Abstract is missing.
- International Workshop on Cyber Range Technologies and Applications (CACOE 2020)Maria Leitner, Teodor Sommestad. 1 [doi]
- Automated Penetration Testing Using Deep Reinforcement LearningZhenguo Hu, Razvan Beuran, Yasuo Tan. 2-10 [doi]
- Comprehensive Cyber Arena; The Next Generation Cyber RangeMika Karjalainen, Tero Kokkonen. 11-16 [doi]
- Evaluation of Information Elements in a Cyber Incident ReportPatrik Lif, Stefan Varga, Mikael Wedlin, David Lindahl, Mats Persson. 17-26 [doi]
- Learning Analytics Perspective: Evidencing Learning from Digital Datasets in Cybersecurity ExercisesKaie Maennel. 27-36 [doi]
- CRATE Exercise Control - A cyber defense exercise management and support toolJonas Almroth, Tommy Gustafsson. 37-45 [doi]
- Replicated Testbed Experiments for the Evaluation of a Wide-range of DDoS DefensesAlefiya Hussain, David DeAngelis, Erik Kline, Stephen Schwab. 46-55 [doi]
- An Experimental Approach for Estimating Cyber Risk: a Proposal Building upon Cyber Ranges and Capture the FlagsGiorgio Di Tizio, Fabio Massacci, Luca Allodi, Stanislav Dashevskyi, Jelena Mirkovic. 56-65 [doi]
- First International Workshop on lightweight and Incremental Cybersecurity CertificationPhilippe Massonet. 66 [doi]
- How to stop crashing more than twice: A Clean-Slate Governance Approach to IT SecurityTobias Fiebig. 67-74 [doi]
- From Lightweight Cybersecurity Assessment to SME Certification Scheme in BelgiumChristophe Ponsard, Philippe Massonet, Jeremy Grandclaudon, Nicolas Point. 75-78 [doi]
- Towards Incremental Safety and Security Requirements Co-CertificationMorgagni Andrea, Massonet Philippe, Dupont Sbastien, Grandclaudon Jeremy. 79-84 [doi]
- Cybersecurity Certification for Agile and Dynamic Software Systems - a Process-Based ApproachVolkmar Lotz. 85-88 [doi]
- JCMathLib: Wrapper Cryptographic Library for Transparent and Certifiable JavaCard AppletsVasilios Mavroudis, Petr Svenda. 89-96 [doi]
- A Cross-Platform Evaluation of Privacy Notices and Tracking PracticesMaryam Mehrnezhad. 97-106 [doi]
- Data Sharing in Mobile Apps - User Privacy Expectations in EuropeNils Quermann, Martin Degeling. 107-119 [doi]
- GDPR Reality Check - Claiming and Investigating Personally Identifiable Data from CompaniesFatemeh Alizadeh, Timo Jakobi, Alexander Boden, Gunnar Stevens, Jens Boldt. 120-129 [doi]
- Analysis of publicly available anti-phishing webpages: contradicting information, lack of concrete advice and very narrow attack vectorMattia Mossano, Kami Vaniea, Lukas Aldag, Reyhan Düzgün, Peter Mayer, Melanie Volkamer. 130-139 [doi]
- Investigating Teenagers' Ability to Detect Phishing MessagesJames Nicholson, Yousra Javed, Matt Dixon, Lynne M. Coventry, Opeyemi Dele-Ajayi, Philip Anderson 0002. 140-149 [doi]
- Do Women in Conservative Societies (Not) Follow Smartphone Security Advice? A Case Study of Saudi Arabia and PakistanElham Al Qahtani, Yousra Javed, Heather Lipford, Mohamed Shehab. 150-159 [doi]
- Vision: I don't want to use my Phone! A Cognitive Walkthrough for YubiKeysClaudia Bischoff, Eva Gerlitz, Matthew Smith 0001. 160-165 [doi]
- Vision: Investigating Web API Developer Experience in Relation to Terms of Service and Privacy PoliciesAidah Ichario, Manuel Maarek. 166-171 [doi]
- Vision: Shred If Insecure - Persuasive Message Design as a Lesson and Alternative to Previous Approaches to Usable Secure Email InterfacesJan Tolsdorf, Luigi Lo Iacono. 172-177 [doi]
