


default search action
EuroS&P 2021: Vienna, Austria - Workshops
- IEEE European Symposium on Security and Privacy Workshops, EuroS&P 2021, Vienna, Austria, September 6-10, 2021. IEEE 2021, ISBN 978-1-6654-1012-0

- Matthias Beckerle, Argyro Chatzopoulou, Simone Fischer-Hübner:

Towards Cybersecurity MOOC Certification. 1-11 - Sébastien Dupont, Guillaume Ginis, Mirko Malacario, Claudio Porretti, Nicolò Maunero

, Christophe Ponsard, Philippe Massonet:
Incremental Common Criteria Certification Processes using DevSecOps Practices. 12-23 - Sebastian Lekies, Damien Engels, Metodi Mitkov:

JSONPS: Secure an inherently insecure practice with this one weird trick! 24-31 - Alexander Sjösten

, Daniel Hedin, Andrei Sabelfeld:
EssentialFP: Exposing the Essence of Browser Fingerprinting. 32-48 - Luca Compagna, Hugo Jonker, Johannes Krochewski, Benjamin Krumnow, Merve Sahin:

A preliminary study on the adoption and effectiveness of SameSite cookies as a CSRF defence. 49-59 - Pei Wang, Bjarki Ágúst Guðmundsson, Krzysztof Kotowicz:

Adopting Trusted Types in ProductionWeb Frameworks to Prevent DOM-Based Cross-Site Scripting: A Case Study. 60-73 - Shuhei Enomoto, Hiroki Kuzuno:

FlushBlocker: Lightweight mitigating mechanism for CPU cache flush instruction based attacks. 74-79 - Thijs Vercammen

, Thomas Van Strydonck, Dominique Devriese
:
Borrowed Capabilities: Flexibly Enforcing Revocation on a Capability Architecture. 80-85 - Camille Le Bon, Erven Rohou, Frédéric Tronel

, Guillaume Hiet:
DAMAS: Control-Data Isolation at Runtime through Dynamic Binary Modification. 86-95 - Quentin Forcioli

, Jean-Luc Danger, Clémentine Maurice, Lilian Bossuet, Florent Bruguier, Maria Mushtaq, David Novo, Loïc France, Pascal Benoit, Sylvain Guilley, Thomas Perianin:
Virtual Platform to Analyze the Security of a System on Chip at Microarchitectural Level. 96-102 - Jukka Soikkeli, Cora Lisa Perner, Emil C. Lupu:

Analyzing the Viability of UAV Missions Facing Cyber Attacks. 103-112 - Nils Mäurer, Thomas Gräupl, Christoph Gentsch, Tobias Guggemos, Marcel Tiepelt

, Corinna Schmitt, Gabi Dreo Rodosek:
A Secure Cell-Attachment Procedure of LDACS. 113-122 - Stefan Marksteiner

, Slava Bronfman, Markus Wolf, Eddie Lazebnik:
Using Cyber Digital Twins for Automated Automotive Cybersecurity Testing. 123-128 - Stefan Marksteiner

, Peter Priller
:
A Model-Driven Methodology for Automotive Cybersecurity Test Case Generation. 129-135 - Giampaolo Bella, Pietro Biondi

, Marco De Vincenzi
, Giuseppe Tudisco
:
Privacy and modern cars through a dual lens. 136-143 - Lonie Sebagh, Jonathan Lusthaus, Edoardo Gallo, Federico Varese, Sean Sirur:

Exploring Cybercrime Disruption through Laboratory Experiments. 144-148 - Pavlo Burda

, Luca Allodi, Nicola Zannone
:
Dissecting Social Engineering Attacks Through the Lenses of Cognition. 149-160 - Maria Grazia Porcedda

, David S. Wall
:
Modelling the Cybercrime Cascade Effect in Data Crime. 161-177 - Yoram J. Meijaard, Peter-Paul Meiler, Luca Allodi:

Modelling Disruptive APTs targeting Critical Infrastructure using Military Theory. 178-190 - Gilberto Atondo Siu, Ben Collier

