Abstract is missing.
- A Threat Model for Soft Privacy on Smart CarsMario Raciti, Giampaolo Bella. 1-10 [doi]
- Vulnerability Analysis of Vehicular Coordinated ManeuversKonstantinos Kalogiannis, Andreas Henriksson, Panos Papadimitratos. 11-20 [doi]
- A Preliminary Study of Privilege Life Cycle in Software Management Platform Automation WorkflowsGiacomo Benedetti, Luca Verderame, Alessio Merlo. 21-28 [doi]
- An Investigation of Quality Issues in Vulnerability Detection DatasetsYuejun Guo 0001, Seifeddine Bettaieb. 29-33 [doi]
- GLICE: Combining Graph Neural Networks and Program Slicing to Improve Software Vulnerability DetectionWesley de Kraker, Harald Vranken, Arjen Hommmersom. 34-41 [doi]
- Guiding Directed Fuzzing with FeasibilityWeiheng Bai, Kefu Wu, Qiushi Wu, Kangjie Lu. 42-49 [doi]
- Effective Machine Learning-based Access Control Administration through UnlearningJavier Martínez Llamas, Davy Preuveneers, Wouter Joosen. 50-57 [doi]
- An Analysis System to Test Security of Software on Continuous Integration-Continuous Delivery PipelineCarmelo Aparo, Cinzia Bernardeschi, Giuseppe Lettieri, Fabio Lucattini, Salvatore Montanarella. 58-67 [doi]
- Tales from the Git: Automating the detection of secrets on code and assessing developers' passwords choicesNikolaos Lykousas, Constantinos Patsakis. 68-75 [doi]
- A 'Human-in-the-Loop' approach for Information Extraction from Privacy Policies under Data ScarcityMichael Gebauer, Faraz Maschhur, Nicola Leschke, Elias Grünewald, Frank Pallas. 76-83 [doi]
- An Analysis of Requirements and Privacy Threats in Mobile Data DonationsLeonie Reichert, Björn Scheuermann 0001. 84-93 [doi]
- ATLAS: Automatically Detecting Discrepancies Between Privacy Policies and Privacy LabelsAkshath Jain, David Rodriguez, José M. del Álamo, Norman M. Sadeh. 94-107 [doi]
- Automating privacy decisions -where to draw the line?Victor Morel, Simone Fischer-Hübner. 108-116 [doi]
- Lessons Learned: Building a Privacy-Preserving Entity Resolution Adaptation of PPJoin using End-to-End Homomorphic EncryptionTanmay Ghai, Yixiang Yao, Srivatsan Ravi. 117-124 [doi]
- Privacy as an Architectural Quality: A Definition and an Architectural ViewImmanuel Kunz, Shuqian Xu. 125-132 [doi]
- Secure Key Management for Multi-Party Computation in MOZAIKEnzo Marquet, Jerico Moeyersons, Erik Pohle, Michiel Van Kenhove, Aysajan Abidin, Bruno Volckaert. 133-140 [doi]
- Unified Communication: What do Digital Activists need?Thomas Reisinger, Isabel Wagner, Eerke A. Boiten. 141-149 [doi]
- Comparing Privacy Label Disclosures of Apps Published in both the App Store and Google Play StoresDavid Rodriguez, Akshath Jain, José M. del Álamo, Norman Sadeh 0001. 150-157 [doi]
- "Get a higher return on your savings!": Comparing adverts for cryptocurrency investment scams across platformsGilberto Atondo Siu, Alice Hutchings. 158-169 [doi]
- An Argument for Linguistic Expertise in Cyberthreat Analysis: LOLSec in Russian Language eCrime LandscapeDalyapraz Manatova, L. Jean Camp, Julia R. Fox, Sandra Kübler, Maria A Shardakova, Inna Kouper. 170-176 [doi]
- Applying Neutralisation Theory to Better Understand Ransomware OffendersLena Yuryna Connolly, Hervé Borrion, Budi Arief, Sanna Kaddoura. 177-182 [doi]
- Digital Drift and the Evolution of a Large Cybercrime ForumJack Hughes 0001, Alice Hutchings. 183-193 [doi]
- Enhancing Vulnerability Prioritization: Data-Driven Exploit Predictions with Community-Driven InsightsJay Jacobs, Sasha Romanosky, Octavian Suciuo, Benjamin Edwards, Armin Sarabi. 194-206 [doi]
- How Cryptocurrency Exchange Interruptions Create Arbitrage OpportunitiesAndrew Morin, Tyler Moore 0001. 207-215 [doi]
- Mapping the Cyberstalking Landscape: An Empirical Analysis of Federal U.S CrimesSasha Romanosky, Peter Schirmer. 216-226 [doi]
- On Gaps in Enterprise Cyber Attack ReportingAbulfaz Hajizada, Tyler Moore 0001. 227-231 [doi]
