


default search action
EuroS&P 2019: Stockholm, Sweden - Workshops
- 2019 IEEE European Symposium on Security and Privacy Workshops, EuroS&P Workshops 2019, Stockholm, Sweden, June 17-19, 2019. IEEE 2019, ISBN 978-1-7281-3026-2
- Pietro Tedeschi
, Savio Sciancalepore
:
Edge and Fog Computing in Critical Infrastructures: Analysis, Security Threats, and Research Challenges. 1-10 - Michele De Donno, Juan Manuel Donaire Felipe, Nicola Dragoni
:
ANTIBIOTIC 2.0: A Fog-based Anti-Malware for Internet of Things. 11-20 - Amr Osman, Simon Hanisch, Thorsten Strufe:
SeCoNetBench: A modular framework for Secure Container Networking Benchmarks. 21-28 - Davy Preuveneers, Wouter Joosen:
Towards Multi-party Policy-based Access Control in Federations of Cloud and Edge Microservices. 29-38 - Ibrahim Nadir, Zafeer Ahmad, Haroon Mahmood
, Ghalib Asadullah Shah, Farrukh Shahzad, Muhammad Umair, Hassam Khan, Usman Gulzar:
An Auditing Framework for Vulnerability Analysis of IoT System. 39-47 - Ahsan Muhammad
, Bilal Afzal, Bilal Imran, Asim Tanwir, Ali Hammad Akbar, Ghalib A. Shah:
oneM2M Architecture Based Secure MQTT Binding in Mbed OS. 48-56 - Ruffin White, Gianluca Caiazza
, Chenxu Jiang, Xinyue Ou, Zhiyue Yang, Agostino Cortesi
, Henrik I. Christensen
:
Network Reconnaissance and Vulnerability Excavation of Secure DDS Systems. 57-66 - Razvan Beuran, Takuya Inoue, Yasuo Tan, Yoichi Shinoda:
Realistic Cybersecurity Training via Scenario Progression Management. 67-76 - Joonsoo Kim, YoungJae Maeng, Moonsu Jang:
Becoming Invisible Hands of National Live-Fire Attack-Defense Cyber Exercise. 77-84 - Mazaher Kianpour
, Stewart Kowalski, Erjon Zoto, Christopher Frantz
, Harald Øverby:
Designing Serious Games for Cyber Ranges: A Socio-technical Approach. 85-93 - Stephen Schwab, Erik Kline:
Cybersecurity Experimentation at Program Scale: Guidelines and Principles for Future Testbeds. 94-102 - Mika Karjalainen, Tero Kokkonen, Samir Puuska:
Pedagogical Aspects of Cyber Security Exercises. 103-108 - Nina Gerber
, Verena Zimmermann, Melanie Volkamer:
Why Johnny Fails to Protect his Privacy. 109-118 - Jonathan Dutson, Danny Allen, Dennis Eggett, Kent E. Seamons:
Don't Punish all of us: Measuring User Attitudes about Two-Factor Authentication. 119-128 - Mohammad Tahaei
, Kami Vaniea:
A Survey on Developer-Centred Security. 129-138 - Manuel Maarek
, Léon McGregor
, Sandy Louchart, Ross McMenemy:
How Could Serious Games Support Secure Programming? Designing a Study Replication and Intervention. 139-148 - Verena Zimmermann, Ernestine Dickhaut, Paul Gerber, Joachim Vogt:
Vision: Shining Light on Smart Homes - Supporting Informed Decision-Making of End Users. 149-153 - Sarah Prange, Emanuel von Zezschwitz, Florian Alt
:
Vision: Exploring Challenges and Opportunities for Usable Authentication in the Smart Home. 154-158 - Keika Mori, Takuya Watanabe, Yunao Zhou, Ayako Akiyama Hasegawa, Mitsuaki Akiyama, Tatsuya Mori
:
Comparative Analysis of Three Language Spheres: Are Linguistic and Cultural Differences Reflected in Password Selection Habits? 159-171 - Borce Stojkovski
, Itzel Vázquez Sandoval, Gabriele Lenzini:
Detecting Misalignments between System Security and User Perceptions: A Preliminary Socio-technical Analysis of an E2E email Encryption System. 172-181 - Kholoud Althobaiti, Ghaidaa Rummani, Kami Vaniea:
A Review of Human- and Computer-Facing URL Phishing Features. 182-191 - Albese Demjaha, Tristan Caulfield
, M. Angela Sasse, David J. Pym:
2 Fast 2 Secure: A Case Study of Post-Breach Security Changes. 192-201 - Ivan Letteri
, Giuseppe Della Penna, Pasquale Caianiello
:
Feature Selection Strategies for HTTP Botnet Traffic Detection. 202-210 - Jiajie Zhang, Bingsheng Zhang
, Jiancheng Lin:
Recessive Social Networking: Preventing Privacy Leakage against Reverse Image Search. 211-219 - Alexander Zhdanov:
Generation of Static YARA-Signatures Using Genetic Algorithm. 220-228 - Ilias Tsingenopoulos, Davy Preuveneers, Wouter Joosen:
