Accepted Papers

Full papers (19)

Aishwarya Surani, Sanchari Das, Amani Bawaked, Braden Kelsey, Nikki Roberts, David Vincent and Matthew Wheeler. A Report on Security and Privacy Evaluation of Mental Healthcare Web Services and Mobile Applications
Franz Deimling and Michela Fazzolari. AMOE: a Tool to Automatically Extract and Assess Organizational Evidence for Continuous Cloud Audit
Sascha Kern, Thomas Baumer, Ludwig Fuchs and Günther Pernul. Maintain High-Quality Access Control Policies: An Academic and Practice-Driven Approach
Gianluca Sassetti, Amir Sharif, Giada Sciarretta, Roberto Carbone and Silvio Ranise. Assurance, Consent and Access Control for Privacy-Aware OIDC Deployments
Héber H. Arcolezi, Selene Cerna and Catuscia Palamidessi. On the utility gain of iterative bayesian update for locally differentially private protocols
Alfredo De Santis and Barbara Masucci. New Results on Distributed Secret Sharing Protocols
Tom Ganz, Erik Imgrund, Martin Härterich and Konrad Rieck. CodeGraphSMOTE - Data Augmentation for Vulnerability Discovery
Siqi Zhang, Mengyuan Zhang and Lianying Zhao. VIET: A Tool for Extracting Essential Information from Vulnerability Descriptions for CVSS Evaluation
Héber H. Arcolezi, Karima Makhlouf and Catuscia Palamidessi. (Local) Differential Privacy has NOT Disparate Impact on Fairness
Emre Yilmaz and Erman Ayday. Probabilistic Fingerprinting Scheme for Correlated Data
Zahra Ebadi Ansaroudi, Roberto Carbone, Giada Sciarretta and Silvio Ranise. Control is Nothing Without Trust: A First Look into Digital Identity Wallet Trends
Adda Akram Bendoukha, Pierre-Emmanuel Clet, Aymen Boudguiga and Renaud Sirdey. Optimized stream-cipher-based transciphering by means of functional-bootstrapping
Janaka Senanayake, Harsha Kumara Kalutarage, Mhd Omar Al Kadri, Andrei Petrovski and Luca Piras. Android Code Vulnerabilities Early Detection using AI-powered ACVED Plugin
Bakary Dolo, Khouloud Boukadi and Faiza Loukil. Data distribution impact on preserving privacy in centralized and decentralized learning
David Rodriguez and Ram Krishnan. An Autoencoder-Based Image Anonymization Scheme for Privacy Enhanced Deep Learning
Ece Alptekin and M. Emre Gursoy. Building Quadtrees for Spatial Data under Local Differential Privacy
Fereshteh Razmi and Li Xiong. Classification Auto-Encoder based Detector against Diverse Data Poisoning Attacks
Basel Abdeen, Latifur Khan, Ehab Al-Shaer, Anoop Singhal and Kevin Hamlen. SMET: Semantic Mapping of CVE to ATT&CK and its Application to Cybersecurity
Xuyang Cao, Yang Cao, Primal Pappachan, Atsuyoshi Nakamura and Masatoshi Yoshikawa. Differentially Private Streaming Data Release under Temporal Correlations via Post-processing

Short papers (5)

Akito Yamamoto and Tetsuo Shibuya. Privacy-Preserving Genomic Statistical Analysis under Local Differential Privacy
Philip Empl, Henric Hager and Günther Pernul. Digital Twins for IoT Security Management
Charles Neu, Henry Cabral Nunes, Lana T. Thomas, Marlon P. da Silva, Charles Morisset and Avelino Francisco Zorzo. Impact of using a privacy model on smart buildings data for CO2 prediction
Fausto Fasano, Michele Guerra, Roberto Milanese and Rocco Oliveto. A Dynamic Approach to Defuse Logic Bombs in Android Applications
Sangita Roy and Rudrapatna K. Shyamasundar. An analysis of Hybrid Consensus in Blockchain Protocols for correctness and Progress