


default search action
EuroS&P 2019: Stockholm, Sweden - Workshops
- 2019 IEEE European Symposium on Security and Privacy Workshops, EuroS&P Workshops 2019, Stockholm, Sweden, June 17-19, 2019. IEEE 2019, ISBN 978-1-7281-3026-2

- Pietro Tedeschi

, Savio Sciancalepore
:
Edge and Fog Computing in Critical Infrastructures: Analysis, Security Threats, and Research Challenges. 1-10 - Michele De Donno, Juan Manuel Donaire Felipe, Nicola Dragoni

:
ANTIBIOTIC 2.0: A Fog-based Anti-Malware for Internet of Things. 11-20 - Amr Osman, Simon Hanisch

, Thorsten Strufe:
SeCoNetBench: A modular framework for Secure Container Networking Benchmarks. 21-28 - Davy Preuveneers, Wouter Joosen:

Towards Multi-party Policy-based Access Control in Federations of Cloud and Edge Microservices. 29-38 - Ibrahim Nadir, Zafeer Ahmad, Haroon Mahmood

, Ghalib Asadullah Shah, Farrukh Shahzad, Muhammad Umair, Hassam Khan, Usman Gulzar:
An Auditing Framework for Vulnerability Analysis of IoT System. 39-47 - Ahsan Muhammad

, Bilal Afzal, Bilal Imran, Asim Tanwir, Ali Hammad Akbar, Ghalib A. Shah:
oneM2M Architecture Based Secure MQTT Binding in Mbed OS. 48-56 - Ruffin White, Gianluca Caiazza

, Chenxu Jiang, Xinyue Ou, Zhiyue Yang, Agostino Cortesi
, Henrik I. Christensen
:
Network Reconnaissance and Vulnerability Excavation of Secure DDS Systems. 57-66 - Razvan Beuran, Takuya Inoue, Yasuo Tan, Yoichi Shinoda:

Realistic Cybersecurity Training via Scenario Progression Management. 67-76 - Joonsoo Kim, YoungJae Maeng, Moonsu Jang:

Becoming Invisible Hands of National Live-Fire Attack-Defense Cyber Exercise. 77-84 - Mazaher Kianpour

, Stewart Kowalski, Erjon Zoto, Christopher Frantz
, Harald Øverby:
Designing Serious Games for Cyber Ranges: A Socio-technical Approach. 85-93 - Stephen Schwab, Erik Kline:

Cybersecurity Experimentation at Program Scale: Guidelines and Principles for Future Testbeds. 94-102 - Mika Karjalainen, Tero Kokkonen, Samir Puuska:

Pedagogical Aspects of Cyber Security Exercises. 103-108 - Nina Gerber

, Verena Zimmermann, Melanie Volkamer:
Why Johnny Fails to Protect his Privacy. 109-118 - Jonathan Dutson, Danny Allen, Dennis Eggett, Kent E. Seamons:

Don't Punish all of us: Measuring User Attitudes about Two-Factor Authentication. 119-128 - Mohammad Tahaei

, Kami Vaniea
:
A Survey on Developer-Centred Security. 129-138 - Manuel Maarek

, Léon McGregor
, Sandy Louchart, Ross McMenemy:
How Could Serious Games Support Secure Programming? Designing a Study Replication and Intervention. 139-148 - Verena Zimmermann, Ernestine Dickhaut, Paul Gerber, Joachim Vogt:

Vision: Shining Light on Smart Homes - Supporting Informed Decision-Making of End Users. 149-153 - Sarah Prange, Emanuel von Zezschwitz, Florian Alt

:
Vision: Exploring Challenges and Opportunities for Usable Authentication in the Smart Home. 154-158 - Keika Mori, Takuya Watanabe, Yunao Zhou, Ayako Akiyama Hasegawa, Mitsuaki Akiyama, Tatsuya Mori

:
Comparative Analysis of Three Language Spheres: Are Linguistic and Cultural Differences Reflected in Password Selection Habits? 159-171 - Borce Stojkovski

, Itzel Vázquez Sandoval, Gabriele Lenzini:
Detecting Misalignments between System Security and User Perceptions: A Preliminary Socio-technical Analysis of an E2E email Encryption System. 172-181 - Kholoud Althobaiti

, Ghaidaa Rummani, Kami Vaniea
:
A Review of Human- and Computer-Facing URL Phishing Features. 182-191 - Albese Demjaha, Tristan Caulfield

, M. Angela Sasse
, David J. Pym:
2 Fast 2 Secure: A Case Study of Post-Breach Security Changes. 192-201 - Ivan Letteri

, Giuseppe Della Penna, Pasquale Caianiello
:
Feature Selection Strategies for HTTP Botnet Traffic Detection. 202-210 - Jiajie Zhang, Bingsheng Zhang

, Jiancheng Lin:
Recessive Social Networking: Preventing Privacy Leakage against Reverse Image Search. 211-219 - Alexander Zhdanov:

Generation of Static YARA-Signatures Using Genetic Algorithm. 220-228 - Ilias Tsingenopoulos, Davy Preuveneers, Wouter Joosen:

