


default search action
ESORICS 2024: Bydgoszcz, Poland, Workshops - Part II
- Joaquín García-Alfaro
, Harsha Kalutarage
, Naoto Yanai
, Rafal Kozik
, Pawel Ksieniewicz
, Michal Wozniak
, Habtamu Abie
, Silvio Ranise
, Luca Verderame
, Enrico Cambiaso, Rita Maria Ugarelli
, Isabel Praça
, Basel Katt
, Sandeep Pirbhulal
, Ankur Shukla
, Marek Pawlicki
, Michal Choras
:
Computer Security. ESORICS 2024 International Workshops - SECAI, DisA, CPS4CIP, and SecAssure, Bydgoszcz, Poland, September 16-20, 2024, Revised Selected Papers, Part II. Lecture Notes in Computer Science 15264, Springer 2025, ISBN 978-3-031-82361-9
SECAI Papers
- Shota Fujii
, Rei Yamagishi
:
Feasibility Study for Supporting Static Malware Analysis Using LLM. 5-28 - Yulian Sun
, Li Duan
, Yong Li:
Short Paper: PSY: Posterior Sampling Based Privacy Enhancer in Large Language Models. 29-38 - Sanghyun Park, Haeun Lee, Sang Kil Cha:
Short Paper: Systematic Bug Reproduction with Large Language Model. 39-48 - Jan Kadel, August See
, Ritwik Sinha
, Mathias Fischer
:
BOTracle: A Framework for Discriminating Bots and Humans. 49-67 - D'Jeff K. Nkashama
, Jordan F. Masakuna
, Arian Soltani
, Jean-Charles Verdier, Marc Frappier
, Pierre-Martin Tardif
, Froduald Kabanza:
Deep Learning for Network Anomaly Detection Under Data Contamination: Evaluating Robustness and Mitigating Performance Degradation. 68-87 - Hajime Tasaki, Jinhui Chao:
On Intrinsic Cause and Defense of Adversarial Examples in Deep Neural Networks. 88-106 - Patrick Lodeweegs
, Behrad Tajalli, Stjepan Picek
:
Short Paper: Effects of Poisoning Attacks on Causal Deep Reinforcement Learning. 107-117 - Robert Flood, Marco Casadio, David Aspinall, Ekaterina Komendantskaya:
Generating Traffic-Level Adversarial Examples from Feature-Level Specifications. 118-127 - Tarini Saka
, Kami Vaniea
, Nadin Kökciyan
:
PhishCoder: Efficient Extraction of Contextual Information from Phishing Emails. 128-148 - Muhammad Salman, Benjamin Zi Hao Zhao, Hassan Jameel Asghar, Muhammad Ikram, Sidharth Kaushik, Mohamed Ali Kâafar:
On the Robustness of Malware Detectors to Adversarial Samples. 149-170 - Andrés Vargas-Rivera, Herson Esquivel-Vargas:
Towards AI-Based Identification of Publicly Known Vulnerabilities. 171-192 - Irfan Bulut
, Enrique Argones-Rúa
:
Short Paper: Machine Learning-Based Secure Malware Detection Using Features from Binary Executable Headers. 193-203 - Hamid Bostani
, Zhengyu Zhao
, Veelasha Moonsamy
:
Improving Adversarial Robustness in Android Malware Detection by Reducing the Impact of Spurious Correlations. 204-222 - Kehinde O. Babaagba
, Jordan Wylie
, Mayowa Ayodele
, Zhiyuan Tan
:
Multi-Objective Evolutionary Algorithm for Automatic Generation of Adversarial Metamorphic Malware. 223-237 - Sampath Rajapaksha
, Ruby Rani
, Erisa Karafili
:
A RAG-Based Question-Answering Solution for Cyber-Attack Investigation and Attribution. 238-256
DisA Papers
- Janusz Bobulski
, Mariusz Kubanek
:
Recognition of Remakes and Fake Facial Images. 261-272 - Marek Pawlicki, Federica Uccello
, Salvatore D'Antonio
, Rafal Kozik, Michal Choras:
A Novel Method of Improving Intrusion Detection Systems Robustness Against Adversarial Attacks, Through Feature Omission and a Committee of Classifiers. 273-288 - Sebastian Szelest, Marek Pawlicki, Aleksandra Pawlicka, Rafal Kozik, Michal Choras:
Proposition of a Novel Type of Attacks Targetting Explainable AI Algorithms in Cybersecurity. 289-304 - Mateusz Walczak
, Aneta Poniszewska-Maranda
:
Data Structures Towards the Recognition of Fake News and Disinformation Written in Polish. 305-320
CPS4CIP Papers
- Srinidhi Madabhushi, Rinku Dewri:
Characterizing Prediction Model Responses to Attack Inputs: A Study with Time-Series Power Consumption Data. 327-343 - Georgios Kavallieratos
, Ahmed Amro
, Vasileios Gkioulos
, Grigore Stamatescu
, Kostantinos Rantos, Thomas Lagkas
, Konstantinos Demertzis
, Fotis Paterakis
, Alexios Lekidis
, Christos Dalamagkas
, Igor Kotsiuba
, Sokratis K. Katsikas
:
Best-Practices-Based Training for Improving Cybersecurity in Power Grids. 344-359 - Ashish Bhattarai, Syed Naqvi:
Proactive Cyber Security Strategies for Securing Critical National Infrastructure. 360-373 - Lorenzo Alvisi, John Bianchi
, Sara Tibidò, Maria Vittoria Zucca
:
Weaponizing Disinformation Against Critical Infrastructures. 374-389
SecAssure Papers
- Gianpietro Castiglione, Giampaolo Bella:
Compliance-Driven CWE Assessment by Semantic Similarity. 395-415 - Hendrik Eikerling
, Anemone Kampkötter
:
Enabling Android Application Monitoring by Characterizing Security-Critical Code Fragments. 416-436 - Yosra Lakhdhar, Slim Rekhis, Lamia Chaari Fourati:
MITRE-Based APT Attack Generation and Prediction. 437-456 - Janaka Senanayake
, Harsha Kalutarage
, Luca Piras
, Mhd Omar Al-Kadri
, Andrei Petrovski
:
Assuring Privacy of AI-Powered Community Driven Android Code Vulnerability Detection. 457-476 - Florian Kammüller, Luca Piras, Bob Fields, Rajagopal Nagarajan:
Formalizing Federated Learning and Differential Privacy for GIS Systems in IIIf. 477-487 - Muhammad Mudassar Yamin, Shao-Fang Wen, Basel Katt:
AI-Assisted Assurance Profile Creation for System Security Assurance. 488-497 - Lama Amro, Ahmed Amro, Christopher Frantz:
Attack to Defend: Gamifying the MITRE ATT&CK for Cyber Security Training Using the COFELET Framework. 498-517 - Matthijs Koier, Hugo Kuipers, Marre Slikker, Slinger Jansen
, Katsiaryna Labunets
:
Canary in the Coal Mine: Identifying Cyber Threat Trends Through Topic Mining - Stack Overflow Case Study. 518-538

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.