| 2016 | A Formal Framework for Environmentally Sensitive Malware. Jeremy Blackthorne, Benjamin Kaiser, Bülent Yener |
| 2016 | A Look into 30 Years of Malware Development from a Software Metrics Perspective. Alejandro Calleja, Juan E. Tapiador, Juan Caballero |
| 2016 | APDU-Level Attacks in PKCS#11 Devices. Claudio Bozzato, Riccardo Focardi, Francesco Palmarini, Graham Steel |
| 2016 | AVclass: A Tool for Massive Malware Labeling. Marcos Sebastián, Richard Rivera, Platon Kotzias, Juan Caballero |
| 2016 | Automatic Uncovering of Tap Points from Kernel Executions. Junyuan Zeng, Yangchun Fu, Zhiqiang Lin |
| 2016 | Blender: Self-randomizing Address Space Layout for Android Apps. Mingshen Sun, John C. S. Lui, Yajin Zhou |
| 2016 | CloudRadar: A Real-Time Side-Channel Attack Detection System in Clouds. Tianwei Zhang, Yinqian Zhang, Ruby B. Lee |
| 2016 | Detecting Stack Layout Corruptions with Robust Stack Unwinding. Yangchun Fu, Junghwan Rhee, Zhiqiang Lin, Zhichun Li, Hui Zhang, Guofei Jiang |
| 2016 | Enabling Network Security Through Active DNS Datasets. Athanasios Kountouras, Panagiotis Kintis, Chaz Lever, Yizheng Chen, Yacin Nadji, David Dagon, Manos Antonakakis, Rodney Joffe |
| 2016 | GRIM: Leveraging GPUs for Kernel Integrity Monitoring. Lazaros Koromilas, Giorgos Vasiliadis, Elias Athanasopoulos, Sotiris Ioannidis |
| 2016 | Identifying Extension-Based Ad Injection via Fine-Grained Web Content Provenance. Sajjad Arshad, Amin Kharraz, William Robertson |
| 2016 | On the Feasibility of TTL-Based Filtering for DRDoS Mitigation. Michael Backes, Thorsten Holz, Christian Rossow, Teemu Rytilahti, Milivoj Simeonovski, Ben Stock |
| 2016 | Research in Attacks, Intrusions, and Defenses - 19th International Symposium, RAID 2016, Paris, France, September 19-21, 2016, Proceedings Fabian Monrose, Marc Dacier, Gregory Blanc, Joaquín García-Alfaro |
| 2016 | SandPrint: Fingerprinting Malware Sandboxes to Provide Intelligence for Sandbox Evasion. Akira Yokoyama, Kou Ishii, Rui Tanabe, Yinmin Papa, Katsunari Yoshioka, Tsutomu Matsumoto, Takahiro Kasama, Daisuke Inoue, Michael Brengel, Michael Backes, Christian Rossow |
| 2016 | Semantics-Preserving Dissection of JavaScript Exploits via Dynamic JS-Binary Analysis. Xunchao Hu, Aravind Prakash, Jinghan Wang, Rundong Zhou, Yao Cheng, Heng Yin |
| 2016 | Small Changes, Big Changes: An Updated View on the Android Permission System. Yury Zhauniarovich, Olga Gadyatskaya |
| 2016 | Taming Transactions: Towards Hardware-Assisted Control Flow Integrity Using Transactional Memory. Marius Muench, Fabio Pagani, Yan Shoshitaishvili, Christopher Kruegel, Giovanni Vigna, Davide Balzarotti |
| 2016 | The Abuse Sharing Economy: Understanding the Limits of Threat Exchanges. Kurt Thomas, Rony Amira, Adi Ben-Yoash, Ori Folger, Amir Hardon, Ari Berger, Elie Bursztein, Michael D. Bailey |
| 2016 | The Messenger Shoots Back: Network Operator Based IMSI Catcher Detection. Adrian Dabrowski, Georg Petzl, Edgar R. Weippl |
| 2016 | Trellis: Privilege Separation for Multi-user Applications Made Easy. Andrea Mambretti, Kaan Onarlioglu, Collin Mulliner, William Robertson, Engin Kirda, Federico Maggi, Stefano Zanero |
| 2016 | Uses and Abuses of Server-Side Requests. Giancarlo Pellegrino, Onur Catakoglu, Davide Balzarotti, Christian Rossow |
| 2016 | Who Gets the Boot? Analyzing Victimization by DDoS-as-a-Service. Arman Noroozian, Maciej Korczynski, Carlos Hernandez Gañán, Daisuke Makita, Katsunari Yoshioka, Michel van Eeten |