X. Bultel and P. , Delayed Authentication for Streaming Synchrophasor Data in the Smart Grid, p.32

S. Câmara and D. , Victoria Pillitteri, and Luiz Carmo Human Aspects of Security Developing a Human Activity Model for Insider IS Security Breaches Using Action Design Research, p.49

G. Dhillon, Spyridon Samonas, and Ugo Etudo Evaluating CVSS Base Score Using Vulnerability Rewards Programs, p.62

G. Dhillon, C. Challa, and K. , Smith Cyber Infrastructure Using Process Invariants to Detect Cyber Attacks on a Water Treatment System, p.91

S. Zerkane, D. Espes, and .. , Philippe Le Parc, and Frederic Cuppens Phishing and Data Sharing Teaching Phishing-Security: Which Way is Best?, p.135

S. Stockhardt, B. Reinheimer, M. Volkamer, P. Mayer, A. Kunz-japan et al., Philipp Rack, and Daniel Lehmann On Gender Specific Perception of Data Sharing in, p.150

M. Volkamer, K. Renaud, B. Reinheimer-social-networks-sybilradar, and .. , A Graph-Structure Based Framework for Sybil Detection in On-line Social Networks 179 Dieudonné Mulamba, Indrajit Ray, and Indrakshi Ray Collateral Damage of Facebook Apps: Friends, Providers, and Privacy Interdependence, Solà, and Bart Preneel Software Vulnerabilities Automated Source Code Instrumentation for Verifying Potential Vulnerabilities, p.211

H. Li, J. Oh, and .. , Hakjoo Oh, and Heejo Lee An Information Flow-Based Taxonomy to Understand the Nature of Software Vulnerabilities

B. Aziz, P. Fremantle, R. Wei, and A. , Arenas Advanced Remote Firmware Upgrades Using TPM 2, p.276

A. Fuchs and C. Krauß, and Jürgen Repp XII Contents Sidechannel Analysis

. Regrsa, Using Registers as Buffers to Resist Memory Disclosure Attacks, p.293

Y. Zhao, J. Lin, and .. , Wuqiong Pan, Cong Xue, Fangyu Zheng, and Ziqiang Ma Uncertain? No, It's Very Certain!: Recovering the Key from Guessing Entropy Enhanced CPA, p.308

C. Ou, Z. Wang, D. Sun-malware, and .. , Xinping Zhou, and Juan Ai Software Security Advanced or Not? A Comparative Study of the Use of Anti-debugging and Anti-VM Techniques in Generic and Targeted, p.323

P. Chen, C. Huygens, L. Desmet, and W. , Protecting Android Applications by Isolating and Intercepting Third-Party Native Libraries, p.337

Y. Hong, Y. Wang, and J. , Yin A Progress-Sensitive Flow-Sensitive Inlined Information-Flow Control Monitor, p.352

A. Bedford, S. Chong, and .. , Josée Desharnais, and Nadia Tawbi Privacy Deducing User Presence from Inter-Message Intervals in Home Automation Systems, 369 Frederik Möllers and Christoph Sorge Privacy by Design Principles in Design of New Generation Cognitive