- The Peculiar Case of Tailored Phishing against SMEs: Detection and Collective DefenseMechanisms at a Small IT CompanyPavlo Burda, Abdul Malek Altawekji, Luca Allodi, Nicola Zannone. 232-243 [doi]
- Visualizing Cyber-Threats in Underground ForumsJames Burroughs, Michal Tereszkowski-Kaminski, Guillermo Suarez-Tangil. 244-258 [doi]
- A Hybrid Solution for Constrained Devices to Detect Microarchitectural AttacksNikolaos Foivos Polychronou, Pierre-Henri Thevenon, Maxime Puys, Vincent Beroulle. 259-269 [doi]
- A Practical Deep Learning-Based Acoustic Side Channel Attack on KeyboardsJoshua Harrison, Ehsan Toreini, Maryam Mehrnezhad. 270-280 [doi]
- Combined Internal Attacks on SoC-FPGAs: Breaking AES with Remote Power Analysis and Frequency-based Covert ChannelsAnis Fellah-Touta, Lilian Bossuet, Carlos Andres Lara-Nino. 281-286 [doi]
- Emulating Side Channel Attacks on gem5: lessons learnedLilian Bossuet, Vincent Grosso, Carlos Andres Lara-Nino. 287-295 [doi]
- TimeInspector: A Static Analysis Approach for Detecting Timing AttacksFatih Durmaz, Nureddin Kamadan, Melih Taha Öz, Musa Sadik Unal, Arsalan Javeed, Cemal Yilmaz, Erkay Savas. 296-303 [doi]
- Work in Progress: Thwarting Timing Attacks in Microcontrollers using Fine-grained Hardware ProtectionsNicolas Gaudin, Jean-Loup Hatchikian-Houdot, Frédéric Besson, Pascal Cotret, Guy Gogniat, Guillaume Hiet, Vianney Lapotre, Pierre Wilke. 304-310 [doi]
- Faulting original McEliece's implementations is possible How to mitigate this risk?Vincent Giraud, Guillaume Bouffard. 311-319 [doi]
- A Digital Forensic Taxonomy For Programmable Logic Controller Data ArtefactsFeras Shahbi, Joseph Gardiner, Sridhar Adepu, Awais Rashid. 320-328 [doi]
- A Key to Embedded System Security: Locking and Unlocking Secrets with a Trusted Platform ModuleTeri Lenard, Anastasija Collen, Niels A. Nijdam, Béla Genge. 329-335 [doi]
- From Tactics to Techniques: A Systematic Attack Modeling for Advanced Persistent Threats in Industrial Control SystemsYunhe Yang, Mu Zhang. 336-344 [doi]
- The Bandit's States: Modeling State Selection for Stateful Network Fuzzing as Multi-armed Bandit ProblemAnne Borcherding, Mark Giraud, Ian Fitzgerald, Jürgen Beyerer. 345-350 [doi]
- The Case for Virtual PLC-enabled Honeypot DesignSamin Y. Chowdhury, Brandon Dudley, Ruimin Sun. 351-357 [doi]
- To me, to you: Towards Secure PLC Programming through a Community-Driven Open-Source InitiativeRichard Derbyshire, Sam Maesschalck, Alexander Staves, Benjamin Green 0001, David Hutch. 358-362 [doi]
- Unsafe Behavior Detection with Adaptive Contrastive Learning in Industrial Control SystemsXu Zheng, Tianchun Wang, Samin Yasar Chowdhury, Ruimin Sun, Dongsheng Luo. 363-369 [doi]
- ARCSG: Advancing Resilience of Cyber-Physical Smart Grid: An Integrated Co-Simulation Approach Incorporating Indicators of CompromiseMohammed Asiri, Neetesh Saxena, Pete Burnap. 370-378 [doi]
- Re-Envisioning Industrial Control Systems Security by Considering Human Factors as a Core Element of Defense-in-DepthJens Pottebaum, Jost Rossel, Juraj Somorovsky, Yasemin Acar, René Fahr, Patricia Arias Cabarcos, Eric Bodden, Iris Gräßler. 379-385 [doi]
- D-GATE: Decentralized Geolocation and Time Enforcement for Usage ControlHendrik Meyer zum Felde, Jean-Luc Reding, Michael Lux. 386-395 [doi]
- Hexanonymity: a scalable geo-positioned data clustering algorithm for anonymisation purposesJavier Rodriguez-Viñas, Ines Ortega-Fernandez, Eva Sotos Martínez. 396-404 [doi]
- Masking Location Streams in the Presence of Colluding Service ProvidersToon Dehaene, Michiel Willocx, Bert Lagaisse, Vincent Naessens. 405-414 [doi]
- A Wolf in Sheep's Clothing: Query-Free Evasion Attacks Against Machine Learning-Based Malware Detectors with Generative Adversarial NetworksDaniel Gibert, Jordi Planes, Quan Le, Giulio Zizzo. 415-426 [doi]
- Simplification of General Mixed Boolean-Arithmetic Expressions: GAMBABenjamin Reichenwallner, Peter Meerwald-Stadler. 427-438 [doi]
