default search action
EuroS&P 2024: Vienna, Austria - Workshops
- IEEE European Symposium on Security and Privacy Workshops, EuroS&PW 2024, Vienna, Austria, July 8-12, 2024. IEEE 2024, ISBN 979-8-3503-6729-4
- Zoltán Ádám Mann, Jonathan Petit, Sarah M. Thornton, Michael Buchholz, Jason Millar:
SPIDER: Interplay Assessment Method for Privacy and Other Values. 1-8 - Edgar R. Weippl, Matteo Maffei:
Message from General Chairs; EuroSP 2024. 1 - Yucheng Yin, Jorge Guajardo Merchan, Pradeep Pappachan, Vyas Sekar:
Work-in-Progress: CANGen: Practical Synthetic CAN Traces Generation Using Deep Generative Models. 1-9 - Zachary Kilhoffer, Devyn Wilder, Masooda Bashir:
Compliance as Baseline, or Striving for More? How Privacy Engineers Work and Use Privacy Standards. 9-18 - David Rodríguez Torrado, Celia Fernández-Aller, José M. del Álamo, Norman Sadeh:
Data Retention Disclosures in the Google Play Store: Opacity Remains the Norm. 19-23 - Thomas Cory, Wolf Rieder, Thu-My Huynh:
A Qualitative Analysis Framework for mHealth Privacy Practices. 24-31 - Ala'a Al-Momani, David Balenson, Zoltán Ádám Mann, Sebastian Pape, Jonathan Petit, Christoph Bösch:
Navigating Privacy Patterns in the Era of Robotaxis. 32-39 - Anika Hannemann, Benjamin Friedl, Erik Buchmann:
Differentially Private Multi-Label Learning Is Harder Than You'd Think. 40-47 - Jonas Allmann, Saskia Nuñez von Voigt, Florian Tschorsch:
An applied Perspective: Estimating the Differential Identifiability Risk of an Exemplary SOEP Data Set. 48-55 - Jonah Gibbon, Tina Marjanov, Alice Hutchings, John Aston:
Measuring the Unmeasurable: Estimating True Population of Hidden Online Communities. 56-66 - Pavlo Burda, Maria Eleni Kokkini, Luca Allodi, Nicola Zannone:
The (Relative) Impact of Email Cues on the Perceived Threat of Phishing Attacks: A User Perspective on Phishing Deceptiveness. 67-84 - Alejandro de la Cruz Alvarado, Sergio Pastrana Portillo:
Understanding Crypter-as-a-Service in a Popular Underground Marketplace. 85-90 - Veronica Valeros, Anna Sirokova, Carlos Adrián Catania, Sebastián García:
Towards Better Understanding of Cybercrime: The Role of Fine-Tuned LLMs in Translation. 91-99 - Romy Fieblinger, Md Tanvirul Alam, Nidhi Rastogi:
Actionable Cyber Threat Intelligence Using Knowledge Graphs and Large Language Models. 100-111 - Martin Rosso, Luca Allodi, Emmanuele Zambon, Jerry den Hartog:
A Methodology to Measure the "Cost" of CPS Attacks: Not all CPS Networks are Created Equal. 112-129 - Javier Sande Ríos, Jesús Canal Sánchez, Carmen Manzano Hernandez, Sergio Pastrana:
Threat Analysis and Adversarial Model for Smart Grids. 130-145 - Stash Kempinski, Savio Sciancalepore, Emmanuele Zambon, Luca Allodi:
Attacking Operational Technology Without Specialized Knowledge: The Unspecialized OT Threat Actor Profile. 146-159 - Pietro Chiavassa, Filippo Gandino, Renato Ferrero, Jan Tobias Mühlberg:
Secure Intermittent Computing with ARM TrustZone on the Cortex-M. 160-168 - Gianluca Scopelliti, Christoph Baumann, Jan Tobias Mühlberg:
Understanding Trust Relationships in Cloud-Based Confidential Computing. 169-176 - Christian Lindenmeier, Matti Schulze, Jonas Röckl, Marcel Busch:
SyncEmu: Enabling Dynamic Analysis of Stateful Trusted Applications. 177-185 - Takashi Yagawa, Tadanori Teruya, Kuniyasu Suzaki, Hirotake Abe:
Delegating Verification for Remote Attestation Using TEE. 186-192 - Luca Wilke, Gianluca Scopelliti:
SNPGuard: Remote Attestation of SEV-SNP VMs Using Open Source Tools. 193-198 - Istemi Ekin Akkus, Ivica Rimac, Ruichuan Chen:
PraaS: Verifiable Proofs of Property as-a-Service with Intel SGX. 199-207 - Chen Chang Lew, Christof Ferreira Torres, Shweta Shinde, Marcus Brandenburger:
Revisiting Rollbacks on Smart Contracts in TEE-protected Private Blockchains. 217-224 - Jonas Röckl, Christian Lindenmeier, Matti Schulze, Tilo Müller:
Conditional Network Availability: Enhancing Connectivity Guarantees for TEE-Based Services. 225-233 - Henrik A. Karlsson:
Minimal Partitioning Kernel with Time Protection and Predictability. 234-241 - Tom Van Eyck, Sam Michiels, Xiaojiang Du, Danny Hughes:
NetReach: Guaranteed Network Availability and Reachability to enable Resilient Networks for Embedded Systems. 242-244 - Matti Schulze, Christian Lindenmeier, Jonas Röckl:
BarriCCAde: Isolating Closed-Source Drivers with ARM CCA. 245-251 - Gastón García González, Pedro Casas, Emilio Martínez, Alicia Fernández:
On the Quest for Foundation Generative-AI Models for Anomaly Detection in Time-Series Data. 252-260 - Luca Gioacchini, Welton Santos, Barbara Lopes, Idilio Drago, Marco Mellia, Jussara M. Almeida, Marcos André Gonçalves:
Explainable Stacking Models based on Complementary Traffic Embeddings. 261-272 - Adrien Schoen, Gregory Blanc, Pierre-François Gimenez, Yufei Han, Frédéric Majorczyk, Ludovic Mé:
A Tale of Two Methods: Unveiling the Limitations of GAN and the Rise of Bayesian Networks for Synthetic Network Traffic Generation. 273-286 - Kai Huang, Luca Gioacchini, Marco Mellia, Luca Vassio:
Dynamic Cluster Analysis to Detect and Track Novelty in Network Telescopes. 287-296 - Markus Sosnowski, Johannes Zirngibl, Patrick Sattler, Juliane Aulbach, Jonas Lang, Georg Carle:
An Internet-Wide View on HTTPS Certificate Revocations: Observing the Revival of CRLs via Active TLS Scans. 297-306 - Ting-Han Chen, Carlotta Tagliaro, Martina Lindorfer, Kevin Borgolte, Jeroen van der Ham-de Vos:
Are You Sure You Want To Do Coordinated Vulnerability Disclosure? 307-314 - Ismael Castell-Uroz, Pere Barlet-Ros:
A First Look into Utiq: Next-Generation Cookies at the ISP Level. 315-320 - Ganesh Chennimalai Sankaran, Mukund Raghothaman, M. Patrick Collins:
Optimal Flow Collector Placement In Experimental Networks. 321-325 - Abdirisaq Farah, Martin Nielsen, Emmanouil Vasilomanolakis:
Improving Synthetic Network Attack Traffic Generation. 326-334 - Robert Flood, David Aspinall:
Measuring the Complexity of Benchmark NIDS Datasets via Spectral Analysis. 335-341 - Muhammad Yasir Muzayan Haq, Abhishta Abhishta, Sander Zeijlemaker, Annette Chau, Michael Siegel, Lambert J. M. Nieuwenhuis:
Measuring Malware Detection Capability for Security Decision Making. 342-351 - Alessandro Brighente, Mauro Conti, Denis Donadel, Federico Turrin:
Hyperloop: A Cybersecurity Perspective. 352-360 - Niclas Ilg, Dominik Germek, Paul Duplys, Michael Menth:
Work-in-Progress: Emerging E/E-Architectures as Enabler for Automotive Honeypots. 361-366 - Francesco Marchiori, Alessandro Brighente, Mauro Conti:
Work-in-Progress: Crash Course: Can (Under Attack) Autonomous Driving Beat Human Drivers? 367-372 - Sekar Kulandaivel, Wenjuan Lu, Brandon Barry, Jorge Guajardo:
Work-in-Progress: Towards a New Configurable and Practical Remote Automotive Security Testing Platform. 373-379 - Atefeh Mohseni-Ejiyeh:
Secure, Robust, and Energy-Efficient Authenticated Data Sharing in Drone to Vehicles Communications. 380-389 - Tillmann Angeli, Daniel Reti, Daniel Schneider, Hans D. Schotten:
False Flavor Honeypot: Deceiving Vulnerability Scanning Tools. 399-406 - Tim Pappa:
Modeling a Cyber Deception Practitioner's Approach: Behaviorally Exploiting an American Cybercriminal with Warranting Theory and Whaley's Unpublished Work on "Unexpected Players". 407-414 - Mario Kahlhofer, Stefan Rass:
Application Layer Cyber Deception Without Developer Interaction. 416-429 - Muris Sladic, Veronica Valeros, Carlos Adrián Catania, Sebastián García:
LLM in the Shell: Generative Honeypots. 430-435 - Istemi Ekin Akkus, Ivica Rimac:
Duet: Combining a Trustworthy Controller with a Confidential Computing Environment. 436-442 - Wenjie Liu, Panos Papadimitratos:
Position-based Rogue Access Point Detection. 436-442 - Ahmed Hemida, Ahmed Bilal Asghar, Charles A. Kamhoua, Jon M. Kleinberg:
A Game Theoretic Framework for Multi Domain Cyber Deception. 443-447 - Ivan Petrukha, Nataliia Stulova, Sergii Kryvoblotskyi:
Position Paper: Think Globally, React Locally - Bringing Real-Time Reference-Based Website Phishing Detection on macOS. 448-455 - Uta Menges, Annette Kluge:
Contrasting and Synergizing CISOs' and Employees' Attitudes, Needs, and Resources for Security Using Personas. 456-472 - Nathan Daniel Schiele, Jari Egberts, Olga Gadyatskaya:
Nobody Knows the Risks I Have Seen: Evaluating the Gap Between Risk Analysis and Security Operations. 473-483 - Abdelrahman Ragab, Mohammad Mannan, Amr M. Youssef:
"Trust Me Over My Privacy Policy": Privacy Discrepancies in Romantic AI Chatbot Apps. 484-495 - Ahmed Salman, Sadie Creese, Michael Goldsmith:
Position Paper: Leveraging Large Language Models for Cybersecurity Compliance. 496-503 - Rebecca Weil, Sahar Abdelnabi, Mario Fritz, Rakibul Hasan:
Tell Me What You Like and I Know What You Will Share: Topical Interest Influences Behavior Toward News From High and Low Credible Sources. 504-518 - Gennaro Esposito Mocerino, Claudio Velotti, Danilo Gentile, Luigi Gallo, Alessio Botta, Giorgio Ventre:
Work in Progress: Implicit Association Tests for Understanding Human Factor in Phishing Beyond Awareness. 519-526 - Seungwon Woo, Wonho Song, Min Suk Kang:
Work in Progress: I Know You Pin Me: Privacy Risks in User Pinning of Zoom Video Conferencing. 527-532 - Aakanksha Saha, Jorge Blasco, Martina Lindorfer:
Exploring the Malicious Document Threat Landscape: Towards a Systematic Approach to Detection and Analysis. 533-544 - Tuomo Lahtinen, Andrei Costin, Guillermo Suarez-Tangil:
Position: On Potential Malware & New Attack Vectors for Internet-of-Brains (IoB). 545-553 - L. Rui, Olga Gadyatskaya:
Position: The Explainability Paradox - Challenges for XAI in Malware Detection and Analysis. 554-561 - Abdullah Hamed Almuntashiri, Luis-Daniel Ibáñez, Adriane Chapman:
LLMs for the Post-Hoc Creation of Provenance. 562-566 - Nils Hoffmann, Neda Ebrahimi Pour:
A Low Overhead Approach for Automatically Tracking Provenance in Machine Learning Workflows. 567-573 - Wisam Abbasi, Adel Taweel, Andrea Saracino:
A Provenance-Driven Approach for Detecting Revenue Leakage in Telecom. 574-582 - Michael A. C. Johnson, Marcus Paradies, Hans-Rainer Klöckner, Albina Muzafarova, Kristen Lackeos, David J. Champion, Marta Dembska, Sirko Schindler:
Evaluation of Provenance Serialisations for Astronomical Provenance - Application Track. 583-591 - Shatha Algarni, Boris Glavic, Seokki Lee, Adriane Chapman:
Solving Why Not Questions for Aggregate Constraints Through Query Repair. 592-596 - Tanja Auge, Susanne Feistel, Fajar J. Ekaputra, Meike Klettke, Susanne Jürgensmann, Emil Michels, Laura Waltersdorfer:
Towards an Integrated Provenance Framework: A Scenario for Marine Data. 597-601 - Shawn Bowers, Yilin Xia, Bertram Ludäscher:
On the Structure of Game Provenance and its Applications. 602-609 - Clarisse Feio, Nuno Santos, Nelson Escravana, Bernardo Pacheco:
An Empirical Study of DevSecOps Focused on Continuous Security Testing. 610-617 - Hannu Turtiainen, Andrei Costin:
VulnBERTa: On Automating CWE Weakness Assignment and Improving the Quality of Cybersecurity CVE Vulnerabilities Through ML/NLP. 618-625 - Alex Wee, Arina Kudriavtseva, Olga Gadyatskaya:
"Have Heard of it": A Study with Practitioners on Adoption of Secure Software Development Frameworks. 626-633 - Virendra Ashiwal, Sören Finster, Abdallah Dawoud:
LLM-based Vulnerability Sourcing from Unstructured Data. 634-641 - Abdallah Dawoud, Sören Finster, Nicolas Coppik, Virendra Ashiwal:
Better Left Shift Security! Framework for Secure Software Development. 642-649 - Mark Bohlender, Raphael Morisco, Mattia Mossano, Thorsten Schwarz, Melanie Volkamer:
SMILE4VIP: Intervention to Support Visually Impaired Users Against Phishing. 650-657 - Tiffany Wilson:
The Unintended Harm of IoT Devices in Assistive Technology Distribution Programs. 658-665 - Naheem Noah, Supriya Thakur, Jason Beck, Sanchari Das:
Evaluating Privacy & Security of Online Dating Applications with a Focus on Older Adults. 666-677 - Mindy Tran, Xinru Tang, Adryana Hutchinson, Adam J. Aviv, Yixin Zou:
Position Paper: Exploring Security and Privacy Needs of d/Deaf Individuals. 678-682 - Eric Ackermann, Noah Mauthe, Sven Bugiel:
Work-in-Progress: Northcape: Embedded Real-Time Capability-Based Addressing. 683-690 - Andrea Bernardini, Francesco D'Alterio, Leonardo Sagratella, Marina Settembre, Nicolò Maunero:
"Work-in-Progress" Structuring the Complexity: An Ontological Approach to Analyze the Cybersecurity of a 5G Service. 691-700 - Giuseppe Salerno, Andrea Pugliese, Cristian Molinaro:
Work-in-Progress: Protecting Knowledge Graph-based Descriptions of Digital Twins. 701-705 - Stefano Berlato, Matteo Rizzi, Matteo Franzil, Silvio Cretti, Pietro De Matteis, Roberto Carbone:
Work-in-Progress: A Sidecar Proxy for Usable and Performance-Adaptable End-to-End Protection of Communications in Cloud Native Applications. 706-711 - Lorenzo Valeriani, Giuseppe Bianchi, Luca Verderame, Alessio Merlo:
Analyzing the Impact of Obfuscation on the Runtime Execution of Android Apps at Kernel Level. 712-717 - Michele Cerreta, Gabriele Costa:
Automating Penetration Testing with MeTeOr. 718-725 - Alessandro Cantelli Forti, Giacomo Longo, Enrico Russo:
Work-In-Progress: Consistent and Tamper-Proof Acquisition of Automatically Verifiable Forensic Web Evidence. 726-730 - Luca Caviglione, Massimo Guarascio, Francesco Sergio Pisani, Marco Zuppelli:
A Few to Unveil Them All: Leveraging Mixture of Experts on Minimal Data for Detecting Covert Channels in Containerized Cloud Infrastructures. 731-739
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.