default search action
ESORICS 2023: The Hague, The Netherlands, Workshops - Part II
- Sokratis K. Katsikas, Habtamu Abie, Silvio Ranise, Luca Verderame, Enrico Cambiaso, Rita Maria Ugarelli, Isabel Praça, Wenjuan Li, Weizhi Meng, Steven Furnell, Basel Katt, Sandeep Pirbhulal, Ankur Shukla, Michele Ianni, Mila Dalla Preda, Kim-Kwang Raymond Choo, Miguel Pupo Correia, Abhishta Abhishta, Giovanni Sileno, Mina Alishahi, Harsha K. Kalutarage, Naoto Yanai:
Computer Security. ESORICS 2023 International Workshops - CPS4CIP, ADIoT, SecAssure, WASP, TAURIN, PriST-AI, and SECAI, The Hague, The Netherlands, September 25-29, 2023, Revised Selected Papers, Part II. Lecture Notes in Computer Science 14399, Springer 2024, ISBN 978-3-031-54128-5
CPS4CIP 2023
- Dinh Uy Tran, Sigrid Haug Selnes, Audun Jøsang, Janne Merete Hagen:
An Opportunity-Based Approach to Information Security Risk. 7-25 - Betul Gokkaya, Leonardo Aniello, Erisa Karafili, Basel Halak:
A Methodology for Cybersecurity Risk Assessment in Supply Chains. 26-41 - Guilherme Saraiva, Filipe Apolinário, Miguel L. Pardal:
IM-DISCO: Invariant Mining for Detecting IntrusionS in Critical Operations. 42-58 - Tiago Fontes Dias, João Vitorino, Tiago Fonseca, Isabel Praça, Eva Maia, Maria João Viamonte:
Unravelling Network-Based Intrusion Detection: A Neutrosophic Rule Mining and Optimization Framework. 59-75 - Nir Daniel, Florian Klaus Kaiser, Anton Dzega, Aviad Elyashar, Rami Puzis:
Labeling NIDS Rules with MITRE ATT &CK Techniques Using ChatGPT. 76-91 - Valentina Dumitrasc, René Serral-Gracià:
User Behavior Analysis for Malware Detection. 92-110 - Christoforos N. Spartalis, Theodoros Semertzidis, Petros Daras:
Balancing XAI with Privacy and Security Considerations. 111-124 - Chathuranga Sampath Kalutharage, Xiaodong Liu, Christos Chrysoulas, Oluwaseun Bamgboye:
Utilizing the Ensemble Learning and XAI for Performance Improvements in IoT Network Attack Detection. 125-139 - Cecilie Solberg Jørgensen, Ankur Shukla, Basel Katt:
Digital Twins in Healthcare: Security, Privacy, Trust and Safety Challenges. 140-153
ADIoT 2023
- Mohamed Abdelsalam, Simon Greiner, Oum-El-Kheir Aktouf, Annabelle Mercier:
C-TAR: A Compositional Threat Analysis and Risk Assessment Method for Infrastructure-Based Autonomous Driving. 159-175 - Sergio Esposito, Daniele Sgandurra, Giampaolo Bella:
The VOCODES Kill Chain for Voice Controllable Devices. 176-197 - Victoria Bull, Niclas Finne, Andrea Agiollo, Pallavi Kaliyar, Luca Pajola, Thiemo Voigt, Mauro Conti:
DETONAR-Light: An IoT Network Intrusion Detection Using DETONAR without a Sniffer Network. 198-213 - Phi Tuong Lau, Stefan Katzenbeisser:
Firmware-Based DoS Attacks in Wireless Sensor Network. 214-232 - Giovanni Di Crescenzo, Matluba Khodjaeva, Dilan D. Morales Caro:
Single-Server Batch Delegation of Variable-Input Pairings with Unbounded Client Lifetime. 233-255 - Giancarlo Fortino, Claudia Greco, Antonella Guzzo, Michele Ianni:
SigIL: A Signature-Based Approach of Malware Detection on Intermediate Language. 256-266
SecAssure 2023
- Alexandre Grimaldi, Julien Ribiollet, Pantaleone Nespoli, Joaquín García-Alfaro:
Toward Next-Generation Cyber Range: A Comparative Study of Training Platforms. 271-290 - Marcello Maugeri, Cristian Daniele, Giampaolo Bella:
Forkfuzz: Leveraging the Fork-Awareness in Coverage-Guided Fuzzing. 291-308 - Kristjan Krips, Nikita Snetkov, Jelizaveta Vakarjuk, Jan Willemson:
Trust Assumptions in Voting Systems. 309-329 - Florian Kammüller:
Introducing Distributed Ledger Security into System Specifications with the Isabelle RR-Cycle. 330-340 - Sampath Rajapaksha, Janaka Senanayake, Harsha Kalutarage, M. Omar Al-Kadri:
Enhancing Security Assurance in Software Development: AI-Based Vulnerable Code Detection with Static Analysis. 341-356
WASP 2023
- Yuanding Zhou:
Least Information Redundancy Algorithm of Printable Shellcode Encoding for X86. 361-376 - Loïc Buckwell, Olivier Gilles, Daniel Gracia Pérez, Nikolai Kosmatov:
Execution at RISC: Stealth JOP Attacks on RISC-V Applications. 377-391 - Sebastian Schrittwieser, Elisabeth Wimmer, Kevin Mallinger, Patrick Kochberger, Caroline Lawitschka, Sebastian Raubitzek, Edgar R. Weippl:
Modeling Obfuscation Stealth Through Code Complexity. 392-408 - Dimitrios Giagkos, Orestis Kompougias, Antonis Litke, Nikolaos Papadakis:
ZeekFlow: Deep Learning-Based Network Intrusion Detection a Multimodal Approach. 409-425 - Janaka Senanayake, Harsha Kalutarage, Andrei Petrovski, M. Omar Al-Kadri, Luca Piras:
FedREVAN: Real-time DEtection of Vulnerable Android Source Code Through Federated Neural Network with XAI. 426-441 - Daniil Sigalov, Dennis Gamayunov:
Finding Server-Side Endpoints with Static Analysis of Client-Side JavaScript. 442-458 - Matteo Golinelli, Francesco Bonomi, Bruno Crispo:
The Nonce-nce of Web Security: An Investigation of CSP Nonces Reuse. 459-475
TAURIN 2023
- Pawel Mackowiak, Fernando Kuipers:
Internet Transparency Through Multi-party Computation. 481-495 - Niousha Nazemi, Omid Tavallaie, Albert Y. Zomaya, Ralph Holz:
DNS Dependencies as an Expression of the Digital Divide: The Example of Australia. 496-509 - Shyam Krishna Khadka, Ralph Holz, Cristian Hesselman:
Towards Security Transparency of Autonomous Systems on the Internet. 510-513
PriST-AI 2023
- Wisam Abbasi, Paolo Mori, Andrea Saracino:
Privacy-Preserving Object Recognition with Explainability in Smart Systems. 519-534 - Tzu-Li Liu, Yu-Te Ku, Ming-Chien Ho, Feng-Hao Liu, Ming-Ching Chang, Chih-Fan Hsu, Wei-Chao Chen, Shih-Hao Hung:
An Efficient CKKS-FHEW/TFHE Hybrid Encrypted Inference Framework. 535-551 - Carmen Veenker, Danny Opdam, Mina Alishahi:
Pixels Who Violate Our Privacy! Deep Learning for Identifying Images' Key Pixels. 552-568 - Ehsan Toreini, Maryam Mehrnezhad, Aad van Moorsel:
Verifiable Fairness: Privacy-preserving Computation of Fairness for Machine Learning Systems. 569-584
SECAI 2023
- Jaromír Janisch, Tomás Pevný, Viliam Lisý:
NASimEmu: Network Attack Simulator & Emulator for Training Agents Generalizing to Novel Scenarios. 589-608 - Davy Preuveneers, Javier Martínez Llamas, Irfan Bulut, Enrique Argones-Rúa, Pieter Verfaillie, Vince Demortier, Dimitri Surinx, Wouter Joosen:
On the Use of AutoML for Combating Alert Fatigue in Security Operations Centers. 609-627 - Madeline Cheah, Jack Stone, Peter Haubrick, Samuel Bailey, David Rimmer, Demian Till, Matt Lacey, Jo Kruczynska, Mark Dorn:
CO-DECYBER: Co-operative Decision Making for Cybersecurity Using Deep Multi-agent Reinforcement Learning. 628-643 - Kevin Hector, Pierre-Alain Moëllic, Jean-Max Dutertre, Mathieu Dumont:
Fault Injection and Safe-Error Attack for Extraction of Embedded Neural Network Models. 644-664 - Kazuki Iwahana, Osamu Saisho, Takayuki Miura, Akira Ito:
Can Inputs' Reconstruction Information Be Coded into Machine Learning Model's Outputs? 665-682 - Daniel Gibert, Giulio Zizzo, Quan Le:
Towards a Practical Defense Against Adversarial Attacks on Deep Learning-Based Malware Detectors via Randomized Smoothing. 683-699 - Kazuki Iwahana, Naoto Yanai, Toru Fujiwara:
Backdoor Attacks Leveraging Latent Representation in Competitive Learning. 700-718 - Andrei Kvasov, Merve Sahin, Cédric Hébert, Anderson Santana de Oliveira:
Simulating Deception for Web Applications Using Reinforcement Learning. 719-737 - Martin Drasar, Ádám Ruman, Pavel Celeda, Shanchieh Jay Yang:
The Road Towards Autonomous Cybersecurity Agents: Remedies for Simulation Environments. 738-749 - Chamath Palihawadana, Nirmalie Wiratunga, Harsha Kalutarage, Anjana Wijekoon:
Mitigating Gradient Inversion Attacks in Federated Learning with Frequency Transformation. 750-760 - Xin Hong, Zafeirios C. Papazachos, Jesús Martínez del Rincón, Paul Miller:
Network Intrusion Detection by Variational Component-Based Feature Saliency Gaussian Mixture Clustering. 761-772
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.