- Temporal Analysis of Distribution Shifts in Malware Classification for Digital ForensicsFrancesco Zola, Jan Lukas Bruse, Mikel Galar. 439-450 [doi]
- How well does GPT phish people? An investigation involving cognitive biases and feedbackMegha Sharma, Kuldeep Singh 0005, Palvi Aggarwal, Varun Dutt. 451-457 [doi]
- Learning to Defend by Attacking (and Vice-Versa): Transfer of Learning in Cybersecurity GamesTyler Malloy, Cleotilde Gonzalez. 458-464 [doi]
- Honey Infiltrator: Injecting Honeytoken Using NetfilterDaniel Reti, Tillmann Angeli, Hans D. Schotten. 465-469 [doi]
- A First Look at SVCB and HTTPS DNS Resource Records in the WildJohannes Zirngibl, Patrick Sattler, Georg Carle. 470-474 [doi]
- Assessing and Exploiting Domain Name MisinformationBlake Anderson, David A. McGrew. 475-486 [doi]
- Assessing Network Operator Actions to Enhance Digital Sovereignty and Strengthen Network Resilience: A Longitudinal Analysis during the Russia-Ukraine ConflictMuhammad Yasir Muzayan Haq, Abhishta Abhishta, Raffaele Sommese, Mattijs Jonker, Lambert J. M. Nieuwenhuis. 487-494 [doi]
- Detecting and Analyzing Mouse Tracking in the WildMarcel Urpí-Bricollé, Ismael Castell-Uroz, Pere Barlet-Ros. 495-500 [doi]
- Inside Residential IP Proxies: Lessons Learned from Large Measurement CampaignsElisa Chiapponi, Marc Dacier, Olivier Thonnard. 501-512 [doi]
- Lost in Translation: AI-based Generator of Cross-Language Sound-squattingRodolfo V. Valentim, Idilio Drago, Marco Mellia, Federico Cerutti 0001. 513-520 [doi]
- Revisiting OAuth 2.0 Compliance: A Two-Year Follow-Up StudyPieter Philippaerts, Davy Preuveneers, Wouter Joosen. 521-525 [doi]
- TLS → Post-Quantum TLS: Inspecting the TLS landscape for PQC adoption on AndroidDimitri Mankowski, Thom Wiggers, Veelasha Moonsamy. 526-538 [doi]
- Towards more rigorous domain-based metrics: quantifying the prevalence and implications of "Active" DomainsSiôn Lloyd, Carlos Hernandez Gañán, Samaneh Tajalizadehkhoob. 539-545 [doi]
- Unveiling the Weak Links: Exploring DNS Infrastructure Vulnerabilities and Fortifying DefensesYevheniya Nosyk, Olivier Hureau, Simon Fernandez, Andrzej Duda, Maciej Korczynski. 546-557 [doi]
- Fake it till you Detect it: Continual Anomaly Detection in Multivariate Time-Series using Generative AIGastón García González, Pedro Casas, Alicia Fernández. 558-566 [doi]
- Identifying and Differentiating Acknowledged Scanners in Network TrafficM. Patrick Collins, Alefiya Hussain, Stephen Schwab. 567-574 [doi]
- "As Usual, I Needed Assistance of a Seeing Person": Experiences and Challenges of People with Disabilities and Authentication MethodsAhmet Erinola, Annalina Buckmann, Jennifer Friedauer, Asli Yardim, M. Angela Sasse. 575-593 [doi]
- Talking Abortion (Mis)information with ChatGPT on TikTokFilipo Sharevski, Jennifer Vander Loop, Peter Jachim, Amy Devine, Emma Pieroni. 594-608 [doi]
- Work in Progress: A Glance at Social Media Self-Censorship in North AmericaWei Hu, Diogo Barradas. 609-618 [doi]
- Position Paper: The role of law in achieving privacy and security measures in smart buildings from the GDPR contextNatalie Leesakul, Charles Morisset. 619-626 [doi]
- Divided We Hack: Exploring the Degree of Sino-Russian Coordination in Cyberspace During the Ukraine WarFrancesco Ferazza, Cosimo Melella, Konstantinos Mersinas, Antonio Calcara. 627-640 [doi]
- U-Sense: Feasibility Study of "Human as a Sensor" in Incident Reporting Systems in a Smart CampusNaoom Abu Abah, Nick Taylor, Charles Morisset, Maryam Mehrnezhad. 641-652 [doi]
- Work in Progress: Evaluation of Security Standards through a Cyber Range using Hackers' Tactics, Techniques and ProceduresPatrick Wake, Sue Black 0001, Jonathan Young. 653-658 [doi]
- What We Do in the Shadows: How does Experiencing Cybercrime Affect Response Actions & Protective Practices?Magdalene Ng, Maria Bada, Kovila P. L. Coopamootoo. 659-672 [doi]