


default search action
EuroS&P 2022: Genoa, Italy - Workshops
- IEEE European Symposium on Security and Privacy, EuroS&P 2022 - Workshops, Genoa, Italy, June 6-10, 2022. IEEE 2022, ISBN 978-1-6654-9560-8

- Rasika Bhalerao, Damon McCoy:

Libel Inc: An Analysis of the Libel Site Ecosystem. 1-10 - Pradip Kumar Sharma, Prosanta Gope, Deepak Puthal:

Blockchain and Federated Learning-enabled Distributed Secure and Privacy-preserving Computing Architecture for IoT Network. 1-9 - Kerstin Bongard-Blanchy, Jean-Louis Sterckx

, Arianna Rossi
, Verena Distler
, Salvador Rivas, Vincent Koenig:
An (Un)Necessary Evil - Users' (Un)Certainty about Smartphone App Permissions and Implications for Privacy Engineering. 1-8 - Samuel N. Eshun

, Paolo Palmieri
:
Two de-anonymization attacks on real-world location data based on a hidden Markov model. 1-9 - Fangyi Yu, Miguel Vargas Martin:

GNPassGAN: Improved Generative Adversarial Networks For Trawling Offline Password Guessing. 10-18 - Matthias J. Kannwischer, Peter Schwabe, Douglas Stebila

, Thom Wiggers
:
Improving Software Quality in Cryptography Standardization Projects. 19-30 - Markku-Juhani O. Saarinen

:
SP 800-22 and GM/T 0005-2012 Tests: Clearly Obsolete, Possibly Harmful. 31-37 - Scott Harper, Maryam Mehrnezhad

, Matthew Leach:
Are Our Animals Leaking Information About Us? Security and Privacy Evaluation of Animal-related Apps. 38-51 - Dan Yamamoto

, Yuji Suga, Kazue Sako:
Formalising Linked-Data based Verifiable Credentials for Selective Disclosure. 52-65 - Dévanté Gray, Maryam Mehrnezhad

, Rishad A. Shafik:
SenSig: Practical IoT Sensor Fingerprinting Using Calibration Data. 66-81 - Shreyas Srinivasa

, Dimitrios Georgoulias
, Jens Myrup Pedersen
, Emmanouil Vasilomanolakis
:
A Bad IDEa: Weaponizing uncontrolled online-IDEs in availability attacks. 82-92 - Ildiko Pete, Jack Hughes, Andrew Caines, Anh V. Vu, Harshad Gupta, Alice Hutchings, Ross J. Anderson, Paula Buttery:

PostCog: A tool for interdisciplinary research into underground forums at scale. 93-104 - Sharad Agarwal

, Marie Vasek
:
Investigating the concentration of High Yield Investment Programs in the United Kingdom. 105-116 - Leon Kersten, Pavlo Burda

, Luca Allodi, Nicola Zannone
:
Investigating the Effect of Phishing Believability on Phishing Reporting. 117-128 - Martino Tommasini, Martin Rosso, Emmanuele Zambon

, Luca Allodi, Jerry den Hartog:
Characterizing Building Automation System Attacks and Attackers. 139-149 - Daniel W. Woods, Lukas Walter:

Reviewing Estimates of Cybercrime Victimisation and Cyber Risk Likelihood. 150-162 - Víctor Labrador

, Sergio Pastrana:
Examining the trends and operations of modern Dark-Web marketplaces. 163-172 - Miguel Cozar, David Rodríguez Torrado

, José M. del Álamo, Danny S. Guamán:
Reliability of IP Geolocation Services for Assessing the Compliance of International Data Transfers. 181-185 - Kenta Kitamura, Mhd Irvan, Rie Shigetomi Yamaguchi:

Anonymity test attacks and vulnerability indicators for the "Patient characteristics" disclosure in medical articles. 186-193 - Ken Ahrens, Jonas Palm, Meiko Jensen:

CampusTracer: A Privacy-Aware Contact Tracing Protocol for Campus Environments. 194-202 - Myriam Clouet, Thibaud Antignac, Mathilde Arnaud, Gabriel Pedroza, Julien Signoles

:
A New Generic Representation for Modeling Privacy. 203-211 - Jack Gardner, Yuanyuan Feng, Kayla Reiman

, Zhi Lin, Akshath Jain, Norman Sadeh:
Helping Mobile Application Developers Create Accurate Privacy Labels. 212-230 - Soheil Human, Harshvardhan J. Pandit

, Victor Morel, Cristiana Teixeira Santos, Martin Degeling, Arianna Rossi
, Maria Wilhelmina Botes, Vitor Jesus, Irene Kamara
:
Data Protection and Consenting Communication Mechanisms: Current Open Proposals and Challenges. 231-239 - Davy Preuveneers, Emma Lavens, Wouter Joosen:

Applying Machine Learning to use security oracles: a case study in virus and malware detection. 240-251 - Victor-Alexandru Padurean, Oliver Gasser, Randy Bush, Anja Feldmann

:
SRv6: Is There Anybody Out There? 252-257 - Adam Halim, Max Danielsson, Martin F. Arlitt, Niklas Carlsson:

Temporal Analysis of X.509 Revocations and their Statuses. 258-265 - Fabian Franzen, Lion Steger

, Johannes Zirngibl, Patrick Sattler:
Looking for Honey Once Again: Detecting RDP and SMB Honeypots on the Internet. 266-277 - Xiufen Yu, Nayanamana Samarasinghe, Mohammad Mannan, Amr M. Youssef:

Got Sick and Tracked: Privacy Analysis of Hospital Websites. 278-286 - Gastón García González

, Sergio Martinez Tagliafico, Alicia Fernández, Gabriel Gómez, José Acuña, Pedro Casas:
DC-VAE, Fine-grained Anomaly Detection in Multivariate Time-Series with Dilated Convolutions and Variational Auto Encoders. 287-293 - Zain Shamsi

, Daniel Zhang, Daehyun Kyoung, Alex Liu:
Measuring and Clustering Network Attackers using Medium-Interaction Honeypots. 294-306 - Thomas Favale, Danilo Giordano, Idilio Drago

, Marco Mellia
:
What Scanners do at L7? Exploring Horizontal Honeypots for Security Monitoring. 307-313 - Matteo Boffa, Giulia Milan

, Luca Vassio
, Idilio Drago
, Marco Mellia
, Zied Ben-Houidi:
Towards NLP-based Processing of Honeypot Logs. 314-321 - Muhammad Yasir Muzayan Haq

, Mattijs Jonker, Roland van Rijswijk-Deij
, K. C. Claffy
, Lambert J. M. Nieuwenhuis, Abhishta Abhishta
:
No Time for Downtime: Understanding Post-Attack Behaviors by Customers of Managed DNS Providers. 322-331 - Paul Olivier, Xuan-Huy Ngo, Aurélien Francillon:

BEERR: Bench of Embedded system Experiments for Reproducible Research. 332-339 - Gianpiero Costantino, Marco De Vincenzi

, Ilaria Matteucci
:
A Comparative Analysis of UNECE WP.29 R155 and ISO/SAE 21434. 340-347 - Rashid Khan, Neetesh Saxena

, Omer F. Rana
, Prosanta Gope:
ATVSA: Vehicle Driver Profiling for Situational Awareness. 348-357 - Roland Bolboaca, Piroska Haller, Dimitris Kontses

, Alexandros Papageorgiou-Koutoulas, Stylianos Doulgeris, Nikolaos Zingopis, Zissis Samaras:
Tampering Detection for Automotive Exhaust Aftertreatment Systems using Long Short-Term Memory Predictive Networks. 358-367 - Ivan F. Salgado, Nicanor Quijano, Daniel J. Fremont

