Title: Usage Control Enforcement for Linux-based embedded Systems
Events
Title: Integrating Privacy Methods into the Software Development Lifecycle
Title: On the Impact of Man-in-the-middle Attack on Bluetooth
Title: Anomaly Detection Aided by Generative Models
Title: Mitigation for the Method Confusion Attack on Bluetooth
Title: Interactive Visualization of the Linux Kernel Code Property Graph for Security Analysis
Title: Virtualization-Assisted User Space Heap Hardening
Title: A Systematization of Privacy Requirements for Cloud-Based Services
Title: An Infrastructure for Verifiable Sensitive Data Processing
Title: Remote Attestation of Dynamic Software Stacks
Title: Comparison of Trusted Execution Environments for Attestation of Dynamic Software Stacks
Title: Building and evaluating high-interaction RDP honeypots
Title: Black-Box Reverse Engineering and Feature Comparison of AV Engines
Title: Using Blind Quantum Computing for Secure Computation on Untrusted Quantum Servers
Title: A Readiness Analysis of Audio to Video Deepfakes
Title: Incremental Construction of Code Property Graphs
Title: Learning the Correct Usage of Cryptographic APIs for Misuse Detection
None
Title: From Requirements to Architecture: Systematically Selecting Privacy Enhancing Technologies
Title: An Adversarial Detection Model for Different Data Types