


default search action
EuroS&P 2023: Delft, Netherlands - Workshops
- IEEE European Symposium on Security and Privacy, EuroS&P 2023 - Workshops, Delft, Netherlands, July 3-7, 2023. IEEE 2023, ISBN 979-8-3503-2720-5

- Mario Raciti

, Giampaolo Bella:
A Threat Model for Soft Privacy on Smart Cars. 1-10 - Konstantinos Kalogiannis, Andreas Henriksson, Panos Papadimitratos

:
Vulnerability Analysis of Vehicular Coordinated Maneuvers. 11-20 - Giacomo Benedetti

, Luca Verderame, Alessio Merlo:
A Preliminary Study of Privilege Life Cycle in Software Management Platform Automation Workflows. 21-28 - Yuejun Guo, Seifeddine Bettaieb

:
An Investigation of Quality Issues in Vulnerability Detection Datasets. 29-33 - Wesley de Kraker, Harald Vranken

, Arjen Hommersom
:
GLICE: Combining Graph Neural Networks and Program Slicing to Improve Software Vulnerability Detection. 34-41 - Weiheng Bai, Kefu Wu, Qiushi Wu, Kangjie Lu:

Guiding Directed Fuzzing with Feasibility. 42-49 - Javier Martínez Llamas

, Davy Preuveneers, Wouter Joosen:
Effective Machine Learning-based Access Control Administration through Unlearning. 50-57 - Carmelo Aparo, Cinzia Bernardeschi, Giuseppe Lettieri

, Fabio Lucattini, Salvatore Montanarella:
An Analysis System to Test Security of Software on Continuous Integration-Continuous Delivery Pipeline. 58-67 - Nikolaos Lykousas, Constantinos Patsakis:

Tales from the Git: Automating the detection of secrets on code and assessing developers' passwords choices. 68-75 - Michael Gebauer, Faraz Maschhur, Nicola Leschke

, Elias Grünewald, Frank Pallas:
A 'Human-in-the-Loop' approach for Information Extraction from Privacy Policies under Data Scarcity. 76-83 - Leonie Reichert, Björn Scheuermann:

An Analysis of Requirements and Privacy Threats in Mobile Data Donations. 84-93 - Akshath Jain, David Rodríguez Torrado

, José M. del Álamo, Norman M. Sadeh:
ATLAS: Automatically Detecting Discrepancies Between Privacy Policies and Privacy Labels. 94-107 - Victor Morel, Simone Fischer-Hübner:

Automating privacy decisions -where to draw the line? 108-116 - Tanmay Ghai, Yixiang Yao, Srivatsan Ravi

:
Lessons Learned: Building a Privacy-Preserving Entity Resolution Adaptation of PPJoin using End-to-End Homomorphic Encryption. 117-124 - Immanuel Kunz, Shuqian Xu:

Privacy as an Architectural Quality: A Definition and an Architectural View. 125-132 - Enzo Marquet

, Jerico Moeyersons
, Erik Pohle
, Michiel Van Kenhove
, Aysajan Abidin
, Bruno Volckaert
:
Secure Key Management for Multi-Party Computation in MOZAIK. 133-140 - Thomas Reisinger, Isabel Wagner

, Eerke A. Boiten:
Unified Communication: What do Digital Activists need? 141-149 - David Rodríguez Torrado

, Akshath Jain, José M. del Álamo, Norman Sadeh:
Comparing Privacy Label Disclosures of Apps Published in both the App Store and Google Play Stores. 150-157 - Gilberto Atondo Siu

, Alice Hutchings:
"Get a higher return on your savings!": Comparing adverts for cryptocurrency investment scams across platforms. 158-169 - Dalyapraz Manatova, L. Jean Camp, Julia R. Fox, Sandra Kübler

, Maria A. Shardakova, Inna Kouper:
An Argument for Linguistic Expertise in Cyberthreat Analysis: LOLSec in Russian Language eCrime Landscape. 170-176 - Lena Yuryna Connolly, Hervé Borrion, Budi Arief

, Sanaa Kaddoura:
Applying Neutralisation Theory to Better Understand Ransomware Offenders. 177-182 - Jack Hughes, Alice Hutchings:

Digital Drift and the Evolution of a Large Cybercrime Forum. 183-193 - Jay Jacobs, Sasha Romanosky, Octavian Suciuo, Benjamin Edwards, Armin Sarabi:

Enhancing Vulnerability Prioritization: Data-Driven Exploit Predictions with Community-Driven Insights. 194-206 - Andrew Morin

, Tyler Moore
:
How Cryptocurrency Exchange Interruptions Create Arbitrage Opportunities. 207-215 - Sasha Romanosky, Peter Schirmer:

Mapping the Cyberstalking Landscape: An Empirical Analysis of Federal U.S Crimes. 216-226 - Abulfaz Hajizada, Tyler Moore