, Alvaro A. Cárdenas
:
Fuzzing Malicious Driving Behavior to find Vulnerabilities in Collision Avoidance Systems. 368-375 - Ben Nassi, Jacob Shams

, Raz Ben-Netanel, Yuval Elovici:
bAdvertisement: Attacking Advanced Driver-Assistance Systems Using Print Advertisements. 376-383 - Michael Collins, Alefiya Hussain, Stephen Schwab:

Towards an Operations-Aware Experimentation Methodology. 384-393 - Martin Macák, Radek Oslejsek, Barbora Buhnova:

Applying Process Discovery to Cybersecurity Training: An Experience Report. 394-402 - Andrea Dalla Costa

, Jarkko Kuusijärvi
:
Programmatic Description Language for Cyber Range Topology Creation. 403-412 - Franck Sicard

, Estelle Hotellier, Julien Francq:
An Industrial Control System Physical Testbed for Naval Defense Cybersecurity Research. 413-422 - Gulkhara Babayeva, Kaie Maennel, Olaf Manuel Maennel:

Building an Ontology for Cyber Defence Exercises. 423-432 - Razvan Beuran, Zhe Zhang, Yasuo Tan:

AWS EC2 Public Cloud Cyber Range Deployment. 433-441 - Shreyas Srinivasa

, Jens Myrup Pedersen
, Emmanouil Vasilomanolakis
:
Deceptive directories and "vulnerable" logs: a honeypot study of the LDAP and log4j attack landscape. 442-447 - Rodolfo V. Valentim, Idilio Drago

, Federico Cerutti, Marco Mellia
:
AI-based Sound-Squatting Attack Made Possible. 448-453 - Fai Ben Salamah

, Marco A. Palomino, Maria Papadaki
, Steven Furnell:
The Importance of the Job Role in Social Media Cybersecurity Training. 454-462 - Petrus M. J. Delport

, Johan Van Niekerk, Rayne Reid:
Introduction to Information Security: From Formal Curriculum to Organisational Awareness. 463-469 - Rasmus Broholm, Michael Christensen, Lene Tolstrup Sørensen:

Exploring Gamification Elements to Enhance User Motivation in a Cyber Security Learning Platform Through Focus Group Interviews. 470-476 - Gianluca Roascio, Samuele Yves Cerini

, Paolo Prinetto:
Remotizing and Virtualizing Chips and Circuits for Hardware-based Capture-the-Flag Challenges. 477-485 - Léon McGregor

, Sheung Chi Chan, Szymon Wlodarczyk, Manuel Maarek
:
Aligning a Serious Game, Secure Programming and CyBOK-Linked Learning Outcomes. 486-495 - Matteo Benzi, Giovanni Lagorio, Marina Ribaudo:

Automatic Challenge Generation for Hands-on Cybersecurity Training. 496-503 - Ivan Oleynikov, Elena Pagnin, Andrei Sabelfeld:

Outsourcing MPC Precomputation for Location Privacy. 504-513 - Aliai Eusebi, Marie Vasek

, Ella Cockbain
, Enrico Mariconti
:
The Ethics of Going Deep: Challenges in Machine Learning for Sensitive Security Domains. 533-537 - Yiming Zhang, Mingxuan Liu, Mingming Zhang, Chaoyi Lu

, Haixin Duan
:
Ethics in Security Research: Visions, Reality, and Paths Forward. 538-545 - Rasika Bhalerao, Vaughn Hamilton, Allison McDonald

, Elissa M. Redmiles, Angelika Strohmayer
:
Ethical Practices for Security Research with At-Risk Populations. 546-553 - Arianna Rossi

, Mónica P. Arenas
, Emre Kocyigit
, Moad Hani
:
Challenges of protecting confidentiality in social media data and their ethical import. 554-561 - Marietjie Botes, Gabriele Lenzini:

When Cryptographic Ransomware Poses Cyber Threats: Ethical Challenges and Proposed Safeguards for Cybersecurity Researchers. 562-568

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














