Abstract is missing.
- An Encrypted Exploit Payload Protocol and Target-Side Scripting EngineDino Dai Zovi. [doi]
- Toward Undetected Operating System FingerprintingLloyd G. Greenwald, Tavaris J. Thomas. [doi]
- The ND2DB Attack: Database Content Extraction Using Timing Attacks on the Indexing AlgorithmsAriel Futoransky, Damián Saura, Ariel Waissbein. [doi]
- BlueSniff: Eve Meets Alice and BluetoothDominic Spill, Andrea Bittau. [doi]
- Flayer: Exposing Application InternalsWill Drewry, Tavis Ormandy. [doi]
- Billing Attacks on SIP-Based VoIP SystemsRuishan Zhang, Xinyuan Wang, Xiaohui Yang, Xuxian Jiang. [doi]
- Exploiting Redundancy in Natural Language to Penetrate Bayesian Spam FiltersChristoph Karlberger, Günther Bayler, Christopher Kruegel, Engin Kirda. [doi]
- Exploiting Concurrency Vulnerabilities in System Call WrappersRobert N. M. Watson. [doi]
- Catch Me, If You Can: Evading Network Signatures with Web-based Polymorphic WormsMatthew Van Gundy, Davide Balzarotti, Giovanni Vigna. [doi]