Fingerprinting Binary Functions to Support Automated Analysis of Code Executables, p.341 ,
Djedjiga Mouheb, Mourad Debbabi, and Aiman Hanna Decoy Password Vaults: At Least as Hard as Steganography?, p.356 ,
Böhme Election-Dependent Security Evaluation of Internet Voting Schemes, p.371 ,
Volkamer Software Security and Privacy Combating Control Flow Linearization, p.385 ,
Apostolis Zarras, and Claudia Eckert Ghost Patches: Fake Patches for Fake Vulnerabilities, p.399 ,
Eliminating Redundant Memory Bound Checks via Statistical Inference, p.413 ,
Tian Lan, and Guru Venkataramani Towards Systematic Privacy and Operability (PRIOP) Studies, p.427 ,
Schneider Privacy Differentially Private Neighborhood-Based Recommender Systems, p.459 ,
Md Morshedul Islam, and Reihaneh Safavi-Naini Supporting Privacy by Design Using Privacy Process Patterns, p.491 ,
Stefanos Gritzalis, and Haralambos Mouratidis Evaluating the Privacy Implications of Frequent Itemset Disclosure, p.506 ,
Risk Management, and Code Reuse Attacks Forward-Secure Digital Signature Schemes with Optimal Computation and Storage of Signers, p.523 ,
Machine Learning-Based Risk Analysis on, p.538 ,
Using Fraud Patterns for Fraud Risk Assessment of E-services, p.553 ,
Rannenberg Gadget Weighted Tagging: A Flexible Framework to Protect Against Code Reuse Attacks, p.568 ,