1

POSTER: Mapping the Landscape of Large-Scale Vulnerability Notifications

Uses and Abuses of Server-Side Requests

Cashing Out the Great Cannon? On Browser-Based DDoS Attacks and Economics

In the Compression Hornet's Nest: A Security Study of Data Compression in Network Services

jAEk: Using Dynamic Analysis to Crawl and Test Modern Web Applications

On the Feasibility of Side-Channel Attacks in a Virtualized Environment

Towards a framework for assessing the feasibility of side-channel attacks in virtualized environments

Toward Black-Box Detection of Logic Flaws in Web Applications

A Tool for Supporting Developers in Analyzing the Security of Web-Based Security Protocols

From Model-Checking to Automated Testing of Security Protocols: Bridging the Gap