


default search action
EuroS&P 2025: Venice, Italy - Workshops
- IEEE European Symposium on Security and Privacy, EuroS&P 2025 - Workshops, Venice, Italy, June 30 - July 4, 2025. IEEE 2025, ISBN 979-8-3315-9546-3

- Stefano Calzavara, Paolo Falcarin:

Message from General Chairs. xiv - Paul Aubry, Juliette Devoivre, Damien Carron, Simon Fernandez, Andrzej Duda, Maciej Korczynski:

Bypassing Audio reCAPTCHA with Automatic Speech Recognition Models. 1-5 - Katharina Kohls:

Admin/1423: On the Insecurity of Open-Source 5G Core Network Deployments in the Wild. 1-5 - Bengü Gülay, Cemal Yilmaz:

Mitigating Information Leakage in Large Language Models: Evaluating the Impact of Code Obfuscation on Vulnerability Detection. 1-8 - Andrea Ponte, Luca Demetrio, Luca Oneto

, Ivan Tesfai Ogbu, Battista Biggio, Fabio Roli:
Demystifying the Role of Rule-Based Detection in AI Systems for Windows Malware Detection. 9-15 - Koen T. W. Teuwen, Sam Baggen

, Emmanuele Zambon
, Luca Allodi:
On the Effect of Ruleset Tuning and Data Imbalance on Explainable Network Security Alert Classifications: A Case-Study on DeepCASE. 16-29 - Thorsten Jenke, Max Jens Ufer, Manuel Blatt, Leander Kohler, Elmar Padilla, Lilli Bruckschen:

Democratizing Generic Malware Unpacking. 30-38 - Jerre Starink

, Cassie Wanjun Xu, Andrea Continella
:
Toward Automatically Generating User-Specific Recovery Procedures After Windows Malware Infections. 39-47 - Samy Bettaieb, Serena Lucca, Charles-Henry Bertrand Van Ouytsel, Axel Legay, Etienne Rivière:

A Unified Comparison of Tabular and Graph-Based Feature Representations in Machine Learning for Malware Detection. 48-58 - Luke Kurlandski, Rayan Mosli, Yin Pan, Sirapat Thianphan, Matthew Wright:

Do Fear the REAPIR: Adversarial Malware from API Replacement. 59-68 - Sofia Della Penna, Roberto Natella, Vittorio Orbinato, Lorenzo Parracino, Luciano Pianese:

CTI-HAL: A Human-Annotated Dataset for Cyber Threat Intelligence Analysis. 69-78 - Saskia Laura Schröer, Noé Canevascini, Irdin Pekaric, Philine Widmer, Pavel Laskov:

The Dark Side of the Web: Towards Understanding Various Data Sources in Cyber Threat Intelligence. 79-89 - Johannes Nordskov, Tyge Tiessen

, Emmanouil Vasilomanolakis
:
Is this your USB? No, but Check this QR Code for a Free Meal! Assessing Awareness Against Dropped USBs and Malicious QR Codes. 90-102 - Konstantinos Mersinas, Aimee Liu, Niki Panteli:

Decomposing Culture within Threat Actor Groups - Insights from the Conti Ransomware Collective. 103-108 - Roy Ricaldi, Yasen Yalamov, Michele Campobasso, Luca Allodi, Hannah Kool, Asier Moneva, Eric Rutger Leukfeldt:

An Experimental Design to Investigate Attacker Actions on an Access-as-a-Service 'Criminal' Platform. 109-114 - Cosimo Melella, Francesco Ferazza, Konstantinos Mersinas, Ricardo Lugo:

Port in a Storm: Iranian Cyber Operations and Chinese Strategic Interests in Middle Eastern Maritime Infrastructure. 115-125 - Anh V. Vu, Alice Hutchings, Ross J. Anderson:

Yet Another Diminishing Spark: Low-Level Cyberattacks in the Israel-Gaza Conflict. 126-131 - Youssef Abyaa, Olivier Hureau, Andrzej Duda, Maciej Korczynski:

LogoTrust: Leveraging BIMI to Build a Validated Dataset of Brands, Domain Names, and Logos. 132-137 - Gonzalo Sobarzo Abufon, Juan Vanerio, Javier Bustos-Jiménez, Pedro Casas:

Hunting Review Bombs with BRIDGE - A Bipartite Graph Neural Network Approach to Abuse Detection. 138-146 - Fabio Palmese, Anna Maria Mandalari, Hamed Haddadi, Alessandro E. C. Redondi:

Intelligent Detection of Non-Essential IoT Traffic on the Home Gateway. 147-152 - Adrián Pekár, Richard Jozsa:

Early-Stage Anomaly Detection: A Study of Model Performance on Complete vs. Partial Flows. 153-163 - Louis Van Langendonck, Ismael Castell-Uroz, Pere Barlet-Ros:

PPT-GNN: A Practical Pretrained Spatio-Temporal Graph Neural Network for Network Security. 169-175 - Bulut Ulukapi, Anna Sperotto, Ralph Holz

:
Tracing Vendors: A Middlebox-Centric Study of Network Interference. 176-186 - Daan Vansteenhuyse

, Victor Le Pochat, Gertjan Franken, Lieven Desmet
:
One Does Not Simply Score a Website: Evaluating Website Security Scoring Algorithms. 187-194 - Ricardo Yaben

, Emmanouil Vasilomanolakis
:
Drifting Away: A Cyber-Security Study of Internet-Exposed OPC UA Servers. 195-202 - Miel Verkerken, Matisse Callewaert, Laurens D'hooge, Tim Wauters, Bruno Volckaert, Filip De Turck:

RustiFlow: Bridging the Gap Between Security Research and Practice Using eBPF-Based Network Flow Extraction. 203-216 - Francesco De Santis, Kai Huang, Rodolfo V. Valentim, Danilo Giordano, Marco Mellia

, Zied Ben-Houidi, Dario Rossi:
CFA-Bench: Cybersecurity Forensic Llm Agent Benchmark and Testing. 217-225 - Jonah Bellemans

, Mario Raciti, Dimitri Van Landuyt
, Laurens Sion, Giampaolo Bella, Lieven Desmet
, Wouter Joosen:
From Cluttered to Clustered: Addressing Privacy Threat Explosion through Automated Clustering. 231-241 - Juko Yamamoto, Takayuki Miura, Rina Okada, Masanobu Kii, Atsunori Ichikawa:

Explaining and Visualizing Synthetic Data Quality Using Statistical Distances. 242-250 - Henrik Graßhoff

, Meiko Jensen, Malte Hansen, Nils Gruschka:
Identification of Compositional Risks in Data Protection Impact Assessments and Beyond. 251-259 - Tim Vlummens, Gunes Acar:

Formguard: Continuous Privacy Testing for Websites Using Automated Interaction Replay. 260-268 - Florian Dehling, Jan Tolsdorf

, Luigi Lo Iacono:
Right Here, Right Now: User Perceptions of In-Place Contextual Privacy Options. 269-277 - Majid Mollaeefar, Andrea Bissoli, Dimitri Van Landuyt, Silvio Ranise:

PILLAR: LINDDUN Privacy Threat Modeling Using LLMs. 278-286 - Romana Blazevic

, Alexander Toch, Omar Veledar, Georg Macher
:
Securing the Lane: Defences Against Patch Attacks on Autonomous Vehicle's Lane Detection. 287-295 - Dror Peri, Avishai Wool:

Stop! Camera Spoofing Via the in-Vehicle IP Network. 296-310 - Aliza Reif, Tarek Stolz, Stjepan Picek, Oscar Hernán Ramírez-Agudelo

, Michael Karl:
The Image Scaling Attack: Unveiling the Risks in Traffic Sign Classification. 311-321 - Rohit Ravichandran, Mahshid Mehr Nezhad, Carsten Maple:

WiP: Concept Drift Management in Edge-AI for Autonomous Vehicles. 322-329 - Christian Prehofer:

Self-Sovereign Identities for Software-Defined Vehicles. 329-334 - Soumaya Boussaha, Victor Fresno Gómez, Thomas Barber, Daniele Antonioli:

CheckOCPP: Automatic OCPP Packet Dissection and Compliance Check. 335-342 - Jiadong Liu, Tatsuya Mori:

Avatar: Adversarial Vehicle Trajectory Attack Targeting Autonomous Driving Planner. 343-350 - Ahmed Salman, Yara Alsiyat, Sadie Creese, Michael Goldsmith:

Work in Progress: Leveraging Large Language Models for Cybersecurity Compliance: A Pilot Study in ISO 27001 Audit Planning. 351-359 - Mahshid Mehr Nezhad, Maryam Mehrnezhad, Timur Yunusov, Feng Hao:

Tap, Pay, and Worry: Users' Perceptions of Contactless Payment Attacks Versus Technical Feasibility. 360-373 - Nandshin Lehniger, Michael Kubach:

Work in Progress: Artificial Intelligence in Cybersecurity - Developing a Framework for Ethically Responsible Practices. 374-380 - Konstantina Fotari, François Dupressoir, Kopo Marvin Ramokapane:

Work in Progress: Secure Deletion on Cloud - a Constant Battle. 381-387 - Oluwamayowa Tijani

, Jamie Mahoney
, Santosh Vijaykumar, James Nicholson:
Understanding How Privacy and Data Protection Perceptions Shape Nigerian Journalists' Use of AI Tools: A Work in Progress. 388-394 - Aidan Marchildon, Ievgeniia Kuzminykh

, Bogdan Ghita:
Work in Progress: Effects of Enforcing International Law on Cyber Conflict Using Wargaming. 395-400 - Sina Abdollahi, Mohammad Maheri, Sandra Deepthy Siby, Marios Kogias, Hamed Haddadi:

An Early Experience With Confidential Computing Architecture for On-Device Model Protection. 401-410 - Anjo Vahldiek-Oberwagner, Marcela S. Melara:

Proving Attributes About Confidential Compute Services with Validation and Endorsement Services. 411-413 - Lorenzo Brescia

, Iacopo Colonnelli, Valerio Schiavoni, Pascal Felber, Marco Aldinucci:
End-To-End Confidentiality with Sev-Snp Leveraging in-Memory Storage. 414-421 - Takumu Umezawa, Akihiro Saiki

, Keiji Kimura:
Enclave Application Cache for RISC-V Keystone. 422-428 - Andrin Bertschi, Shweta Shinde:

OPENCCA: An Open Framework to Enable Arm CCA Research. 429-434 - Gert-Jan Goossens, Jo Van Bulck:

Principled Symbolic Validation of Enclaves on Low-End Microcontrollers. 435-447 - Marcin Spoczynski, Marcela S. Melara, Sebastian Szyller

:
Atlas: A Framework for ML Lifecycle Provenance & Transparency. 448-461 - Ruben Van Dijck, Marton Bognar

, Jo Van Bulck
:
Wait a Cycle: Eroding Cryptographic Trust in Low-End Tees via Timing Side Channels. 462-470 - Filip Rezabek, Jonathan Passerat-Palmbach, Moe Mahhouk, Frieder Erdmann, Andrew Miller:

Narrowing the Gap Between Tees Threat Model and Deployment Strategies. 471-473 - Abubakar-Sadiq Shehu, Steve Schneider:

Decentralised Supply Chain Reputation: A Privacy and Self-Sovereign Identity Perspective. 474-484 - Vitali Serzantov, Erwin Kupris, Thomas Schreck:

Identity Threats and Where to Find Them: Mapping ITDR and MITRE ATT&CK. 485-495 - Naheem Noah, Peter Mayer

, Sanchari Das:
Replication Study: Cross-Country Evaluation of the Recognition-Based Graphical Authentication Scheme in AR and VR Environments. 496-507 - Luca Petrillo, Fabio Martinelli, Antonella Santone, Francesco Mercaldo:

Security Requirements Classification by Means of Explainable Transformer Models. 508-515 - Francesco Buccafurri, Carmen Licciardi:

Towards Privacy-Preserving Revocation of Verifiable Credentials with Time-Flexibility. 516-521 - Subhojeet Mukherjee, Ritesh Kumar Kalle:

HFuzz-Rb: Real-Time Roadblock Detection in Fuzz Testing. 522-529 - Ye Li, Abu Barkat Ullah, Dat Tran, Elisa Martínez Marroquín, Wanli Ma:

A Review of Anti-Phishing Email Control Measures: Why we Need a Novel Digital Signature Scheme. 530-537 - Alessandro Brighente, Elisa Burato, Mauro Conti:

Are You Sure That is Secure? Assessing Organizations Security Readiness Via a Devsecops Maturity Model. 538-545 - Anita Nair, Serena Nicolazzo, Antonino Nocera, Rafidha Rehiman K. A., Vinod P.:

Sok: Zero Trust as a Strategy to Address Devsecops Challenges. 546-554 - Andrea Bisegna, Roberto Carbone, Laura Cristiano

, Pietro De Matteis, Silvio Ranise:
Towards Continuous Risk Assessment and Conformance Checking of IdM Deployments. 555-560 - Sebastian Kraust, Peter Heller, Jürgen Mottok:

Concept for Designing an ICS Testbed from a Penetration Testing Perspective. 561-568 - Luca Ferrari, Franceso Pagano, Luca Verderame, Alessio Merlo:

The OWApp Benchmark: An OWASP-Compliant Vulnerable Android App Dataset. 569-580 - Hosam Alamleh, Alessandro Cantelli-Forti:

Covert BLE Data Exfiltration via Apple's Find My Network: A Malware Prototype and Defense Strategies. 581-587 - Stefan Gast, Sebastian Daniel Felix, Alexander Steinmaurer, Jonas Juffinger, Daniel Gruss:

Real-World Study of the Security of Educational Test Systems. 588-599 - Alexandre Bouez

, Joan Daemen, Bart Mennink:
Statistical Evaluation of Entropy Accumulation in Linux. 600-612 - Ion Andy Ditu, Stefano Berlato, Matteo Busi

, Roberto Carbone, Silvio Ranise:
Work-in-Progress: Optimizing Performance of User Revocation in Cryptographic Access Control with Trusted Execution Environments. 613-618 - Luca Verderame, Giorgia Bolognesi, Enrico Pezzano, Massimiliano Rak, Alberto Falcone

, Giacomo Benedetti, Massimo Guarascio
, Luca Caviglione, Roberto Carbone, Roberto Doriguzzi-Corin, Maurizio Giacobbe, Giovanni Merlino, Antonio Puliafito, Massimiliano Baldo, Marino Miculan, Vincenzo Riccio
, Massimo Ficco:
From Edge to Cloud: Securing Distributed Containerized Applications. 619-629 - Anu Aggarwal, Maria José Ferreira, Palvi Aggarwal, Prashanth Rajivan, Cleotilde Gonzalez:

Cognitive Biases in Cyber Attacker Decision Making: Translating Behavioral Insights Into Cybersecurity. 630-645 - Anastasia Safargalieva, Emmanouil Vasilomanolakis

:
Towards Bio-Inspired Cyber-Deception: A Case Study of SSH and Telnet Honeypots. 646-655 - Raj Gopalakrishna, Rajaram Bhaskaran:

Experience Paper: Uncovering a Privileged Insider Threat in Action. 656-661 - Raj Gopalakrishna, Rajaram Bhaskaran:

Position Paper: The Extended Pyramid of Pain: The Attacker's Nightmare Edition. 662-670 - Muris Sladic, Veronica Valeros, Carlos Adrián Catania

, Sebastián García:
VelLMes: A High-Interaction AI-Based Deception Framework. 671-679 - Briland Hitaj, Grit Denker, Laura Tinnel, Michael McAnally, Bruce DeBruhl, Nathan Bunting, Alex Fafard, Daniel Aaron, Richard D. Roberts, Joshua Lawson, Greg McCain, Dylan Starink:

A Case Study on the Use of Representativeness Bias as a Defense Against Adversarial Cyber Threats. 680-689 - Mario Kahlhofer, Matteo Golinelli, Stefan Rass

:
Koney: A Cyber Deception Orchestration Framework for Kubernetes. 690-702 - Paolo Falcarin

, Mirco Venerba, Matteo De Giorgi, Federica Sarro:
Detection of Reverse Engineering Activities Before the Attack. 703-710

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














