Abstract is missing.
- Trusted VM Snapshots in Untrusted Cloud InfrastructuresAbhinav Srivastava, Himanshu Raj, Jonathon T. Giffin, Paul England. 1-21 [doi]
- Secure and Robust Monitoring of Virtual Machines through Guest-Assisted IntrospectionMartim Carbone, Matthew Conover, Bruce Montague, Wenke Lee. 22-41 [doi]
- Assessing the Trustworthiness of DriversShengzhi Zhang, Peng Liu 0005. 42-63 [doi]
- Industrial Espionage and Targeted Attacks: Understanding the Characteristics of an Escalating ThreatOlivier Thonnard, Leyla Bilge, Gavin O'Gorman, Seán Kiernan, Martin Lee. 64-85 [doi]
- Memory Errors: The Past, the Present, and the FutureVictor van der Veen, Nitish dutt-Sharma, Lorenzo Cavallaro, Herbert Bos. 86-106 [doi]
- A Memory Access Validation Scheme against Payload Injection AttacksDongkyun Ahn, Gyungho Lee. 107-126 [doi]
- Dione: A Flexible Disk Monitoring and Analysis FrameworkJennifer Mankin, David R. Kaeli. 127-146 [doi]
- AK-PPM: An Authenticated Packet Attribution Scheme for Mobile Ad Hoc NetworksZhi Xu, Hung-Yuan Hsu, Xin Chen, Sencun Zhu, Ali R. Hurson. 147-168 [doi]
- Paying for Piracy? An Analysis of One-Click Hosters' Controversial Reward SchemesTobias Lauinger, Engin Kirda, Pietro Michiardi. 169-189 [doi]
- Proactive Discovery of Phishing Related Domain NamesSamuel Marchal, Jérôme François, Radu State, Thomas Engel. 190-209 [doi]
- Evaluating Electricity Theft Detectors in Smart Grid NetworksDaisuke Mashima, Alvaro A. Cárdenas. 210-229 [doi]
- PoisonAmplifier: A Guided Approach of Discovering Compromised Websites through Reversing Search Poisoning AttacksJialong Zhang, Chao Yang, Zhaoyan Xu, Guofei Gu. 230-253 [doi]
- DEMACRO: Defense against Malicious Cross-Domain RequestsSebastian Lekies, Nick Nikiforakis, Walter Tighzert, Frank Piessens, Martin Johns. 254-273 [doi]
- FlashDetect: ActionScript 3 Malware DetectionTimon Van Overveldt, Christopher Kruegel, Giovanni Vigna. 274-293 [doi]
- ALERT-ID: Analyze Logs of the Network Element in Real Time for Intrusion DetectionJie Chu, Zihui Ge, Richard Huber, Ping Ji, Jennifer Yates, Yung-Chao Yu. 294-313 [doi]
- A Lone Wolf No More: Supporting Network Intrusion Detection with Real-Time IntelligenceBernhard Amann, Robin Sommer, Aashish Sharma, Seth Hall. 314-333 [doi]
- GPP-Grep: High-Speed Regular Expression Processing Engine on General Purpose ProcessorsVictor C. Valgenti, Jatin Chhugani, Yan Sun, Nadathur Satish, Min Sik Kim, Changkyu Kim, Pradeep Dubey. 334-353 [doi]
- N-Gram against the Machine: On the Feasibility of the N-Gram Network Analysis for Binary ProtocolsDina Hadziosmanovic, Lorenzo Simionato, Damiano Bolzoni, Emmanuele Zambon, Sandro Etalle. 354-373 [doi]
- Online Social Networks, a Criminals Multipurpose Toolbox (Poster Abstract)Shah Mahmood, Yvo Desmedt. 374-375 [doi]
- The Triple-Channel Model: Toward Robust and Efficient Advanced Botnets (Poster Abstract)Xiang Cui, Jinqiao Shi, Peng Liao, Chaoge Liu. 376-377 [doi]
- Network Security Analysis Method Taking into Account the Usage Information (Poster Abstract)Jinyu Wu, Lihua Yin, Binxing Fang. 378-379 [doi]
- Automatic Covert Channel Detection in Asbestos System (Poster Abstract)Shuyuan Jin, Zhi Yang, Xiang Cui. 380-381 [doi]
- EFA for Efficient Regular Expression Matching in NIDS (Poster Abstract)Dengke Qiao, Tingwen Liu, Yong Sun, Li Guo. 382-383 [doi]
- Distress Detection (Poster Abstract)Mark Vella, Sotirios Terzis, Marc Roper. 384-385 [doi]
- Trie Data Structure to Compare Traffic Payload in a Supervised Anomaly Detection System (Poster Abstract)Jenny Andrea Pinto Sánchez, Luis Javier García-Villalba. 386-387 [doi]
- Towards Automated Forensic Event Reconstruction of Malicious Code (Poster Abstract)Ahmed F. Shosha, Joshua James, Chen-Ching Liu, Pavel Gladyshev. 388-389 [doi]
- Accurate Recovery of Functions in a Retargetable Decompiler(Poster Abstract)Lukás Durfina, Jakub Kroustek, Petr Zemek, Bretislav Kábele. 390-392 [doi]
- Improvement of an Anagram Based NIDS by Reducing the Storage Space of Bloom Filters (Poster Abstract)Hugo Villanúa Vega, Jorge Maestre Vidal, Jaime Daniel Mejía Castro, Luis Javier García-Villalba. 393-394 [doi]
- Concurrency Optimization for NIDS (Poster Abstract)Jorge Maestre Vidal, Hugo Villanúa Vega, Jaime Daniel Mejía Castro, Luis Javier García-Villalba. 395-396 [doi]
- Malware Detection System by Payload Analysis of Network Traffic (Poster Abstract)Luis Javier García-Villalba, Jaime Daniel Mejía Castro, Ana Lucila Sandoval Orozco, Javier Martínez Puentes. 397-398 [doi]