- Vision: What If They All Die? Crypto Requirements For Key PeopleChan Nam Ngo, Daniele Friolo, Fabio Massacci, Daniele Venturi 0001, Ettore Battaiola. 178-183 [doi]
- Vision: Why Johnny Can't Configure Smart Home? A Behavioural Framework for Smart Home Privacy ConfigurationJoseph Shams, Nalin A. G. Arachchilage, Jose M. Such. 184-189 [doi]
- Simulating the Effects of Social Presence on Trust, Privacy Concerns & Usage Intentions in Automated Bots for FinanceMagdalene Ng, Kovila P. L. Coopamootoo, Ehsan Toreini, Mhairi Aitken, Karen Elliott, Aad van Moorsel. 190-199 [doi]
- Cash, Cards or Cryptocurrencies? A Study of Payment Culture in Four CountriesKaroline Busse, Mohammad Tahaei, Katharina Krombholz, Emanuel von Zezschwitz, Matthew Smith 0001, Jing Tian, Wenyuan Xu. 200-209 [doi]
- Improving Non-Experts' Understanding of End-to-End Encryption: An Exploratory StudyWei Bai 0004, Michael Pearson, Patrick Gage Kelley, Michelle L. Mazurek. 210-219 [doi]
- Making Encryption Feel Secure: Investigating how Descriptions of Encryption Impact Perceived SecurityVerena Distler, Carine Lallemand, Vincent Koenig. 220-229 [doi]
- End User and Expert Perceptions of Threats and Potential CountermeasuresSimon Anell, Lea Gröber, Katharina Krombholz. 230-239 [doi]
- "Security should be there by default": Investigating how journalists perceive and respond to risks from the Internet of ThingsAnjuli R. K. Shere, Jason R. C. Nurse, Ivan Flechais. 240-249 [doi]
- Tech Pains: Characterizations of Lived Cybersecurity ExperiencesHuixin Tian, Chris Kanich, Jason Polakis, Sameer Patil. 250-259 [doi]
- HotSpot: Hot Issues in Security Principles and Trust 2020Joshua Guttman, Sebastian Mödersheim. 260 [doi]
- QQIF: Quantum Quantitative Information Flow (invited paper)Arthur Américo, Pasquale Malacaria. 261-270 [doi]
- Security across abstraction layers: old and new examplesFrank Piessens. 271-279 [doi]
- A Game Of Drones: Extending the Dolev-Yao Attacker Model With MovementAndrew Cook, Luca Viganò 0001. 280-292 [doi]
- Explainable SecurityLuca Viganò 0001, Daniele Magazzeni. 293-300 [doi]
- Preface on the International Workshop on Privacy Engineering 2020 (IWPE'20)José M. del Álamo, Jose M. Such, Isabel Wagner, Marvin Ramokapane. 301 [doi]
- LINDDUN GO: A Lightweight Approach to Privacy Threat ModelingKim Wuyts, Laurens Sion, Wouter Joosen. 302-309 [doi]
- Shedding light on web privacy impact assessment: A case study of the Ambient Light Sensor APILukasz Olejnik. 310-313 [doi]
- The Never-Ending Story: On the Need for Continuous Privacy Impact AssessmentLaurens Sion, Dimitri Van Landuyt, Wouter Joosen. 314-317 [doi]
- Extracting Layered Privacy Language Purposes from Web ServicesKalle Hjerppe, Jukka Ruohonen, Ville Leppänen. 318-325 [doi]
- On Compliance of Cookie Purposes with the Purpose Specification PrincipleImane Fouad, Cristiana Santos, Feras Al Kassar, Nataliia Bielova, Stefano Calzavara. 326-333 [doi]
- A Siamese Adversarial Anonymizer for Data Minimization in Biometric ApplicationsGiuseppe Garofalo, Tim Van hamme, Davy Preuveneers, Wouter Joosen. 334-343 [doi]
- Enhancing Privacy via Hierarchical Federated LearningAidmar Wainakh, Alejandro Sánchez Guinea, Tim Grube, Max Mühlhäuser. 344-347 [doi]
- Reconciling Privacy and Utility for Energy Services - an Application to Demand Response ProtocolsFranklin Leukam Lako, Paul Lajoie-Mazenc, Maryline Laurent. 348-355 [doi]
- IEEE S&B 2020: 4th IEEE Workshop on Security and Privacy on the BlockchainTim Ruffing, Florian Tschorsch. 356 [doi]
