Abstract is missing.
- Tackling Credential Abuse TogetherMichael K. Reiter. 1 [doi]
- Comparative Privacy Analysis of Mobile BrowsersAhsan Zafar, Anupam Das 0001. 3-14 [doi]
- IdDecoder: A Face Embedding Inversion Tool and its Privacy and Security Implications on Facial Recognition SystemsMinh Ha Le, Niklas Carlsson. 15-26 [doi]
- Attribute Inference Attacks in Online Multiplayer Video Games: A Case Study on DOTA2Pier Paolo Tricomi, Lisa Facciolo, Giovanni Apruzzese, Mauro Conti. 27-38 [doi]
- AutoSpill: Credential Leakage from Mobile Password ManagersAnkit Gangwal, Shubham Singh, Abhijeet Srivastava. 39-47 [doi]
- Users Really Do Respond To SmishingMd. Lutfor Rahman, Daniel Timko, Hamid Wali, Ajaya Neupane. 49-60 [doi]
- A User Study of Keystroke Dynamics as Second Factor in Web MFAAhmed Anu Wahab, Daqing Hou, Stephanie Schuckers. 61-72 [doi]
- Multi-Modality Mobile Datasets for Behavioral Biometrics Research: Data/Toolset paperAratrika Ray-Dowling, Ahmed Anu Wahab, Daqing Hou, Stephanie Schuckers. 73-78 [doi]
- A Tenant-based Two-stage Approach to Auditing the Integrity of Virtual Network Function Chains Hosted on Third-Party CloudsMomen Oqaily, Suryadipta Majumdar, Lingyu Wang 0001, Mohammad Ekramul Kabir, Yosr Jarraya, A. S. M. Asadujjaman, Makan Pourzandi, Mourad Debbabi. 79-90 [doi]
- CloudShield: Real-time Anomaly Detection in the CloudZecheng He, Guangyuan Hu, Ruby B. Lee. 91-102 [doi]
- Local Methods for Privacy Protection and Impact on FairnessCatuscia Palamidessi. 103 [doi]
- Privacy-Preserving Fully Online Matching with DeadlinesAndreas Klinger, Ulrike Meyer. 105-116 [doi]
- Grote: Group Testing for Privacy-Preserving Face IdentificationAlberto Ibarrondo, Hervé Chabanne, Vincent Despiegel, Melek Önen. 117-128 [doi]
- Anonymous System for Fully Distributed and Robust Secure Multi-Party ComputationAndreas Klinger, Felix Battermann, Ulrike Meyer. 129-139 [doi]
- Velocity-Aware Geo-IndistinguishabilityRicardo Mendes, Mariana Cunha, João P. Vilela. 141-152 [doi]
- Confidential Execution of Deep Learning Inference at the Untrusted Edge with ARM TrustZoneMd Shihabul Islam, Mahmoud Zamani, Chung Hwan Kim, Latifur Khan, Kevin W. Hamlen. 153-164 [doi]
- Protecting Encrypted Virtual Machines from Nested Page Fault Controlled ChannelHaoxiang Qin, Zhenyu Song, Weijuan Zhang, Sicong Huang, Wentao Yao, Ge Liu, Xiaoqi Jia, Haichao Du. 165-175 [doi]
- Overcoming the Pitfalls of HPC-based Cryptojacking Detection in Presence of GPUsClaudius Pott, Berk Gülmezoglu, Thomas Eisenbarth 0001. 177-188 [doi]
- Detecting Backdoors in Collaboration Graphs of Software RepositoriesTom Ganz, Inaam Ashraf, Martin Härterich, Konrad Rieck. 189-200 [doi]
- Infotainment System Matters: Understanding the Impact and Implications of In-Vehicle Infotainment System Hacking with Automotive Grade LinuxSeonghoon Jeong, Minsoo Ryu, Hyunjae Kang, Huy Kang Kim. 201-212 [doi]
- HAT: Secure and Practical Key Establishment for Implantable Medical DevicesSayon Duttagupta, Eduard Marin, Dave Singelée, Bart Preneel. 213-224 [doi]
- SCAtt-man: Side-Channel-Based Remote Attestation for Embedded Devices that Users UnderstandSebastian Surminski, Christian Niesler, Sebastian Linsner, Lucas Davi, Christian Reuter 0001. 225-236 [doi]
- Risk-Based Authentication for OpenStack: A Fully Functional Implementation and Guiding ExampleVincent Unsel, Stephan Wiefling, Nils Gruschka, Luigi Lo Iacono. 237-243 [doi]
- All Your IoT Devices Are Belong to Us: Security Weaknesses in IoT Management PlatformsBhaskar Tejaswi, Mohammad Mannan, Amr M. Youssef. 245-250 [doi]
- Role Models: Role-based Debloating for Web ApplicationsBabak Amin Azad, Nick Nikiforakis. 251-262 [doi]
- FLAP - A Federated Learning Framework for Attribute-based Access Control PoliciesAmani Abu Jabal, Elisa Bertino, Jorge Lobo 0001, Dinesh C. Verma, Seraphin B. Calo, Alessandra Russo. 263-272 [doi]
- Tool/Dataset Paper: Realistic ABAC Data Generation using Conditional Tabular GANRitwik Rai, Shamik Sural. 273-278 [doi]
- Exploiting Windows PE Structure for Adversarial Malware Evasion AttacksKshitiz Aryal, Maanak Gupta, Mahmoud Abdelsalam. 279-281 [doi]
- Utilizing The DLBAC Approach Toward a ZT Score-based Authorization for IoT SystemsSafwa Ameer, Ram Krishnan, Ravi S. Sandhu, Maanak Gupta. 283-285 [doi]
- Securing Kubernetes Pods communicating over Weave Net through eBPF/XDP from DDoS attacksTalaya Farasat, Muhammad Ahmad Rathore, JongWon Kim. 287-289 [doi]
- RanSAM: Randomized Search for ABAC Policy MiningNakul Aggarwal, Shamik Sural. 291-293 [doi]
- The Design of an Ontology for ATT&CK and its Application to CybersecurityKhandakar Ashrafi Akbar, Sadaf Md. Halim, Anoop Singhal, Basel Abdeen, Latifur Khan, Bhavani Thuraisingham. 295-297 [doi]