default search action
EuroS&P 2022: Genoa, Italy - Workshops
- IEEE European Symposium on Security and Privacy, EuroS&P 2022 - Workshops, Genoa, Italy, June 6-10, 2022. IEEE 2022, ISBN 978-1-6654-9560-8
- Rasika Bhalerao, Damon McCoy:
Libel Inc: An Analysis of the Libel Site Ecosystem. 1-10 - Pradip Kumar Sharma, Prosanta Gope, Deepak Puthal:
Blockchain and Federated Learning-enabled Distributed Secure and Privacy-preserving Computing Architecture for IoT Network. 1-9 - Kerstin Bongard-Blanchy, Jean-Louis Sterckx, Arianna Rossi, Verena Distler, Salvador Rivas, Vincent Koenig:
An (Un)Necessary Evil - Users' (Un)Certainty about Smartphone App Permissions and Implications for Privacy Engineering. 1-8 - Samuel N. Eshun, Paolo Palmieri:
Two de-anonymization attacks on real-world location data based on a hidden Markov model. 1-9 - Fangyi Yu, Miguel Vargas Martin:
GNPassGAN: Improved Generative Adversarial Networks For Trawling Offline Password Guessing. 10-18 - Matthias J. Kannwischer, Peter Schwabe, Douglas Stebila, Thom Wiggers:
Improving Software Quality in Cryptography Standardization Projects. 19-30 - Markku-Juhani O. Saarinen:
SP 800-22 and GM/T 0005-2012 Tests: Clearly Obsolete, Possibly Harmful. 31-37 - Scott Harper, Maryam Mehrnezhad, Matthew Leach:
Are Our Animals Leaking Information About Us? Security and Privacy Evaluation of Animal-related Apps. 38-51 - Dan Yamamoto, Yuji Suga, Kazue Sako:
Formalising Linked-Data based Verifiable Credentials for Selective Disclosure. 52-65 - Dévanté Gray, Maryam Mehrnezhad, Rishad A. Shafik:
SenSig: Practical IoT Sensor Fingerprinting Using Calibration Data. 66-81 - Shreyas Srinivasa, Dimitrios Georgoulias, Jens Myrup Pedersen, Emmanouil Vasilomanolakis:
A Bad IDEa: Weaponizing uncontrolled online-IDEs in availability attacks. 82-92 - Ildiko Pete, Jack Hughes, Andrew Caines, Anh V. Vu, Harshad Gupta, Alice Hutchings, Ross J. Anderson, Paula Buttery:
PostCog: A tool for interdisciplinary research into underground forums at scale. 93-104 - Sharad Agarwal, Marie Vasek:
Investigating the concentration of High Yield Investment Programs in the United Kingdom. 105-116 - Leon Kersten, Pavlo Burda, Luca Allodi, Nicola Zannone:
Investigating the Effect of Phishing Believability on Phishing Reporting. 117-128 - Martino Tommasini, Martin Rosso, Emmanuele Zambon, Luca Allodi, Jerry den Hartog:
Characterizing Building Automation System Attacks and Attackers. 139-149 - Daniel W. Woods, Lukas Walter:
Reviewing Estimates of Cybercrime Victimisation and Cyber Risk Likelihood. 150-162 - Víctor Labrador, Sergio Pastrana:
Examining the trends and operations of modern Dark-Web marketplaces. 163-172 - Miguel Cozar, David Rodríguez Torrado, José M. del Álamo, Danny S. Guamán:
Reliability of IP Geolocation Services for Assessing the Compliance of International Data Transfers. 181-185 - Kenta Kitamura, Mhd Irvan, Rie Shigetomi Yamaguchi:
Anonymity test attacks and vulnerability indicators for the "Patient characteristics" disclosure in medical articles. 186-193 - Ken Ahrens, Jonas Palm, Meiko Jensen:
CampusTracer: A Privacy-Aware Contact Tracing Protocol for Campus Environments. 194-202 - Myriam Clouet, Thibaud Antignac, Mathilde Arnaud, Gabriel Pedroza, Julien Signoles:
A New Generic Representation for Modeling Privacy. 203-211 - Jack Gardner, Yuanyuan Feng, Kayla Reiman, Zhi Lin, Akshath Jain, Norman Sadeh:
Helping Mobile Application Developers Create Accurate Privacy Labels. 212-230 - Soheil Human, Harshvardhan J. Pandit, Victor Morel, Cristiana Santos, Martin Degeling, Arianna Rossi, Maria Wilhelmina Botes, Vitor Jesus, Irene Kamara:
Data Protection and Consenting Communication Mechanisms: Current Open Proposals and Challenges. 231-239 - Davy Preuveneers, Emma Lavens, Wouter Joosen:
Applying Machine Learning to use security oracles: a case study in virus and malware detection. 240-251 - Victor-Alexandru Padurean, Oliver Gasser, Randy Bush, Anja Feldmann:
SRv6: Is There Anybody Out There? 252-257 - Adam Halim, Max Danielsson, Martin F. Arlitt, Niklas Carlsson:
Temporal Analysis of X.509 Revocations and their Statuses. 258-265 - Fabian Franzen, Lion Steger, Johannes Zirngibl, Patrick Sattler:
Looking for Honey Once Again: Detecting RDP and SMB Honeypots on the Internet. 266-277 - Xiufen Yu, Nayanamana Samarasinghe, Mohammad Mannan, Amr M. Youssef:
Got Sick and Tracked: Privacy Analysis of Hospital Websites. 278-286 - Gastón García González, Sergio Martinez Tagliafico, Alicia Fernández, Gabriel Gómez, José Acuña, Pedro Casas:
DC-VAE, Fine-grained Anomaly Detection in Multivariate Time-Series with Dilated Convolutions and Variational Auto Encoders. 287-293 - Zain Shamsi, Daniel Zhang, Daehyun Kyoung, Alex Liu:
