Regular Papers
Title |
Authors |
A Comparative Analysis of Machine Learning Techniques for IoT Intrusion Detection | João Vitorino, Rui Andrade, Isabel Praça, Orlando Sousa and Eva Maia. |
HistoTrust: ethereum-based attestation of a data history built with OP-TEE and TPM | Dylan Paulin, Christine Hennebert, Thibault Franco-Rondisson, Romain Jayles, Thomas Loubier and Raphaël Collado. |
A Modular Runtime Enforcement Model using Multi-Traces | Rania Taleb, Sylvain Hallé and Raphael Khoury |
Detecting Attacks in Network Traffic using Normality Models: The Cellwise Estimator | Felix Heine, Carsten Kleiner, Philip Klostermeyer, Volker Ahlers, Tim Laue and Nils Wellermann. |
Breaking Black Box Crypto-Devices using Laser-based Fault Injection | Bodo Selmke, Emanuele Strieder, Johann Heyszl, Tobias Damm and Sven Freud. |
Choosing wordlists for password guessing: an adaptive multi-armed bandit approach | Hazel Murray and David Malone |
Secure and Robust Cyber Security Threat Information Sharing | Anis Bkakria, Reda Yaich and Walid Arabi |
Revisiting stream-cipher-based homomorphic transciphering in the TFHE era | Adda Akram Bendoukha, Aymen Boudguiga and Renaud Sirdey. |
Automatic Annotation of Confidential Data in Java Code | Iulia Bastys, Pauline Bolignano, Franco Raimondi and Daniel Schoepe. |
An Extensive Comparison of Systems for Entity Extraction from Log Files | Anubhav Chhabra, Paula Branco, Guy-Vincent Jourdan and Herna Viktor. |
Generic Construction for Identity-based Proxy Blind Signature | Charles Olivier-Anclin, Leo Robert, Xavier Bultel and Pascal Lafourcade. |
Why anomaly-based intrusion detection systems have not yet conquered the industrial market? | S. Seng, Joaquin Garcia-Alfaro and Youssef Laarouchi |
PERMANENT: Publicly Verifiable Remote Attestation for Internet of Things through Blockchain | Sigurd Frej Joel Jørgensen Ankergård, Edlira Dushku and Nicola Dragoni |
K-Smali: an Executable Semantics for Program Verification of Reversed Android Applications | Marwa Ziadia, Mohamed Mejri and Jaouhar Fattahi |
Cut It: Deauthentication Attacks on Protected Management Frames in WPA2 and WPA3 | Karim Lounis, Steven Ding and Mohammad Zulkernine |
A Quantile-based Watermarking Approach for Distortion Minimization | Maikel Lázaro Pérez Gort, Martina Olliaro and Agostino Cortesi. |
Employing Feature Selection to Improve the Performance of Intrusion Detection Systems | Ricardo Avila, Raphaël Khoury, Christophe Pere and Kobra Khanmohammadi |
Implementation of Lightweight Ciphers and Their Integration into Entity Authentication with IEEE 802.11 Physical Layer Transmission | Yunjie Yi, Kalikinkar Mandal and Guang Gong |
Short Papers
Title | Authors |
Tight Integration of Symbolic Execution and Fuzzing | Sebastien Bardin, Michaël Marcozzi and Yaelle Vincont |
Trade-offs between Anonymity and Performance in Mix Networks | Matthieu Jee, Ania Piotrowska, Harry Halpin and Ninoslav Marina |
Creation and Detection of German Voice Deepfakes | Andreas Schaad, Dominik Binder, Vanessa Barnekow and Pascal Munaretto |
Homomorphic Evaluation of Lightweight Cipher Boolean Circuits | Kalikinkar Mandal and Guang Gong. |
Lightweight Authentication and Encryption for Real-Time Monitoring in IIoT Environments | Armando Miguel Garcia and Matthias Hiller. |
An automatized Identity and Access Management system for IoT combining Self-Sovereign Identity and smart contracts | Montassar Naghmouchi, Hella Kaffel and Maryline Laurent. |
Asset Sensitivity for Aligning Risk Assessment Across Multiple Units in Complex Organizations | Carla Mascia and Silvio Ranise |
At the bottom of binary analysis: instructions | Alexandre Talon and Guillaume Bonfante |
EXMULF: An Explainable Multimodal Content-based Fake News Detection System | Sabrine Amri, Dorsaf Sallami and Esma Aïmeur. |