Abstract is missing.
- Security Analysis of Vendor Implementations of the OPC UA Protocol for Industrial Control SystemsAlessandro Erba, Anne Müller, Nils Ole Tippenhauer. 1-13 [doi]
- Single-Server Delegation of Small-Exponent Exponentiation from Quasilinear-Time Clients and ApplicationsGiovanni Di Crescenzo, Matluba Khodjaeva, Rajesh Krishnan, David Shur. 15-26 [doi]
- Secure Reboots for Real-Time Cyber-Physical SystemsVijay Banerjee, Sena Hounsinou, Habeeb Olufowobi, Monowar Hasan, Gedare Bloom. 27-33 [doi]
- RoSym: Robust Symmetric Key Based IoT Software Upgrade Over-the-AirPegah Nikbakht Bideh, Christian Gehrmann. 35-46 [doi]
- Stargaze: A LEO Constellation Emulator for Security ExperimentationPatrick Tser Jern Kon, Diogo Barradas, Ang Chen. 47-53 [doi]
- CloudPAD: Managed Anomaly Detection for ICSSanjeev Rao, Majid Ghaderi, Hongwen Zhang. 55-61 [doi]
- Real-Time Scheduling of TrustZone-enabled DNN WorkloadsMohammad Fakhruddin Babar, Monowar Hasan. 63-69 [doi]