:
On Gaps in Enterprise Cyber Attack Reporting. 227-231 - Pavlo Burda, Abdul Malek Altawekji, Luca Allodi, Nicola Zannone

:
The Peculiar Case of Tailored Phishing against SMEs: Detection and Collective DefenseMechanisms at a Small IT Company. 232-243 - James Burroughs, Michal Tereszkowski-Kaminski, Guillermo Suarez-Tangil:

Visualizing Cyber-Threats in Underground Forums. 244-258 - Nikolaos Foivos Polychronou, Pierre-Henri Thevenon, Maxime Puys

, Vincent Beroulle:
A Hybrid Solution for Constrained Devices to Detect Microarchitectural Attacks. 259-269 - Joshua Harrison, Ehsan Toreini, Maryam Mehrnezhad

:
A Practical Deep Learning-Based Acoustic Side Channel Attack on Keyboards. 270-280 - Anis Fellah-Touta, Lilian Bossuet, Carlos Andres Lara-Nino

:
Combined Internal Attacks on SoC-FPGAs: Breaking AES with Remote Power Analysis and Frequency-based Covert Channels. 281-286 - Lilian Bossuet, Vincent Grosso, Carlos Andres Lara-Nino

:
Emulating Side Channel Attacks on gem5: lessons learned. 287-295 - Fatih Durmaz, Nureddin Kamadan, Melih Taha Öz, Musa Sadik Unal, Arsalan Javeed, Cemal Yilmaz, Erkay Savas:

TimeInspector: A Static Analysis Approach for Detecting Timing Attacks. 296-303 - Nicolas Gaudin, Jean-Loup Hatchikian-Houdot, Frédéric Besson, Pascal Cotret, Guy Gogniat, Guillaume Hiet, Vianney Lapotre, Pierre Wilke:

Work in Progress: Thwarting Timing Attacks in Microcontrollers using Fine-grained Hardware Protections. 304-310 - Vincent Giraud, Guillaume Bouffard:

Faulting original McEliece's implementations is possible How to mitigate this risk? 311-319 - Feras Shahbi

, Joseph Gardiner
, Sridhar Adepu, Awais Rashid
:
A Digital Forensic Taxonomy For Programmable Logic Controller Data Artefacts. 320-328 - Teri Lenard

, Anastasija Collen
, Niels A. Nijdam, Béla Genge:
A Key to Embedded System Security: Locking and Unlocking Secrets with a Trusted Platform Module. 329-335 - Yunhe Yang, Mu Zhang

:
From Tactics to Techniques: A Systematic Attack Modeling for Advanced Persistent Threats in Industrial Control Systems. 336-344 - Anne Borcherding

, Mark Giraud, Ian Fitzgerald, Jürgen Beyerer:
The Bandit's States: Modeling State Selection for Stateful Network Fuzzing as Multi-armed Bandit Problem. 345-350 - Samin Yasar Chowdhury

, Brandon Dudley, Ruimin Sun
:
The Case for Virtual PLC-enabled Honeypot Design. 351-357 - Richard Derbyshire, Sam Maesschalck

, Alexander Staves, Benjamin Green, David Hutchison:
To me, to you: Towards Secure PLC Programming through a Community-Driven Open-Source Initiative. 358-362 - Xu Zheng, Tianchun Wang, Samin Yasar Chowdhury

, Ruimin Sun
, Dongsheng Luo:
Unsafe Behavior Detection with Adaptive Contrastive Learning in Industrial Control Systems. 363-369 - Mohammed Asiri

, Neetesh Saxena
, Pete Burnap:
ARCSG: Advancing Resilience of Cyber-Physical Smart Grid: An Integrated Co-Simulation Approach Incorporating Indicators of Compromise. 370-378 - Jens Pottebaum, Jost Rossel, Juraj Somorovsky, Yasemin Acar, René Fahr

, Patricia Arias Cabarcos, Eric Bodden, Iris Gräßler:
Re-Envisioning Industrial Control Systems Security by Considering Human Factors as a Core Element of Defense-in-Depth. 379-385 - Hendrik Meyer zum Felde, Jean-Luc Reding

, Michael Lux:
D-GATE: Decentralized Geolocation and Time Enforcement for Usage Control. 386-395 - Javier Rodriguez-Viñas, Ines Ortega-Fernandez, Eva Sotos Martínez:

Hexanonymity: a scalable geo-positioned data clustering algorithm for anonymisation purposes. 396-404 - Toon Dehaene

, Michiel Willocx
, Bert Lagaisse
, Vincent Naessens:
Masking Location Streams in the Presence of Colluding Service Providers. 405-414 - Daniel Gibert

