Abstract is missing.
- CoolTest: Improved Randomness Testing Using Boolean FunctionsJirí Gavenda, Marek Sýs. 3-17 [doi]
- Towards a Lightweight and Privacy-Friendly Architecture for Online AdvertisingMaximilian Wittig, Dogan Kesdogan. 18-33 [doi]
- Future-Proof Asynchronous IoT Backups: An Evaluation of Secure IoT Data Recovery Considering Post-Quantum ThreatsDmytro Shvets, Edona Fasllija, Jakob Heher, Stefan More. 34-48 [doi]
- Checking the Impact of Security Standardization - A Case Study on Bluetooth LE Pairing of Internet-of-Things DevicesHenrich C. Pöhls, Lukas Steffens. 49-63 [doi]
- Generating and Attacking Passwords with Misspellings by Leveraging HomophonesShiva Houshmand, Smita Ghosh, Jared Maeyama. 67-81 [doi]
- Time is Money: A Temporal Model of CybersecurityZoltán Ádám Mann. 82-96 [doi]
- Update at Your Own Risk: Analysis and Recommendations for Update-Related VulnerabilitiesAhmad B. Usman, Mikael Asplund. 97-110 [doi]
- You Still have to Study On the Security of LLM Generated CodeAndreas Schaad, Stefan Götz 0007, Dominik Binder. 111-124 [doi]
- Certifiably Robust Malware Detectors by DesignPierre-François Gimenez, Sarath Sivaprasad, Mario Fritz. 125-139 [doi]
- How Stealthy is Stealthy? Studying the Efficacy of Black-Box Adversarial Attacks in the Real WorldFrancesco Panebianco, Mario D'Onghia, Stefano Zanero, Michele Carminati. 140-154 [doi]
- Identifying and Analyzing Vulnerabilities and Exploits in On-Premises KubernetesSunny Chowdhury, Florian Freund. 155-169 [doi]
- A Novel Evidence-Based Threat Enumeration Methodology for ICSCan Özkan, Dave Singelée. 175-188 [doi]
- Impact Analysis of Sybil Attacks in the Tor NetworkChristoph Sendner, Dominik Schreider, Alexandra Dmitrienko. 189-204 [doi]
- Security Metrics for False Data Injection in Smart GridsMoritz Volkmann, Sascha Kaven, Volker Skwarek. 205-218 [doi]
- BERMUDA: A BPSec-Compatible Key Management Scheme for DTNsFiona Fuchs, Felix Walter, Florian Tschorsch. 219-233 [doi]
- A Quantum Algorithm for Assessing Node Importance in the st-Connectivity AttackIain Burge, Michel Barbeau, Joaquín García-Alfaro. 234-248 [doi]
- Flatdc: Automatic Schema Reverse Engineering of FlatBuffersAugust See, Benedikt Ostendorf, Lilly Sell, Mathias Fischer 0001. 249-262 [doi]
- Time-Aware Face Anti-spoofing with Rotation Invariant Local Binary Patterns and Deep LearningMoritz Finke, Alexandra Dmitrienko. 263-277 [doi]