Accepted Papers

  • Communicating Through Subliminal-Free Signatures

    Author: George Teseleanu
  • Size, Speed, and Security: An Ed25519 Case Study

    Authors: Cesar Pereida Garcia and Sampo Sovio
  • Trusted Sockets Layer: a TLS 1.3 based trusted channel protocol

    Authors: Arto Niemi, Vasile Adrian Bogdan Bop and Jan-Erik Ekberg
  • X-Pro: Distributed XDP Proxies against Botnets of Things

    Authors: Syafiq Al Atiiq and Christian Gehrmann
  • Industrialising Blackmail: Privacy Invasion Based IoT Ransomware

    Authors: Calvin Brierley, Budi Arief, Julio Hernandez and David Barnes
  • SQL Injections and Reinforcement Learning: An Empirical Evaluation of the Role of Action Structure

    Authors: Manuel Del Verme, Avald Aslaugson Sommervoll, Laszlo Erdodi, Simone Totaro and Fabio Massimo Zennaro
  • Arrows in a Quiver: A Secure Certicateless Group Key Distribution Protocol for Drones

    Authors: Eugene Frimpong, Reyhaneh Rabbaninejad and Antonis Michalas
  • Gollector: Measuring Domain Name Dark Matter from Different Vantage Points

    Authors: Kaspar Hageman, Rene Rydhof Hansen and Jens Myrup Pedersen
  • Secure Collaborative Learning for Predictive Maintenance in Optical Networks

    Authors: Khouloud Abdelli, Joo Yeon Cho and Stephan Pachnicke
  • Adversarial trends in mobile communication systems: From attack patterns to potential defenses strategies

    Authors: Hsin Yi Chen and Siddharth Prakash Rao
  • Preliminary Security Analysis, Formalisation, and Verification of OpenTitan Secure Boot Code

    Authors: Bjarke Hilmer Møller, Jacob Gosch Søndergaard, Kristoffer Skagbæk Jensen, Magnus Winkel Pedersen, Tobias Worm Bøgedal, Anton Christensen, Danny Bøgsted Poulsen, Kim Guldstrand Larsen and René Rydhof Hansen