Abstract is missing.
- Leaky Controller: Cross-VM Memory Controller Covert Channel on Multi-core SystemsBenjamin Semal, Konstantinos Markantonakis, Raja Naeem Akram, Jan Kalbantner. 3-16 [doi]
- Evaluation of Statistical Tests for Detecting Storage-Based Covert ChannelsThomas A. V. Sattolo, Jason Jaskolka. 17-31 [doi]
- IE-Cache: Counteracting Eviction-Based Cache Side-Channel Attacks Through Indirect EvictionMuhammad Asim Mukhtar, Muhammad Khurram Bhatti, Guy Gogniat. 32-45 [doi]
- Refined Detection of SSH Brute-Force Attackers Using Machine LearningKarel Hynek, Tomás Benes, Tomás Cejka, Hana Kubátová. 49-63 [doi]
- MultiTLS: Secure Communication Channels with Cipher Suite DiversityRicardo Moura, David R. Matos, Miguel L. Pardal, Miguel Correia 0001. 64-77 [doi]
- Improving Big Data Clustering for Jamming Detection in Smart MobilityHind Bangui, Mouzhi Ge, Barbora Buhnova. 78-91 [doi]
- Assisting Users to Create Stronger Passwords Using ContextBased MicroTrainingJoakim Kävrestad, Marcus Nohlberg. 95-108 [doi]
- Facilitating Privacy Attitudes and Behaviors with Affective Visual DesignAgnieszka Kitkowska, Yefim Shulman, Leonardo A. Martucci, Erik Wästlund. 109-123 [doi]
- Privacy CURE: Consent Comprehension Made EasyOlha Drozd, Sabrina Kirrane. 124-139 [doi]
- JavaScript Malware Detection Using Locality Sensitive HashingStefan Carl Peiser, Ludwig Friborg, Riccardo Scandariato. 143-154 [doi]
- RouAlign: Cross-Version Function Alignment and Routine Recovery with Graphlet Edge EmbeddingCan Yang, Jian Liu, Mengxia Luo, Xiaorui Gong, Baoxu Liu. 155-170 [doi]
- Code Between the Lines: Semantic Analysis of Android ApplicationsJohannes Feichtner, Stefan Gruber. 171-186 [doi]
- IMShell-Dec: Pay More Attention to External Links in PowerShellRuidong Han, Chao Yang, Jianfeng Ma, Siqi Ma, Yunbo Wang, Feng Li. 189-202 [doi]
- Secure Attestation of Virtualized EnvironmentsMichael Eckel, Andreas Fuchs, Jürgen Repp, Markus Springer. 203-216 [doi]
- Security and Performance Implications of BGP Rerouting-Resistant Guard Selection Algorithms for TorAsya Mitseva, Marharyta Aleksandrova, Thomas Engel 0001, Andriy Panchenko 0001. 219-233 [doi]
- Actively Probing Routes for Tor AS-Level Adversaries with RIPE AtlasWilfried Mayer, Georg Merzdovnik, Edgar R. Weippl. 234-247 [doi]
- Zeek-Osquery: Host-Network Correlation for Advanced Monitoring and Intrusion DetectionSteffen Haas, Robin Sommer, Mathias Fischer 0001. 248-262 [doi]
- Revisiting Security Vulnerabilities in Commercial Password ManagersMichael Carr, Siamak F. Shahandashti. 265-279 [doi]
- Evaluation of Risk-Based Re-Authentication MethodsStephan Wiefling, Tanvi Patil, Markus Dürmuth, Luigi Lo Iacono. 280-294 [doi]
- Fuzzy Vault for Behavioral Authentication SystemMd. Morshedul Islam, Reihaneh Safavi-Naini. 295-310 [doi]
- Improvements of the Balance Discovery Attack on Lightning Network Payment ChannelsGijs van Dam, Rabiah Abdul Kadir, Puteri N. E. Nohuddin, Halimah Badioze Zaman. 313-323 [doi]
- CCBRSN: A System with High Embedding Capacity for Covert Communication in BitcoinWeizheng Wang, Chunhua Su. 324-337 [doi]
- Privacy-Friendly Monero Transaction Signing on a Hardware WalletDusan Klinec, Vashek Matyas. 338-351 [doi]
- A Matter of Life and Death: Analyzing the Security of Healthcare NetworksGuillaume Dupont, Daniel Ricardo Dos Santos, Elisa Costante, Jerry den Hartog, Sandro Etalle. 355-369 [doi]
- Establishing a Strong Baseline for Privacy Policy ClassificationNajmeh Mousavi Nejad, Pablo Jabat, Rostislav Nedelchev, Simon Scerri, Damien Graux. 370-383 [doi]
- Cross-Platform File System Activity Monitoring and Forensics - A Semantic ApproachKabul Kurniawan, Andreas Ekelhart, Fajar J. Ekaputra, Elmar Kiesling. 384-397 [doi]
- A Correlation-Preserving Fingerprinting Technique for Categorical Data in Relational DatabasesTanja Sarcevic, Rudolf Mayer. 401-415 [doi]
- FDFtNet: Facing Off Fake Images Using Fake Detection Fine-Tuning NetworkHyeonseong Jeon, Youngoh Bang, Simon S. Woo. 416-430 [doi]
- Escaping Backdoor Attack Detection of Deep LearningYayuan Xiong, Fengyuan Xu, Sheng Zhong, Qun Li. 431-445 [doi]