16. CCS 2009: Chicago, Illinois, USA

Attacks I

RFID

Formal techniques

Applied cryptography

Anonymization networks

Cloud security

Security of mobile services

Software security using behavior

Systems and networks

Privacy

Anonymization techniques

Embedded and mobile devices

Technique for ensuring software security

Designing secure systems

Attacks II

System security

Anonymization

Malware and bots