Measuring and Clustering Network Attackers using Medium-Interaction Honeypots. 294-306 - Thomas Favale, Danilo Giordano, Idilio Drago, Marco Mellia:
What Scanners do at L7? Exploring Horizontal Honeypots for Security Monitoring. 307-313 - Matteo Boffa, Giulia Milan, Luca Vassio, Idilio Drago, Marco Mellia, Zied Ben-Houidi:
Towards NLP-based Processing of Honeypot Logs. 314-321 - Muhammad Yasir Muzayan Haq, Mattijs Jonker, Roland van Rijswijk-Deij, kc claffy, Lambert J. M. Nieuwenhuis, Abhishta Abhishta:
No Time for Downtime: Understanding Post-Attack Behaviors by Customers of Managed DNS Providers. 322-331 - Paul Olivier, Xuan-Huy Ngo, Aurélien Francillon:
BEERR: Bench of Embedded system Experiments for Reproducible Research. 332-339 - Gianpiero Costantino, Marco De Vincenzi, Ilaria Matteucci:
A Comparative Analysis of UNECE WP.29 R155 and ISO/SAE 21434. 340-347 - Rashid Khan, Neetesh Saxena, Omer F. Rana, Prosanta Gope:
ATVSA: Vehicle Driver Profiling for Situational Awareness. 348-357 - Roland Bolboaca, Piroska Haller, Dimitris Kontses, Alexandros Papageorgiou-Koutoulas, Stylianos Doulgeris, Nikolaos Zingopis, Zissis Samaras:
Tampering Detection for Automotive Exhaust Aftertreatment Systems using Long Short-Term Memory Predictive Networks. 358-367 - Ivan F. Salgado, Nicanor Quijano, Daniel J. Fremont, Alvaro A. Cárdenas:
Fuzzing Malicious Driving Behavior to find Vulnerabilities in Collision Avoidance Systems. 368-375 - Ben Nassi, Jacob Shams, Raz Ben-Netanel, Yuval Elovici:
bAdvertisement: Attacking Advanced Driver-Assistance Systems Using Print Advertisements. 376-383 - Michael Collins, Alefiya Hussain, Stephen Schwab:
Towards an Operations-Aware Experimentation Methodology. 384-393 - Martin Macák, Radek Oslejsek, Barbora Buhnova:
Applying Process Discovery to Cybersecurity Training: An Experience Report. 394-402 - Andrea Dalla Costa, Jarkko Kuusijärvi:
Programmatic Description Language for Cyber Range Topology Creation. 403-412 - Franck Sicard, Estelle Hotellier, Julien Francq:
An Industrial Control System Physical Testbed for Naval Defense Cybersecurity Research. 413-422 - Gulkhara Babayeva, Kaie Maennel, Olaf Manuel Maennel:
Building an Ontology for Cyber Defence Exercises. 423-432 - Razvan Beuran, Zhe Zhang, Yasuo Tan:
AWS EC2 Public Cloud Cyber Range Deployment. 433-441 - Shreyas Srinivasa, Jens Myrup Pedersen, Emmanouil Vasilomanolakis:
Deceptive directories and "vulnerable" logs: a honeypot study of the LDAP and log4j attack landscape. 442-447 - Rodolfo V. Valentim, Idilio Drago, Federico Cerutti, Marco Mellia:
AI-based Sound-Squatting Attack Made Possible. 448-453 - Fai Ben Salamah, Marco A. Palomino, Maria Papadaki, Steven Furnell:
The Importance of the Job Role in Social Media Cybersecurity Training. 454-462 - Petrus M. J. Delport, Johan Van Niekerk, Rayne Reid:
Introduction to Information Security: From Formal Curriculum to Organisational Awareness. 463-469 - Rasmus Broholm, Michael Christensen, Lene Tolstrup Sørensen:
Exploring Gamification Elements to Enhance User Motivation in a Cyber Security Learning Platform Through Focus Group Interviews. 470-476 - Gianluca Roascio, Samuele Yves Cerini, Paolo Prinetto:
Remotizing and Virtualizing Chips and Circuits for Hardware-based Capture-the-Flag Challenges. 477-485 - Léon McGregor, Sheung Chi Chan, Szymon Wlodarczyk, Manuel Maarek:
Aligning a Serious Game, Secure Programming and CyBOK-Linked Learning Outcomes. 486-495 - Matteo Benzi, Giovanni Lagorio, Marina Ribaudo:
Automatic Challenge Generation for Hands-on Cybersecurity Training. 496-503 - Ivan Oleynikov, Elena Pagnin, Andrei Sabelfeld:
Outsourcing MPC Precomputation for Location Privacy. 504-513 - Aliai Eusebi, Marie Vasek, Ella Cockbain, Enrico Mariconti:
The Ethics of Going Deep: Challenges in Machine Learning for Sensitive Security Domains. 533-537 - Yiming Zhang, Mingxuan Liu, Mingming Zhang, Chaoyi Lu, Haixin Duan:
Ethics in Security Research: Visions, Reality, and Paths Forward. 538-545 - Rasika Bhalerao, Vaughn Hamilton, Allison McDonald, Elissa M. Redmiles, Angelika Strohmayer:
Ethical Practices for Security Research with At-Risk Populations. 546-553 - Arianna Rossi, Mónica P. Arenas, Emre Kocyigit, Moad Hani:
Challenges of protecting confidentiality in social media data and their ethical import. 554-561 - Marietjie Botes, Gabriele Lenzini:
When Cryptographic Ransomware Poses Cyber Threats: Ethical Challenges and Proposed Safeguards for Cybersecurity Researchers. 562-568
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.