Abstract is missing.
- Towards Cybersecurity MOOC CertificationMatthias Beckerle, Argyro Chatzopoulou, Simone Fischer-Hübner. 1-11 [doi]
- Incremental Common Criteria Certification Processes using DevSecOps PracticesSébastien Dupont, Guillaume Ginis, Mirko Malacario, Claudio Porretti, Nicolò Maunero, Christophe Ponsard, Philippe Massonet. 12-23 [doi]
- JSONPS: Secure an inherently insecure practice with this one weird trick!Sebastian Lekies, Damien Engels, Metodi Mitkov. 24-31 [doi]
- EssentialFP: Exposing the Essence of Browser FingerprintingAlexander Sjösten, Daniel Hedin, Andrei Sabelfeld. 32-48 [doi]
- A preliminary study on the adoption and effectiveness of SameSite cookies as a CSRF defenceLuca Compagna, Hugo Jonker, Johannes Krochewski, Benjamin Krumnow, Merve Sahin. 49-59 [doi]
- Adopting Trusted Types in ProductionWeb Frameworks to Prevent DOM-Based Cross-Site Scripting: A Case StudyPei Wang, Bjarki Ágúst Guðmundsson, Krzysztof Kotowicz. 60-73 [doi]
- FlushBlocker: Lightweight mitigating mechanism for CPU cache flush instruction based attacksShuhei Enomoto, Hiroki Kuzuno. 74-79 [doi]
- Borrowed Capabilities: Flexibly Enforcing Revocation on a Capability ArchitectureThijs Vercammen, Thomas Van Strydonck, Dominique Devriese. 80-85 [doi]
- DAMAS: Control-Data Isolation at Runtime through Dynamic Binary ModificationCamille Le Bon, Erven Rohou, Frédéric Tronel, Guillaume Hiet. 86-95 [doi]
- Virtual Platform to Analyze the Security of a System on Chip at Microarchitectural LevelQuentin Forcioli, Jean-Luc Danger, Clémentine Maurice, Lilian Bossuet, Florent Bruguier, Maria Mushtaq, David Novo, Loïc France, Pascal Benoit, Sylvain Guilley, Thomas Perianin. 96-102 [doi]
- Analyzing the Viability of UAV Missions Facing Cyber AttacksJukka Soikkeli, Cora Perner, Emil C. Lupu. 103-112 [doi]
- A Secure Cell-Attachment Procedure of LDACSNils Mäurer, Thomas Gräupl, Christoph Gentsch, Tobias Guggemos, Marcel Tiepelt, Corinna Schmitt, Gabi Dreo Rodosek. 113-122 [doi]
- Using Cyber Digital Twins for Automated Automotive Cybersecurity TestingStefan Marksteiner, Slava Bronfman, Markus Wolf 0003, Eddie Lazebnik. 123-128 [doi]
- A Model-Driven Methodology for Automotive Cybersecurity Test Case GenerationStefan Marksteiner, Peter Priller. 129-135 [doi]
- Privacy and modern cars through a dual lensGiampaolo Bella, Pietro Biondi, Marco De Vincenzi, Giuseppe Tudisco. 136-143 [doi]
- Exploring Cybercrime Disruption through Laboratory ExperimentsLonie Sebagh, Jonathan Lusthaus, Edoardo Gallo, Federico Varese, Sean Sirur. 144-148 [doi]
- Dissecting Social Engineering Attacks Through the Lenses of CognitionPavlo Burda, Luca Allodi, Nicola Zannone. 149-160 [doi]
- Modelling the Cybercrime Cascade Effect in Data CrimeMaria Grazia Porcedda, David S. Wall. 161-177 [doi]
- Modelling Disruptive APTs targeting Critical Infrastructure using Military TheoryYoram J. Meijaard, Peter-Paul Meiler, Luca Allodi. 178-190 [doi]
- Follow the money: The relationship between currency exchange and illicit behaviour in an underground forumGilberto Atondo Siu, Ben Collier, Alice Hutchings. 191-201 [doi]
