Security Testing beyond Functional Tests.- Progress-Sensitive Security for SPARK.- Sound and Precise Cross-Layer Data Flow Tracking.- Automatically Extracting Threats from Extended Data Flow Diagrams.- On the Static Analysis of Hybrid Mobile Apps.- Semantics-based Repackaging Detection for Mobile Apps.- Accelerometer-based Device Fingerprinting for Multi-factor Mobile Authentication.- POODLEs, More POODLEs, FREAK Attacks How Server Administrators Responded to Three Serious Web Vulnerabilities.- a platform to detect stealth attacks.- Analyzing the Gadgets - Towards a Metric to Measure Gadget Quality.- Empirical Analysis and Modeling of Black-Box Mutational Fuzzing.- On the Security Cost of Using a Free and Open Source Component in a Proprietary Product.- Usable Platforms for Secure Programming { Mining Unix for Insight and Guidelines.- AppPAL for Capturing and Checking Mobile App Policies.- Inferring Semantic Mapping Between Policies and The Clue is in the Language.- Supporting Policy-Based Access Control on Database Systems.- Enforcing Security Properties by Solving Behavioural Equations.