Default Cover Image

2023 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)

Jul 03 2023 to Jul 07 2023

Delft, Netherlands

ISSN: 2768-0657

ISBN: 979-8-3503-2720-5

Table of Contents

Title Page iFreely available from IEEE.pp. 1-1
Title Page iiiFreely available from IEEE.pp. 3-3
Copyright PageFreely available from IEEE.pp. 4-4
Table of ContentsFreely available from IEEE.pp. 5-13
Welcome Message from the General ChairsFreely available from IEEE.pp. 14-14
Welcome Message from the Workshop ChairsFreely available from IEEE.pp. 15-15
A Threat Model for Soft Privacy on Smart CarsFull-text access may be available. Sign in or learn about subscription options.pp. 1-10
Vulnerability Analysis of Vehicular Coordinated ManeuversFull-text access may be available. Sign in or learn about subscription options.pp. 11-20
A Preliminary Study of Privilege Life Cycle in Software Management Platform Automation WorkflowsFull-text access may be available. Sign in or learn about subscription options.pp. 21-28
An Investigation of Quality Issues in Vulnerability Detection DatasetsFull-text access may be available. Sign in or learn about subscription options.pp. 29-33
Guiding Directed Fuzzing with FeasibilityFull-text access may be available. Sign in or learn about subscription options.pp. 42-49
Effective Machine Learning-based Access Control Administration through UnlearningFull-text access may be available. Sign in or learn about subscription options.pp. 50-57
An Analysis of Requirements and Privacy Threats in Mobile Data DonationsFull-text access may be available. Sign in or learn about subscription options.pp. 84-93
ATLAS: Automatically Detecting Discrepancies Between Privacy Policies and Privacy LabelsFull-text access may be available. Sign in or learn about subscription options.pp. 94-107
Automating Privacy Decisions – Where to Draw the Line?Full-text access may be available. Sign in or learn about subscription options.pp. 108-116
Privacy as an Architectural Quality: A Definition and an Architectural ViewFull-text access may be available. Sign in or learn about subscription options.pp. 125-132
Secure Key Management for Multi-Party Computation in MOZAIKFull-text access may be available. Sign in or learn about subscription options.pp. 133-140
Unified Communication: What do Digital Activists Need?Full-text access may be available. Sign in or learn about subscription options.pp. 141-149
Applying Neutralisation Theory to Better Understand Ransomware OffendersFull-text access may be available. Sign in or learn about subscription options.pp. 177-182
Digital Drift and the Evolution of a Large Cybercrime ForumFull-text access may be available. Sign in or learn about subscription options.pp. 183-193
How Cryptocurrency Exchange Interruptions Create Arbitrage OpportunitiesFull-text access may be available. Sign in or learn about subscription options.pp. 207-215
Mapping the Cyberstalking Landscape: An Empirical Analysis of Federal U.S. CrimesFull-text access may be available. Sign in or learn about subscription options.pp. 216-226
On Gaps in Enterprise Cyber Attack ReportingFull-text access may be available. Sign in or learn about subscription options.pp. 227-231
Visualizing Cyber-Threats in Underground ForumsFull-text access may be available. Sign in or learn about subscription options.pp. 244-258
A Practical Deep Learning-Based Acoustic Side Channel Attack on KeyboardsFull-text access may be available. Sign in or learn about subscription options.pp. 270-280
Emulating Side Channel Attacks on Gem5: Lessons LearnedFull-text access may be available. Sign in or learn about subscription options.pp. 287-295
Faulting Original McEliece’s Implementations is Possible How to Mitigate this Risk?Full-text access may be available. Sign in or learn about subscription options.pp. 311-319
A Digital Forensic Taxonomy For Programmable Logic Controller Data ArtefactsFull-text access may be available. Sign in or learn about subscription options.pp. 320-328
A Key to Embedded System Security: Locking and Unlocking Secrets with a Trusted Platform ModuleFull-text access may be available. Sign in or learn about subscription options.pp. 329-335
From Tactics to Techniques: A Systematic Attack Modeling for Advanced Persistent Threats in Industrial Control SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 336-344
The Case for Virtual PLC-Enabled Honeypot DesignFull-text access may be available. Sign in or learn about subscription options.pp. 351-357
D-GATE: Decentralized Geolocation and Time Enforcement for Usage ControlFull-text access may be available. Sign in or learn about subscription options.pp. 386-395
Masking Location Streams in the Presence of Colluding Service ProvidersFull-text access may be available. Sign in or learn about subscription options.pp. 405-414
Simplification of General Mixed Boolean-Arithmetic Expressions: GAMBAFull-text access may be available. Sign in or learn about subscription options.pp. 427-438
Temporal Analysis of Distribution Shifts in Malware Classification for Digital ForensicsFull-text access may be available. Sign in or learn about subscription options.pp. 439-450
How Well does GPT Phish People? An Investigation Involving Cognitive Biases and FeedbackFull-text access may be available. Sign in or learn about subscription options.pp. 451-457
Learning to Defend by Attacking (and Vice-Versa): Transfer of Learning in Cybersecurity GamesFull-text access may be available. Sign in or learn about subscription options.pp. 458-464
Honey Infiltrator: Injecting Honeytoken Using NetfilterFull-text access may be available. Sign in or learn about subscription options.pp. 465-469
A First Look at SVCB and HTTPS DNS Resource Records in the WildFull-text access may be available. Sign in or learn about subscription options.pp. 470-474
Assessing and Exploiting Domain Name MisinformationFull-text access may be available. Sign in or learn about subscription options.pp. 475-486
Detecting and Analyzing Mouse Tracking in the WildFull-text access may be available. Sign in or learn about subscription options.pp. 495-500
Inside Residential IP Proxies: Lessons Learned from Large Measurement CampaignsFull-text access may be available. Sign in or learn about subscription options.pp. 501-512
Lost in Translation: AI-based Generator of Cross-Language Sound-SquattingFull-text access may be available. Sign in or learn about subscription options.pp. 513-520
Revisiting OAuth 2.0 Compliance: A Two-Year Follow-Up StudyFull-text access may be available. Sign in or learn about subscription options.pp. 521-525
TLS → Post-Quantum TLS: Inspecting the TLS Landscape for PQC Adoption on AndroidFull-text access may be available. Sign in or learn about subscription options.pp. 526-538
Identifying and Differentiating Acknowledged Scanners in Network TrafficFull-text access may be available. Sign in or learn about subscription options.pp. 567-574
Talking Abortion (Mis)information with ChatGPT on TikTokFull-text access may be available. Sign in or learn about subscription options.pp. 594-608
Work in Progress: A Glance at Social Media Self-Censorship in North AmericaFull-text access may be available. Sign in or learn about subscription options.pp. 609-618
Author IndexFreely available from IEEE.pp. 673-676
Showing 80 out of 80