Accepted papers

  • Malrec: Compact Full-Trace Malware Recording for Retrospective Deep Analysis
    Giorgio Severi, Tim Leek, Brendan Dolan-Gavitt
  • MemScrimper: Time- and Space-Efficient Storage of Malware Sandbox Memory Dumps
    Michael Brengel, Christian Rossow
  • Spearphishing Malware: Do We Really Know the Unknown?
    Yanko Baychev, Leyla Bilge
  • Honey, I Shrunk Your App Security: The State of Android App Hardening
    Vincent Haupert, Dominik Maier, Nicolas Schneider, Julian Kirsch, Tilo Müller
  • GuardION: Practical Mitigation of DMA-based Rowhammer Attacks on ARM
    Victor van der Veen, Martina Lindorfer, Yanick Fratantonio, Harikrishnan Padmanabha Pillai, Giovanni Vigna, Christopher Kruegel, Herbert Bos, Kaveh Razavi
  • BinArm: Scalable and Efficient Detection of Vulnerabilities in Firmware Images of Intelligent Electronic Devices
    Paria Shirani, Leo Collard, Basile L. Agba, Bernard Lebel, Mourad Debbabi, Lingyu Wang, Aiman Hanna
  • Update State Tampering: A Novel Adversary Post-Compromise Technique on Cyber Threats
    Sung-Jin Kim, Byung-Joon Kim, Hyoung-Chun Kim, Dong Hoon Lee
  • Evasive Malware via Identifier Implanting
    Rui Tanabe, Wataru Ueno, Kou Ishii, Katsunari Yoshioka, Tsutomu Matsumoto, Takahiro Kasama, Daisuke Inoue, Christian Rossow
  • On the Weaknesses of Function Table Randomization
    Moritz Contag, Robert Gawlik, Andre Pawlowski, Thorsten Holz
  • FraudBuster: Temporal Analysis and Detection of Advanced Financial Frauds
    Michele Carminati, Alessandro Baggio, Federico Maggi, Umberto Spagnolini, Stefano Zanero
  • No Random, No Ransom: A Key to Stop Cryptographic Ransomware
    Ziya Alper Genç, Gabriele Lenzini, Peter Y.A. Ryan
  • Hidden in Plain Sight: Filesystem View Separation for Data Integrity and Deception
    Teryl Taylor, Frederico Araujo, Anne Kohlbrenner, Marc Ph. Stoecklin
  • Knockin’ on Trackers’ Door: Large-Scale Automatic Analysis of Web Tracking
    Iskander Sanchez-Rola, Igor Santos
  • JaSt: Fully Syntactic Detection of Malicious (Obfuscated) JavaScript
    Aurore Fass, Robert Krawczyk, Michael Backes, Ben Stock
  • Bytecode Corruption Attacks Are Real  And How to Defend Against Them
    Taemin Park, Julian Lettner, Yeoul Na, Stijn Volckaert, Michael Franz
  • ELISA: ELiciting ISA of Raw Binaries for Fine-grained Code and Data Separation
    Pietro De Nicolao, Marcello Pogliani, Mario Polino, Michele Carminati, Davide Quarta, Stefano Zanero
  • Symbolic Deobfuscation: From Virtualized Code Back to the Original
    Jonathan Salwan, Sébastien Bardin, Marie-Laure Potet
  • Extended Abstract: Toward Systematically Exploring Antivirus Engines
    Davide Quarta, Federico Salvioni, Andrea Continella, Stefano Zanero