Abstract is missing.
- Cyber Security When IT Meets OTSokratis K. Katsikas. 5
- Don't Tell Me The Cybersecurity Moon Is Shining... (Cybersecurity Show and Tell)Luca Viganò 0001. 7
- SEVIL: Secure and Efficient VerifIcation over Massive Proofs of KnowLedgeSouha Masmoudi, Maryline Laurent, Nesrine Kaaniche. 13-24 [doi]
- Blind Side Channel on the Elephant LFSRAwaleh Houssein Meraneh, Christophe Clavier, Hélène Le Bouder, Julien Maillard, Gaël Thomas 0002. 25-34 [doi]
- Towards an Automated Business Process Model Risk Assessment: A Process Mining ApproachPanagiotis Dedousis, Melina Raptaki, George Stergiopoulos, Dimitris Gritzalis. 35-46 [doi]
- Metering Homes: Do Energy Efficiency and Privacy Need to Be in Conflict?Libor Polcák, Petr Matousek. 47-58 [doi]
- Stacked Ensemble Model for Enhancing the DL based SCAAnh Tuan Hoang, Neil Hanley, Ayesha Khalid, Dur-e-Shahwar Kundi, Máire O'Neill. 59-68 [doi]
- Comparison-based MPC in Star TopologyGowri R. Chandran, Carmit Hazay, Robin Hundt, Thomas Schneider. 69-82 [doi]
- CRGC: A Practical Framework for Constructing Reusable Garbled CircuitsChristopher Harth-Kitzerow, Georg Carle, Fan Fei, André Luckow, Johannes Klepsch. 83-95 [doi]
- An Adaptive Web Application FirewallMiguel Calvo, Marta Beltrán. 96-107 [doi]
- FAPRIL: Towards Faster Privacy-preserving Fingerprint-based LocalizationChristopher van der Beets, Raine Nieminen, Thomas Schneider. 108-120 [doi]
- A Longitudinal Study of Cryptographic API: A Decade of Android MalwareAdam Janovsky, Davide Maiorca, Dominik Macko, Vashek Matyas, Giorgio Giacinto. 121-133 [doi]
- Large-scale Randomness Study of Security Margins for 100+ Cryptographic FunctionsDusan Klinec, Marek Sýs, Karel Kubícek, Petr Svenda, Vashek Matyás. 134-146 [doi]
- PAMMELA: Policy Administration Methodology using Machine LearningVarun Gumma, Barsha Mitra, Soumyadeep Dey, Pratik Shashikantbhai Patel, Sourabh Suman, Saptarshi Das, Jaideep Vaidya. 147-157 [doi]
- Partially Oblivious Neural Network InferencePanagiotis Rizomiliotis, Christos Diou, Aikaterini Triakosia, Ilias Kyrannas, Konstantinos Tserpes. 158-169 [doi]
- Federated Naive Bayes under Differential PrivacyThomas Marchioro, Lodovico Giaretta, Evangelos P. Markatos, Sarunas Girdzijauskas. 170-180 [doi]
- Effectiveness of Adversarial Component Recovery in Protected Netlist Circuit DesignsJeffrey Todd McDonald, Jennifer Parnell, Todd R. Andel, Samuel H. Russ. 181-192 [doi]
- Membership Inference Attacks on Aggregated Time Series with Linear ProgrammingAntonin Voyez, Tristan Allard, Gildas Avoine, Pierre Cauchois, Élisa Fromont, Matthieu Simonin. 193-204 [doi]
- Graph Algorithms over Homomorphic Encryption for Data CooperativesMark Dockendorf, Ram Dantu, John Long. 205-214 [doi]
- Mason Vulnerability Scoring Framework: A Customizable Framework for Scoring Common Vulnerabilities and WeaknessesIbifubara Iganibo, Massimiliano Albanese, Kaan Turkmen, Thomas R. Campbell, Marc Mosko. 215-225 [doi]
- Threats to Adversarial Training for IDSs and MitigationHassan Chaitou, Thomas Robert 0003, Jean Leneutre, Laurent Pautet. 226-236 [doi]
- CatNap: Leveraging Generic MPC for Actively Secure Privacy-enhancing Proximity Testing with a Napping PartyIvan Oleynikov, Elena Pagnin, Andrei Sabelfeld. 237-248 [doi]
