


default search action
EuroS&P 2020: Genoa, Italy - Workshops
- IEEE European Symposium on Security and Privacy Workshops, EuroS&P Workshops 2020, Genoa, Italy, September 7-11, 2020. IEEE 2020, ISBN 978-1-7281-8597-2

CACOE: Cyberange Technologies Workshop
- Maria Leitner, Teodor Sommestad:

International Workshop on Cyber Range Technologies and Applications (CACOE 2020). 1 - Zhenguo Hu, Razvan Beuran, Yasuo Tan:

Automated Penetration Testing Using Deep Reinforcement Learning. 2-10 - Mika Karjalainen, Tero Kokkonen:

Comprehensive Cyber Arena; The Next Generation Cyber Range. 11-16 - Patrik Lif, Stefan Varga, Mikael Wedlin, David Lindahl, Mats Persson:

Evaluation of Information Elements in a Cyber Incident Report. 17-26 - Kaie Maennel

:
Learning Analytics Perspective: Evidencing Learning from Digital Datasets in Cybersecurity Exercises. 27-36 - Jonas Almroth

, Tommy Gustafsson:
CRATE Exercise Control - A cyber defense exercise management and support tool. 37-45 - Alefiya Hussain, David DeAngelis, Erik Kline, Stephen Schwab:

Replicated Testbed Experiments for the Evaluation of a Wide-range of DDoS Defenses. 46-55 - Giorgio Di Tizio

, Fabio Massacci
, Luca Allodi, Stanislav Dashevskyi, Jelena Mirkovic:
An Experimental Approach for Estimating Cyber Risk: a Proposal Building upon Cyber Ranges and Capture the Flags. 56-65
CyberCert: Cybersecurity Certification
- Philippe Massonet:

First International Workshop on lightweight and Incremental Cybersecurity Certification. 66 - Tobias Fiebig

:
How to stop crashing more than twice: A Clean-Slate Governance Approach to IT Security. 67-74 - Christophe Ponsard, Philippe Massonet

, Jeremy Grandclaudon, Nicolas Point:
From Lightweight Cybersecurity Assessment to SME Certification Scheme in Belgium. 75-78 - Andrea Morgagni, Philippe Massonet, Sébastien Dupont, Jeremy Grandclaudon:

Towards Incremental Safety and Security Requirements Co-Certification. 79-84 - Volkmar Lotz:

Cybersecurity Certification for Agile and Dynamic Software Systems - a Process-Based Approach. 85-88 - Vasilios Mavroudis

, Petr Svenda:
JCMathLib: Wrapper Cryptographic Library for Transparent and Certifiable JavaCard Applets. 89-96
EuroUSEC: European Workshop on Usable Security
- Maryam Mehrnezhad

:
A Cross-Platform Evaluation of Privacy Notices and Tracking Practices. 97-106 - Nils Quermann, Martin Degeling

:
Data Sharing in Mobile Apps - User Privacy Expectations in Europe. 107-119 - Fatemeh Alizadeh, Timo Jakobi, Alexander Boden, Gunnar Stevens, Jens Boldt:

GDPR Reality Check - Claiming and Investigating Personally Identifiable Data from Companies. 120-129 - Mattia Mossano

, Kami Vaniea
, Lukas Aldag, Reyhan Düzgün, Peter Mayer
, Melanie Volkamer:
Analysis of publicly available anti-phishing webpages: contradicting information, lack of concrete advice and very narrow attack vector. 130-139 - James Nicholson, Yousra Javed, Matt Dixon, Lynne M. Coventry

, Opeyemi Dele-Ajayi
, Philip Anderson:
Investigating Teenagers' Ability to Detect Phishing Messages. 140-149 - Elham Al Qahtani, Yousra Javed, Heather Lipford, Mohamed Shehab

:
Do Women in Conservative Societies (Not) Follow Smartphone Security Advice? A Case Study of Saudi Arabia and Pakistan. 150-159 - Claudia Bischoff, Eva Gerlitz, Matthew Smith

:
Vision: I don't want to use my Phone! A Cognitive Walkthrough for YubiKeys. 160-165 - Aidah Ichario, Manuel Maarek

:
Vision: Investigating Web API Developer Experience in Relation to Terms of Service and Privacy Policies. 166-171 - Jan Tolsdorf

