| 2015 | "Nice Boots!" - A Large-Scale Analysis of Bootkits and New Ways to Stop Them. Bernhard Grill, Andrei Bacs, Christian Platzer, Herbert Bos |
| 2015 | C5: Cross-Cores Cache Covert Channel. Clémentine Maurice, Christoph Neumann, Olivier Heen, Aurélien Francillon |
| 2015 | Capturing DDoS Attack Dynamics Behind the Scenes. An Wang, Aziz Mohaisen, Wentao Chang, Songqing Chen |
| 2015 | Controlled Data Sharing for Collaborative Predictive Blacklisting. Julien Freudiger, Emiliano De Cristofaro, Alejandro E. Brito |
| 2015 | Cutting the Gordian Knot: A Look Under the Hood of Ransomware Attacks. Amin Kharraz, William K. Robertson, Davide Balzarotti, Leyla Bilge, Engin Kirda |
| 2015 | Detection of Intrusions and Malware, and Vulnerability Assessment - 12th International Conference, DIMVA 2015, Milan, Italy, July 9-10, 2015, Proceedings Magnus Almgren, Vincenzo Gulisano, Federico Maggi |
| 2015 | Fine-Grained Control-Flow Integrity Through Binary Hardening. Mathias Payer, Antonio Barresi, Thomas R. Gross |
| 2015 | Identifying Intrusion Infections via Probabilistic Inference on Bayesian Network. Yuan Yang, Zhongmin Cai, Weixuan Mao, Zhihai Yang |
| 2015 | Intrusion Detection for Airborne Communication Using PHY-Layer Information. Martin Strohmeier, Vincent Lenders, Ivan Martinovic |
| 2015 | Jackdaw: Towards Automatic Reverse Engineering of Large Datasets of Binaries. Mario Polino, Andrea Scorti, Federico Maggi, Stefano Zanero |
| 2015 | May I? - Content Security Policy Endorsement for Browser Extensions. Daniel Hausknecht, Jonas Magazinius, Andrei Sabelfeld |
| 2015 | More Guidelines Than Rules: CSRF Vulnerabilities from Noncompliant OAuth 2.0 Implementations. Ethan Shernan, Henry Carter, Dave Tian, Patrick Traynor, Kevin R. B. Butler |
| 2015 | On the Security and Engineering Implications of Finer-Grained Access Controls for Android Developers and Users. Yanick Fratantonio, Antonio Bianchi, William K. Robertson, Manuel Egele, Christopher Kruegel, Engin Kirda, Giovanni Vigna |
| 2015 | Powerslave: Analyzing the Energy Consumption of Mobile Antivirus Software. Iasonas Polakis, Michalis Diamantaris, Thanasis Petsas, Federico Maggi, Sotiris Ioannidis |
| 2015 | Quit Playing Games with My Heart: Understanding Online Dating Scams. Jingmin Huang, Gianluca Stringhini, Peng Yong |
| 2015 | Robust and Effective Malware Detection Through Quantitative Data Flow Graph Metrics. Tobias Wüchner, Martín Ochoa, Alexander Pretschner |
| 2015 | That Ain't You: Blocking Spearphishing Through Behavioral Modelling. Gianluca Stringhini, Olivier Thonnard |
| 2015 | The Role of Cloud Services in Malicious Software: Trends and Insights. Xiao Han, Nizar Kheir, Davide Balzarotti |