- Real-time Crowd Counting based on Wearable Ephemeral IDsDaniel Morales, Isaac Agudo, Javier López 0001. 249-260 [doi]
- HTTPFuzz: Web Server Fingerprinting with HTTP Request FuzzingAnimesh Kar, Andrei Natadze, Enrico Branca, Natalia Stakhanova. 261-271 [doi]
- A Region-based Training Data Segmentation Strategy to Credit ScoringRoberto Saia, Salvatore Carta, Gianni Fenu, Livio Pompianu. 275-282 [doi]
- A Spendable Cold Wallet from QR VideoRafael Dowsley, Mylène C. Q. Farias, Mario Larangeira, Anderson Nascimento, Jot Virdee. 283-290 [doi]
- Collusion-resistant Broadcast Encryption based on Hidden RSA SubgroupsSigurd Eskeland. 291-298 [doi]
- Cryptanalysis of a Privacy-preserving Behavior-oriented Authentication SchemeSigurd Eskeland, Ahmed Fraz Baig. 299-304 [doi]
- SHINE: Resilience via Practical Interoperability of Multi-party Schnorr Signature SchemesAntonin Dufka, Vladimir Sedlacek, Petr Svenda. 305-316 [doi]
- Application Sandboxing for Linux Desktops: A User-friendly ApproachLukas Brodschelm, Marcus Gelderie. 317-324 [doi]
- A Local Differential Privacy based Hybrid Recommendation Model with BERT and Matrix FactorizationNeera Jeyamohan, Xiaomin Chen, Nauman Aslam, Biju Issac 0001, Eve O'Brien. 325-332 [doi]
- Behavior Modeling of a Distributed Application for Anomaly DetectionAmanda B. Viescinski, Tiago Heinrich, Newton Carlos Will, Carlos Maziero. 333-340 [doi]
- What your Fitbit Says about You: De-anonymizing Users in Lifelogging DatasetsAndrei Kazlouski, Thomas Marchioro, Evangelos P. Markatos. 341-348 [doi]
- Key Encapsulation Mechanism in Ciphertext-policy Attribute based Setting Featuring Revocation and Key-homomorphic PropertyAnushree Belel, Ratna Dutta, Sourav Mukhopadhyay. 349-356 [doi]
- Tick Tock Break the Clock: Breaking CAPTCHAs on the DarkwebDavid Holm Audran, Marcus Braunschweig Andersen, Mark Højer Hansen, Mikkel Møller Andersen, Thomas B. Frederiksen, Kasper H. Hansen, Dimitrios Georgoulias, Emmanouil Vasilomanolakis. 357-365 [doi]
- A New Leakage Resilient Symmetric Searchable Encryption Scheme for Phrase SearchSamiran Bag, Indranil Ghosh Ray, Feng Hao 0001. 366-373 [doi]
- Code-based Key Encapsulation Mechanism Preserving Short Ciphertext and Secret KeyJayashree Dey, Ratna Dutta. 374-381 [doi]
- Near-collisions and Their Impact on Biometric SecurityAxel Durbet, Paul-Marie Grollemund, Pascal Lafourcade 0001, Kevin Thiry-Atighehchi. 382-389 [doi]
- Resilience of GANs against Adversarial AttacksKyrylo Rudavskyy, Ali Miri. 390-397 [doi]
- Implementation of a Stateful Network Protocol Intrusion Detection SystemsS. Seng, Joaquín García-Alfaro, Y. Laarouci. 398-405 [doi]
- zkBeacon: Proven Randomness Beacon based on Zero-knowledge Verifiable ComputationThomas Lavaur, Jérôme Lacan. 406-414
- Yet Another Algebraic Cryptanalysis of Small Scale Variants of AESMarek Bielik, Martin Jurecek, Olha Jurecková, Róbert Lórencz. 415-427 [doi]
- PhishGNN: A Phishing Website Detection Framework using Graph Neural NetworksTristan Bilot, Grégoire Geis, Badis Hammi. 428-435 [doi]
- Are Clouds making Our Research Irrelevant and Who Is at Fault? (Position Paper)Yvo Desmedt. 436-442 [doi]
