default search action
ESORICS 2023: The Hague, The Netherlands, Workshops - Part II
- Sokratis K. Katsikas
, Habtamu Abie
, Silvio Ranise
, Luca Verderame
, Enrico Cambiaso
, Rita Maria Ugarelli
, Isabel Praça
, Wenjuan Li
, Weizhi Meng
, Steven Furnell
, Basel Katt
, Sandeep Pirbhulal
, Ankur Shukla
, Michele Ianni
, Mila Dalla Preda
, Kim-Kwang Raymond Choo
, Miguel Pupo Correia, Abhishta Abhishta
, Giovanni Sileno, Mina Alishahi, Harsha K. Kalutarage
, Naoto Yanai
:
Computer Security. ESORICS 2023 International Workshops - CPS4CIP, ADIoT, SecAssure, WASP, TAURIN, PriST-AI, and SECAI, The Hague, The Netherlands, September 25-29, 2023, Revised Selected Papers, Part II. Lecture Notes in Computer Science 14399, Springer 2024, ISBN 978-3-031-54128-5
CPS4CIP 2023
- Dinh Uy Tran
, Sigrid Haug Selnes
, Audun Jøsang
, Janne Merete Hagen:
An Opportunity-Based Approach to Information Security Risk. 7-25 - Betul Gokkaya
, Leonardo Aniello
, Erisa Karafili
, Basel Halak
:
A Methodology for Cybersecurity Risk Assessment in Supply Chains. 26-41 - Guilherme Saraiva, Filipe Apolinário
, Miguel L. Pardal
:
IM-DISCO: Invariant Mining for Detecting IntrusionS in Critical Operations. 42-58 - Tiago Fontes Dias, João Vitorino, Tiago Fonseca, Isabel Praça, Eva Maia, Maria João Viamonte:
Unravelling Network-Based Intrusion Detection: A Neutrosophic Rule Mining and Optimization Framework. 59-75 - Nir Daniel
, Florian Klaus Kaiser, Anton Dzega, Aviad Elyashar
, Rami Puzis
:
Labeling NIDS Rules with MITRE ATT &CK Techniques Using ChatGPT. 76-91 - Valentina Dumitrasc, René Serral-Gracià
:
User Behavior Analysis for Malware Detection. 92-110 - Christoforos N. Spartalis
, Theodoros Semertzidis
, Petros Daras
:
Balancing XAI with Privacy and Security Considerations. 111-124 - Chathuranga Sampath Kalutharage
, Xiaodong Liu
, Christos Chrysoulas
, Oluwaseun Bamgboye
:
Utilizing the Ensemble Learning and XAI for Performance Improvements in IoT Network Attack Detection. 125-139 - Cecilie Solberg Jørgensen, Ankur Shukla, Basel Katt:
Digital Twins in Healthcare: Security, Privacy, Trust and Safety Challenges. 140-153
ADIoT 2023
- Mohamed Abdelsalam, Simon Greiner, Oum-El-Kheir Aktouf, Annabelle Mercier
:
C-TAR: A Compositional Threat Analysis and Risk Assessment Method for Infrastructure-Based Autonomous Driving. 159-175 - Sergio Esposito
, Daniele Sgandurra
, Giampaolo Bella
:
The VOCODES Kill Chain for Voice Controllable Devices. 176-197 - Victoria Bull, Niclas Finne, Andrea Agiollo, Pallavi Kaliyar, Luca Pajola, Thiemo Voigt, Mauro Conti
:
DETONAR-Light: An IoT Network Intrusion Detection Using DETONAR without a Sniffer Network. 198-213 - Phi Tuong Lau, Stefan Katzenbeisser:
Firmware-Based DoS Attacks in Wireless Sensor Network. 214-232 - Giovanni Di Crescenzo, Matluba Khodjaeva, Dilan D. Morales Caro:
Single-Server Batch Delegation of Variable-Input Pairings with Unbounded Client Lifetime. 233-255 - Giancarlo Fortino, Claudia Greco
, Antonella Guzzo, Michele Ianni
:
SigIL: A Signature-Based Approach of Malware Detection on Intermediate Language. 256-266
SecAssure 2023
- Alexandre Grimaldi, Julien Ribiollet, Pantaleone Nespoli, Joaquín García-Alfaro:
Toward Next-Generation Cyber Range: A Comparative Study of Training Platforms. 271-290 - Marcello Maugeri
, Cristian Daniele
, Giampaolo Bella
:
Forkfuzz: Leveraging the Fork-Awareness in Coverage-Guided Fuzzing. 291-308 - Kristjan Krips, Nikita Snetkov
, Jelizaveta Vakarjuk
, Jan Willemson
:
Trust Assumptions in Voting Systems. 309-329 - Florian Kammüller:
Introducing Distributed Ledger Security into System Specifications with the Isabelle RR-Cycle. 330-340 - Sampath Rajapaksha
, Janaka Senanayake
, Harsha Kalutarage
, M. Omar Al-Kadri
:
Enhancing Security Assurance in Software Development: AI-Based Vulnerable Code Detection with Static Analysis. 341-356
WASP 2023
- Yuanding Zhou:
Least Information Redundancy Algorithm of Printable Shellcode Encoding for X86. 361-376 - Loïc Buckwell
, Olivier Gilles