, Alice Hutchings:
Follow the money: The relationship between currency exchange and illicit behaviour in an underground forum. 191-201 - Tim M. Booij, Thijmen Verburgh, Federico Falconieri, Rolf van Wegberg:

Get Rich or Keep Tryin' Trajectories in dark net market vendor careers. 202-212 - Vít Sembera, Masarah Paquet-Clouston, Sebastián García

, María José Erquiaga:
Cybercrime Specialization: An Exposé of a Malicious Android Obfuscation-as-a-Service. 213-226 - Ziauddin Ursani, Claudia Peersman, Matthew Edwards

, Chao Chen, Awais Rashid
:
The Impact of Adverse Events in Darknet Markets: an Anomaly Detection Approach. 227-238 - Andrew Roberts

, Olaf Maennel, Nikita Snetkov
:
Cybersecurity Test Range for Autonomous Vehicle Shuttles. 239-248 - Shao-Fang Wen, Muhammad Mudassar Yamin, Basel Katt:

Ontology-Based Scenario Modeling for Cyber Security Exercise. 249-258 - Sten Mäses, Kaie Maennel

, Mascia Toussaint, Veronica Rosa:
Success Factors for Designing a Cybersecurity Exercise on the Example of Incident Response. 259-268 - Paulina Jo Pesch:

Drivers and Obstacles for the Adoption of Consent Management Solutions by Ad-Tech Providers. 269-277 - Vitor Jesus

:
Pragmatic Online Privacy: the SftE Approach. 278-282 - Piero A. Bonatti, Luigi Sauro, Jonathan Langens:

Representing Consent and Policies for Compliance. 283-291 - Maria Wilhelmina Botes, Arianna Rossi

:
Visualisation Techniques for Consent: Finding Common Ground in Comic Art with Indigenous Populations. 292-297 - Beatriz Esteves, Harshvardhan J. Pandit

, Víctor Rodríguez-Doncel:
ODRL Profile for Expressing Consent through Granular Access Control Policies in Solid. 298-306 - Soheil Human, Mandan Kazzazi:

Contextuality and Intersectionality of E-Consent: A Human-centric Reflection on Digital Consenting in the Emerging Genetic Data Markets. 307-311 - Elias Grünewald

, Paul Wille, Frank Pallas, Maria C. Borges, Max-Robert Ulbricht
:
TIRA: An OpenAPI Extension and Toolbox for GDPR Transparency in RESTful Architectures. 312-319 - Stephan Wiefling

, Jan Tolsdorf
, Luigi Lo Iacono:
Privacy Considerations for Risk-Based Authentication Systems. 320-327 - Luise Mehner

, Saskia Nuñez von Voigt, Florian Tschorsch:
Towards Explaining Epsilon: A Worst-Case Study of Differential Privacy Risks. 328-331 - Gabriel Pedroza, Victor Muntés-Mulero, Yod Samuel Martín, Guillaume Mockly

:
A Model-based Approach to Realize Privacy and Data Protection by Design. 332-339 - R. Jason Cronk, Stuart S. Shapiro:

Quantitative Privacy Risk Analysis. 340-350 - Laurens Sion

, Dimitri Van Landuyt
, Wouter Joosen:
An Overview of Runtime Data Protection Enforcement Approaches. 351-358 - Ine van Zeeland

, Jo Pierson
:
How Standards Co-Shape Personal Data Protection in the European Banking Sector. 359-366 - Ben Weintraub, Cristina Nita-Rotaru:

Structural Attacks on Local Routing in Payment Channel Networks. 367-379 - Shih-Hong Wang, Chia-Chien Wu, Yu-Chuan Liang, Li-Hsun Hsieh, Hsu-Chun Hsiao:

ProMutator: Detecting Vulnerable Price Oracles in DeFi by Mutated Transactions. 380-385 - Sanket Kanjalkar, Ye Zhang, Shreyas Gandlur, Andrew Miller:

Publicly Auditable MPC-as-a-Service with succinct verification and universal setup. 386-411 - Fabian Stiehle, Erik Daniel, Florian Tschorsch:

Modeling the Block Verification Time of Zcash. 412-416

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














