default search action
40th SP 2019: San Francisco, CA, USA - Workshops
- 2019 IEEE Security and Privacy Workshops, SP Workshops 2019, San Francisco, CA, USA, May 19-23, 2019. IEEE 2019, ISBN 978-1-7281-3508-3
DLS 2019: 2nd IEEE Workshop on Deep Learning and Security
- Chawin Sitawarin, David A. Wagner:
On the Robustness of Deep K-Nearest Neighbors. 1-7 - Octavian Suciu, Scott E. Coull, Jeffrey Johns:
Exploring Adversarial Examples in Malware Detection. 8-14 - Rohan Taori, Amog Kamsetty, Brenton Chu, Nikita Vemuri:
Targeted Adversarial Examples for Black Box Audio Systems. 15-20 - Scott E. Coull, Christopher Gardner:
Activation Analysis of a Byte-Based Deep Neural Network for Malware Classification. 21-27 - Petr Gronát, Javier Alejandro Aldana-Iuit, Martin Bálek:
MaxNet: Neural Network Architecture for Continuous Detection of Malicious Activity. 28-35 - Gonzalo Marín, Pedro Casas, Germán Capdehourat:
Deep in the Dark - Deep Learning-Based Malware Traffic Detection Without Expert Knowledge. 36-42 - Taesung Lee, Benjamin Edwards, Ian M. Molloy, Dong Su:
Defending Against Neural Network Model Stealing Attacks Using Deceptive Perturbations. 43-49 - Liwei Song, Reza Shokri, Prateek Mittal:
Membership Inference Attacks Against Adversarially Robust Deep Learning Models. 50-56 - Patricia Thaine, Sergey Gorbunov, Gerald Penn:
Efficient Evaluation of Activation Functions over Encrypted Data. 57-63
IWPE 2019: IEEE Workshop on Privacy Engineering
- Laurens Sion, Dimitri Van Landuyt, Kim Wuyts, Wouter Joosen:
Privacy Risk Assessment for Data Subject-Aware Threat Modeling. 64-71 - Ali Kassem, Gergely Ács, Claude Castelluccia, Catuscia Palamidessi:
Differential Inference Testing: A Practical Approach to Evaluate Sanitizations of Datasets. 72-79 - Kim Wuyts, Laurens Sion, Dimitri Van Landuyt, Wouter Joosen:
Knowledge is Power: Systematic Reuse of Privacy Knowledge for Threat Elicitation. 80-83 - Tavish Vaidya, Micah Sherr:
You Talk Too Much: Limiting Privacy Exposure Via Voice Input. 84-91 - Takahito Sakamoto, Masahiro Matsunaga:
After GDPR, Still Tracking or Not? Understanding Opt-Out States for Online Behavioral Advertising. 92-99 - Ala'a Al-Momani, Frank Kargl, Robert Karl Schmidt, Antonio Kung, Christoph Bösch:
A Privacy-Aware V-Model for Software Development. 100-104 - Shengbao Zheng, Zhenyu Zhou, Heyi Tang, Xiaowei Yang:
SwitchMan: An Easy-to-Use Approach to Secure User Input and Output. 105-113
SafeThings 2019: IEEE Workshop on the Internet of Safe Things
- Sean Rivera, Sofiane Lagraa, Cristina Nita-Rotaru, Sheila Becker, Radu State:
ROS-Defender: SDN-Based Security Policy Enforcement for Robotic Applications. 114-119 - Kacper Wardega, Roberto Tron, Wenchao Li:
Resilience of Multi-robot Systems to Physical Masquerade Attacks. 120-125 - Florian Kohnhäuser, Dominik Püllen, Stefan Katzenbeisser:
Ensuring the Safe and Secure Operation of Electronic Control Units in Road Vehicles. 126-131 - Alesia Chernikova, Alina Oprea, Cristina Nita-Rotaru, BaekGyu Kim:
Are Self-Driving Cars Secure? Evasion Attacks Against Deep Neural Networks for Steering Angle Prediction. 132-137 - Mitali Palekar, Earlence Fernandes, Franziska Roesner:
Analysis of the Susceptibility of Smart Home Programming Interfaces to End User Error. 138-143 - Peng Cheng, Ibrahim Ethem Bagci, Jeff Yan, Utz Roedig:
Smart Speaker Privacy Control - Acoustic Tagging for Personal Voice Assistants. 144-149 - Weijia He, Jesse J. Martinez, Roshni Padhi, Lefan Zhang, Blase Ur:
When Smart Devices Are Stupid: Negative Experiences Using Home Smart Devices. 150-155 - Sihang Liu, Yizhou Wei, Jianfeng Chi, Faysal Hossain Shezan, Yuan Tian:
Side Channel Attacks in Computation Offloading Systems with GPU Virtualization. 156-161 - Shin-Ming Cheng, Sheng-Hao Ma:
Demo: An Emulator-Based Active Protection System Against IoT Malware. 162 - Salma Elmalaki, Bo-Jhang Ho, Moustafa Alzantot, Yasser Shoukry, Mani B. Srivastava:
SpyCon: Adaptation Based Spyware in Human-in-the-Loop IoT. 163-168 - Simon D. Duque Antón, Alexander Hafner, Hans Dieter Schotten:
Devil in the Detail: Attack Scenarios in Industrial Applications. 169-174 - Ulrich Matchi Aïvodji, Sébastien Gambs, Alexandre Martin:
IOTFLA : A Secured and Privacy-Preserving Smart Home Architecture Implementing Federated Learning. 175-180 - Davino Mauro Junior, Luis Melo, Hao Lu, Marcelo d'Amorim, Atul Prakash:
A Study of Vulnerability Analysis of Popular Smart Devices Through Their Companion Apps. 181-186
WTMC 2019: 4th IEEE Workshop on Traffic Measurements for Cybersecurity
- Victor Le Pochat, Tom van Goethem, Wouter Joosen:
A Smörgåsbord of Typos: Exploring International Keyboard Layout Typosquatting. 187-192 - Marcin Skwarek, Maciej Korczynski, Wojciech Mazurczyk, Andrzej Duda:
Characterizing Vulnerability of DNS AXFR Transfers with Global-Scale Scanning. 193-198 - Thomas Vissers, Peter Janssen, Wouter Joosen, Lieven Desmet:
Assessing the Effectiveness of Domain Blacklisting Against Malicious DNS Registrations. 199-204 - Oliver Farnan, Joss Wright, Alexander Darer:
Analysing Censorship Circumvention with VPNs Via DNS Cache Snooping. 205-211 - John V. Monaco:
Feasibility of a Keystroke Timing Attack on Search Engines with Autocomplete. 212-217 - Oleksii Starov, Yuchen Zhou, Jun Wang:
Detecting Malicious Campaigns in Obfuscated JavaScript with Scalable Behavioral Analysis. 218-223 - Alexander Vetterl, Richard Clayton, Ian Walden:
Counting Outdated Honeypots: Legal and Useful. 224-229 - Pedro Casas, Gonzalo Marín, Germán Capdehourat, Maciej Korczynski:
MLSEC - Benchmarking Shallow and Deep Machine Learning Models for Network Security. 230-235 - Kelvin Mai, Xi Qin, Neil Ortiz Silva, Alvaro A. Cárdenas:
IEC 60870-5-104 Network Characterization of a Large-Scale Operational Power Grid. 236-241 - Abhishta Abhishta, Marianne Junger, Reinoud Joosten, Lambert J. M. Nieuwenhuis:
Victim Routine Influences the Number of DDoS Attacks: Evidence from Dutch Educational Network. 242-247
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.