, Jordi Planes
, Quan Le
, Giulio Zizzo:
A Wolf in Sheep's Clothing: Query-Free Evasion Attacks Against Machine Learning-Based Malware Detectors with Generative Adversarial Networks. 415-426 - Benjamin Reichenwallner, Peter Meerwald-Stadler:

Simplification of General Mixed Boolean-Arithmetic Expressions: GAMBA. 427-438 - Francesco Zola

, Jan Lukas Bruse, Mikel Galar:
Temporal Analysis of Distribution Shifts in Malware Classification for Digital Forensics. 439-450 - Megha Sharma, Kuldeep Singh, Palvi Aggarwal, Varun Dutt:

How well does GPT phish people? An investigation involving cognitive biases and feedback. 451-457 - Tyler Malloy, Cleotilde Gonzalez:

Learning to Defend by Attacking (and Vice-Versa): Transfer of Learning in Cybersecurity Games. 458-464 - Daniel Reti, Tillmann Angeli, Hans D. Schotten:

Honey Infiltrator: Injecting Honeytoken Using Netfilter. 465-469 - Johannes Zirngibl, Patrick Sattler, Georg Carle:

A First Look at SVCB and HTTPS DNS Resource Records in the Wild. 470-474 - Blake Anderson, David A. McGrew:

Assessing and Exploiting Domain Name Misinformation. 475-486 - Muhammad Yasir Muzayan Haq

, Abhishta Abhishta
, Raffaele Sommese, Mattijs Jonker, Lambert J. M. Nieuwenhuis:
Assessing Network Operator Actions to Enhance Digital Sovereignty and Strengthen Network Resilience: A Longitudinal Analysis during the Russia-Ukraine Conflict. 487-494 - Marcel Urpí-Bricollé, Ismael Castell-Uroz

, Pere Barlet-Ros:
Detecting and Analyzing Mouse Tracking in the Wild. 495-500 - Elisa Chiapponi

, Marc Dacier
, Olivier Thonnard:
Inside Residential IP Proxies: Lessons Learned from Large Measurement Campaigns. 501-512 - Rodolfo V. Valentim, Idilio Drago, Marco Mellia

, Federico Cerutti:
Lost in Translation: AI-based Generator of Cross-Language Sound-squatting. 513-520 - Pieter Philippaerts

, Davy Preuveneers, Wouter Joosen:
Revisiting OAuth 2.0 Compliance: A Two-Year Follow-Up Study. 521-525 - Dimitri Mankowski, Thom Wiggers

, Veelasha Moonsamy:
TLS → Post-Quantum TLS: Inspecting the TLS landscape for PQC adoption on Android. 526-538 - Siôn Lloyd, Carlos Hernandez Gañán, Samaneh Tajalizadehkhoob:

Towards more rigorous domain-based metrics: quantifying the prevalence and implications of "Active" Domains. 539-545 - Yevheniya Nosyk, Olivier Hureau, Simon Fernandez

, Andrzej Duda
, Maciej Korczynski:
Unveiling the Weak Links: Exploring DNS Infrastructure Vulnerabilities and Fortifying Defenses. 546-557 - Gastón García González

, Pedro Casas
, Alicia Fernández:
Fake it till you Detect it: Continual Anomaly Detection in Multivariate Time-Series using Generative AI. 558-566 - M. Patrick Collins, Alefiya Hussain, Stephen Schwab:

Identifying and Differentiating Acknowledged Scanners in Network Traffic. 567-574 - Ahmet Erinola, Annalina Buckmann, Jennifer Friedauer

, Asli Yardim
, M. Angela Sasse
:
"As Usual, I Needed Assistance of a Seeing Person": Experiences and Challenges of People with Disabilities and Authentication Methods. 575-593 - Wei Hu, Diogo Barradas:

Work in Progress: A Glance at Social Media Self-Censorship in North America. 609-618 - Natalie Leesakul

, Charles Morisset:
Position Paper: The role of law in achieving privacy and security measures in smart buildings from the GDPR context. 619-626 - Francesco Ferazza

, Cosimo Melella, Konstantinos Mersinas, Antonio Calcara
:
Divided We Hack: Exploring the Degree of Sino-Russian Coordination in Cyberspace During the Ukraine War. 627-640 - Naoom Abu Abah, Nick Taylor, Charles Morisset, Maryam Mehrnezhad

:
U-Sense: Feasibility Study of "Human as a Sensor" in Incident Reporting Systems in a Smart Campus. 641-652 - Patrick Wake

, Sue Black, Jonathan Young
:
Work in Progress: Evaluation of Security Standards through a Cyber Range using Hackers' Tactics, Techniques and Procedures. 653-658 - Magdalene Ng

, Maria Bada, Kovila P. L. Coopamootoo:
What We Do in the Shadows: How does Experiencing Cybercrime Affect Response Actions & Protective Practices? 659-672

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.



Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID







last updated on 2026-05-18 23:24 CEST by the 







