Malicious origami in PDF Frédéric RaynalGuillaume DelugréDamien Aumaitre Original Paper 26 August 2009 Pages: 289 - 315
Practical overview of a Xen covert channel Mickaël Salaün Original Paper 19 August 2009 Pages: 317 - 328
IpMorph: fingerprinting spoofing unification Guillaume PrigentFlorian VichotFabrice Harrouet Original Paper 03 September 2009 Pages: 329 - 342
Developing a Trojan applets in a smart card Julien Iguchi-CartignyJean-Louis Lanet Original Paper 11 September 2009 Pages: 343 - 351
ACPI and SMI handlers: some limits to trusted computing Loïc DuflotOlivier GrumelardBenjamin Morin Original Paper 25 November 2009 Pages: 353 - 374