, Luigi Lo Iacono:
Vision: Shred If Insecure - Persuasive Message Design as a Lesson and Alternative to Previous Approaches to Usable Secure Email Interfaces. 172-177 - Chan Nam Ngo, Daniele Friolo

, Fabio Massacci
, Daniele Venturi, Ettore Battaiola:
Vision: What If They All Die? Crypto Requirements For Key People. 178-183 - Joseph Shams, Nalin A. G. Arachchilage, Jose M. Such

:
Vision: Why Johnny Can't Configure Smart Home? A Behavioural Framework for Smart Home Privacy Configuration. 184-189 - Magdalene Ng, Kovila P. L. Coopamootoo, Ehsan Toreini, Mhairi Aitken, Karen Elliott

, Aad van Moorsel:
Simulating the Effects of Social Presence on Trust, Privacy Concerns & Usage Intentions in Automated Bots for Finance. 190-199 - Karoline Busse, Mohammad Tahaei

, Katharina Krombholz, Emanuel von Zezschwitz, Matthew Smith, Jing Tian, Wenyuan Xu:
Cash, Cards or Cryptocurrencies? A Study of Payment Culture in Four Countries. 200-209 - Wei Bai, Michael Pearson, Patrick Gage Kelley, Michelle L. Mazurek:

Improving Non-Experts' Understanding of End-to-End Encryption: An Exploratory Study. 210-219 - Verena Distler

, Carine Lallemand
, Vincent Koenig:
Making Encryption Feel Secure: Investigating how Descriptions of Encryption Impact Perceived Security. 220-229 - Simon Anell

, Lea Gröber, Katharina Krombholz:
End User and Expert Perceptions of Threats and Potential Countermeasures. 230-239 - Anjuli R. K. Shere, Jason R. C. Nurse, Ivan Flechais:

"Security should be there by default": Investigating how journalists perceive and respond to risks from the Internet of Things. 240-249 - Huixin Tian, Chris Kanich, Jason Polakis, Sameer Patil

:
Tech Pains: Characterizations of Lived Cybersecurity Experiences. 250-259
HotSpot: Hot Topics in the Principles of Security and Trust
- Joshua D. Guttman

, Sebastian Mödersheim
:
HotSpot: Hot Issues in Security Principles and Trust 2020. 260 - Arthur Américo, Pasquale Malacaria:

QQIF: Quantum Quantitative Information Flow (invited paper). 261-270 - Frank Piessens:

Security across abstraction layers: old and new examples. 271-279 - Andrew Cook, Luca Viganò:

A Game Of Drones: Extending the Dolev-Yao Attacker Model With Movement. 280-292 - Luca Viganò, Daniele Magazzeni:

Explainable Security. 293-300
IWPE: 6th International Workshop on Privacy Engineering
- José M. del Álamo, Jose M. Such

, Isabel Wagner
, Kopo Marvin Ramokapane:
Preface on the International Workshop on Privacy Engineering 2020 (IWPE'20). 301 - Kim Wuyts

, Laurens Sion
, Wouter Joosen:
LINDDUN GO: A Lightweight Approach to Privacy Threat Modeling. 302-309 - Lukasz Olejnik:

Shedding light on web privacy impact assessment: A case study of the Ambient Light Sensor API. 310-313 - Laurens Sion

, Dimitri Van Landuyt
, Wouter Joosen:
The Never-Ending Story: On the Need for Continuous Privacy Impact Assessment. 314-317 - Kalle Hjerppe

, Jukka Ruohonen
, Ville Leppänen
:
Extracting Layered Privacy Language Purposes from Web Services. 318-325 - Imane Fouad, Cristiana Santos, Feras Al Kassar, Nataliia Bielova

, Stefano Calzavara
:
On Compliance of Cookie Purposes with the Purpose Specification Principle. 326-333 - Giuseppe Garofalo

, Tim Van hamme, Davy Preuveneers, Wouter Joosen:
A Siamese Adversarial Anonymizer for Data Minimization in Biometric Applications. 334-343 - Aidmar Wainakh, Alejandro Sánchez Guinea, Tim Grube, Max Mühlhäuser:

Enhancing Privacy via Hierarchical Federated Learning. 344-347 - Franklin Leukam Lako, Paul Lajoie-Mazenc, Maryline Laurent

:
Reconciling Privacy and Utility for Energy Services - an Application to Demand Response Protocols. 348-355
S&B: Security & Privacy on the Blockchain
- Tim Ruffing, Florian Tschorsch:

IEEE S&B 2020: 4th IEEE Workshop on Security and Privacy on the Blockchain. 356 - Simon Janin, Kaihua Qin

, Akaki Mamageishvili, Arthur Gervais:
FileBounty: Fair Data Exchange. 357-366 - Suyash Bagad

, Saravanan Vijayakumaran:
Performance Trade-offs in Design of MimbleWimble Proofs of Reserves. 367-377 - Martin Westerkamp, Jacob Eberhardt:

zkRelay: Facilitating Sidechains using zkSNARK-based Chain-Relays. 378-386 - Sergei Tikhomirov, Pedro Moreno-Sanchez

, Matteo Maffei:
A Quantitative Analysis of Security, Anonymity and Scalability for the Lightning Network. 387-396 - Alex Manuskin, Michael Mirkin, Ittay Eyal:

Ostraka: Secure Blockchain Scaling by Node Sharding. 397-406 - Emad Badawi

, Guy-Vincent Jourdan, Gregor von Bochmann, Iosif-Viorel Onut:
An Automatic Detection and Analysis of the Bitcoin Generator Scam. 407-416 - István András Seres, Omer Shlomovits, Pratyush Ranjan Tiwari:

CryptoWills: How to Bequeath Cryptoassets. 417-426
WACCO: 2nd Workshop on Attackers and Cyber-Crime Operations
- Luca Allodi, Alice Hutchings, Fabio Massacci, Sergio Pastrana, Marie Vasek

:
WACCO 2020: the 2nd Workshop on Attackers and Cybercrime Operations Co-held with IEEE European Symposium on Security and Privacy 2020. 427 - Kieron Ivy Turk

, Sergio Pastrana
, Ben Collier
:
A tight scrape: methodological approaches to cybercrime research data collection in adversarial environments. 428-437 - Fatima Zahrah

, Jason R. C. Nurse, Michael Goldsmith:
#ISIS vs #ActionCountersTerrorism: A Computational Analysis of Extremist and Counter-extremist Twitter Narratives. 438-447 - Jonathan Lusthaus, Miranda Bruce

, Nigel Phair:
Mapping the Geography of Cybercrime: A Review of Indices of Digital Offending by Country. 448-453 - Veronica Valeros

, Sebastián García
:
Growth and Commoditization of Remote Access Trojans. 454-462 - Pavlo Burda

, Luca Allodi, Nicola Zannone
:
Don't Forget the Human: a Crowdsourced Approach to Automate Response and Containment Against Spear Phishing Attacks. 471-476 - John McAlaney, Sarah Hambidge, Emily Kimpton, Helen Thackray:

Knowledge is power: An analysis of discussions on hacking forums. 477-483 - Ildiko Pete, Jack Hughes, Yi Ting Chua, Maria Bada:

A Social Network Analysis and Comparison of Six Dark Web Forums. 484-493 - Adrian Bermudez-Villalva, Mirco Musolesi, Gianluca Stringhini:

A Measurement Study on the Advertisements Displayed to Web Users Coming from the Regular Web and from Tor. 494-499 - Florian Hantke, Andreas Dewald:

How can data from fitness trackers be obtained and analyzed with a forensic approach? 500-508 - Duc-Ly Vu

, Ivan Pashchenko
, Fabio Massacci
, Henrik Plate, Antonino Sabetta:
Typosquatting and Combosquatting Attacks on the Python Ecosystem. 509-514 - Giorgio Di Tizio

, Chan Nam Ngo:
Are You a Favorite Target For Cryptojacking? A Case-Control Study On The Cryptojacking Ecosystem. 515-520
WTMC: Workshop on Traffic Measurements for Cybersecurity
- Maciej Korczynski, Wojciech Mazurczyk, Pedro Casas:

Preface on the 5th International Workshop on Traffic Measurements for Cybersecurity. 521 - Yuji Sakurai, Takuya Watanabe, Tetsuya Okuda, Mitsuaki Akiyama, Tatsuya Mori

:
Discovering HTTPSified Phishing Websites Using the TLS Certificates Footprints. 522-531 - Wissem Soussi

, Maciej Korczynski, Sourena Maroofi
, Andrzej Duda
:
Feasibility of Large-Scale Vulnerability Notifications after GDPR. 532-537 - Raffaele Sommese

