default search action
EuroS&P 2021: Vienna, Austria - Workshops
- IEEE European Symposium on Security and Privacy Workshops, EuroS&P 2021, Vienna, Austria, September 6-10, 2021. IEEE 2021, ISBN 978-1-6654-1012-0
- Matthias Beckerle, Argyro Chatzopoulou, Simone Fischer-Hübner:
Towards Cybersecurity MOOC Certification. 1-11 - Sébastien Dupont, Guillaume Ginis, Mirko Malacario, Claudio Porretti, Nicolò Maunero, Christophe Ponsard, Philippe Massonet:
Incremental Common Criteria Certification Processes using DevSecOps Practices. 12-23 - Sebastian Lekies, Damien Engels, Metodi Mitkov:
JSONPS: Secure an inherently insecure practice with this one weird trick! 24-31 - Alexander Sjösten, Daniel Hedin, Andrei Sabelfeld:
EssentialFP: Exposing the Essence of Browser Fingerprinting. 32-48 - Luca Compagna, Hugo Jonker, Johannes Krochewski, Benjamin Krumnow, Merve Sahin:
A preliminary study on the adoption and effectiveness of SameSite cookies as a CSRF defence. 49-59 - Pei Wang, Bjarki Ágúst Guðmundsson, Krzysztof Kotowicz:
Adopting Trusted Types in ProductionWeb Frameworks to Prevent DOM-Based Cross-Site Scripting: A Case Study. 60-73 - Shuhei Enomoto, Hiroki Kuzuno:
FlushBlocker: Lightweight mitigating mechanism for CPU cache flush instruction based attacks. 74-79 - Thijs Vercammen, Thomas Van Strydonck, Dominique Devriese:
Borrowed Capabilities: Flexibly Enforcing Revocation on a Capability Architecture. 80-85 - Camille Le Bon, Erven Rohou, Frédéric Tronel, Guillaume Hiet:
DAMAS: Control-Data Isolation at Runtime through Dynamic Binary Modification. 86-95 - Quentin Forcioli, Jean-Luc Danger, Clémentine Maurice, Lilian Bossuet, Florent Bruguier, Maria Mushtaq, David Novo, Loïc France, Pascal Benoit, Sylvain Guilley, Thomas Perianin:
Virtual Platform to Analyze the Security of a System on Chip at Microarchitectural Level. 96-102 - Jukka Soikkeli, Cora Lisa Perner, Emil C. Lupu:
Analyzing the Viability of UAV Missions Facing Cyber Attacks. 103-112 - Nils Mäurer, Thomas Gräupl, Christoph Gentsch, Tobias Guggemos, Marcel Tiepelt, Corinna Schmitt, Gabi Dreo Rodosek:
A Secure Cell-Attachment Procedure of LDACS. 113-122 - Stefan Marksteiner, Slava Bronfman, Markus Wolf, Eddie Lazebnik:
Using Cyber Digital Twins for Automated Automotive Cybersecurity Testing. 123-128 - Stefan Marksteiner, Peter Priller:
A Model-Driven Methodology for Automotive Cybersecurity Test Case Generation. 129-135 - Giampaolo Bella, Pietro Biondi, Marco De Vincenzi, Giuseppe Tudisco:
Privacy and modern cars through a dual lens. 136-143 - Lonie Sebagh, Jonathan Lusthaus, Edoardo Gallo, Federico Varese, Sean Sirur:
Exploring Cybercrime Disruption through Laboratory Experiments. 144-148 - Pavlo Burda, Luca Allodi, Nicola Zannone:
Dissecting Social Engineering Attacks Through the Lenses of Cognition. 149-160 - Maria Grazia Porcedda, David S. Wall:
Modelling the Cybercrime Cascade Effect in Data Crime. 161-177 - Yoram J. Meijaard, Peter-Paul Meiler, Luca Allodi:
Modelling Disruptive APTs targeting Critical Infrastructure using Military Theory. 178-190 - Gilberto Atondo Siu, Ben Collier, Alice Hutchings:
Follow the money: The relationship between currency exchange and illicit behaviour in an underground forum. 191-201 - Tim M. Booij, Thijmen Verburgh, Federico Falconieri, Rolf van Wegberg:
