A boostershot for transferable physically realizable adversarial examples | Willem Verheyen, Sander Joos, Tim Van hamme, Davy Preuveneers, Wouter Joosen |
A practical methodology for ML-Based EM Side Channel Disassemblers | Cesar Arguello, Hunter Searle, Sara Rampazzi, Kevin Butler |
Detecting Network Anomalies from Small Traffic Samples using Graph Neural Network | Aviv Yehezkel, Eyal Elyashiv |
Exploiting Timing Side-Channel Leaks in Web Applications that Tell on Themselves | Vik Vanderlinden, Tom Van Goethem, Wouter Joosen, Mathy Vanhoef |
How Attackers Determine the Ransom in Ransomware Attacks | Tom Meurs, Marianne Junger, Abhishta Abhishta |
One of a Kind: Correlating Robustness to Adversarial Examples and Face Uniqueness | Giuseppe Garofalo, Tim Van hamme, Davy Preuveneers, Wouter Joosen |
Pillars of Sand: The current state of Datasets in the field of Network Intrusion Detection | Gints Engelen, Robert Flood, Lisa Liu-Thorrold, Vera Rimmer, Henry Clausen, David Aspinall, Wouter Joosen |
Systematic Elicitation of Common Security Design Flaws | Stef Verreydt, Laurens Sion, Koen Yskout, Wouter Joosen |
TESTABLE: Testability-driven security and privacy testing for Web Applications | Luca Compagna, Giancarlo Pellegrino, Davide Balzarotti, Martin Johns, Ángel Cuevas, Battista Biggio, Leyla Bilge, Fabian Yamaguchi, Matteo Meucci |
The Beauty and the Beast (40 years of process algebra and cybersecurity) | Silvia De Francisci, Gabriele Costa, Rocco De Nicola |
The impact of data sampling in the anonymization pipeline | Jenno Verdonck, Kevin De Boeck, Michiel Willocx, Jorn Lapon, Vincent Naessens |
The impact of public data during de-anonymization: a case study | Kevin De Boeck, Jenno Verdonck, Michiel Willocx, Jorn Lapon, Vincent Naessens |
Towards Cyber Resilience of Cyber-Physical Systems using Tiny Twins | Fereidoun Moradi, Sara Abbaspour Asadollah, Marjan Sirjani |