Abstract is missing.
- On the Effectiveness of Intersection Attacks in Anonymous MicrobloggingSarah Abdelwahab Gaballah, Lamya Abdullah, Minh Tung Tran, Ephraim Zimmer, Max Mühlhäuser. 3-19 [doi]
- Data Privacy in Ride-Sharing Services: From an Analysis of Common Practices to Improvement of User AwarenessCarsten Hesselmann, Delphine Reinhardt, Jan Gertheiss, Jörg P. Müller. 20-39 [doi]
- Location Privacy, 5G AKA, and EnhancementsMohamed Taoufiq Damir, Valtteri Niemi. 40-57 [doi]
- Local Differential Privacy for Private Construction of Classification AlgorithmsMina Alishahi, Daan Gast, Sam Vermeiren. 58-79 [doi]
- IMSI Probing: Possibilities and LimitationsDaniel Fraunholz, Dominik Brunke, Simon Beidenhauser, Sebastian Berger, Hartmut Koenig, Daniel Reti. 80-97 [doi]
- Honeysweeper: Towards Stealthy Honeytoken Fingerprinting TechniquesMohamed Msaad, Shreyas Srinivasa, Mikkel Møller Andersen, David Holm Audran, Charity U. Orji, Emmanouil Vasilomanolakis. 101-119 [doi]
- Towards Self-monitoring Enclaves: Side-Channel Detection Using Performance CountersDavid Lantz, Felipe Boeira, Mikael Asplund. 120-138 [doi]
- DeCrypto: Finding Cryptocurrency Miners on ISP NetworksRichard Plný, Karel Hynek, Tomás Cejka. 139-158 [doi]
- Detection of Voice Conversion Spoofing Attacks Using Voiced SpeechArun Sankar Muttathu Sivasankara Pillai, Phillip L. De Leon, Utz Roedig. 159-175 [doi]
- A Wide Network Scanning for Discovery of UDP-Based Reflectors in the Nordic CountriesAlexander Bjerre, Andreas Philip Westh, Emil Villefrance, A S. M. Farhan Al Haque, Jonas Bukrinski Andersen, Lucas K. Helgogaard, Marios Anagnostopoulos. 176-193 [doi]
- GPU-FAN: Leaking Sensitive Data from Air-Gapped Machines via Covert Noise from GPU FansMordechai Guri. 194-211 [doi]
- Simplex: Repurposing Intel Memory Protection Extensions for Secure StorageMatthew Cole, Aravind Prakash. 215-233 [doi]
- Automatic Implementations Synthesis of Secure Protocols and Attacks from Abstract ModelsCamille Sivelle, Lorys Debbah, Maxime Puys, Pascal Lafourcade 0001, Thibault Franco-Rondisson. 234-252 [doi]
- How to Avoid Repetitions in Lattice-Based Deniable Zero-Knowledge ProofsXavier Arnal, Abraham Cano, Tamara Finogina, Javier Herranz. 253-269 [doi]
- Obfuscation-Resilient Semantic Functionality Identification Through Program SimulationSebastian Schrittwieser, Patrick Kochberger, Michael Pucher, Caroline Lawitschka, Philip König, Edgar R. Weippl. 273-291 [doi]
- Malware Analysis with Symbolic Execution and Graph KernelCharles-Henry Bertrand Van Ouytsel, Axel Legay. 292-310 [doi]
- WearSec: Towards Automated Security Evaluation of Wireless Wearable DevicesBernhards Blumbergs, Eriks Dobelis, Peteris Paikens, Krisjanis Nesenbergs, Kirils Solovjovs, Artis Rusins. 311-325 [doi]
- Maraudrone's Map: An Interactive Web Application for Forensic Analysis and Visualization of DJI Drone Log DataTobias Latzo, Andreas Hellmich, Annika Knepper, Lukas Hardi, Tim Phillip Castello-Waldow, Felix C. Freiling, Andreas Attenberger. 329-345 [doi]
- VinciDecoder: Automatically Interpreting Provenance Graphs into Textual Forensic Reports with Application to OpenStackAzadeh Tabiban, Heyang Zhao, Yosr Jarraya, Makan Pourzandi, Lingyu Wang 0001. 346-367 [doi]
- Actionable Cyber Threat Intelligence for Automated Incident ResponseCristoffer Leite, Jerry den Hartog, Daniel Ricardo Dos Santos, Elisa Costante. 368-385 [doi]