AutoAttacker: A reinforcement learning approach for black-box adversarial attacks. 229-237 - Hugo Leonardo Duarte-Garcia, Carlos Domenick Morales-Medina, Aldo Hernandez-Suarez

, Gabriel Sanchez-Perez
, Karina Toscano-Medina, Héctor Pérez-Meana, Victor Sanchez:
A Semi-supervised Learning Methodology for Malware Categorization using Weighted Word Embeddings. 238-246 - Arindam Sharma

, Pasquale Malacaria, M. H. R. Khouzani:
Malware Detection Using 1-Dimensional Convolutional Neural Networks. 247-256 - Syed Naqvi, Ian Williams, Sean Enderby, Péter Pollner

, Daniel Abel, Berta Biescas, Oscar Garcia, Monica Florea
, Cristi Potlog:
Towards Fully Integrated Real-time Detection Framework for Online Contents Analysis - RED-Alert Approach. 257-263 - Elena Dubrova, Oscar Näslund, Bernhard Degen

, Anders Gawell, Yang Yu:
CRC-PUF: A Machine Learning Attack Resistant Lightweight PUF Construction. 264-271 - Dario Pasquini, Marco Mingione

, Massimo Bernaschi:
Adversarial Out-domain Examples for Generative Models. 272-280 - Giuseppina Andresini

, Annalisa Appice, Nicola Di Mauro, Corrado Loglisci, Donato Malerba:
Exploiting the Auto-Encoder Residual Error for Intrusion Detection. 281-290 - John Yoon:

Using a Deep-Learning Approach for Smart IoT Network Packet Analysis. 291-299 - Sebastian A. Henningsen, Daniel Teunis, Martin Florian, Björn Scheuermann:

Eclipsing Ethereum Peers with False Friends. 300-309 - Renlord Yang, Toby Murray, Paul Rimba, Udaya Parampalli:

Empirically Analyzing Ethereum's Gas Mechanism. 310-319 - Reza Rahimian, Shayan Eskandari

, Jeremy Clark:
Resolving the Multiple Withdrawal Attack on ERC20 Tokens. 320-329 - Arijit Dutta, Saravanan Vijayakumaran:

MProve: A Proof of Reserves Protocol for Monero Exchanges. 330-339 - Easwar Vivek Mangipudi, Krutarth Rao, Jeremy Clark, Aniket Kate:

Towards Automatically Penalizing Multimedia Breaches (Extended Abstract). 340-346 - Elias Rohrer, Julian Malliaris, Florian Tschorsch:

Discharged Payment Channels: Quantifying the Lightning Network's Resilience to Topology-Based Attacks. 347-356 - Fredrik Winzer, Benjamin Herd

, Sebastian Faust:
Temporary Censorship Attacks in the Presence of Rational Miners. 357-366 - Martin Florian, Sebastian A. Henningsen, Sophie Beaucamp, Björn Scheuermann:

Erasing Data from Blockchain Nodes. 367-376 - Minjeong Kim, Yujin Kwon, Yongdae Kim

:
Is Stellar As Secure As You Think? 377-385 - Tarun Chitra, Monica Quaintance, Stuart Haber, Will Martino:

Agent-Based Simulations of Blockchain protocols illustrated via Kadena's Chainweb. 386-395 - Oguzhan Ersoy, Zekeriya Erkin

, Reginald L. Lagendijk:
TULIP: A Fully Incentive Compatible Blockchain Framework Amortizing Redundant Communication. 396-405 - Sebastián García

, María José Erquiaga, Anna Shirokova
, Carlos García Garino:
Geost Botnet. Operational Security Failures of a New Android Banking Threat. 406-409 - Sinchul Back, Jennifer LaPrade, Lana Shehadeh

, Minju Kim:
Youth Hackers and Adult Hackers in South Korea: An Application of Cybercriminal Profiling. 410-413 - Jeremiah Onaolapo, Martin Lazarov, Gianluca Stringhini:

Master of Sheets: A Tale of Compromised Cloud Documents. 414-422 - Prakhar Pandey

, Maxwell Aliapoulios, Damon McCoy:
Iniquitous Cord-Cutting: An Analysis of Infringing IPTV Services. 423-432 - Michele Campobasso

, Pavlo Burda
, Luca Allodi:
CARONTE: Crawling Adversarial Resources Over Non-Trusted, High-Profile Environments. 433-442 - Maria Grazia Porcedda

, David S. Wall
:
Cascade and Chain Effects in Big Data Cybercrime: Lessons from the TalkTalk hack. 443-452 - Cerys Bradley, Gianluca Stringhini:

A Qualitative Evaluation of Two Different Law Enforcement Approaches on Dark Net Markets. 453-463 - Veronica Valeros

, Maria Rigaki
, Sebastián García
:
Machete: Dissecting the Operations of a Cyber Espionage Group in Latin America. 464-473 - Jonathan Lusthaus:

Beneath the Dark Web: Excavating the Layers of Cybercrime's Underground Economy. 474-480 - Alice Hutchings, Ben Collier

:
Inside out: Characterising Cybercrimes Committed Inside and Outside the Workplace. 481-490

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














