Model-Based Security.- Detecting Code Reuse Attacks with a Model of Conformant Program Execution.- Security@Runtime : A Flexible MDE Approach to Enforce Fine-Grained Security Policies.- Towards a Vision of Engineering Controlled Interaction Execution for Information Services.- Formal Methods.- Automated Formal Verification of Application-Specific Security Properties .- Fault-Tolerant Non-interference .- Quantitative Security Analysis for Programs with Low Input and Noisy Output.- A Modeling and Formal Approach for the Precise Specification of Security Patterns.- On the Relation between Redactable and Sanitizable Signature Schemes.- Towards a Working Fully Homomorphic Practice and the Secret Computer.- Web and Mobile Security.- Architectures for Inlining Security Monitors in Web Applications.- Automatic and Robust Client-Side Protection for Cookie-Based Sessions.- Security Testing of GSM Implementations.- Applications.- User-Centric Security Assessment of Software A Case Study.- Security Engineering Principles for Day Two Car2X Applications .- Embedded Fault Injection Simulator on Smartcard.