, Daniel Gracia Pérez
, Nikolai Kosmatov
:
Execution at RISC: Stealth JOP Attacks on RISC-V Applications. 377-391 - Sebastian Schrittwieser, Elisabeth Wimmer, Kevin Mallinger, Patrick Kochberger
, Caroline Lawitschka, Sebastian Raubitzek, Edgar R. Weippl:
Modeling Obfuscation Stealth Through Code Complexity. 392-408 - Dimitrios Giagkos
, Orestis Kompougias
, Antonis Litke
, Nikolaos Papadakis
:
ZeekFlow: Deep Learning-Based Network Intrusion Detection a Multimodal Approach. 409-425 - Janaka Senanayake
, Harsha Kalutarage
, Andrei Petrovski
, M. Omar Al-Kadri
, Luca Piras
:
FedREVAN: Real-time DEtection of Vulnerable Android Source Code Through Federated Neural Network with XAI. 426-441 - Daniil Sigalov
, Dennis Gamayunov:
Finding Server-Side Endpoints with Static Analysis of Client-Side JavaScript. 442-458 - Matteo Golinelli
, Francesco Bonomi, Bruno Crispo
:
The Nonce-nce of Web Security: An Investigation of CSP Nonces Reuse. 459-475
TAURIN 2023
- Pawel Mackowiak, Fernando Kuipers:
Internet Transparency Through Multi-party Computation. 481-495 - Niousha Nazemi
, Omid Tavallaie
, Albert Y. Zomaya
, Ralph Holz
:
DNS Dependencies as an Expression of the Digital Divide: The Example of Australia. 496-509 - Shyam Krishna Khadka, Ralph Holz
, Cristian Hesselman:
Towards Security Transparency of Autonomous Systems on the Internet. 510-513
PriST-AI 2023
- Wisam Abbasi
, Paolo Mori
, Andrea Saracino
:
Privacy-Preserving Object Recognition with Explainability in Smart Systems. 519-534 - Tzu-Li Liu, Yu-Te Ku, Ming-Chien Ho, Feng-Hao Liu, Ming-Ching Chang, Chih-Fan Hsu, Wei-Chao Chen, Shih-Hao Hung:
An Efficient CKKS-FHEW/TFHE Hybrid Encrypted Inference Framework. 535-551 - Carmen Veenker, Danny Opdam, Mina Alishahi:
Pixels Who Violate Our Privacy! Deep Learning for Identifying Images' Key Pixels. 552-568 - Ehsan Toreini
, Maryam Mehrnezhad
, Aad van Moorsel
:
Verifiable Fairness: Privacy-preserving Computation of Fairness for Machine Learning Systems. 569-584
SECAI 2023
- Jaromír Janisch
, Tomás Pevný
, Viliam Lisý
:
NASimEmu: Network Attack Simulator & Emulator for Training Agents Generalizing to Novel Scenarios. 589-608 - Davy Preuveneers, Javier Martínez Llamas, Irfan Bulut, Enrique Argones-Rúa, Pieter Verfaillie, Vince Demortier, Dimitri Surinx, Wouter Joosen:
On the Use of AutoML for Combating Alert Fatigue in Security Operations Centers. 609-627 - Madeline Cheah, Jack Stone, Peter Haubrick, Samuel Bailey, David Rimmer, Demian Till, Matt Lacey, Jo Kruczynska, Mark Dorn:
CO-DECYBER: Co-operative Decision Making for Cybersecurity Using Deep Multi-agent Reinforcement Learning. 628-643 - Kevin Hector, Pierre-Alain Moëllic, Jean-Max Dutertre, Mathieu Dumont:
Fault Injection and Safe-Error Attack for Extraction of Embedded Neural Network Models. 644-664 - Kazuki Iwahana
, Osamu Saisho
, Takayuki Miura
, Akira Ito
:
Can Inputs' Reconstruction Information Be Coded into Machine Learning Model's Outputs? 665-682 - Daniel Gibert
, Giulio Zizzo, Quan Le:
Towards a Practical Defense Against Adversarial Attacks on Deep Learning-Based Malware Detectors via Randomized Smoothing. 683-699 - Kazuki Iwahana
, Naoto Yanai
, Toru Fujiwara:
Backdoor Attacks Leveraging Latent Representation in Competitive Learning. 700-718 - Andrei Kvasov
, Merve Sahin, Cédric Hébert, Anderson Santana de Oliveira
:
Simulating Deception for Web Applications Using Reinforcement Learning. 719-737 - Martin Drasar
, Ádám Ruman
, Pavel Celeda
, Shanchieh Jay Yang
:
The Road Towards Autonomous Cybersecurity Agents: Remedies for Simulation Environments. 738-749 - Chamath Palihawadana
, Nirmalie Wiratunga, Harsha Kalutarage, Anjana Wijekoon:
Mitigating Gradient Inversion Attacks in Federated Learning with Frequency Transformation. 750-760 - Xin Hong, Zafeirios C. Papazachos
, Jesús Martínez del Rincón
, Paul Miller:
Network Intrusion Detection by Variational Component-Based Feature Saliency Gaussian Mixture Clustering. 761-772
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.