Abstract is missing.
- Time Will Tell: Exploiting Timing Leaks Using HTTP Response HeadersVik Vanderlinden, Tom van Goethem, Mathy Vanhoef. 3-22 [doi]
- Peering into the Darkness: The Use of UTRS in Combating DDoS AttacksRadu Anghel, Swaathi Vetrivel, Elsa Turcios Rodriguez, Kaichi Sameshima, Daisuke Makita, Katsunari Yoshioka, Carlos Gañán, Yury Zhauniarovich. 23-41 [doi]
- Protocol Dialects as Formal PatternsD. Galán, Víctor García, Santiago Escobar 0001, Catherine A. Meadows, José Meseguer 0001. 42-61 [doi]
- ResolFuzz: Differential Fuzzing of DNS ResolversJonas Bushart, Christian Rossow. 62-80 [doi]
- Fingerprinting of Cellular Infrastructure Based on Broadcast InformationAnup Kiran Bhattacharjee, Stefano Cecconello, Fernando Kuipers, Georgios Smaragdakis. 81-101 [doi]
- One IDS Is Not Enough! Exploring Ensemble Learning for Industrial Intrusion DetectionKonrad Wolsing, Dominik Kus, Eric Wagner 0003, Jan Pennekamp, Klaus Wehrle, Martin Henze. 102-122 [doi]
- Evaluating the Security Posture of 5G Networks by Combining State Auditing and Event MonitoringMd. Nazmul Hoq, Jia-Wei Yao, Suryadipta Majumdar, Luis Suárez, Lingyu Wang 0001, Amine Boukhtouta, Makan Pourzandi, Mourad Debbabi. 123-144 [doi]
- PrivMail: A Privacy-Preserving Framework for Secure EmailsGowri R. Chandran, Raine Nieminen, Thomas Schneider 0003, Ajith Suresh. 145-165 [doi]
- Towards Efficient Privacy-Preserving Deep Packet InspectionWeicheng Wang, Hyunwoo Lee 0001, Yan Huang, Elisa Bertino, Ninghui Li. 166-192 [doi]
- Panini - Anonymous Anycast and an InstantiationChristoph Coijanovic, Christiane Weis, Thorsten Strufe. 193-211 [doi]
- Curveball+: Exploring Curveball-Like Vulnerabilities of Implicit Certificate ValidationYajun Teng, Wei Wang 0314, Jun Shao, Huiqing Wan, Heqing Huang, Yong Liu, Jingqiang Lin. 212-234 [doi]
- Malware Classification Using Open Set Recognition and HTTP Protocol RequestsPiotr Bialczak, Wojciech Mazurczyk. 235-254 [doi]
- Static Semantics Reconstruction for Enhancing JavaScript-WebAssembly Multilingual Malware DetectionYifan Xia, Ping He, Xuhong Zhang 0002, Peiyu Liu 0003, Shouling Ji, Wenhai Wang. 255-276 [doi]
- A New Model for Testing IPv6 Fragment HandlingEdoardo Di Paolo, Enrico Bassetti, Angelo Spognardi. 277-294 [doi]
- Trajectory Hiding and Sharing for Supply Chains with Differential PrivacyTianyu Li 0002, Li Xu, Zekeriya Erkin, Reginald L. Lagendijk. 297-317 [doi]
- A User-Centric Approach to API Delegations - Enforcing Privacy Policies on OAuth DelegationsShirin Kalantari, Pieter Philippaerts, Yana Dimova, Danny Hughes 0001, Wouter Joosen, Bart De Decker. 318-337 [doi]
- Traffic Analysis by Adversaries with Partial VisibilityIness Ben Guirat, Claudia Díaz, Karim Eldefrawy, Hadas Zeilberger. 338-358 [doi]
- Learning Markov Chain Models from Sequential Data Under Local Differential PrivacyEfehan Guner, Mehmet Emre Gursoy. 359-379 [doi]
- Achilles' Heels: Vulnerable Record Identification in Synthetic Data PublishingMatthieu Meeus, Florent Guépin, Ana-Maria Cretu 0002, Yves-Alexandre de Montjoye. 380-399 [doi]
- Enforcing the GDPRFrançois Hublet, David A. Basin, Srdan Krstic. 400-422 [doi]
- Identity-Based Matchmaking Encryption with Enhanced Privacy - A Generic Construction with Practical InstantiationsXavier Boyen, Qinyi Li. 425-445 [doi]
- Item-Oriented Personalized LDP for Discrete Distribution EstimationXin Li, Hong Zhu 0003, Zhiqiang Zhang, Meiyi Xie. 446-466 [doi]
- Intelligent Zigbee Protocol Fuzzing via Constraint-Field Dependency InferenceMengfei Ren 0001, Haotian Zhang, Xiaolei Ren, Jiang Ming 0002, Yu Lei 0001. 467-486 [doi]
- FSmell: Recognizing Inline Function in Binary CodeWei Lin, Qingli Guo, Jiawei Yin, Xiangyu Zuo, Rongqing Wang, Xiaorui Gong. 487-506 [doi]
- LFuzz: Exploiting Locality-Enabled Techniques for File-System FuzzingWenqing Liu, An-I Andy Wang. 507-525 [doi]