- FileBounty: Fair Data ExchangeSimon Janin, Kaihua Qin, Akaki Mamageishvili, Arthur Gervais. 357-366 [doi]
- Performance Trade-offs in Design of MimbleWimble Proofs of ReservesSuyash Bagad, Saravanan Vijayakumaran. 367-377 [doi]
- zkRelay: Facilitating Sidechains using zkSNARK-based Chain-RelaysMartin Westerkamp, Jacob Eberhardt. 378-386 [doi]
- A Quantitative Analysis of Security, Anonymity and Scalability for the Lightning NetworkSergei Tikhomirov, Pedro Moreno-Sanchez, Matteo Maffei. 387-396 [doi]
- Ostraka: Secure Blockchain Scaling by Node ShardingAlex Manuskin, Michael Mirkin, Ittay Eyal. 397-406 [doi]
- An Automatic Detection and Analysis of the Bitcoin Generator ScamEmad Badawi, Guy-Vincent Jourdan, Gregor von Bochmann, Iosif-Viorel Onut. 407-416 [doi]
- CryptoWills: How to Bequeath CryptoassetsIstván András Seres, Omer Shlomovits, Pratyush Ranjan Tiwari. 417-426 [doi]
- WACCO 2020: the 2nd Workshop on Attackers and Cybercrime Operations Co-held with IEEE European Symposium on Security and Privacy 2020Luca Allodi, Alice Hutchings, Fabio Massacci, Sergio Pastrana, Marie Vasek. 427 [doi]
- A tight scrape: methodological approaches to cybercrime research data collection in adversarial environmentsKieron Turk, Sergio Pastrana, Ben Collier. 428-437 [doi]
- #ISIS vs #ActionCountersTerrorism: A Computational Analysis of Extremist and Counter-extremist Twitter NarrativesFatima Zahrah, Jason R. C. Nurse, Michael Goldsmith. 438-447 [doi]
- Mapping the Geography of Cybercrime: A Review of Indices of Digital Offending by CountryJonathan Lusthaus, Miranda Bruce, Nigel Phair. 448-453 [doi]
- Growth and Commoditization of Remote Access TrojansVeronica Valeros, Sebastian Garcia. 454-462 [doi]
- My Boss is Really Cool: Malware-Induced Misperception in Workplace Communication Through Covert Linguistic Manipulation of EmailsFilipo Sharevski, Peter Jachim, Paige Treebridge, Audrey Li, Adam Babin. 463-470 [doi]
- Don't Forget the Human: a Crowdsourced Approach to Automate Response and Containment Against Spear Phishing AttacksPavlo Burda, Luca Allodi, Nicola Zannone. 471-476 [doi]
- Knowledge is power: An analysis of discussions on hacking forumsJohn McAlaney, Sarah Hambidge, Emily Kimpton, Helen Thackray. 477-483 [doi]
- A Social Network Analysis and Comparison of Six Dark Web ForumsIldiko Pete, Jack Hughes, Yi Ting Chua, Maria Bada. 484-493 [doi]
- A Measurement Study on the Advertisements Displayed to Web Users Coming from the Regular Web and from TorAdrian Bermudez-Villalva, Mirco Musolesi, Gianluca Stringhini. 494-499 [doi]
- How can data from fitness trackers be obtained and analyzed with a forensic approach?Florian Hantke, Andreas Dewald. 500-508 [doi]
- Typosquatting and Combosquatting Attacks on the Python EcosystemDuc Ly Vu, Ivan Pashchenko, Fabio Massacci, Henrik Plate, Antonino Sabetta. 509-514 [doi]
- Are You a Favorite Target For Cryptojacking? A Case-Control Study On The Cryptojacking EcosystemGiorgio Di Tizio, Chan Nam Ngo. 515-520 [doi]
- Preface on the 5th International Workshop on Traffic Measurements for CybersecurityMaciej Korczynski, Wojciech Mazurczyk, Pedro Casas. 521 [doi]
- Discovering HTTPSified Phishing Websites Using the TLS Certificates FootprintsYuji Sakurai, Takuya Watanabe 0001, Tetsuya Okuda, Mitsuaki Akiyama, Tatsuya Mori. 522-531 [doi]
- Feasibility of Large-Scale Vulnerability Notifications after GDPRWissem Soussi, Maciej Korczynski, Sourena Maroofi, Andrzej Duda. 532-537 [doi]
