynamic Code IdentityBob Gilbert, Richard A. Kemmerer, Christopher Kruegel, Giovanni Vigna. 21-40 [doi]
- Automated Identification of Cryptographic Primitives in Binary ProgramsFelix Gröbert, Carsten Willems, Thorsten Holz. 41-60 [doi]
- Shellzer: A Tool for the Dynamic Analysis of Malicious ShellcodeYanick Fratantonio, Christopher Kruegel, Giovanni Vigna. 61-80 [doi]
- KLIMAX: Profiling Memory Write Patterns to Detect Keystroke-Harvesting MalwareStefano Ortolani, Cristiano Giuffrida, Bruno Crispo. 81-100 [doi]
- Packed, Printable, and Polymorphic Return-Oriented ProgrammingKangjie Lu, Dabi Zou, Weiping Wen, Debin Gao. 101-120 [doi]
- On the Expressiveness of Return-into-libc AttacksMinh Tran, Mark Etheridge, Tyler K. Bletsch, Xuxian Jiang, Vincent W. Freeh, Peng Ning. 121-141 [doi]
- Cross-Domain Collaborative Anomaly Detection: So Far Yet So CloseNathaniel Boggs, Sharath Hiremagalore, Angelos Stavrou, Salvatore J. Stolfo. 142-160 [doi]
- Revisiting Traffic Anomaly Detection Using Software Defined NetworkingSyed Akbar Mehdi, Junaid Khalid, Syed Ali Khayam. 161-180 [doi]
- Modeling User Search Behavior for Masquerade DetectionMalek Ben Salem, Salvatore J. Stolfo. 181-200 [doi]
- Securing Application-Level Topology Estimation Networks: Facing the Frog-Boiling AttackSheila Becker, Jeff Seibert, Cristina Nita-Rotaru, Radu State. 201-221 [doi]
- Detecting Traffic Snooping in Tor Using DecoysSambuddho Chakravarty, Georgios Portokalidis, Michalis Polychronakis, Angelos D. Keromytis. 222-241 [doi]
- Cross-Analysis of Botnet Victims: New Insights and ImplicationsSeungwon Shin, Raymond Lin, Guofei Gu. 242-261 [doi]
- Banksafe Information Stealer Detection Inside the Web BrowserArmin Buescher, Felix Leder, Thomas Siebert. 262-280 [doi]
- IceShield: Detection and Mitigation of Malicious Websites with a Frozen DOMMario Heiderich, Tilman Frosch, Thorsten Holz. 281-300 [doi]
- Spam Filtering in Twitter Using Sender-Receiver RelationshipJonghyuk Song, Sangho Lee, Jong Kim. 301-317 [doi]
- Die Free or Live Hard? Empirical Evaluation and New Design for Fighting Evolving Twitter SpammersChao Yang, Robert Chandler Harkreader, Guofei Gu. 318-337 [doi]
- Detecting Environment-Sensitive MalwareMartina Lindorfer, Clemens Kolbitsch, Paolo Milani Comparetti. 338-357 [doi]
- Defending Embedded Systems with Software SymbiotesAng Cui, Salvatore J. Stolfo. 358-377 [doi]
- What If You Can't Trust Your Network Card?Loïc Duflot, Yves-Alexis Perez, Benjamin Morin. 378-397 [doi]