default search action
EuroS&P 2020: Genoa, Italy - Workshops
- IEEE European Symposium on Security and Privacy Workshops, EuroS&P Workshops 2020, Genoa, Italy, September 7-11, 2020. IEEE 2020, ISBN 978-1-7281-8597-2
CACOE: Cyberange Technologies Workshop
- Maria Leitner, Teodor Sommestad:
International Workshop on Cyber Range Technologies and Applications (CACOE 2020). 1 - Zhenguo Hu, Razvan Beuran, Yasuo Tan:
Automated Penetration Testing Using Deep Reinforcement Learning. 2-10 - Mika Karjalainen, Tero Kokkonen:
Comprehensive Cyber Arena; The Next Generation Cyber Range. 11-16 - Patrik Lif, Stefan Varga, Mikael Wedlin, David Lindahl, Mats Persson:
Evaluation of Information Elements in a Cyber Incident Report. 17-26 - Kaie Maennel:
Learning Analytics Perspective: Evidencing Learning from Digital Datasets in Cybersecurity Exercises. 27-36 - Jonas Almroth, Tommy Gustafsson:
CRATE Exercise Control - A cyber defense exercise management and support tool. 37-45 - Alefiya Hussain, David DeAngelis, Erik Kline, Stephen Schwab:
Replicated Testbed Experiments for the Evaluation of a Wide-range of DDoS Defenses. 46-55 - Giorgio Di Tizio, Fabio Massacci, Luca Allodi, Stanislav Dashevskyi, Jelena Mirkovic:
An Experimental Approach for Estimating Cyber Risk: a Proposal Building upon Cyber Ranges and Capture the Flags. 56-65
CyberCert: Cybersecurity Certification
- Philippe Massonet:
First International Workshop on lightweight and Incremental Cybersecurity Certification. 66 - Tobias Fiebig:
How to stop crashing more than twice: A Clean-Slate Governance Approach to IT Security. 67-74 - Christophe Ponsard, Philippe Massonet, Jeremy Grandclaudon, Nicolas Point:
From Lightweight Cybersecurity Assessment to SME Certification Scheme in Belgium. 75-78 - Andrea Morgagni, Philippe Massonet, Sébastien Dupont, Jeremy Grandclaudon:
Towards Incremental Safety and Security Requirements Co-Certification. 79-84 - Volkmar Lotz:
Cybersecurity Certification for Agile and Dynamic Software Systems - a Process-Based Approach. 85-88 - Vasilios Mavroudis, Petr Svenda:
JCMathLib: Wrapper Cryptographic Library for Transparent and Certifiable JavaCard Applets. 89-96
EuroUSEC: European Workshop on Usable Security
- Maryam Mehrnezhad:
A Cross-Platform Evaluation of Privacy Notices and Tracking Practices. 97-106 - Nils Quermann, Martin Degeling:
Data Sharing in Mobile Apps - User Privacy Expectations in Europe. 107-119 - Fatemeh Alizadeh, Timo Jakobi, Alexander Boden, Gunnar Stevens, Jens Boldt:
GDPR Reality Check - Claiming and Investigating Personally Identifiable Data from Companies. 120-129 - Mattia Mossano, Kami Vaniea, Lukas Aldag, Reyhan Düzgün, Peter Mayer, Melanie Volkamer:
Analysis of publicly available anti-phishing webpages: contradicting information, lack of concrete advice and very narrow attack vector. 130-139 - James Nicholson, Yousra Javed, Matt Dixon, Lynne M. Coventry, Opeyemi Dele-Ajayi, Philip Anderson:
Investigating Teenagers' Ability to Detect Phishing Messages. 140-149 - Elham Al Qahtani, Yousra Javed, Heather Lipford, Mohamed Shehab:
Do Women in Conservative Societies (Not) Follow Smartphone Security Advice? A Case Study of Saudi Arabia and Pakistan. 150-159 - Claudia Bischoff, Eva Gerlitz, Matthew Smith:
Vision: I don't want to use my Phone! A Cognitive Walkthrough for YubiKeys. 160-165 - Aidah Ichario, Manuel Maarek:
Vision: Investigating Web API Developer Experience in Relation to Terms of Service and Privacy Policies. 166-171 - Jan Tolsdorf, Luigi Lo Iacono:
Vision: Shred If Insecure - Persuasive Message Design as a Lesson and Alternative to Previous Approaches to Usable Secure Email Interfaces. 172-177 - Chan Nam Ngo, Daniele Friolo, Fabio Massacci, Daniele Venturi, Ettore Battaiola:
Vision: What If They All Die? Crypto Requirements For Key People. 178-183 - Joseph Shams, Nalin A. G. Arachchilage, Jose M. Such:
Vision: Why Johnny Can't Configure Smart Home? A Behavioural Framework for Smart Home Privacy Configuration. 184-189 - Magdalene Ng, Kovila P. L. Coopamootoo, Ehsan Toreini, Mhairi Aitken, Karen Elliott, Aad van Moorsel:
Simulating the Effects of Social Presence on Trust, Privacy Concerns & Usage Intentions in Automated Bots for Finance. 190-199 - Karoline Busse, Mohammad Tahaei, Katharina Krombholz, Emanuel von Zezschwitz, Matthew Smith, Jing Tian, Wenyuan Xu:
Cash, Cards or Cryptocurrencies? A Study of Payment Culture in Four Countries. 200-209 - Wei Bai, Michael Pearson, Patrick Gage Kelley, Michelle L. Mazurek:
Improving Non-Experts' Understanding of End-to-End Encryption: An Exploratory Study. 210-219 - Verena Distler, Carine Lallemand, Vincent Koenig:
Making Encryption Feel Secure: Investigating how Descriptions of Encryption Impact Perceived Security. 220-229 - Simon Anell, Lea Gröber, Katharina Krombholz:
End User and Expert Perceptions of Threats and Potential Countermeasures. 230-239 - Anjuli R. K. Shere, Jason R. C. Nurse, Ivan Flechais:
"Security should be there by default": Investigating how journalists perceive and respond to risks from the Internet of Things. 240-249 - Huixin Tian, Chris Kanich, Jason Polakis, Sameer Patil:
Tech Pains: Characterizations of Lived Cybersecurity Experiences. 250-259
HotSpot: Hot Topics in the Principles of Security and Trust
- Joshua D. Guttman, Sebastian Mödersheim:
HotSpot: Hot Issues in Security Principles and Trust 2020. 260 - Arthur Américo, Pasquale Malacaria:
QQIF: Quantum Quantitative Information Flow (invited paper). 261-270 - Frank Piessens:
Security across abstraction layers: old and new examples. 271-279 - Andrew Cook, Luca Viganò:
A Game Of Drones: Extending the Dolev-Yao Attacker Model With Movement. 280-292 - Luca Viganò, Daniele Magazzeni:
Explainable Security. 293-300
IWPE: 6th International Workshop on Privacy Engineering
- José M. del Álamo, Jose M. Such, Isabel Wagner, Kopo Marvin Ramokapane:
Preface on the International Workshop on Privacy Engineering 2020 (IWPE'20). 301 - Kim Wuyts, Laurens Sion, Wouter Joosen:
LINDDUN GO: A Lightweight Approach to Privacy Threat Modeling. 302-309 - Lukasz Olejnik:
Shedding light on web privacy impact assessment: A case study of the Ambient Light Sensor API. 310-313 - Laurens Sion, Dimitri Van Landuyt, Wouter Joosen:
The Never-Ending Story: On the Need for Continuous Privacy Impact Assessment. 314-317 - Kalle Hjerppe, Jukka Ruohonen, Ville Leppänen:
Extracting Layered Privacy Language Purposes from Web Services. 318-325 - Imane Fouad, Cristiana Santos, Feras Al Kassar, Nataliia Bielova, Stefano Calzavara:
On Compliance of Cookie Purposes with the Purpose Specification Principle. 326-333 - Giuseppe Garofalo, Tim Van hamme, Davy Preuveneers, Wouter Joosen:
A Siamese Adversarial Anonymizer for Data Minimization in Biometric Applications. 334-343 - Aidmar Wainakh, Alejandro Sánchez Guinea, Tim Grube, Max Mühlhäuser:
Enhancing Privacy via Hierarchical Federated Learning. 344-347 - Franklin Leukam Lako, Paul Lajoie-Mazenc, Maryline Laurent:
Reconciling Privacy and Utility for Energy Services - an Application to Demand Response Protocols. 348-355
