default search action
EuroS&P 2023: Delft, Netherlands - Workshops
- IEEE European Symposium on Security and Privacy, EuroS&P 2023 - Workshops, Delft, Netherlands, July 3-7, 2023. IEEE 2023, ISBN 979-8-3503-2720-5
- Mario Raciti, Giampaolo Bella:
A Threat Model for Soft Privacy on Smart Cars. 1-10 - Konstantinos Kalogiannis, Andreas Henriksson, Panos Papadimitratos:
Vulnerability Analysis of Vehicular Coordinated Maneuvers. 11-20 - Giacomo Benedetti, Luca Verderame, Alessio Merlo:
A Preliminary Study of Privilege Life Cycle in Software Management Platform Automation Workflows. 21-28 - Yuejun Guo, Seifeddine Bettaieb:
An Investigation of Quality Issues in Vulnerability Detection Datasets. 29-33 - Wesley de Kraker, Harald Vranken, Arjen Hommersom:
GLICE: Combining Graph Neural Networks and Program Slicing to Improve Software Vulnerability Detection. 34-41 - Weiheng Bai, Kefu Wu, Qiushi Wu, Kangjie Lu:
Guiding Directed Fuzzing with Feasibility. 42-49 - Javier Martínez Llamas, Davy Preuveneers, Wouter Joosen:
Effective Machine Learning-based Access Control Administration through Unlearning. 50-57 - Carmelo Aparo, Cinzia Bernardeschi, Giuseppe Lettieri, Fabio Lucattini, Salvatore Montanarella:
An Analysis System to Test Security of Software on Continuous Integration-Continuous Delivery Pipeline. 58-67 - Nikolaos Lykousas, Constantinos Patsakis:
Tales from the Git: Automating the detection of secrets on code and assessing developers' passwords choices. 68-75 - Michael Gebauer, Faraz Maschhur, Nicola Leschke, Elias Grünewald, Frank Pallas:
A 'Human-in-the-Loop' approach for Information Extraction from Privacy Policies under Data Scarcity. 76-83 - Leonie Reichert, Björn Scheuermann:
An Analysis of Requirements and Privacy Threats in Mobile Data Donations. 84-93 - Akshath Jain, David Rodríguez Torrado, José M. del Álamo, Norman M. Sadeh:
ATLAS: Automatically Detecting Discrepancies Between Privacy Policies and Privacy Labels. 94-107 - Victor Morel, Simone Fischer-Hübner:
Automating privacy decisions -where to draw the line? 108-116 - Tanmay Ghai, Yixiang Yao, Srivatsan Ravi:
Lessons Learned: Building a Privacy-Preserving Entity Resolution Adaptation of PPJoin using End-to-End Homomorphic Encryption. 117-124 - Immanuel Kunz, Shuqian Xu:
Privacy as an Architectural Quality: A Definition and an Architectural View. 125-132 - Enzo Marquet, Jerico Moeyersons, Erik Pohle, Michiel Van Kenhove, Aysajan Abidin, Bruno Volckaert:
Secure Key Management for Multi-Party Computation in MOZAIK. 133-140 - Thomas Reisinger, Isabel Wagner, Eerke A. Boiten:
Unified Communication: What do Digital Activists need? 141-149 - David Rodríguez Torrado, Akshath Jain, José M. del Álamo, Norman Sadeh:
Comparing Privacy Label Disclosures of Apps Published in both the App Store and Google Play Stores. 150-157 - Gilberto Atondo Siu, Alice Hutchings:
"Get a higher return on your savings!": Comparing adverts for cryptocurrency investment scams across platforms. 158-169 - Dalyapraz Manatova, L. Jean Camp, Julia R. Fox, Sandra Kübler, Maria A Shardakova, Inna Kouper:
An Argument for Linguistic Expertise in Cyberthreat Analysis: LOLSec in Russian Language eCrime Landscape. 170-176 - Lena Yuryna Connolly, Hervé Borrion, Budi Arief, Sanaa Kaddoura:
Applying Neutralisation Theory to Better Understand Ransomware Offenders. 177-182 - Jack Hughes, Alice Hutchings:
Digital Drift and the Evolution of a Large Cybercrime Forum. 183-193 - Jay Jacobs, Sasha Romanosky, Octavian Suciuo, Benjamin Edwards, Armin Sarabi:
Enhancing Vulnerability Prioritization: Data-Driven Exploit Predictions with Community-Driven Insights. 194-206 - Andrew Morin, Tyler Moore:
How Cryptocurrency Exchange Interruptions Create Arbitrage Opportunities. 207-215 - Sasha Romanosky, Peter Schirmer:
Mapping the Cyberstalking Landscape: An Empirical Analysis of Federal U.S Crimes. 216-226 - Abulfaz Hajizada, Tyler Moore:
On Gaps in Enterprise Cyber Attack Reporting. 227-231 - Pavlo Burda, Abdul Malek Altawekji, Luca Allodi, Nicola Zannone:
The Peculiar Case of Tailored Phishing against SMEs: Detection and Collective DefenseMechanisms at a Small IT Company. 232-243 - James Burroughs, Michal Tereszkowski-Kaminski, Guillermo Suarez-Tangil:
Visualizing Cyber-Threats in Underground Forums. 244-258 - Nikolaos Foivos Polychronou, Pierre-Henri Thevenon, Maxime Puys, Vincent Beroulle:
A Hybrid Solution for Constrained Devices to Detect Microarchitectural Attacks. 259-269 - Joshua Harrison, Ehsan Toreini, Maryam Mehrnezhad:
A Practical Deep Learning-Based Acoustic Side Channel Attack on Keyboards. 270-280 - Anis Fellah-Touta, Lilian Bossuet, Carlos Andres Lara-Nino:
Combined Internal Attacks on SoC-FPGAs: Breaking AES with Remote Power Analysis and Frequency-based Covert Channels. 281-286 - Lilian Bossuet, Vincent Grosso, Carlos Andres Lara-Nino:
Emulating Side Channel Attacks on gem5: lessons learned. 287-295 - Fatih Durmaz, Nureddin Kamadan, Melih Taha Öz, Musa Sadik Unal, Arsalan Javeed, Cemal Yilmaz, Erkay Savas:
TimeInspector: A Static Analysis Approach for Detecting Timing Attacks. 296-303 - Nicolas Gaudin, Jean-Loup Hatchikian-Houdot, Frédéric Besson, Pascal Cotret, Guy Gogniat, Guillaume Hiet, Vianney Lapotre, Pierre Wilke:
Work in Progress: Thwarting Timing Attacks in Microcontrollers using Fine-grained Hardware Protections. 304-310 - Vincent Giraud, Guillaume Bouffard:
Faulting original McEliece's implementations is possible How to mitigate this risk? 311-319 - Feras Shahbi, Joseph Gardiner, Sridhar Adepu, Awais Rashid:
A Digital Forensic Taxonomy For Programmable Logic Controller Data Artefacts. 320-328 - Teri Lenard, Anastasija Collen, Niels A. Nijdam, Béla Genge:
A Key to Embedded System Security: Locking and Unlocking Secrets with a Trusted Platform Module. 329-335 - Yunhe Yang, Mu Zhang:
From Tactics to Techniques: A Systematic Attack Modeling for Advanced Persistent Threats in Industrial Control Systems. 336-344 - Anne Borcherding, Mark Giraud, Ian Fitzgerald, Jürgen Beyerer:
The Bandit's States: Modeling State Selection for Stateful Network Fuzzing as Multi-armed Bandit Problem. 345-350 - Samin Yasar Chowdhury, Brandon Dudley, Ruimin Sun:
The Case for Virtual PLC-enabled Honeypot Design. 351-357 - Richard Derbyshire, Sam Maesschalck, Alexander Staves, Benjamin Green, David Hutchison:
To me, to you: Towards Secure PLC Programming through a Community-Driven Open-Source Initiative. 358-362 - Xu Zheng, Tianchun Wang, Samin Yasar Chowdhury, Ruimin Sun, Dongsheng Luo:
Unsafe Behavior Detection with Adaptive Contrastive Learning in Industrial Control Systems. 363-369 - Mohammed Asiri, Neetesh Saxena, Pete Burnap:
ARCSG: Advancing Resilience of Cyber-Physical Smart Grid: An Integrated Co-Simulation Approach Incorporating Indicators of Compromise. 370-378 - Jens Pottebaum, Jost Rossel, Juraj Somorovsky, Yasemin Acar, René Fahr, Patricia Arias Cabarcos, Eric Bodden, Iris Gräßler:
Re-Envisioning Industrial Control Systems Security by Considering Human Factors as a Core Element of Defense-in-Depth. 379-385 - Hendrik Meyer zum Felde, Jean-Luc Reding, Michael Lux:
D-GATE: Decentralized Geolocation and Time Enforcement for Usage Control. 386-395 - Javier Rodriguez-Viñas, Ines Ortega-Fernandez, Eva Sotos Martínez:
Hexanonymity: a scalable geo-positioned data clustering algorithm for anonymisation purposes. 396-404 - Toon Dehaene, Michiel Willocx, Bert Lagaisse, Vincent Naessens:
Masking Location Streams in the Presence of Colluding Service Providers. 405-414 - Daniel Gibert, Jordi Planes, Quan Le, Giulio Zizzo:
A Wolf in Sheep's Clothing: Query-Free Evasion Attacks Against Machine Learning-Based Malware Detectors with Generative Adversarial Networks. 415-426 - Benjamin Reichenwallner, Peter Meerwald-Stadler:
