Abstract is missing.
- ADAM: Automated Detection and Attribution of Malicious WebpagesAhmed E. Kosba, Aziz Mohaisen, Andrew G. West, Trevor Tonn, Huy Kang Kim. 3-16 [doi]
- Detection of Heap-Spraying Attacks Using String Trace GraphJaehyeok Song, Jonghyuk Song, Jong Kim. 17-26 [doi]
- A Simple Yet Efficient Approach to Combat Transaction Malleability in BitcoinUbaidullah Rajput, Fizza Abbas, Rasheed Hussain, Hasoo Eun, Heekuck Oh. 27-37 [doi]
- Before Unrooting your Android Phone, Patching up Permission System First!Zhongwen Zhang. 41-54 [doi]
- I've Got Your Number: - Harvesting Users' Personal Data via Contacts Sync for the KakaoTalk MessengerEunhyun Kim, Kyungwon Park, Hyoungshick Kim, JaeSeung Song. 55-67 [doi]
- Analyzing Unnecessary Permissions Requested by Android Apps Based on Users' OpinionsJina Kang, Daehyun Kim, Hyoungshick Kim, Jun Ho Huh. 68-79 [doi]
- Reconstructing and Visualizing Evidence of Artifact from Firefox SessionStorageShinichi Matsumoto, Yuya Onitsuka, Junpei Kawamoto, Kouichi Sakurai. 83-94 [doi]
- Analyzing Security of Korean USIM-Based PKI Certificate ServiceShinjo Park, Suwan Park, Insu Yun, Dongkwan Kim, Yongdae Kim. 95-106 [doi]
- AMAL: High-Fidelity, Behavior-Based Automated Malware Analysis and ClassificationAziz Mohaisen, Omar Alrawi. 107-121 [doi]
- Systematically Breaking Online WYSIWYG EditorsAshar Javed, Jörg Schwenk. 122-133 [doi]
- New Integrated Long-Term Glimpse of RC4Ryoma Ito, Atsuko Miyaji. 137-149 [doi]
- Improved Modular Multiplication for Optimal Prime FieldsHwajeong Seo, Zhe Liu 0001, Yasuyuki Nogami, Jongseok Choi, Howon Kim. 150-161 [doi]
- Context Based Smart Access Control on BYOD EnvironmentsDongwan Kang, JooHyung Oh, Chaetae Im. 165-176 [doi]
- Scalable and Autonomous Mobile Device-Centric Cloud for Secured D2D SharingChao-Lieh Chen, Shen-Chien Chen, Chun-Ruei Chang, Chia-Fei Lin. 177-189 [doi]
- SecaaS Framework and Architecture: A Design of Dynamic Packet ControlNgoc-Tu Chau, Minh-Duong Nguyen, Seung Wook Jung, Souhwan Jung. 190-201 [doi]
- Name Server Switching: Anomaly Signatures, Usage, Clustering, and PredictionAziz Mohaisen, Mansurul Bhuiyan, Yannis Labrou. 202-215 [doi]
- A Trustless Broker Based Protocol to Discover Friends in Proximity-Based Mobile Social NetworksFizza Abbas, Ubaidullah Rajput, Rasheed Hussain, Hasoo Eun, Heekuck Oh. 216-227 [doi]
- Shared and Searchable Encrypted Data for Semi-trusted Servers with Controllable Sharing PropertyMinkyu Joo, Pil Joong Lee. 231-243 [doi]
- Fair Multi-signaturePairat Thorncharoensri, Willy Susilo, Yi Mu. 244-256 [doi]
- An Efficient Variant of Boneh-Gentry-Hamburg's Identity-Based Encryption Without PairingIbrahim F. Elashry, Yi Mu, Willy Susilo. 257-268 [doi]
- Joint Signature and Encryption in the Presence of Continual LeakageFei Tang, Hongda Li. 269-280 [doi]
- Wireless Key Exchange Using Frequency ImpairmentsJörn Müller-Quade, Antonio Sobreira de Almeida. 283-294 [doi]
- Exploiting the Potential of GPUs for Modular Multiplication in ECCFangyu Zheng, Wuqiong Pan, Jingqiang Lin, Jiwu Jing, Yuan Zhao. 295-306 [doi]
- The Unified Hardware Design for GCM and SGCMYeoncheol Lee, Hwajeong Seo, Howon Kim. 307-320 [doi]
- Successful Profiling Attacks with Different Measurement Environments for Each PhaseYongdae Kim. 321-330 [doi]
- Function Masking: A New Countermeasure Against Side Channel AttackTaesung Kim, Sungjun Ahn, Seungkwang Lee, Dooho Choi. 331-342 [doi]
- Multivariate Statistic Approach to Field Specifications of Binary Protocols in SCADA SystemSeungoh Choi, Yeop Chang, Jeong-Han Yun, Woonyon Kim. 345-357 [doi]
- Packet Loss Consideration for Burst-Based Anomaly Detection in SCADA NetworkKyoung-Ho Kim, Jeong-Han Yun, Yeop Chang, Woonyon Kim. 358-369 [doi]
- Defining Security Primitives for Eliciting Flexible Attack Scenarios Through CAPEC AnalysisJi-Yeon Kim, Hyung-Jong Kim. 370-382 [doi]
- Advanced Security Assessment for Control EffectivenessYoungin You, Sangkyo Oh, Kyungho Lee. 383-393 [doi]
- Study on the Effectiveness of the Security Countermeasures Against Spear PhishingMisun Song, JunSeok Seo, Kyungho Lee. 394-404 [doi]