Proceedings of the Eighth European Workshop on System Security

Full Citation in the ACM Digital Library

Deployment challenges in log-based PKI enhancements

Stephanos Matsumoto, Pawel Szalachowski, Adrian Perrig

A study on data de-pseudonymization in the smart grid

Valentin Tudor, Magnus Almgren, Marina Papatriantafilou

Fox in the trap: thwarting masqueraders via automated decoy document deployment

Jonathan Voris, Jill Jermyn, Nathaniel Boggs, Salvatore Stolfo

Two-factor authentication: is the world ready?: quantifying 2FA adoption

Thanasis Petsas, Giorgos Tsirantonakis, Elias Athanasopoulos, Sotiris Ioannidis

Collaborative filtering under a sybil attack: analysis of a privacy threat

Davide Frey, Rachid Guerraoui, Anne-Marie Kermarrec, Antoine Rault

Mobile device fingerprinting considered harmful for risk-based authentication

Jan Spooren, Davy Preuveneers, Wouter Joosen

Exploring reverse engineering symptoms in Android apps

Hugo Gonzalez, Andi A. Kadir, Natalia Stakhanova, Abdullah J. Alzahrani, Ali A. Ghorbani