| 2016 | AVRAND: A Software-Based Defense Against Code Reuse Attacks for AVR Embedded Devices. Sergio Pastrana, Juan E. Tapiador, Guillermo Suarez-Tangil, Pedro Peris-López |
| 2016 | Adaptive Semantics-Aware Malware Classification. Bojan Kolosnjaji, Apostolis Zarras, Tamas K. Lengyel, George D. Webster, Claudia Eckert |
| 2016 | Analysing the Security of Google's Implementation of OpenID Connect. Wanpeng Li, Chris J. Mitchell |
| 2016 | AutoRand: Automatic Keyword Randomization to Prevent Injection Attacks. Jeff H. Perkins, Jordan Eikenberry, Alessandro Coglio, Daniel Willenson, Stelios Sidiroglou-Douskos, Martin C. Rinard |
| 2016 | Comprehensive Analysis and Detection of Flash-Based Malware. Christian Wressnegger, Fabian Yamaguchi, Daniel Arp, Konrad Rieck |
| 2016 | DeepFuzz: Triggering Vulnerabilities Deeply Hidden in Binaries - (Extended Abstract). Konstantin Böttinger, Claudia Eckert |
| 2016 | Detecting Hardware-Assisted Virtualization. Michael Brengel, Michael Backes, Christian Rossow |
| 2016 | Detection of Intrusions and Malware, and Vulnerability Assessment - 13th International Conference, DIMVA 2016, San Sebastián, Spain, July 7-8, 2016, Proceedings Juan Caballero, Urko Zurutuza, Ricardo J. Rodríguez |
| 2016 | Detile: Fine-Grained Information Leak Detection in Script Engines. Robert Gawlik, Philipp Koppe, Benjamin Kollenda, Andre Pawlowski, Behrad Garmany, Thorsten Holz |
| 2016 | Financial Lower Bounds of Online Advertising Abuse - A Four Year Case Study of the TDSS/TDL4 Botnet. Yizheng Chen, Panagiotis Kintis, Manos Antonakakis, Yacin Nadji, David Dagon, Wenke Lee, Michael Farrell |
| 2016 | Flush+Flush: A Fast and Stealthy Cache Attack. Daniel Gruss, Clémentine Maurice, Klaus Wagner, Stefan Mangard |
| 2016 | Google Dorks: Analysis, Creation, and New Defenses. Flavio Toffalini, Maurizio Abbà, Damiano Carra, Davide Balzarotti |
| 2016 | Leveraging Sensor Fingerprinting for Mobile Device Authentication. Thomas Hupperich, Henry Hosseini, Thorsten Holz |
| 2016 | MtNet: A Multi-Task Neural Network for Dynamic Malware Classification. Wenyi Huang, Jack W. Stokes |
| 2016 | On the Lack of Consensus in Anti-Virus Decisions: Metrics and Insights on Building Ground Truths of Android Malware. Médéric Hurier, Kevin Allix, Tegawendé F. Bissyandé, Jacques Klein, Yves Le Traon |
| 2016 | Probfuscation: An Obfuscation Approach Using Probabilistic Control Flows. Andre Pawlowski, Moritz Contag, Thorsten Holz |
| 2016 | RAMBO: Run-Time Packer Analysis with Multiple Branch Observation. Xabier Ugarte-Pedrero, Davide Balzarotti, Igor Santos, Pablo García Bringas |
| 2016 | Reviewer Integration and Performance Measurement for Malware Detection. Brad Miller, Alex Kantchelian, Michael Carl Tschantz, Sadia Afroz, Rekha Bachwani, Riyaz Faizullabhoy, Ling Huang, Vaishaal Shankar, Tony Wu, George Yiu, Anthony D. Joseph, J. D. Tygar |
| 2016 | Rowhammer.js: A Remote Software-Induced Fault Attack in JavaScript. Daniel Gruss, Clémentine Maurice, Stefan Mangard |
| 2016 | Subverting Operating System Properties Through Evolutionary DKOM Attacks. Mariano Graziano, Lorenzo Flore, Andrea Lanzi, Davide Balzarotti |
| 2016 | Towards Vulnerability Discovery Using Staged Program Analysis. Bhargava Shastry, Fabian Yamaguchi, Konrad Rieck, Jean-Pierre Seifert |
| 2016 | Understanding the Privacy Implications of ECS - (Extended Abstract). Panagiotis Kintis, Yacin Nadji, David Dagon, Michael Farrell, Manos Antonakakis |