AutoAttacker: A reinforcement learning approach for black-box adversarial attacks. 229-237 - Hugo Leonardo Duarte-Garcia, Carlos Domenick Morales-Medina, Aldo Hernandez-Suarez
, Gabriel Sanchez-Perez, Karina Toscano-Medina, Héctor Pérez-Meana, Victor Sanchez:
A Semi-supervised Learning Methodology for Malware Categorization using Weighted Word Embeddings. 238-246 - Arindam Sharma, Pasquale Malacaria, M. H. R. Khouzani:
Malware Detection Using 1-Dimensional Convolutional Neural Networks. 247-256 - Syed Naqvi, Ian Williams, Sean Enderby, Péter Pollner
, Daniel Abel, Berta Biescas, Oscar Garcia, Monica Florea, Cristi Potlog:
Towards Fully Integrated Real-time Detection Framework for Online Contents Analysis - RED-Alert Approach. 257-263 - Elena Dubrova, Oscar Näslund, Bernhard Degen, Anders Gawell, Yang Yu:
CRC-PUF: A Machine Learning Attack Resistant Lightweight PUF Construction. 264-271 - Dario Pasquini, Marco Mingione
, Massimo Bernaschi:
Adversarial Out-domain Examples for Generative Models. 272-280 - Giuseppina Andresini
, Annalisa Appice, Nicola Di Mauro, Corrado Loglisci, Donato Malerba:
Exploiting the Auto-Encoder Residual Error for Intrusion Detection. 281-290 - John Yoon:
Using a Deep-Learning Approach for Smart IoT Network Packet Analysis. 291-299 - Sebastian A. Henningsen, Daniel Teunis, Martin Florian, Björn Scheuermann:
Eclipsing Ethereum Peers with False Friends. 300-309 - Renlord Yang, Toby Murray, Paul Rimba, Udaya Parampalli:
Empirically Analyzing Ethereum's Gas Mechanism. 310-319 - Reza Rahimian, Shayan Eskandari
, Jeremy Clark:
Resolving the Multiple Withdrawal Attack on ERC20 Tokens. 320-329 - Arijit Dutta, Saravanan Vijayakumaran:
MProve: A Proof of Reserves Protocol for Monero Exchanges. 330-339 - Easwar Vivek Mangipudi, Krutarth Rao, Jeremy Clark, Aniket Kate:
Towards Automatically Penalizing Multimedia Breaches (Extended Abstract). 340-346 - Elias Rohrer, Julian Malliaris, Florian Tschorsch:
Discharged Payment Channels: Quantifying the Lightning Network's Resilience to Topology-Based Attacks. 347-356 - Fredrik Winzer, Benjamin Herd
, Sebastian Faust:
Temporary Censorship Attacks in the Presence of Rational Miners. 357-366 - Martin Florian, Sebastian A. Henningsen, Sophie Beaucamp, Björn Scheuermann:
Erasing Data from Blockchain Nodes. 367-376 - Minjeong Kim, Yujin Kwon, Yongdae Kim
:
Is Stellar As Secure As You Think? 377-385 - Tarun Chitra, Monica Quaintance, Stuart Haber, Will Martino:
Agent-Based Simulations of Blockchain protocols illustrated via Kadena's Chainweb. 386-395 - Oguzhan Ersoy, Zekeriya Erkin
, Reginald L. Lagendijk:
TULIP: A Fully Incentive Compatible Blockchain Framework Amortizing Redundant Communication. 396-405 - Sebastián García, María José Erquiaga, Anna Shirokova
, Carlos García Garino:
Geost Botnet. Operational Security Failures of a New Android Banking Threat. 406-409 - Sinchul Back, Jennifer LaPrade, Lana Shehadeh
, Minju Kim:
Youth Hackers and Adult Hackers in South Korea: An Application of Cybercriminal Profiling. 410-413 - Jeremiah Onaolapo, Martin Lazarov, Gianluca Stringhini:
Master of Sheets: A Tale of Compromised Cloud Documents. 414-422 - Prakhar Pandey, Maxwell Aliapoulios, Damon McCoy:
Iniquitous Cord-Cutting: An Analysis of Infringing IPTV Services. 423-432 - Michele Campobasso
, Pavlo Burda
, Luca Allodi:
CARONTE: Crawling Adversarial Resources Over Non-Trusted, High-Profile Environments. 433-442 - Maria Grazia Porcedda
, David S. Wall
:
Cascade and Chain Effects in Big Data Cybercrime: Lessons from the TalkTalk hack. 443-452 - Cerys Bradley, Gianluca Stringhini:
A Qualitative Evaluation of Two Different Law Enforcement Approaches on Dark Net Markets. 453-463 - Veronica Valeros
, Maria Rigaki
, Sebastián García:
Machete: Dissecting the Operations of a Cyber Espionage Group in Latin America. 464-473 - Jonathan Lusthaus:
Beneath the Dark Web: Excavating the Layers of Cybercrime's Underground Economy. 474-480 - Alice Hutchings, Ben Collier
:
Inside out: Characterising Cybercrimes Committed Inside and Outside the Workplace. 481-490

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.