S&B: Security & Privacy on the Blockchain
- Tim Ruffing, Florian Tschorsch:
IEEE S&B 2020: 4th IEEE Workshop on Security and Privacy on the Blockchain. 356 - Simon Janin, Kaihua Qin, Akaki Mamageishvili, Arthur Gervais:
FileBounty: Fair Data Exchange. 357-366 - Suyash Bagad, Saravanan Vijayakumaran:
Performance Trade-offs in Design of MimbleWimble Proofs of Reserves. 367-377 - Martin Westerkamp, Jacob Eberhardt:
zkRelay: Facilitating Sidechains using zkSNARK-based Chain-Relays. 378-386 - Sergei Tikhomirov, Pedro Moreno-Sanchez, Matteo Maffei:
A Quantitative Analysis of Security, Anonymity and Scalability for the Lightning Network. 387-396 - Alex Manuskin, Michael Mirkin, Ittay Eyal:
Ostraka: Secure Blockchain Scaling by Node Sharding. 397-406 - Emad Badawi, Guy-Vincent Jourdan, Gregor von Bochmann, Iosif-Viorel Onut:
An Automatic Detection and Analysis of the Bitcoin Generator Scam. 407-416 - István András Seres, Omer Shlomovits, Pratyush Ranjan Tiwari:
CryptoWills: How to Bequeath Cryptoassets. 417-426
WACCO: 2nd Workshop on Attackers and Cyber-Crime Operations
- Luca Allodi, Alice Hutchings, Fabio Massacci, Sergio Pastrana, Marie Vasek:
WACCO 2020: the 2nd Workshop on Attackers and Cybercrime Operations Co-held with IEEE European Symposium on Security and Privacy 2020. 427 - Kieron Ivy Turk, Sergio Pastrana, Ben Collier:
A tight scrape: methodological approaches to cybercrime research data collection in adversarial environments. 428-437 - Fatima Zahrah, Jason R. C. Nurse, Michael Goldsmith:
#ISIS vs #ActionCountersTerrorism: A Computational Analysis of Extremist and Counter-extremist Twitter Narratives. 438-447 - Jonathan Lusthaus, Miranda Bruce, Nigel Phair:
Mapping the Geography of Cybercrime: A Review of Indices of Digital Offending by Country. 448-453 - Veronica Valeros, Sebastian García:
Growth and Commoditization of Remote Access Trojans. 454-462 - Pavlo Burda, Luca Allodi, Nicola Zannone:
Don't Forget the Human: a Crowdsourced Approach to Automate Response and Containment Against Spear Phishing Attacks. 471-476 - John McAlaney, Sarah Hambidge, Emily Kimpton, Helen Thackray:
Knowledge is power: An analysis of discussions on hacking forums. 477-483 - Ildiko Pete, Jack Hughes, Yi Ting Chua, Maria Bada:
A Social Network Analysis and Comparison of Six Dark Web Forums. 484-493 - Adrian Bermudez-Villalva, Mirco Musolesi, Gianluca Stringhini:
A Measurement Study on the Advertisements Displayed to Web Users Coming from the Regular Web and from Tor. 494-499 - Florian Hantke, Andreas Dewald:
How can data from fitness trackers be obtained and analyzed with a forensic approach? 500-508 - Duc-Ly Vu, Ivan Pashchenko, Fabio Massacci, Henrik Plate, Antonino Sabetta:
Typosquatting and Combosquatting Attacks on the Python Ecosystem. 509-514 - Giorgio Di Tizio, Chan Nam Ngo:
Are You a Favorite Target For Cryptojacking? A Case-Control Study On The Cryptojacking Ecosystem. 515-520
WTMC: Workshop on Traffic Measurements for Cybersecurity
- Maciej Korczynski, Wojciech Mazurczyk, Pedro Casas:
Preface on the 5th International Workshop on Traffic Measurements for Cybersecurity. 521 - Yuji Sakurai, Takuya Watanabe, Tetsuya Okuda, Mitsuaki Akiyama, Tatsuya Mori:
Discovering HTTPSified Phishing Websites Using the TLS Certificates Footprints. 522-531 - Wissem Soussi, Maciej Korczynski, Sourena Maroofi, Andrzej Duda:
Feasibility of Large-Scale Vulnerability Notifications after GDPR. 532-537 - Raffaele Sommese, Mattijs Jonker, Roland van Rijswijk-Deij, Alberto Dainotti, Kimberly C. Claffy, Anna Sperotto:
The Forgotten Side of DNS: Orphan and Abandoned Records. 538-543 - Olivier van der Toorn, Roland van Rijswijk-Deij, Tobias Fiebig, Martina Lindorfer, Anna Sperotto:
TXTing 101: Finding Security Issues in the Long Tail of DNS TXT Records. 544-549 - Giovane C. M. Moura, Cristian Hesselman, Gerald Schaapman, Nick Boerman, Octavia de Weerdt:
Into the DDoS maelstrom: a longitudinal study of a scrubbing service. 550-558 - Ramin Yazdani, Olivier van der Toorn, Anna Sperotto:
A Case of Identity: Detection of Suspicious IDN Homograph Domains Using Active DNS Measurements. 559-564 - Laetitia Leichtnam, Eric Totel, Nicolas Prigent, Ludovic Mé:
Forensic Analysis of Network Attacks: Restructuring Security Events as Graphs and Identifying Strongly Connected Sub-graphs. 565-573 - Pavol Mulinka, Kensuke Fukuda, Pedro Casas, Lukas Kencl:
WhatsThat? On the Usage of Hierarchical Clustering for Unsupervised Detection & Interpretation of Network Attacks. 574-583 - Stéphane Mocanu, Jean-Marc Thiriet:
Experimental study of performance and vulnerabilities of IEC 61850 process bus communications on HSR networks. 584-593 - Emeline Marechal, Benoit Donnet:
Network Fingerprinting: Routers under Attack. 594-599
SAD: Workshop on Software Attacks and Defenses
- Maria Teresa Rossi, Renan Greca, Ludovico Iovino, Giorgio Giacinto, Antonia Bertolino:
Defensive Programming for Smart Home Cybersecurity. 600-605 - Bert Abrath, Bart Coppens, Ilja Nevolin, Bjorn De Sutter:
Resilient Self-Debugging Software Protection. 606-615 - Pierre Graux, Jean-François Lalande, Pierre Wilke, Valérie Viet Triem Tong:
Abusing Android Runtime for Application Obfuscation. 616-624 - Michele Pasetto, Niccolò Marastoni, Mila Dalla Preda:
Revealing Similarities in Android Malware by Dissecting their Methods. 625-634 - Weiyun Lu, Bahman Sistany, Amy P. Felty, Philip J. Scott:
Towards Formal Verification of Program Obfuscation. 635-644
SecWeb: SecWeb 2020
- Stefano Calzavara, Ben Stock:
SecWeb 2020 Preface. 645 - Vincent Drury, Ulrike Meyer:
No Phishing With the Wrong Bait: Reducing the Phishing Risk by Address Separation. 646-652 - Christoph Kerschbaumer, Tom Ritter, Frederik Braun:
Hardening Firefox against Injection Attacks. 653-663 - Wanpeng Li, Chris J. Mitchell:
User Access Privacy in OAuth 2.0 and OpenID Connect. 664-672 - Artur Janc, Mike West:
Oh, the Places You'll Go! Finding Our Way Back from the Web Platform's Ill-conceived Jaunts. 673-680
SILM: SILM Workshop on Security of Software/Hardware Interfaces
- Guillaume Hiet, Frédéric Tronel, Jean-Louis Lanet:
Preface of the 2nd Workshop on the Security of Software/Hardware Interfaces (SILM 2020). 681 - Aditya Rohan, Biswabandan Panda, Prakhar Agarwal:
Reverse Engineering the Stream Prefetcher for Profit. 682-687 - Michael Dodson, Alastair R. Beresford, Alexander Richardson, Jessica Clarke, Robert N. M. Watson:
CHERI Macaroons: Efficient, host-based access control for cyber-physical systems. 688-693 - Pierre-Yves Péneau, Ludovic Claudepierre, Damien Hardy, Erven Rohou:
NOP-Oriented Programming: Should we Care? 694-703 - Yuxiao Mao, Vincent Migliore, Vincent Nicomette:
REHAD: Using Low-Frequency Reconfigurable Hardware for Cache Side-Channel Attacks Detection. 704-709 - Moritz Lipp, Michael Schwarz, Lukas Raab, Lukas Lamster, Misiker Tadesse Aga, Clémentine Maurice, Daniel Gruss:
Nethammer: Inducing Rowhammer Faults through Network Requests. 710-719
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.