Get Rich or Keep Tryin' Trajectories in dark net market vendor careers. 202-212 - Vít Sembera, Masarah Paquet-Clouston, Sebastián García, María José Erquiaga:
Cybercrime Specialization: An Exposé of a Malicious Android Obfuscation-as-a-Service. 213-226 - Ziauddin Ursani, Claudia Peersman, Matthew Edwards, Chao Chen, Awais Rashid:
The Impact of Adverse Events in Darknet Markets: an Anomaly Detection Approach. 227-238 - Andrew Roberts, Olaf Maennel, Nikita Snetkov:
Cybersecurity Test Range for Autonomous Vehicle Shuttles. 239-248 - Shao-Fang Wen, Muhammad Mudassar Yamin, Basel Katt:
Ontology-Based Scenario Modeling for Cyber Security Exercise. 249-258 - Sten Mäses, Kaie Maennel, Mascia Toussaint, Veronica Rosa:
Success Factors for Designing a Cybersecurity Exercise on the Example of Incident Response. 259-268 - Paulina Jo Pesch:
Drivers and Obstacles for the Adoption of Consent Management Solutions by Ad-Tech Providers. 269-277 - Vitor Jesus:
Pragmatic Online Privacy: the SftE Approach. 278-282 - Piero A. Bonatti, Luigi Sauro, Jonathan Langens:
Representing Consent and Policies for Compliance. 283-291 - Maria Wilhelmina Botes, Arianna Rossi:
Visualisation Techniques for Consent: Finding Common Ground in Comic Art with Indigenous Populations. 292-297 - Beatriz Esteves, Harshvardhan J. Pandit, Víctor Rodríguez-Doncel:
ODRL Profile for Expressing Consent through Granular Access Control Policies in Solid. 298-306 - Soheil Human, Mandan Kazzazi:
Contextuality and Intersectionality of E-Consent: A Human-centric Reflection on Digital Consenting in the Emerging Genetic Data Markets. 307-311 - Elias Grünewald, Paul Wille, Frank Pallas, Maria C. Borges, Max-Robert Ulbricht:
TIRA: An OpenAPI Extension and Toolbox for GDPR Transparency in RESTful Architectures. 312-319 - Stephan Wiefling, Jan Tolsdorf, Luigi Lo Iacono:
Privacy Considerations for Risk-Based Authentication Systems. 320-327 - Luise Mehner, Saskia Nuñez von Voigt, Florian Tschorsch:
Towards Explaining Epsilon: A Worst-Case Study of Differential Privacy Risks. 328-331 - Gabriel Pedroza, Victor Muntés-Mulero, Yod Samuel Martín, Guillaume Mockly:
A Model-based Approach to Realize Privacy and Data Protection by Design. 332-339 - R. Jason Cronk, Stuart S. Shapiro:
Quantitative Privacy Risk Analysis. 340-350 - Laurens Sion, Dimitri Van Landuyt, Wouter Joosen:
An Overview of Runtime Data Protection Enforcement Approaches. 351-358 - Ine van Zeeland, Jo Pierson:
How Standards Co-Shape Personal Data Protection in the European Banking Sector. 359-366 - Ben Weintraub, Cristina Nita-Rotaru:
Structural Attacks on Local Routing in Payment Channel Networks. 367-379 - Shih-Hong Wang, Chia-Chien Wu, Yu-Chuan Liang, Li-Hsun Hsieh, Hsu-Chun Hsiao:
ProMutator: Detecting Vulnerable Price Oracles in DeFi by Mutated Transactions. 380-385 - Sanket Kanjalkar, Ye Zhang, Shreyas Gandlur, Andrew Miller:
Publicly Auditable MPC-as-a-Service with succinct verification and universal setup. 386-411 - Fabian Stiehle, Erik Daniel, Florian Tschorsch:
Modeling the Block Verification Time of Zcash. 412-416
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.