Regular Papers

Title

Authors

A Comparative Analysis of Machine Learning Techniques for IoT Intrusion DetectionJoão Vitorino, Rui Andrade, Isabel Praça, Orlando Sousa and Eva Maia.
HistoTrust: ethereum-based attestation of a data history built with OP-TEE and TPMDylan Paulin, Christine Hennebert, Thibault Franco-Rondisson, Romain Jayles, Thomas Loubier and Raphaël Collado.
A Modular Runtime Enforcement Model using Multi-TracesRania Taleb, Sylvain Hallé and Raphael Khoury
Detecting Attacks in Network Traffic using Normality Models: The Cellwise EstimatorFelix Heine, Carsten Kleiner, Philip Klostermeyer, Volker Ahlers, Tim Laue and Nils Wellermann.
Breaking Black Box Crypto-Devices using Laser-based Fault InjectionBodo Selmke, Emanuele Strieder, Johann Heyszl, Tobias Damm and Sven Freud.
Choosing wordlists for password guessing: an adaptive multi-armed bandit approachHazel Murray and David Malone
Secure and Robust Cyber Security Threat Information SharingAnis Bkakria, Reda Yaich and Walid Arabi
Revisiting stream-cipher-based homomorphic transciphering in the TFHE eraAdda Akram Bendoukha, Aymen Boudguiga and Renaud Sirdey.
Automatic Annotation of Confidential Data in Java CodeIulia Bastys, Pauline Bolignano, Franco Raimondi and Daniel Schoepe.
An Extensive Comparison of Systems for Entity Extraction from Log FilesAnubhav Chhabra, Paula Branco, Guy-Vincent Jourdan and Herna Viktor.
Generic Construction for Identity-based Proxy Blind SignatureCharles Olivier-Anclin, Leo Robert, Xavier Bultel and Pascal Lafourcade.
Why anomaly-based intrusion detection systems have not yet conquered the industrial market?S. Seng, Joaquin Garcia-Alfaro and Youssef Laarouchi
PERMANENT: Publicly Verifiable Remote Attestation for Internet of Things through BlockchainSigurd Frej Joel Jørgensen Ankergård, Edlira Dushku and Nicola Dragoni
K-Smali: an Executable Semantics for Program Verification of Reversed Android ApplicationsMarwa Ziadia, Mohamed Mejri and Jaouhar Fattahi
Cut It: Deauthentication Attacks on Protected Management Frames in WPA2 and WPA3Karim Lounis, Steven Ding and Mohammad Zulkernine
A Quantile-based Watermarking Approach for Distortion MinimizationMaikel Lázaro Pérez Gort, Martina Olliaro and Agostino Cortesi.
Employing Feature Selection to Improve the Performance of Intrusion Detection SystemsRicardo Avila, Raphaël Khoury, Christophe Pere and Kobra Khanmohammadi
Implementation of Lightweight Ciphers and Their Integration into Entity Authentication with IEEE 802.11 Physical Layer TransmissionYunjie Yi, Kalikinkar Mandal and Guang Gong

Short Papers

Title

Authors

Tight Integration of Symbolic Execution and FuzzingSebastien Bardin, Michaël Marcozzi and Yaelle Vincont
Trade-offs between Anonymity and Performance in Mix NetworksMatthieu Jee, Ania Piotrowska, Harry Halpin and Ninoslav Marina
Creation and Detection of German Voice DeepfakesAndreas Schaad, Dominik Binder, Vanessa Barnekow and Pascal Munaretto
Homomorphic Evaluation of Lightweight Cipher Boolean CircuitsKalikinkar Mandal and Guang Gong.
Lightweight Authentication and Encryption for Real-Time Monitoring in IIoT EnvironmentsArmando Miguel Garcia and Matthias Hiller.
An automatized Identity and Access Management system for IoT combining Self-Sovereign Identity and smart contractsMontassar Naghmouchi, Hella Kaffel and Maryline Laurent.
Asset Sensitivity for Aligning Risk Assessment Across Multiple Units in Complex OrganizationsCarla Mascia and Silvio Ranise
At the bottom of binary analysis: instructionsAlexandre Talon and Guillaume Bonfante
EXMULF: An Explainable Multimodal Content-based Fake News Detection SystemSabrine Amri, Dorsaf Sallami and Esma Aïmeur.

Supporting Institutions