- The Forgotten Side of DNS: Orphan and Abandoned RecordsRaffaele Sommese, Mattijs Jonker, Roland van Rijswijk-Deij, Alberto Dainotti, Kimberly C. Claffy, Anna Sperotto. 538-543 [doi]
- TXTing 101: Finding Security Issues in the Long Tail of DNS TXT RecordsOlivier van der Toorn, Roland van Rijswijk-Deij, Tobias Fiebig, Martina Lindorfer, Anna Sperotto. 544-549 [doi]
- Into the DDoS maelstrom: a longitudinal study of a scrubbing serviceGiovane C. M. Moura, Cristian Hesselman, Gerald Schaapman, Nick Boerman, Octavia de Weerdt. 550-558 [doi]
- A Case of Identity: Detection of Suspicious IDN Homograph Domains Using Active DNS MeasurementsRamin Yazdani, Olivier van der Toorn, Anna Sperotto. 559-564 [doi]
- Forensic Analysis of Network Attacks: Restructuring Security Events as Graphs and Identifying Strongly Connected Sub-graphsLaetitia Leichtnam, Eric Totel, Nicolas Prigent, Ludovic Mé. 565-573 [doi]
- WhatsThat? On the Usage of Hierarchical Clustering for Unsupervised Detection & Interpretation of Network AttacksPavol Mulinka, Kensuke Fukuda, Pedro Casas, Lukas Kencl. 574-583 [doi]
- Experimental study of performance and vulnerabilities of IEC 61850 process bus communications on HSR networksStéphane Mocanu, Jean-Marc Thiriet. 584-593 [doi]
- Network Fingerprinting: Routers under AttackEmeline Marechal, Benoit Donnet. 594-599 [doi]
- Defensive Programming for Smart Home CybersecurityMaria Teresa Rossi, Renan Greca, Ludovico Iovino, Giorgio Giacinto, Antonia Bertoli. 600-605 [doi]
- Resilient Self-Debugging Software ProtectionBert Abrath, Bart Coppens, Ilja Nevolin, Bjorn De Sutter. 606-615 [doi]
- Abusing Android Runtime for Application ObfuscationPierre Graux, Jean-François Lalande, Pierre Wilke, Valérie Viet Triem Tong. 616-624 [doi]
- Revealing Similarities in Android Malware by Dissecting their MethodsMichele Pasetto, Niccolò Marastoni, Mila Dalla Preda. 625-634 [doi]
- Towards Formal Verification of Program ObfuscationWeiyun Lu, Bahman Sistany, Amy P. Felty, Philip J. Scott. 635-644 [doi]
- SecWeb 2020 PrefaceStefano Calzavara, Ben Stock. 645 [doi]
- No Phishing With the Wrong Bait: Reducing the Phishing Risk by Address SeparationVincent Drury, Ulrike Meyer. 646-652 [doi]
- Hardening Firefox against Injection AttacksChristoph Kerschbaumer, Tom Ritter, Frederik Braun. 653-663 [doi]
- User Access Privacy in OAuth 2.0 and OpenID ConnectWanpeng Li, Chris J. Mitchell. 664-672 [doi]
- Oh, the Places You'll Go! Finding Our Way Back from the Web Platform's Ill-conceived JauntsArtur Janc, Mike West. 673-680 [doi]
- nd Workshop on the Security of Software/Hardware Interfaces (SILM 2020)Guillaume Hiet, Frédéric Tronel, Jean-Louis Lanet. 681 [doi]
- Reverse Engineering the Stream Prefetcher for ProfitAditya Rohan, Biswabandan Panda, Prakhar Agarwal. 682-687 [doi]
- CHERI Macaroons: Efficient, host-based access control for cyber-physical systemsMichael Dodson, Alastair R. Beresford, Alexander Richardson, Jessica Clarke, Robert N. M. Watson. 688-693 [doi]
- NOP-Oriented Programming: Should we Care?Pierre-Yves Péneau, Ludovic Claudepierre, Damien Hardy, Erven Rohou. 694-703 [doi]
- REHAD: Using Low-Frequency Reconfigurable Hardware for Cache Side-Channel Attacks DetectionYuxiao Mao, Vincent Migliore, Vincent Nicomette. 704-709 [doi]
- Nethammer: Inducing Rowhammer Faults through Network RequestsMoritz Lipp, Michael Schwarz 0001, Lukas Raab, Lukas Lamster, Misiker Tadesse Aga, Clémentine Maurice, Daniel Gruss. 710-719 [doi]