, Mattijs Jonker, Roland van Rijswijk-Deij
, Alberto Dainotti
, Kimberly C. Claffy
, Anna Sperotto:
The Forgotten Side of DNS: Orphan and Abandoned Records. 538-543 - Olivier van der Toorn, Roland van Rijswijk-Deij

, Tobias Fiebig
, Martina Lindorfer, Anna Sperotto:
TXTing 101: Finding Security Issues in the Long Tail of DNS TXT Records. 544-549 - Giovane C. M. Moura, Cristian Hesselman, Gerald Schaapman, Nick Boerman, Octavia de Weerdt:

Into the DDoS maelstrom: a longitudinal study of a scrubbing service. 550-558 - Ramin Yazdani

, Olivier van der Toorn, Anna Sperotto:
A Case of Identity: Detection of Suspicious IDN Homograph Domains Using Active DNS Measurements. 559-564 - Laetitia Leichtnam, Eric Totel, Nicolas Prigent, Ludovic Mé:

Forensic Analysis of Network Attacks: Restructuring Security Events as Graphs and Identifying Strongly Connected Sub-graphs. 565-573 - Pavol Mulinka

, Kensuke Fukuda, Pedro Casas
, Lukas Kencl
:
WhatsThat? On the Usage of Hierarchical Clustering for Unsupervised Detection & Interpretation of Network Attacks. 574-583 - Stéphane Mocanu

, Jean-Marc Thiriet
:
Experimental study of performance and vulnerabilities of IEC 61850 process bus communications on HSR networks. 584-593 - Emeline Marechal, Benoit Donnet:

Network Fingerprinting: Routers under Attack. 594-599
SAD: Workshop on Software Attacks and Defenses
- Maria Teresa Rossi

, Renan Greca
, Ludovico Iovino
, Giorgio Giacinto, Antonia Bertolino:
Defensive Programming for Smart Home Cybersecurity. 600-605 - Bert Abrath, Bart Coppens, Ilja Nevolin, Bjorn De Sutter:

Resilient Self-Debugging Software Protection. 606-615 - Pierre Graux

, Jean-François Lalande, Pierre Wilke, Valérie Viet Triem Tong:
Abusing Android Runtime for Application Obfuscation. 616-624 - Michele Pasetto, Niccolò Marastoni, Mila Dalla Preda:

Revealing Similarities in Android Malware by Dissecting their Methods. 625-634 - Weiyun Lu, Bahman Sistany, Amy P. Felty, Philip J. Scott:

Towards Formal Verification of Program Obfuscation. 635-644
SecWeb: SecWeb 2020
- Stefano Calzavara

, Ben Stock:
SecWeb 2020 Preface. 645 - Vincent Drury, Ulrike Meyer:

No Phishing With the Wrong Bait: Reducing the Phishing Risk by Address Separation. 646-652 - Christoph Kerschbaumer, Tom Ritter, Frederik Braun:

Hardening Firefox against Injection Attacks. 653-663 - Wanpeng Li

, Chris J. Mitchell:
User Access Privacy in OAuth 2.0 and OpenID Connect. 664-672 - Artur Janc, Mike West:

Oh, the Places You'll Go! Finding Our Way Back from the Web Platform's Ill-conceived Jaunts. 673-680
SILM: SILM Workshop on Security of Software/Hardware Interfaces
- Guillaume Hiet, Frédéric Tronel

, Jean-Louis Lanet:
Preface of the 2nd Workshop on the Security of Software/Hardware Interfaces (SILM 2020). 681 - Aditya Rohan, Biswabandan Panda

, Prakhar Agarwal:
Reverse Engineering the Stream Prefetcher for Profit. 682-687 - Michael Dodson, Alastair R. Beresford, Alexander Richardson, Jessica Clarke, Robert N. M. Watson:

CHERI Macaroons: Efficient, host-based access control for cyber-physical systems. 688-693 - Pierre-Yves Péneau, Ludovic Claudepierre, Damien Hardy, Erven Rohou

:
NOP-Oriented Programming: Should we Care? 694-703 - Yuxiao Mao, Vincent Migliore, Vincent Nicomette:

REHAD: Using Low-Frequency Reconfigurable Hardware for Cache Side-Channel Attacks Detection. 704-709 - Moritz Lipp, Michael Schwarz, Lukas Raab, Lukas Lamster

, Misiker Tadesse Aga, Clémentine Maurice, Daniel Gruss
:
Nethammer: Inducing Rowhammer Faults through Network Requests. 710-719

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














