Abstract is missing.
- Understanding and Mitigating Privacy Leaks from Third-Party Smart Speaker AppsAbrar S. Alrumayh, Sarah M. Lehman, Chiu C. Tan 0001. 1-9 [doi]
- Evaluating the Eavesdropper Entropy via Bloch-Messiah DecompositionMicael A. Dias, Francisco Marcos de Assis. 1-6 [doi]
- A Model Obfuscation Approach to IoT SecurityYunqi Guo, Zhaowei Tan, KaiYuan Chen, Songwu Lu, Ying Nian Wu. 1-9 [doi]
- The Quantum Communications and Networking Project at the Information Technology Laboratory of NISTOliver Slattery, Xiao Tang, Lijun Ma, Thomas Gerrits, Anouar Rahmouni, Sumit Bhushan. 1-6 [doi]
- Mitigating Energy Depletion Attacks in IoT via Random Time-Slotted Channel AccessSavio Sciancalepore, Pietro Tedeschi, Usman Riasat, Roberto Di Pietro. 10-18 [doi]
- LICE: Lightweight certificate enrollment for IoT using application layer securityJoel Höglund, Shahid Raza. 19-28 [doi]
- Device-Centric Detection and Mitigation of Diameter Signaling Attacks against Mobile CoreZhaowei Tan, Boyan Ding, Zhehui Zhang, Qianru Li, Yunqi Guo, Songwu Lu. 29-37 [doi]
- CUPS Hijacking in Mobile RAN Slicing: Modeling, Prototyping, and AnalysisRupendra Nath Mitra, Mohamed M. Kassem, Jon Larrea, Mahesh K. Marina. 38-46 [doi]
- A Game-Theoretic Approach for Probabilistic Cooperative Jamming Strategies over Parallel Wireless ChannelsZhifan Xu, Melike Baykal-Gürsoy, Predrag Spasojevic. 47-55 [doi]
- Very Pwnable Network: Cisco AnyConnect Security AnalysisGerbert Roitburd, Matthias Ortmann, Matthias Hollick, Jiska Classen. 56-64 [doi]
- Privacy, Security, and Utility Analysis of Differentially Private CPES DataMd Tamjid Hossain, Shahriar Badsha, Haoting Shen. 65-73 [doi]
- Hiding the Topology of an IEEE 802.15.4 Network with Limited EnergySara Beatriz Schwarz, Dimitrios-Georgios Akestoridis, Patrick Tague, Hanan Hibshi. 74-82 [doi]
- On Game-theoretic Computation Power Diversification in the Bitcoin Mining NetworkSuhan Jiang, Jie Wu 0001. 83-91 [doi]
- SPON: Enabling Resilient Inter-Ledgers Payments with an Intrusion-Tolerant OverlayLucian Trestioreanu, Cristina Nita-Rotaru, Aanchal Malhotra, Radu State. 92-100 [doi]
- ConMan: A Connection Manipulation-based Attack Against Bitcoin NetworkingWenjun Fan, Sang-Yoon Chang, Xiaobo Zhou 0002, Shouhuai Xu. 101-109 [doi]
- Translating Intrusion Alerts to Cyberattack Stages using Pseudo-Active Transfer Learning (PATRL)Stephen Moskal, Shanchieh Jay Yang. 110-118 [doi]
- GADoT: GAN-based Adversarial Training for Robust DDoS Attack DetectionMaged AbdelAty, Sandra Scott-Hayward, Roberto Doriguzzi Corin, Domenico Siracusa. 119-127 [doi]
- A Hierarchical Architecture and Probabilistic Strategy for Collaborative Intrusion DetectionChristoph Hardegen, Mike Petersen, Chukwuebuka Ezelu, Timo Geier, Sebastian Rieger, Ulrich Buehler. 128-136 [doi]
- DREVAN: Deep Reinforcement Learning-based Vulnerability-Aware Network Adaptations for Resilient NetworksQisheng Zhang, Jin-Hee Cho, Terrence J. Moore, Frederica Free-Nelson. 137-145 [doi]
- A Symmetric Cipher Response-Based Cryptography Engine Accelerated Using GPGPUJordan Wright, Zane Fink, Michael Gowanlock, Christopher Robert Philabaum, Brian Donnelly, Bertrand Cambou. 146-154 [doi]
- Context-Aware IoT Device Functionality Extraction from Specifications for Ensuring Consumer SecurityUpakar Paudel, Andy Dolan, Suryadipta Majumdar, Indrakshi Ray. 155-163 [doi]
- An uneven game of hide and seek: Hiding botnet CnC by encrypting IPs in DNS recordsMartin Fejrskov, Jens Myrup Pedersen, Leon Böck, Emmanouil Vasilomanolakis. 164-172 [doi]
- CHIMERA: Autonomous Planning and Orchestration for Malware DeceptionMd. Mazharul Islam 0001, Ashutosh Dutta, Md Sajidul Islam Sajid, Ehab Al-Shaer, Jinpeng Wei, Sadegh Farhang. 173-181 [doi]
- PORTFILER: Port-Level Network Profiling for Self-Propagating Malware DetectionTalha Ongun, Oliver Spohngellert, Benjamin A. Miller, Simona Boboila, Alina Oprea, Tina Eliassi-Rad, Jason Hiser, Alastair Nottingham, Jack W. Davidson, Malathi Veeraraghavan. 182-190 [doi]
- EthClipper: A Clipboard Meddling Attack on Hardware Wallets with Address Verification EvasionNikolay Ivanov, Qiben Yan. 191-199 [doi]
- iAttackGen: Generative Synthesis of False Data Injection Attacks in Cyber-physical SystemsMd Hasan Shahriar, Alvi Ataur Khalil, Mohammad Ashiqur Rahman, Mohammad Hossein Manshaei, Dong Chen. 200-208 [doi]
- HiveGuard: A Network Security Monitoring Architecture for Zigbee NetworksDimitrios-Georgios Akestoridis, Patrick Tague. 209-217 [doi]
- HoneyBog: A Hybrid Webshell Honeypot Framework against Command InjectionSongsong Liu, Pengbin Feng, Kun Sun 0001. 218-226 [doi]
- "X-Phish: Days of Future Past"‡: Adaptive & Privacy Preserving Phishing DetectionShalin Kumar Deval, Meenakshi Tripathi, Bruhadeshwar Bezawada, Indrakshi Ray. 227-235 [doi]
- Vibe: An Implicit Two-Factor Authentication using Vibration SignalsEric Husa, Reza Tourani. 236-244 [doi]
- Artificial Packet-Pair Dispersion (APPD): A Blackbox Approach to Verifying the Integrity of NFV Service ChainsA. S. M. Asadujjaman, Momen Oqaily, Yosr Jarraya, Suryadipta Majumdar, Makan Pourzandi, Lingyu Wang 0001, Mourad Debbabi. 245-253 [doi]
- Automatic Detection of Android Steganography Apps via Symbolic Execution and Tree MatchingWenhao Chen, Li Lin 0004, Jennifer Newman, Yong Guan. 254-262 [doi]
- Unconditional Authentication for Constrained Applications via Strong PUFsAhmed S. Bendary, C. Emre Koksal, Daniel Canaday, Andrew Pomerance. 272-280 [doi]
- CompKey: Exploiting Computer's Electromagnetic Radiation for Secret Key GenerationFangfang Yang, Mohammad A. Islam 0001, Fan Wu 0006, Shaolei Ren. 281-289 [doi]
- Securing APIs and Chaos EngineeringSalah Sharieh, Alexander Ferworn. 290-294 [doi]