Abstract is missing.
- Breaking DNSSECDaniel J. Bernstein.
- Rootkits for JavaScript EnvironmentsBen Adida, Adam Barth, Collin Jackson. 1-7 [doi]
- Injecting SMS Messages into Smart Phones for Security AnalysisCollin Mulliner, Charlie Miller. 1-7 [doi]
- Covert Channels through External InterferenceGaurav Shah, Matt Blaze. 1-8 [doi]
- A Fistful of Red-Pills: How to Automatically Generate Procedures to Detect CPU EmulatorsRoberto Paleari, Lorenzo Martignoni, Giampaolo Fresi Roglia, Danilo Bruschi. 1-7 [doi]
- Routing Loop Attacks using IPv6 TunnelsGabi Nakibly, Michael Arov. 1-7 [doi]
- Half-Blind Attacks: Mask ROM Bootloaders are DangerousTravis Goodspeed, Aurélien Francillon. 1-6 [doi]
- PolyPack: An Automated Online Packing Service for Optimal Antivirus EvasionJon Oberheide, Michael Bailey, Farnam Jahanian. 1-6 [doi]
- Unpacking Virtualization ObfuscatorsRolf Rolles. 1-7 [doi]
- Decaptcha: Breaking 75% of eBay Audio CAPTCHAsElie Bursztein, Steven Bethard. 1-7 [doi]