- Antonios Xenakis, Sabrina Mamtaz Nourin, Zhiyuan Chen, George Karabatis, Ahmed Aleroud, Jhancy Amarsingh:
A Self-adaptive and Secure Approach to Share Network Trace Data. DTRAP 4(4): 50:1-50:20 (2023) - Ya Xiao, Yang Zhao, Nicholas Allen, Nathan Keynes, Danfeng (Daphne) Yao, Cristina Cifuentes:
Industrial Experience of Finding Cryptographic Vulnerabilities in Large-scale Codebases. DTRAP 4(1): 4:1-4:18 (2023) - Yagiz Yilmaz, Orçun Çetin, Claudia Grigore, Budi Arief, Julio C. Hernandez-Castro:
Personality Types and Ransomware Victimisation. DTRAP 4(4): 53:1-53:25 (2023) - 2022
- Jinxin Liu, Murat Simsek, Burak Kantarci, Melike Erol-Kantarci, Andrew J. Malton, Andrew Walenstein:
Risk-aware Fine-grained Access Control in Cyber-physical Contexts. DTRAP 3(4): 43:1-43:29 (2022) - Fritz Alder, Jo Van Bulck, Jesse Spielman, David F. Oswald, Frank Piessens:
Faulty Point Unit: ABI Poisoning Attacks on Trusted Execution Environments. DTRAP 3(2): 13:1-13:26 (2022) - Giovanni Apruzzese, Mauro Andreolini, Luca Ferretti, Mirco Marchetti, Michele Colajanni:
Modeling Realistic Adversarial Attacks against Network Intrusion Detection Systems. DTRAP 3(3): 31:1-31:19 (2022) - Louise Axon, Katherine Fletcher, Arianna Schuler Scott, Marcel Stolz, Robert Hannigan, Ali El Kaafarani, Michael Goldsmith, Sadie Creese:
Emerging Cybersecurity Capability Gaps in the Industrial Internet of Things: Overview and Research Agenda. DTRAP 3(4): 34:1-34:27 (2022) - Mila Bajic, Andrej Petrovski, Bojan Perkov:
Field Note on Doing Digital Rights: Central and Southeast Europe Monitoring Project. DTRAP 3(3): 23:1-23:7 (2022) - Antoine Boutet, Claude Castelluccia, Mathieu Cunche, Cédric Lauradoux, Vincent Roca, Adrien Baud, Pierre-Guillaume Raverdy:
Desire: Leveraging the Best of Centralized and Decentralized Contact Tracing Systems. DTRAP 3(3): 28:1-28:20 (2022) - Siri Bromander, Morton Swimmer, Lilly Pijnenburg Muller, Audun Jøsang, Martin Eian, Geir Skjøtskift, Fredrik Borg:
Investigating Sharing of Cyber Threat Intelligence and Proposing A New Data Model for Enabling Automation in Knowledge Representation and Exchange. DTRAP 3(1): 6:1-6:22 (2022) - Chung-Kuan Chen, Si-Chen Lin, Szu-Chun Huang, Yung-Tien Chu, Chin-Laung Lei, Chun-Ying Huang:
Building Machine Learning-based Threat Hunting System from Scratch. DTRAP 3(3): 20:1-20:21 (2022) - Chase Cotton:
"Off-Label" Use of DNS. DTRAP 3(3): 21:1-21:13 (2022) - Daniele Cono D'Elia, Lorenzo Invidia, Federico Palmaro, Leonardo Querzoni:
Evaluating Dynamic Binary Instrumentation Systems for Conspicuous Features and Artifacts. DTRAP 3(2): 10:1-10:13 (2022) - Lucimara Desiderá, Jeroen van der Ham:
Introduction to the Special Issue on the 2020 FIRST Conference. DTRAP 3(3): 18:1 (2022) - Alexandre Dulaunoy, Jean-Louis Huynen, Aurelien Thirion:
Active and Passive Collection of SSH Key Material for Cyber Threat Intelligence. DTRAP 3(3): 19:1-19:5 (2022) - Johannes Düsing, Ben Hermann:
Analyzing the Direct and Transitive Impact of Vulnerabilities onto Different Artifact Repositories. DTRAP 3(4): 38:1-38:25 (2022) - Ailton Santos Filho, Ricardo J. Rodríguez, Eduardo L. Feitosa:
Evasion and Countermeasures Techniques to Detect Dynamic Binary Instrumentation Frameworks. DTRAP 3(2): 11:1-11:28 (2022) - Allen D. Householder, Jonathan M. Spring:
Are We Skillful or Just Lucky? Interpreting the Possible Histories of Vulnerability Disclosures. DTRAP 3(4): 39:1-39:28 (2022) - Martin Husák, Martin Lastovicka, Tomás Plesník:
Handling Internet Activism During the Russian Invasion of Ukraine: A Campus Network Perspective. DTRAP 3(3): 17:1-17:5 (2022) - Shehzeen Hussain, Paarth Neekhara, Brian Dolhansky, Joanna Bitton, Cristian Canton Ferrer, Julian J. McAuley, Farinaz Koushanfar:
Exposing Vulnerabilities of Deepfake Detection Systems with Robust Attacks. DTRAP 3(3): 30:1-30:23 (2022) - Paul-David Jarvis, Amalia Damianou, Cosmin Ciobanu, Vasilis Katos:
Vulnerability Exposure Driven Intelligence in Smart, Circular Cities. DTRAP 3(4): 40:1-40:18 (2022) - Christopher Jelesnianski, Jinwoo Yom, Changwoo Min, Yeongjin Jang:
Securely Sharing Randomized Code That Flies. DTRAP 3(3): 32:1-32:25 (2022) - Gabriel Kaptchuk, Daniel G. Goldstein, Eszter Hargittai, Jake M. Hofman, Elissa M. Redmiles:
How Good is Good Enough? Quantifying the Impact of Benefits, Accuracy, and Privacy on Willingness to Adopt COVID-19 Decision Aids. DTRAP 3(3): 27:1-27:18 (2022) - Gabriel Kaptchuk, Fabio Massacci, Sara Nieves Matheu-García, Elissa M. Redmiles:
Introduction to the Special Issue on Security and Privacy for COVID-19. DTRAP 3(3): 24:1-24:2 (2022) - Éireann Leverett, Matilda Rhode, Adam Wedgbury:
Vulnerability Forecasting: Theory and Practice. DTRAP 3(4): 42:1-42:27 (2022) - Ming Li, Peter J. Hawrylak, John Hale:
Strategies for Practical Hybrid Attack Graph Generation and Analysis. DTRAP 3(4): 41:1-41:24 (2022) - Pooria Madani, Natalija Vlajic, Ivo Maljevic:
Randomized Moving Target Approach for MAC-Layer Spoofing Detection and Prevention in IoT Systems. DTRAP 3(4): 35:1-35:24 (2022) - Nicholas Mainardi, Alessandro Barenghi, Gerardo Pelosi:
Privacy-aware Character Pattern Matching over Outsourced Encrypted Data. DTRAP 3(1): 7:1-7:38 (2022) - Fabio Massacci, Nick Nikiforakis, Ivan Pashchenko, Antonino Sabetta, Victoria Wang:
Introduction to the Special Issue on Vulnerabilities. DTRAP 3(4): 37:1 (2022) - Karl Mozurkewich:
Field Note on IoT Security: Novel JIT Security for Large-Scale Heterogeneous IoT Deployments. DTRAP 3(4): 36:1-36:5 (2022)