- PASS-P: Performance and Security Sensitive Dynamic Cache PartitioningNirmal Kumar Boran, Pranil Joshi, Virendra Singh. 443-450 [doi]
- GAN-based Approach to Crafting Adversarial Malware Examples against a Heterogeneous Ensemble ClassifierSaad Al-Ahmadi, Saud Al-Eyead. 451-460 [doi]
- Reverse Engineering for Thwarting Digital Supply Chain Attacks in Critical Infrastructures: Ethical ConsiderationsArne Roar Nygård, Arvind Sharma, Sokratis K. Katsikas. 461-468 [doi]
- A Decentralised Real Estate Transfer Verification based on Self-Sovereign Identity and Smart ContractsAbubakar-sadiq Shehu, António Pinto, Manuel Eduardo Correia. 469-476 [doi]
- Irreversible Applications for Windows NT SystemsRahul Sankalana Gunawardhana, Kavinga Yapa Abeywardana. 479-484 [doi]
- Bypassing Current Limitations for Implementing a Credential Delegation for the Industry 4.0Santiago de Diego, Oscar Lage, Cristina Regueiro, Sergio Anguita, Gabriel Maciá-Fernández. 485-490 [doi]
- A Generic Privacy-preserving Protocol for Keystroke Dynamics-based Continuous AuthenticationAhmed Fraz Baig, Sigurd Eskeland. 491-498 [doi]
- Risk-driven Model-based Architecture Design for Secure Information Flows in Manufacturing InfrastructuresLoris Dal Lago, Fabio Federici, Davide Martintoni, Valerio Senni. 499-506 [doi]
- Seccomp Filters from FuzzingMarcus Gelderie, Valentin Barth, Maximilian Luff, Julian Birami. 507-512 [doi]
- A Method for Road Accident Prevention in Smart Cities based on Deep Reinforcement LearningGiuseppe Crincoli, Fabiana Fierro, Giacomo Iadarola, Piera Elena La Rocca, Fabio Martinelli, Francesco Mercaldo, Antonella Santone. 513-518 [doi]
- TrustLend: Using Borrower Trustworthiness for Lending on EthereumWisnu Uriawan, Youakim Badr, Omar Hasan, Lionel Brunie. 519-524 [doi]
- Efficient IoT Device Fingerprinting Approach using Machine LearningRichmond Osei, Habib Louafi, Malek Mouhoub, Zhongwen Zhu. 525-533 [doi]
- A Real-time Method for CAN Bus Intrusion Detection by Means of Supervised Machine LearningFrancesco Mercaldo, Rosangela Casolare, Giovanni Ciaramella, Giacomo Iadarola, Fabio Martinelli, Francesco Ranieri, Antonella Santone. 534-539 [doi]
- Parallel and Distributed Implementations of the Wiedemann and the Block-Wiedemann Methods over GF(2)Rahul Roy, Abhijit Das 0004, Dipanwita Roy Chowdhury. 540-547 [doi]
- Discovering How to Attack a SystemFabrizio Baiardi, Daria Maggi, Mauro Passacantando. 548-553 [doi]
- Decentralized Public Key Infrastructure with Identity Management using Hyperledger FabricAmisha Sinha, Debanjan Sadhya. 554-559 [doi]
- The Weakest Link: On Breaking the Association between Usernames and Passwords in Authentication SystemsEva Anastasiadi, Elias Athanasopoulos, Evangelos P. Markatos. 560-567 [doi]
- Authentication Attacks on Projection-based Cancelable Biometric SchemesAxel Durbet, Paul-Marie Grollemund, Pascal Lafourcade 0001, Denis Migdal, Kevin Thiry-Atighehchi. 568-573 [doi]
- Weighted Attribute-based Encryption with Parallelized DecryptionAlexandru Ionita. 574-579 [doi]
- Evaluation of AI-based Malware Detection in IoT Network TrafficNuno Prazeres, Rogério Luís C. Costa, Leonel Santos, Carlos Rabadão. 580-585 [doi]
