Abstract is missing.
- Why 2 times 2 ain't neccessarily 4 - at least not in IT security risk assessmentJens Braband. 1-10
- Sicherheitsanalyse mit JOANAJuergen Graf, Martin Hecker, Martin Mohr, Gregor Snelting. 11-22
- Distributed evolutionary fuzzing with EvofuzzFabian Beterke. 23-32
- Attacks on fitness trackers revisited: a case-study of unfit firmware securityJakob Rieck. 33-44
- Automotive Ethernet: security opportunity or challenge?Christopher Corbett, Elmar Schoch, Frank Kargl, Felix Preussner. 45-54
- A semantic framework for a better understanding, investigation and prevention of organized financial crimeRonny Merkel, Christian Kraetzer, Mario Hildebrandt, Stefan Kiltz, Sven Kuhlmann, Jana Dittmann. 55-66
- Surreptitious sharing on AndroidDominik Schürmann, Lars C. Wolf. 67-78
- Comparative evaluation of machine learning-based malware detection on AndroidSebastian Hahn, Mykola Protsenko, Tilo Müller. 79-88
- SDN malware: problems of current protection systems and potential countermeasuresChristian Röpke. 89-100
- Auf dem Weg verTAN: Über die Sicherheit App-basierter TAN-VerfahrenVincent Haupert, Tilo Müller. 101-112
- Die Bordkarte als Authentifikationsmittel bei FlugreisenMariia Astrakhantceva, Günter Karjoth, Bettina Hübscher. 113-124
- Correlation-resistant fuzzy vault for fingerprintsMoazzam Butt, Johannes Merkle, Ulrike Korte, Christoph Busch. 125-136
- Für bare Münze? NutzerInnenerfahrungen mit Sicherheit und Datenschutz bei BitcoinKatharina Krombholz, Aljosha Judmayer, Matthias Gusenbauer, Edgar R. Weippl. 137-148
- Obtaining personal data and asking for erasure: do app vendors and website owners honour your privacy rights?Dominik Herrmann, Jens Lindemann. 149-160
- IT-Grundschutz in großen Institutionen - Herausforderungen und LösungsstrategienSeverin Rast, Timo Brecher, Sabine Kammerhofer. 161-170
- Lessons learned bei KMUs aus dem Befall durch RansomwareFlorian Hertle. 171-176
- Generating security vulnerabilities in source codeFelix Schuckert. 177-184
- Sicherheit im Softwareentwurf - Integrierte Modellierung von Security und SoftwarearchitekturStefanie Jasser. 185-190
- A framework for encrypted computation on shared dataSaffija Kasem-Madani. 191-196
- Towards adaptive event prioritization for network security - ideas and challengesLeonard Renners. 197-202
- Designing resilient and secure smart micro gridsSiavash Valipour. 203-208
- Order preserving encryption for wide column storesTim Waage. 209-216
- Software security requirements in building automationFriedrich Praus, Wolfgang Kastner, Peter Palensky. 217-228
- On the security of the ZigBee Light Link touchlink commissioning procedureChristian Müller, Frederik Armknecht, Zinaida Benenson, Philipp Morgner. 229-240
- Increasing security and availability in KNX networksHarald Glanzer, Lukas Krammer, Wolfgang Kastner. 241-252
- Detecting anomalies in BACnet network dataJernej Tonejc, Jaspreet Kaur, Alexandra Kobekova. 253-264