Filter-resistant code injection on ARM Yves YounanPieter PhilippaertsThomas Walter Original Paper 13 October 2010 Pages: 173 - 188
Managing university internet access: balancing the need for security, privacy and digital evidence Vlasti BroucekPaul TurnerMark Zimmerli Original Paper 25 November 2010 Pages: 189 - 199
Hunting for undetectable metamorphic viruses Da LinMark Stamp Original Paper 25 December 2010 Pages: 201 - 214
Malware and steganography in hard disk firmware Iain SutherlandGareth DaviesAndrew Blyth Original Paper 11 January 2011 Pages: 215 - 219
Heliza: talking dirty to the attackers GĂ©rard WagenerRadu StateThomas Engel Original Paper 29 December 2010 Pages: 221 - 232