Abstract is missing.
- GRIM: Leveraging GPUs for Kernel Integrity MonitoringLazaros Koromilas, Giorgos Vasiliadis, Elias Athanasopoulos, Sotiris Ioannidis. 3-23 [doi]
- Taming Transactions: Towards Hardware-Assisted Control Flow Integrity Using Transactional MemoryMarius Muench, Fabio Pagani, Yan Shoshitaishvili, Christopher Kruegel, Giovanni Vigna, Davide Balzarotti. 24-48 [doi]
- Automatic Uncovering of Tap Points from Kernel ExecutionsJunyuan Zeng, Yangchun Fu, Zhiqiang Lin. 49-70 [doi]
- Detecting Stack Layout Corruptions with Robust Stack UnwindingYangchun Fu, Junghwan Rhee, Zhiqiang Lin, Zhichun Li, Hui Zhang 0002, Guofei Jiang. 71-94 [doi]
- APDU-Level Attacks in PKCS#11 DevicesClaudio Bozzato, Riccardo Focardi, Francesco Palmarini, Graham Steel. 97-117 [doi]
- CloudRadar: A Real-Time Side-Channel Attack Detection System in CloudsTianwei Zhang, Yinqian Zhang, Ruby B. Lee. 118-140 [doi]
- The Abuse Sharing Economy: Understanding the Limits of Threat ExchangesKurt Thomas, Rony Amira, Adi Ben-Yoash, Ori Folger, Amir Hardon, Ari Berger, Elie Bursztein, Michael Bailey. 143-164 [doi]
- SandPrint: Fingerprinting Malware Sandboxes to Provide Intelligence for Sandbox EvasionAkira Yokoyama, Kou Ishii, Rui Tanabe, Yinmin Papa, Katsunari Yoshioka, Tsutomu Matsumoto, Takahiro Kasama, Daisuke Inoue, Michael Brengel, Michael Backes 0001, Christian Rossow. 165-187 [doi]
- Enabling Network Security Through Active DNS DatasetsAthanasios Kountouras, Panagiotis Kintis, Chaz Lever, Yizheng Chen, Yacin Nadji, David Dagon, Manos Antonakakis, Rodney Joffe. 188-208 [doi]
- A Formal Framework for Environmentally Sensitive MalwareJeremy Blackthorne, Benjamin Kaiser, Bülent Yener. 211-229 [doi]
- AVclass: A Tool for Massive Malware LabelingMarcos Sebastián, Richard Rivera, Platon Kotzias, Juan Caballero. 230-253 [doi]
- Semantics-Preserving Dissection of JavaScript Exploits via Dynamic JS-Binary AnalysisXunchao Hu, Aravind Prakash, Jinghan Wang, Rundong Zhou, Yao Cheng, Heng Yin. 254-276 [doi]
- The Messenger Shoots Back: Network Operator Based IMSI Catcher DetectionAdrian Dabrowski, Georg Petzl, Edgar R. Weippl. 279-302 [doi]
- On the Feasibility of TTL-Based Filtering for DRDoS MitigationMichael Backes 0001, Thorsten Holz, Christian Rossow, Teemu Rytilahti, Milivoj Simeonovski, Ben Stock. 303-322 [doi]
- A Look into 30 Years of Malware Development from a Software Metrics PerspectiveAlejandro Calleja, Juan E. Tapiador, Juan Caballero. 325-345 [doi]
- Small Changes, Big Changes: An Updated View on the Android Permission SystemYury Zhauniarovich, Olga Gadyatskaya. 346-367 [doi]
- Who Gets the Boot? Analyzing Victimization by DDoS-as-a-ServiceArman Noroozian, Maciej Korczynski, Carlos Hernandez Gañán, Daisuke Makita, Katsunari Yoshioka, Michel van Eeten. 368-389 [doi]
- Uses and Abuses of Server-Side RequestsGiancarlo Pellegrino, Onur Catakoglu, Davide Balzarotti, Christian Rossow. 393-414 [doi]
- Identifying Extension-Based Ad Injection via Fine-Grained Web Content ProvenanceSajjad Arshad, Amin Kharraz, William Robertson. 415-436 [doi]
- Trellis: Privilege Separation for Multi-user Applications Made EasyAndrea Mambretti, Kaan Onarlioglu, Collin Mulliner, William Robertson, Engin Kirda, Federico Maggi, Stefano Zanero. 437-456 [doi]
- Blender: Self-randomizing Address Space Layout for Android AppsMingshen Sun, John C. S. Lui, Yajin Zhou. 457-480 [doi]