Designed to Fail: A USB-Connected Reader for Online Banking.- Security Add-Ons for Mobile Platforms.- THAPS: Automated Vulnerability Scanning of PHP Applications.- Cyber security exercises and competitions as a platform for cyber security experiments.- The Development of Cyber Security Warning, Advice & Report Points.- Towards an Empirical Examination of IT Security Infrastructures in SME.- How to Select a Security Requirements Method? A comparative study with students and practitioners.- There is Safety in Numbers: Preventing Control-Flow Hijacking by Duplication.- Coinductive Unwinding of Security-Relevant.-
Retooling and Securing Systemic Debugging.- Cracking Associative Passwords.- A Hybrid Approach for Highly Available & Secure Storage of Pseudo-SSO Credentials.- Assessing the Quality of Packet-Level Traces Collected on Internet Backbone Links.- Everything but the Kitchen Sink: Determining the effect of multiple attacks on privacy preserving technology users.- Can We Identify Manipulative Behavior and the Corresponding Suspects on Review Websites using Supervised Learning?.- Privacy-Friendly Cloud Storage for the Data Track.