Simplification of General Mixed Boolean-Arithmetic Expressions: GAMBA. 427-438 - Francesco Zola, Jan Lukas Bruse, Mikel Galar:
Temporal Analysis of Distribution Shifts in Malware Classification for Digital Forensics. 439-450 - Megha Sharma, Kuldeep Singh, Palvi Aggarwal, Varun Dutt:
How well does GPT phish people? An investigation involving cognitive biases and feedback. 451-457 - Tyler Malloy, Cleotilde Gonzalez:
Learning to Defend by Attacking (and Vice-Versa): Transfer of Learning in Cybersecurity Games. 458-464 - Daniel Reti, Tillmann Angeli, Hans D. Schotten:
Honey Infiltrator: Injecting Honeytoken Using Netfilter. 465-469 - Johannes Zirngibl, Patrick Sattler, Georg Carle:
A First Look at SVCB and HTTPS DNS Resource Records in the Wild. 470-474 - Blake Anderson, David A. McGrew:
Assessing and Exploiting Domain Name Misinformation. 475-486 - Muhammad Yasir Muzayan Haq, Abhishta Abhishta, Raffaele Sommese, Mattijs Jonker, Lambert J. M. Nieuwenhuis:
Assessing Network Operator Actions to Enhance Digital Sovereignty and Strengthen Network Resilience: A Longitudinal Analysis during the Russia-Ukraine Conflict. 487-494 - Marcel Urpí-Bricollé, Ismael Castell-Uroz, Pere Barlet-Ros:
Detecting and Analyzing Mouse Tracking in the Wild. 495-500 - Elisa Chiapponi, Marc Dacier, Olivier Thonnard:
Inside Residential IP Proxies: Lessons Learned from Large Measurement Campaigns. 501-512 - Rodolfo V. Valentim, Idilio Drago, Marco Mellia, Federico Cerutti:
Lost in Translation: AI-based Generator of Cross-Language Sound-squatting. 513-520 - Pieter Philippaerts, Davy Preuveneers, Wouter Joosen:
Revisiting OAuth 2.0 Compliance: A Two-Year Follow-Up Study. 521-525 - Dimitri Mankowski, Thom Wiggers, Veelasha Moonsamy:
TLS → Post-Quantum TLS: Inspecting the TLS landscape for PQC adoption on Android. 526-538 - Siôn Lloyd, Carlos Hernandez Gañán, Samaneh Tajalizadehkhoob:
Towards more rigorous domain-based metrics: quantifying the prevalence and implications of "Active" Domains. 539-545 - Yevheniya Nosyk, Olivier Hureau, Simon Fernandez, Andrzej Duda, Maciej Korczynski:
Unveiling the Weak Links: Exploring DNS Infrastructure Vulnerabilities and Fortifying Defenses. 546-557 - Gastón García González, Pedro Casas, Alicia Fernández:
Fake it till you Detect it: Continual Anomaly Detection in Multivariate Time-Series using Generative AI. 558-566 - M. Patrick Collins, Alefiya Hussain, Stephen Schwab:
Identifying and Differentiating Acknowledged Scanners in Network Traffic. 567-574 - Ahmet Erinola, Annalina Buckmann, Jennifer Friedauer, Asli Yardim, M. Angela Sasse:
"As Usual, I Needed Assistance of a Seeing Person": Experiences and Challenges of People with Disabilities and Authentication Methods. 575-593 - Wei Hu, Diogo Barradas:
Work in Progress: A Glance at Social Media Self-Censorship in North America. 609-618 - Natalie Leesakul, Charles Morisset:
Position Paper: The role of law in achieving privacy and security measures in smart buildings from the GDPR context. 619-626 - Francesco Ferazza, Cosimo Melella, Konstantinos Mersinas, Antonio Calcara:
Divided We Hack: Exploring the Degree of Sino-Russian Coordination in Cyberspace During the Ukraine War. 627-640 - Naoom Abu Abah, Nick Taylor, Charles Morisset, Maryam Mehrnezhad:
U-Sense: Feasibility Study of "Human as a Sensor" in Incident Reporting Systems in a Smart Campus. 641-652 - Patrick Wake, Sue Black, Jonathan Young:
Work in Progress: Evaluation of Security Standards through a Cyber Range using Hackers' Tactics, Techniques and Procedures. 653-658 - Magdalene Ng, Maria Bada, Kovila P. L. Coopamootoo:
What We Do in the Shadows: How does Experiencing Cybercrime Affect Response Actions & Protective Practices? 659-672
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.