Proceedings of the Eighth European Workshop on System Security

Deployment challenges in log-based PKI enhancements
Stephanos Matsumoto, Pawel Szalachowski, Adrian Perrig
A study on data de-pseudonymization in the smart grid
Valentin Tudor, Magnus Almgren, Marina Papatriantafilou
Fox in the trap: thwarting masqueraders via automated decoy document deployment
Jonathan Voris, Jill Jermyn, Nathaniel Boggs, Salvatore Stolfo
Two-factor authentication: is the world ready?: quantifying 2FA adoption
Thanasis Petsas, Giorgos Tsirantonakis, Elias Athanasopoulos, Sotiris Ioannidis
Collaborative filtering under a sybil attack: analysis of a privacy threat
Davide Frey, Rachid Guerraoui, Anne-Marie Kermarrec, Antoine Rault
Mobile device fingerprinting considered harmful for risk-based authentication
Jan Spooren, Davy Preuveneers, Wouter Joosen
Exploring reverse engineering symptoms in Android apps
Hugo Gonzalez, Andi A. Kadir, Natalia Stakhanova, Abdullah J. Alzahrani, Ali A. Ghorbani