Abstract is missing.
- Proteus: Detecting Android Emulators from Instruction-Level ProfilesOnur Sahin, Ayse Kivilcim Coskun, Manuel Egele. 3-24 [doi]
- BabelView: Evaluating the Impact of Code Injection Attacks in Mobile WebviewsClaudio Rizzo, Lorenzo Cavallaro, Johannes Kinder. 25-46 [doi]
- Defeating Software Mitigations Against Rowhammer: A Surgical Precision HammerAndrei Tatar, Cristiano Giuffrida, Herbert Bos, Kaveh Razavi. 47-66 [doi]
- Reading Between the Lines: Content-Agnostic Detection of Spear-Phishing EmailsHugo Gascon, Steffen Ullrich, Benjamin Stritter, Konrad Rieck. 69-91 [doi]
- Backdoors: Definition, Deniability and DetectionSam L. Thomas, Aurélien Francillon. 92-113 [doi]
- RWGuard: A Real-Time Detection System Against Cryptographic RansomwareShagufta Mehnaz, Anand Mudgerikar, Elisa Bertino. 114-136 [doi]
- DNS Unchained: Amplified Application-Layer DoS Attacks Against DNS AuthoritativesJonas Bushart, Christian Rossow. 139-160 [doi]
- Control Plane Reflection Attacks in SDNs: New Attacks and CountermeasuresMenghao Zhang, Guanyu Li, Lei Xu, Jun Bi, Guofei Gu, Jiasong Bai. 161-183 [doi]
- Proof-of-Blackouts? How Proof-of-Work Cryptocurrencies Could Affect Power GridsJohanna Ullrich, Nicholas Stifter, Aljosha Judmayer, Adrian Dabrowski, Edgar R. Weippl. 184-203 [doi]
- Characterizing Eve: Analysing Cybercrime Actors in a Large Underground ForumSergio Pastrana, Alice Hutchings, Andrew Caines, Paula Buttery. 207-227 [doi]
- SybilBlind: Detecting Fake Users in Online Social Networks Without Manual LabelsBinghui Wang, Le Zhang, Neil Zhenqiang Gong. 228-249 [doi]
- GuidedPass: Helping Users to Create Strong and Memorable PasswordsSimon S. Woo, Jelena Mirkovic. 250-270 [doi]
- Fine-Pruning: Defending Against Backdooring Attacks on Deep Neural NetworksKang Liu 0017, Brendan Dolan-Gavitt, Siddharth Garg. 273-294 [doi]
- Dictionary Extraction and Detection of Algorithmically Generated Domain Names in Passive DNS TrafficMayana Pereira, Shaun Coleman, Bin Yu, Martine De Cock, Anderson C. A. Nascimento. 295-314 [doi]
- OTTer: A Scalable High-Resolution Encrypted Traffic Identification EngineEva Papadogiannaki, Constantinos Halevidis, Periklis Akritidis, Lazaros Koromilas. 315-334 [doi]
- Hardware Assisted Randomization of DataBrian Belleville, Hyungon Moon, Jangseop Shin, Dongil Hwang, Joseph M. Nash, Seonhwa Jung, Yeoul Na, Stijn Volckaert, Per Larsen, Yunheung Paek, Michael Franz. 337-358 [doi]
- MicroStache: A Lightweight Execution Context for In-Process Safe Region IsolationLucian Mogosanu, Ashay Rane, Nathan Dautenhahn. 359-379 [doi]
- CryptMe: Data Leakage Prevention for Unmodified Programs on ARM DevicesChen Cao, Le Guan, Ning Zhang 0017, Neng Gao, Jingqiang Lin, Bo Luo, Peng Liu, Ji Xiang, Wenjing Lou. 380-400 [doi]
- PartiSan: Fast and Flexible Sanitization via Run-Time PartitioningJulian Lettner, Dokyung Song, Taemin Park, Per Larsen, Stijn Volckaert, Michael Franz. 403-422 [doi]
- τCFI: Type-Assisted Control Flow Integrity for x86-64 BinariesPaul Muntean, Matthias Fischer, Gang Tan, Zhiqiang Lin, Jens Grossklags, Claudia Eckert. 423-444 [doi]
- Trusted Execution Path for Protecting Java Applications Against Deserialization of Untrusted DataStefano Cristalli, Edoardo Vignati, Danilo Bruschi, Andrea Lanzi. 445-464 [doi]
- Error-Sensor: Mining Information from HTTP Error Traffic for Malware IntelligenceJialong Zhang, Jiyong Jang, Guofei Gu, Marc Ph. Stoecklin, Xin Hu 0001. 467-489 [doi]
- Generic Black-Box End-to-End Attack Against State of the Art API Call Based Malware ClassifiersIshai Rosenberg, Asaf Shabtai, Lior Rokach, Yuval Elovici. 490-510 [doi]
- Next Generation P2P Botnets: Monitoring Under Adverse ConditionsLeon Böck, Emmanouil Vasilomanolakis, Max Mühlhäuser, Shankar Karuppayah. 511-531 [doi]
- Malicious IoT Implants: Tampering with Serial Communication over the InternetPhilipp Morgner, Stefan Pfennig, Dennis Salzner, Zinaida Benenson. 535-555 [doi]
- Before Toasters Rise Up: A View into the Emerging IoT Threat LandscapePierre-Antoine Vervier, Yun Shen. 556-576 [doi]
- Statistical Similarity of Critical Infrastructure Network Traffic Based on Nearest Neighbor DistancesJeong-Han Yun, Yoonho Hwang, Woomyo Lee, Hee-Kap Ahn, Sin-Kyu Kim. 577-599 [doi]
- PostScript Undead: Pwning the Web with a 35 Years Old LanguageJens Müller 0007, Vladislav Mladenov, Dennis Felsch, Jörg Schwenk. 603-622 [doi]
- Identifying Key Leakage of Bitcoin UsersMichael Brengel, Christian Rossow. 623-643 [doi]
- Furnace: Self-service Tenant VMI for the CloudMicah Bushouse, Douglas S. Reeves. 647-669 [doi]
- ShadowMonitor: An Effective In-VM Monitoring Framework with Hardware-Enforced IsolationBin Shi, Lei Cui, Bo Li, Xudong Liu, Zhiyu Hao, Haiying Shen. 670-690 [doi]
- KASR: A Reliable and Practical Approach to Attack Surface Reduction of Commodity OS KernelsZhi Zhang, Yueqiang Cheng, Surya Nepal, Dongxi Liu, Qingni Shen, Fethi Rabhi. 691-710 [doi]