Abstract is missing.
- XML Signature Wrapping Still Considered Harmful: A Case Study on the Personal Health Record in GermanyPaul Höller, Alexander Krumeich, Luigi Lo Iacono. 3-18 [doi]
- Trust Me If You Can: Trusted Transformation Between (JSON) Schemas to Support Global Authentication of Education CredentialsStefan More, Peter Grassberger, Felix Hörandner, Andreas Abraham, Lukas Daniel Klausner. 19-35 [doi]
- SIUV: A Smart Car Identity Management and Usage Control System Based on Verifiable CredentialsAli Hariri, Subhajit Bandopadhyay, Athanasios Rizos, Theo Dimitrakos, Bruno Crispo, Muttukrishnan Rajarajan. 36-50 [doi]
- A Performance Assessment of Free-to-Use Vulnerability Scanners - RevisitedRicardo Araújo, António Pinto, Pedro Pinto. 53-65 [doi]
- QuickBCC: Quick and Scalable Binary Vulnerable Code Clone DetectionHajin Jang, Kyeongseok Yang, Geonwoo Lee, Yoonjong Na, Jeremy D. Seideman, Shoufu Luo, Heejo Lee, Sven Dietrich. 66-82 [doi]
- Automatic Inference of Taint Sources to Discover Vulnerabilities in SOHO Router FirmwareKai Cheng, Dongliang Fang, Chuan Qin, Huizhao Wang, Yaowen Zheng, Nan Yu, Limin Sun. 83-99 [doi]
- ESQABE: Predicting Encrypted Search QueriesIsaac Meers, Mariano Di Martino, Peter Quax, Wim Lamotte. 103-117 [doi]
- Reconnection-Based Covert Channels in Wireless NetworksSebastian Zillien, Steffen Wendzel. 118-133 [doi]
- Minecraft Altered Skin Channel (MASC)Sam Abrams, Brandon Keller, Kenneth Nero, Gino Placella, Daryl Johnson. 134-145 [doi]
- Lattice-Based Weak Curve Fault Attack on ECDSAWeiqiong Cao, Hongsong Shi, Hua Chen 0011, Wei Wei, Jiazhe Chen. 146-161 [doi]
- HyperSec: Visual Analytics for Blockchain Security MonitoringBenedikt Putz, Fabian Böhm, Günther Pernul. 165-180 [doi]
- 100 Popular Open-Source Infosec ToolsRauli Kaksonen, Tommi Järvenpää, Jukka Pajukangas, Mihai Mahalean, Juha Röning. 181-195 [doi]
- RootAsRole: Towards a Secure Alternative to sudo/su Commands for Home Users and SME AdministratorsAhmad Samer Wazan, David W. Chadwick, Rémi Venant, Romain Laborde, Abdelmalek Benzekri. 196-209 [doi]
- Accept All: The Landscape of Cookie Banners in Greece and the UKGeorgios Kampanos, Siamak F. Shahandashti. 213-227 [doi]
- The AppChk Crowd-Sourcing Platform: Which Third Parties are iOS Apps Talking To?Oleg Geier, Dominik Herrmann. 228-241 [doi]
- Compiling Personal Data and Subject Categories from App Data ModelsChristian Burkert, Maximilian Blochberger, Hannes Federrath. 242-255 [doi]
- Privacy Concerns Go Hand in Hand with Lack of Knowledge: The Case of the German Corona-Warn-AppSebastian Pape 0001, David Harborth, Jacob Leon Kröger. 256-269 [doi]
- Perceived Privacy Problems Within Digital Contact Tracing: A Study Among Swedish CitizensAli Padyab, Joakim Kävrestad. 270-283 [doi]
- Secure and Scalable IoT: An IoT Network Platform Based on Network Overlay and MAC SecurityJunwon Lee, Heejo Lee. 287-301 [doi]
- Enriching DNS Flows with Host-Based Events to Bypass Future Protocol EncryptionStanislav Spacek, Daniel Tovarnák, Pavel Celeda. 302-316 [doi]
- Advanced Cowrie Configuration to Increase Honeypot DeceptivenessWarren Z. Cabral, Craig Valli, Leslie F. Sikos, Samuel G. Wakeling. 317-331 [doi]
- Less is Often More: Header Whitelisting as Semantic Gap Mitigation in HTTP-Based Software SystemsAndre Büttner, Hoai Viet Nguyen, Nils Gruschka, Luigi Lo Iacono. 332-347 [doi]
- TAR: Generalized Forensic Framework to Detect Deepfakes Using Weakly Supervised LearningSangyup Lee, Shahroz Tariq, Junyaup Kim, Simon S. Woo. 351-366 [doi]
- Anomaly Detection for Insider Threats: An Objective Comparison of Machine Learning Models and EnsemblesFilip Wieslaw Bartoszewski, Mike Just, Michael A. Lones, Oleksii Mandrychenko. 367-381 [doi]
- Revitalizing Self-Organizing Map: Anomaly Detection Using Forecasting Error PatternsYoung-geun Kim, Jeong-Han Yun, Siho Han, Hyoung-Chun Kim, Simon S. Woo. 382-397 [doi]
- What Is Lurking in Your Backups?Ben Lenard, Alexander Rasin, Nick Scope, James Wagner. 401-415 [doi]
- How Do Users Chain Email Accounts Together?Lydia Kraus, Mária Svidronová, Elizabeth Stobert. 416-429 [doi]
- Tensions that Hinder the Implementation of Digital Security GovernanceStef Schinagl, Svetlana Khapova, Abbas Shahim. 430-445 [doi]