Abstract is missing.
- VDF: Targeted Evolutionary Fuzz Testing of Virtual DevicesAndrew Henderson, Heng Yin, Guang Jin, Hao Han, Hongmei Deng 0001. 3-25 [doi]
- Static Program Analysis as a Fuzzing AidBhargava Shastry, Markus Leutner, Tobias Fiebig, Kashyap Thimmaraju, Fabian Yamaguchi, Konrad Rieck, Stefan Schmid, Jean-Pierre Seifert, Anja Feldmann. 26-47 [doi]
- Breaking Fitness Records Without Moving: Reverse Engineering and Spoofing FitbitHossein Fereidooni, Jiska Classen, Tom Spink, Paul Patras, Markus Miettinen, Ahmad-Reza Sadeghi, Matthias Hollick, Mauro Conti. 48-69 [doi]
- Lens on the Endpoint: Hunting for Malicious Software Through Endpoint Data AnalysisAhmet Salih Buyukkayhan, Alina Oprea, Zhou Li, William K. Robertson. 73-97 [doi]
- Redemption: Real-Time Protection Against Ransomware at End-HostsAmin Kharraz, Engin Kirda. 98-119 [doi]
- ILAB: An Interactive Labelling Strategy for Intrusion DetectionAnaƫl Beaugnon, Pierre Chifflier, Francis Bach. 120-140 [doi]
- Precisely and Scalably Vetting JavaScript Bridge in Android Hybrid AppsGuangliang Yang, Abner Mendoza, Jialong Zhang, Guofei Gu. 143-166 [doi]
- Filtering for Malice Through the Data Ocean: Large-Scale PHA Install Detection at the Communication Service Provider LevelKai Chen, Tongxin Li, Bin Ma, Peng Wang, Xiaofeng Wang, Peiyuan Zong. 167-191 [doi]
- Android Malware Clustering Through Malicious Payload MiningYuping Li, Jiyong Jang, Xin Hu, Xinming Ou. 192-214 [doi]
- Stealth Loader: Trace-Free Program Loading for API ObfuscationYuhei Kawakoya, Eitaro Shioji, Yuto Otsuki, Makoto Iwamura, Takeshi Yada. 217-237 [doi]
- LAZARUS: Practical Side-Channel Resilient Kernel-Space RandomizationDavid Gens, Orlando Arias, Dean Sullivan, Christopher Liebchen, Yier Jin, Ahmad-Reza Sadeghi. 238-258 [doi]
- CFI CaRE: Hardware-Supported Call and Return Enforcement for Commercial MicrocontrollersThomas Nyman, Jan-Erik Ekberg, Lucas Davi, N. Asokan. 259-284 [doi]
- Mining on Someone Else's Dime: Mitigating Covert Mining Operations in Clouds and EnterprisesRashid Tahir, Muhammad Huzaifa, Anupam Das, Mohammad Ahmad, Carl A. Gunter, Fareed Zaffar, Matthew Caesar, Nikita Borisov. 287-310 [doi]
- BEADS: Automated Attack Discovery in OpenFlow-Based SDN SystemsSamuel Jero, Xiangyu Bu, Cristina Nita-Rotaru, Hamed Okhravi, Richard Skowyra, Sonia Fahmy. 311-333 [doi]
- Trapped by the UI: The Android CaseEfthimios Alepis, Constantinos Patsakis. 334-354 [doi]
- Sgx-Lapd: Thwarting Controlled Side Channel Attacks via Enclave Verifiable Page FaultsYangchun Fu, Erick Bauman, Raul Quinonez, Zhiqiang Lin. 357-380 [doi]
- Secure In-Cache ExecutionYue Chen, Mustakimur Khandaker, Zhi Wang 0004. 381-402 [doi]
- Scotch: Combining Software Guard Extensions and System Management Mode to Monitor Cloud Resource UsageKevin Leach, Fengwei Zhang, Westley Weimer. 403-424 [doi]
- Linking Amplification DDoS Attacks to Booter ServicesJohannes Krupp, Mohammad Karami, Christian Rossow, Damon McCoy, Michael Backes 0001. 427-449 [doi]
- Practical and Accurate Runtime Application Protection Against DoS AttacksMohamed Elsabagh, Dan Fleck, Angelos Stavrou, Michael Kaplan, Thomas Bowen. 450-471 [doi]
- Exploring the Ecosystem of Malicious Domain Registrations in the .eu TLDThomas Vissers, Jan Spooren, Pieter Agten, Dirk Jumpertz, Peter Janssen, Marc Van Wesemael, Frank Piessens, Wouter Joosen, Lieven Desmet. 472-493 [doi]