- Towards Heterogeneous Remote Attestation ProtocolsPaul Georg Wagner, Jürgen Beyerer. 586-591 [doi]
- Identifying Organizations Receiving Personal Data in Android AppsDavid Rodriguez, Miguel Cozar, José M. del Álamo. 592-596 [doi]
- JCAlgTest: Robust Identification Metadata for Certified SmartcardsPetr Svenda, Rudolf Kvasnovský, Imrich Nagy, Antonin Dufka. 597-604 [doi]
- On the Efficiency and Security of Quantum-resistant Key Establishment Mechanisms on FPGA PlatformsLukas Malina, Sara Ricci, Patrik Dobias, Petr Jedlicka, Jan Hajny, Kim-Kwang Raymond Choo. 605-613 [doi]
- Brain Waves and Evoked Potentials as Biometric User Identification Strategy: An Affordable Low-cost ApproachRoberto Saia, Salvatore Carta, Gianni Fenu, Livio Pompianu. 614-619 [doi]
- Illicit Darkweb Classification via Natural-language Processing: Classifying Illicit Content of Webpages based on Textual InformationGiuseppe Cascavilla, Gemma Catolino, Mirella Sangiovanni. 620-626 [doi]
- Verification of PUF-based IoT Protocols with AVISPA and ScytherTomás Rabas, Róbert Lórencz, Jirí Bucek. 627-635 [doi]
- PE-AONT: Partial Encryption All or Nothing TransformKatarzyna Kapusta, Gérard Memmi. 636-641 [doi]
- From GDPR to Privacy Design Patterns: The MATERIALIST FrameworkVita Santa Barletta, Giuseppe Desolda, Domenico Gigante, Rosa Lanzilotti, Marco Saltarella. 642-648 [doi]
- Moving Target Defense Router: MaTaDoRBerkan Ufuk, Mehmet Tahir Sandikkaya. 649-654 [doi]
- Transient State Signaling for Spectre/Meltdown Transient Cache Side-channel PreventionZelong Li, Akhilesh Tyagi. 655-660 [doi]
- On the Practicality of Relying on Simulations in Different Abstraction Levels for Pre-silicon Side-Channel AnalysisJavad Bahrami, Mohammad Ebrahimabadi, Sofiane Takarabt, Jean-Luc Danger, Sylvain Guilley, Naghmeh Karimi. 661-668 [doi]
- A Secure Federated Learning: Analysis of Different Cryptographic ToolsOana Stan, Vincent Thouvenot, Aymen Boudguiga, Katarzyna Kapusta, Martin Zuber, Renaud Sirdey. 669-674 [doi]
- Novel Design for IE-Cache to Mitigate Conflict-based Cache-side Channel Attacks with Reduced Energy ConsumptionSaqib Javed, Muhammad Asim Mukhtar, Muhammad Khurram Bhatti, Guy Gogniat. 675-680 [doi]
- Switched-based Control Testbed to Assure Cyber-physical Resilience by DesignMariana Segovia, Jose Rubio-Hernan, Ana R. Cavalli, Joaquín García-Alfaro. 681-686 [doi]
- Offline-verifiable Data from Distributed Ledger-based RegistriesStefan More, Jakob Heher, Clemens Walluschek. 687-693 [doi]
- Efficient Hybrid Model for Intrusion Detection SystemsNesrine Kaaniche, Aymen Boudguiga, Gustavo Gonzalez Granadillo. 694-700 [doi]
- Side-channel Analysis and Countermeasure for Implementation of Lattice-based SignatureKazuhide Fukushima, Hiroki Okada, Sofiane Takarabt, Amina Korchi, Meziane Hamoud, Khaled Karray, Youssef Souissy, Sylvain Guilley. 701-706 [doi]
- Towards a Threat Model and Security Analysis for Data CooperativesAbiola Salau, Ram Dantu, Kirill Morozov, Kritagya Upadhyay, Syed Badruddoja. 707-713 [doi]
- A Novel Method for Embedding and Extracting Secret Messages in Textual Documents based on Paragraph ResizingBenjamin Aziz, Aysha Bukhelli, Rinat Khusainov, Alaa Mohasseb. 714-719 [doi]