Abstract is missing.
- On Dynamic Malware Payloads Aimed at Programmable Logic ControllersStephen E. McLaughlin. [doi]
- Towards Practical Avoidance of Information Leakage in Enterprise NetworksJason Croft, Matthew Caesar. [doi]
- Towards Client-side HTML Security PoliciesJoel Weinberger, Adam Barth, Dawn Song. [doi]
- Building Secure Robot ApplicationsMurph Finnicum, Samuel T. King. [doi]
- Security Fusion: A New Security Architecture for Resource-Constrained EnvironmentsSuku Nair, Subil Abraham, Omar Al-Ibrahim. [doi]
- Herbert West - DeanonymizerMihir Nanavati, Nathan Taylor, William Aiello, Andrew Warfield. [doi]
- Public vs. Publicized: Content Use Trends and Privacy ExpectationsJessica Staddon, Andrew Swerdlow. [doi]
- Effective Digital Forensics Research Is Investigator-CentricRobert J. Walls, Brian Neil Levine, Marc Liberatore, Clay Shields. [doi]
- Privacy-Preserving Applications on SmartphonesYan Huang, Peter Chapman, David Evans. [doi]
- DISTROY: Detecting Integrated Circuit Trojans with Compressive MeasurementsYoungjune Gwon, H. T. Kung, Dario Vlah. [doi]
- TouchLogger: Inferring Keystrokes on Touch Screen from Smartphone MotionLiang Cai, Hao Chen. [doi]