- Get Rich or Keep Tryin' Trajectories in dark net market vendor careersTim M. Booij, Thijmen Verburgh, Federico Falconieri, Rolf van Wegberg. 202-212 [doi]
- Cybercrime Specialization: An Exposé of a Malicious Android Obfuscation-as-a-ServiceVít Sembera, Masarah Paquet-Clouston, Sebastián García, María José Erquiaga. 213-226 [doi]
- The Impact of Adverse Events in Darknet Markets: an Anomaly Detection ApproachZiauddin Ursani, Claudia Peersman, Matthew Edwards 0001, Chao Chen, Awais Rashid. 227-238 [doi]
- Cybersecurity Test Range for Autonomous Vehicle ShuttlesAndrew Roberts, Olaf Maennel, Nikita Snetkov. 239-248 [doi]
- Ontology-Based Scenario Modeling for Cyber Security ExerciseShao-Fang Wen, Muhammad Mudassar Yamin, Basel Katt. 249-258 [doi]
- Success Factors for Designing a Cybersecurity Exercise on the Example of Incident ResponseSten Mäses, Kaie Maennel, Mascia Toussaint, Veronica Rosa. 259-268 [doi]
- Drivers and Obstacles for the Adoption of Consent Management Solutions by Ad-Tech ProvidersPaulina Jo Pesch. 269-277 [doi]
- Pragmatic Online Privacy: the SftE ApproachVitor Jesus. 278-282 [doi]
- Representing Consent and Policies for CompliancePiero A. Bonatti, Luigi Sauro, Jonathan Langens. 283-291 [doi]
- Visualisation Techniques for Consent: Finding Common Ground in Comic Art with Indigenous PopulationsMaria Wilhelmina Botes, Arianna Rossi. 292-297 [doi]
- ODRL Profile for Expressing Consent through Granular Access Control Policies in SolidBeatriz Esteves, Harshvardhan J. Pandit, Víctor Rodríguez-Doncel. 298-306 [doi]
- Contextuality and Intersectionality of E-Consent: A Human-centric Reflection on Digital Consenting in the Emerging Genetic Data MarketsSoheil Human, Mandan Kazzazi. 307-311 [doi]
- TIRA: An OpenAPI Extension and Toolbox for GDPR Transparency in RESTful ArchitecturesElias Grünewald, Paul Wille, Frank Pallas, Maria C. Borges, Max-Robert Ulbricht. 312-319 [doi]
- Privacy Considerations for Risk-Based Authentication SystemsStephan Wiefling, Jan Tolsdorf, Luigi Lo Iacono. 320-327 [doi]
- Towards Explaining Epsilon: A Worst-Case Study of Differential Privacy RisksLuise Mehner, Saskia Nuñez von Voigt, Florian Tschorsch. 328-331 [doi]
- A Model-based Approach to Realize Privacy and Data Protection by DesignGabriel Pedroza, Victor Muntés-Mulero, Yod-Samuel Martín, Guillaume Mockly. 332-339 [doi]
- Quantitative Privacy Risk AnalysisR. Jason Cronk, Stuart S. Shapiro. 340-350 [doi]
- An Overview of Runtime Data Protection Enforcement ApproachesLaurens Sion, Dimitri Van Landuyt, Wouter Joosen. 351-358 [doi]
- How Standards Co-Shape Personal Data Protection in the European Banking SectorIne van Zeeland, Jo Pierson. 359-366 [doi]
- Structural Attacks on Local Routing in Payment Channel NetworksBen Weintraub, Cristina Nita-Rotaru. 367-379 [doi]
- ProMutator: Detecting Vulnerable Price Oracles in DeFi by Mutated TransactionsShih-Hong Wang, Chia-Chien Wu, Yu-Chuan Liang, Li-Hsun Hsieh, Hsu-Chun Hsiao. 380-385 [doi]
- Publicly Auditable MPC-as-a-Service with succinct verification and universal setupSanket Kanjalkar, Ye Zhang, Shreyas Gandlur, Andrew Miller 0001. 386-411 [doi]
- Modeling the Block Verification Time of ZcashFabian Stiehle, Erik Daniel, Florian Tschorsch. 412-416 [doi]