J. Couchot, R. Couturier, M. Salomon-binsign, and .. , Fingerprinting Binary Functions to Support Automated Analysis of Code Executables, p.341

L. Nouh, A. Rahimian, and .. , Djedjiga Mouheb, Mourad Debbabi, and Aiman Hanna Decoy Password Vaults: At Least as Hard as Steganography?, p.356

C. Pasquini, P. Schöttle, and R. , Böhme Election-Dependent Security Evaluation of Internet Voting Schemes, p.371

S. Neumann, M. Noll, and M. , Volkamer Software Security and Privacy Combating Control Flow Linearization, p.385

J. Kirsch, C. Jonischkeit, T. Kittel, and .. , Apostolis Zarras, and Claudia Eckert Ghost Patches: Fake Patches for Fake Vulnerabilities, p.399

J. Avery, E. H. Spafford, and S. , Eliminating Redundant Memory Bound Checks via Statistical Inference, p.413

H. Xue, Y. Chen, F. Yao, Y. Li, and .. , Tian Lan, and Guru Venkataramani Towards Systematic Privacy and Operability (PRIOP) Studies, p.427

T. Antignac, D. Sands, and G. , Schneider Privacy Differentially Private Neighborhood-Based Recommender Systems, p.459

S. Taheri and .. , Md Morshedul Islam, and Reihaneh Safavi-Naini Supporting Privacy by Design Using Privacy Process Patterns, p.491

V. Diamantopoulou and C. Kalloniatis, Stefanos Gritzalis, and Haralambos Mouratidis Evaluating the Privacy Implications of Frequent Itemset Disclosure, p.506

E. Serra, J. Vaidya, H. Akella, A. Sharma-digital-signature, and .. , Risk Management, and Code Reuse Attacks Forward-Secure Digital Signature Schemes with Optimal Computation and Storage of Signers, p.523

R. Android and .. , Machine Learning-Based Risk Analysis on, p.538

A. Merlo and G. , Using Fraud Patterns for Fraud Risk Assessment of E-services, p.553

A. Seid-yesuf, J. Serna-olvera, and K. , Rannenberg Gadget Weighted Tagging: A Flexible Framework to Protect Against Code Reuse Attacks, p.568