Abstract is missing.
- Turning Active TLS Scanning to ElevenWilfried Mayer, Martin Schmiedecker. 3-16 [doi]
- Slow TCAM Exhaustion DDoS AttackTúlio A. Pascoal, Yuri Gil Dantas, Iguatemi E. Fonseca, Vivek Nigam. 17-31 [doi]
- Evasive Malware Detection Using Groups of ProcessesGheorghe Hajmasan, Alexandra Mondoc, Radu Portase, Octavian Cret. 32-45 [doi]
- A Malware-Tolerant, Self-Healing Industrial Control System FrameworkMichael Denzel, Mark Ryan, Eike Ritter. 46-60 [doi]
- Process Discovery for Industrial Control System Cyber Attack DetectionDavid Myers, Kenneth Radke, Suriadi Suriadi, Ernest Foo. 61-75 [doi]
- Secure Photo Sharing in Social NetworksPablo Picazo-Sanchez, Raúl Pardo, Gerardo Schneider. 79-92 [doi]
- Context-Dependent Privacy-Aware Photo Sharing Based on Machine LearningLin Yuan, Joël Theytaz, Touradj Ebrahimi. 93-107 [doi]
- 3LP: Three Layers of Protection for Individual Privacy in FacebookKhondker Jahid Reza, Md Zahidul Islam, Vladimir Estivill-Castro. 108-123 [doi]
- A Framework for Moving Target Defense QuantificationWarren Connell, Massimiliano Albanese, Sridhar Venkatesan. 124-138 [doi]
- Query Privacy in Sensing-as-a-Service PlatformsRuben Rios, David Nuñez, Javier Lopez. 141-154 [doi]
- Secure and Efficient k-NN QueriesHafiz Salman Asif, Jaideep Vaidya, Basit Shafiq, Nabil R. Adam. 155-170 [doi]
- Secure and Trustable Distributed Aggregation Based on KademliaStéphane Grumbach, Robert Riemann. 171-185 [doi]
- HyBIS: Advanced Introspection for Effective Windows Guest ProtectionRoberto Di Pietro, Federico Franzoni, Flavio Lombardi. 189-204 [doi]
- Detection of Side Channel Attacks Based on Data Tainting in Android SystemsMariem Graa, Nora Cuppens-Boulahia, Frédéric Cuppens, Jean-Louis Lanet, Routa Moussaileb. 205-218 [doi]
- The Fuzzing Awakens: File Format-Aware Mutational Fuzzing on Smartphone Media Server DaemonsMinSik Shin, JungBeen Yu, Youngjin Yoon, Taekyoung Kwon. 219-232 [doi]
- Towards Automated Classification of Firmware Images and Identification of Embedded DevicesAndrei Costin, Apostolis Zarras, Aurélien Francillon. 233-247 [doi]
- Runtime Firmware Product Lines Using TPM2.0Andreas Fuchs, Christoph Krauß, Jürgen Repp. 248-261 [doi]
- On the Use of Emojis in Mobile AuthenticationLydia Kraus, Robert Schmidt, Marcel Walch, Florian Schaub, Sebastian Möller. 265-280 [doi]
- EmojiTCHA: Using Emotion Recognition to Tell Computers and Humans ApartDavid Lorenzi, Jaideep Vaidya, Achyuta Aich, Shamik Sural, Vijayalakshmi Atluri, Joseph Calca. 281-295 [doi]
- Assisted Authoring, Analysis and Enforcement of Access Control Policies in the CloudUmberto Morelli, Silvio Ranise. 296-309 [doi]
- Capturing Policies for BYODJoseph Hallett, David Aspinall 0001. 310-323 [doi]
- Improving Blind Steganalysis in Spatial Domain Using a Criterion to Choose the Appropriate Steganalyzer Between CNN and SRM+ECJean-François Couchot, Raphaël Couturier, Michel Salomon. 327-340 [doi]
- BinSign: Fingerprinting Binary Functions to Support Automated Analysis of Code ExecutablesLina Nouh, Ashkan Rahimian, Djedjiga Mouheb, Mourad Debbabi, Aiman Hanna. 341-355 [doi]
- Decoy Password Vaults: At Least as Hard as Steganography?Cecilia Pasquini, Pascal Schöttle, Rainer Böhme. 356-370 [doi]
- Election-Dependent Security Evaluation of Internet Voting SchemesStephan Neumann, Manuel Noll, Melanie Volkamer. 371-382 [doi]
- Combating Control Flow LinearizationJulian Kirsch, Clemens Jonischkeit, Thomas Kittel 0001, Apostolis Zarras, Claudia Eckert. 385-398 [doi]
- Ghost Patches: Fake Patches for Fake VulnerabilitiesJeffrey Avery, Eugene H. Spafford. 399-412 [doi]
- SIMBER: Eliminating Redundant Memory Bound Checks via Statistical InferenceHongfa Xue, Yurong Chen, Fan Yao, Yongbo Li, Tian Lan, Guru Venkataramani. 413-426 [doi]
- Towards Systematic Privacy and Operability (PRIOP) StudiesRene Meis, Maritta Heisel. 427-441 [doi]
- Data Minimisation: A Language-Based ApproachThibaud Antignac, David Sands, Gerardo Schneider. 442-456 [doi]
- Differentially Private Neighborhood-Based Recommender SystemsJun Wang, Qiang Tang 0001. 459-473 [doi]
- Privacy-Enhanced Profile-Based Authentication Using Sparse Random ProjectionSomayeh Taheri, Md. Morshedul Islam, Reihaneh Safavi-Naini. 474-490 [doi]
- Supporting Privacy by Design Using Privacy Process PatternsVasiliki Diamantopoulou, Christos Kalloniatis, Stefanos Gritzalis, Haralambos Mouratidis. 491-505 [doi]
- Evaluating the Privacy Implications of Frequent Itemset DisclosureEdoardo Serra, Jaideep Vaidya, Haritha Akella, Ashish Sharma. 506-519 [doi]
- Forward-Secure Digital Signature Schemes with Optimal Computation and Storage of SignersJihye Kim, Hyunok Oh. 523-537 [doi]
- RiskInDroid: Machine Learning-Based Risk Analysis on AndroidAlessio Merlo, Gabriel Claudiu Georgiu. 538-552 [doi]
- Using Fraud Patterns for Fraud Risk Assessment of E-servicesAhmed Seid Yesuf, Jetzabel Serna-Olvera, Kai Rannenberg. 553-567 [doi]
- Gadget Weighted Tagging: A Flexible Framework to Protect Against Code Reuse AttacksLiwei Chen, Mengyu Ma, Wenhao Zhang, Gang Shi, Dan Meng. 568-584 [doi]