Abstract is missing.
- CAIN: Silently Breaking ASLR in the CloudAntonio Barresi, Kaveh Razavi, Mathias Payer, Thomas R. Gross. [doi]
- Own Your Android! Yet Another Universal RootWen Xu, Yubin Fu. [doi]
- How to Break XML Encryption - AutomaticallyDennis Kupser, Christian Mainka, Jörg Schwenk, Juraj Somorovsky. [doi]
- Fuzzing E-mail Filters with Generative Grammars and N-Gram AnalysisSean Palka, Damon McCoy. [doi]
- Cashing Out the Great Cannon? On Browser-Based DDoS Attacks and EconomicsGiancarlo Pellegrino, Christian Rossow, Fabrice J. Ryba, Thomas C. Schmidt, Matthias Wählisch. [doi]
- Cocaine Noodles: Exploiting the Gap between Human and Machine Speech RecognitionTavish Vaidya, Yuankai Zhang, Micah Sherr, Clay Shields. [doi]
- Prying Open Pandora's Box: KCI Attacks against TLSClemens Hlauschek, Markus Gruber, Florian Fankhauser, Christian Schanes. [doi]
- IoTPOT: Analysing the Rise of IoT CompromisesYin Minn Pa Pa, Shogo Suzuki, Katsunari Yoshioka, Tsutomu Matsumoto, Takahiro Kasama, Christian Rossow. [doi]
- P2P File-Sharing in Hell: Exploiting BitTorrent Vulnerabilities to Launch Distributed Reflective DoS AttacksFlorian Adamsky, Syed Ali Khayam, Rudolf Jäger, Muttukrishnan Rajarajan. [doi]
- Replication Prohibited: Attacking Restricted Keyways with 3D-PrintingBen Burgess, Eric Wustrow, J. Alex Halderman. [doi]
- Hypervisor Introspection: A Technique for Evading Passive Virtual Machine MonitoringGary Wang, Zachary John Estrada, Cuong Manh Pham, Zbigniew T. Kalbarczyk, Ravishankar K. Iyer. [doi]
- One Class to Rule Them All: 0-Day Deserialization Vulnerabilities in AndroidOr Peles, Roee Hay. [doi]
- Run-DMAMichael Rushanan, Stephen Checkoway. [doi]
- RouteDetector: Sensor-based Positioning System That Exploits Spatio-Temporal Regularity of Human MobilityTakuya Watanabe, Mitsuaki Akiyama, Tatsuya Mori. [doi]
- Fast and Vulnerable: A Story of Telematic FailuresIan T. Foster, Andrew Prudhomme, Karl Koscher, Stefan Savage. [doi]
- FLEXTLS: A Tool for Testing TLS ImplementationsBenjamin Beurdouche, Antoine Delignat-Lavaud, Nadim Kobeissi, Alfredo Pironti, Karthikeyan Bhargavan. [doi]
- Scrutinizing WPA2 Password Generating Algorithms in Wireless RoutersEduardo Novella Lorente, Carlo Meijer, Roel Verdult. [doi]
- Symbolic Execution for BIOS SecurityOleksandr Bazhaniuk, John Loucaides, Lee Rosenbaum, Mark R. Tuttle, Vincent Zimmer. [doi]
- SURROGATES: Enabling Near-Real-Time Dynamic Analyses of Embedded SystemsKarl Koscher, Tadayoshi Kohno, David Molnar. [doi]