| 2022 | A Decentralised Real Estate Transfer Verification based on Self-Sovereign Identity and Smart Contracts. Abubakar-Sadiq Shehu, António Pinto, Manuel Eduardo Correia |
| 2022 | A Generic Privacy-preserving Protocol for Keystroke Dynamics-based Continuous Authentication. Ahmed Fraz Baig, Sigurd Eskeland |
| 2022 | A Local Differential Privacy based Hybrid Recommendation Model with BERT and Matrix Factorization. Jeyamohan Neera, Xiaomin Chen, Nauman Aslam, Biju Issac, Eve O'Brien |
| 2022 | A Longitudinal Study of Cryptographic API: A Decade of Android Malware. Adam Janovsky, Davide Maiorca, Dominik Macko, Vashek Matyas, Giorgio Giacinto |
| 2022 | A Method for Road Accident Prevention in Smart Cities based on Deep Reinforcement Learning. Giuseppe Crincoli, Fabiana Fierro, Giacomo Iadarola, Piera Elena La Rocca, Fabio Martinelli, Francesco Mercaldo, Antonella Santone |
| 2022 | A New Leakage Resilient Symmetric Searchable Encryption Scheme for Phrase Search. Samiran Bag, Indranil Ghosh Ray, Feng Hao |
| 2022 | A Novel Method for Embedding and Extracting Secret Messages in Textual Documents based on Paragraph Resizing. Benjamin Aziz, Aysha Bukhelli, Rinat Khusainov, Alaa Mohasseb |
| 2022 | A Real-time Method for CAN Bus Intrusion Detection by Means of Supervised Machine Learning. Francesco Mercaldo, Rosangela Casolare, Giovanni Ciaramella, Giacomo Iadarola, Fabio Martinelli, Francesco Ranieri, Antonella Santone |
| 2022 | A Region-based Training Data Segmentation Strategy to Credit Scoring. Roberto Saia, Salvatore Carta, Gianni Fenu, Livio Pompianu |
| 2022 | A Secure Federated Learning: Analysis of Different Cryptographic Tools. Oana Stan, Vincent Thouvenot, Aymen Boudguiga, Katarzyna Kapusta, Martin Zuber, Renaud Sirdey |
| 2022 | A Spendable Cold Wallet from QR Video. Rafael Dowsley, Mylène C. Q. Farias, Mario Larangeira, Anderson Nascimento, Jot Virdee |
| 2022 | An Adaptive Web Application Firewall. Miguel Calvo, Marta Beltrán |
| 2022 | Application Sandboxing for Linux Desktops: A User-friendly Approach. Lukas Brodschelm, Marcus Gelderie |
| 2022 | Are Clouds making Our Research Irrelevant and Who Is at Fault? (Position Paper). Yvo Desmedt |
| 2022 | Authentication Attacks on Projection-based Cancelable Biometric Schemes. Axel Durbet, Paul-Marie Grollemund, Pascal Lafourcade, Denis Migdal, Kevin Thiry-Atighehchi |
| 2022 | Behavior Modeling of a Distributed Application for Anomaly Detection. Amanda B. Viescinski, Tiago Heinrich, Newton Carlos Will, Carlos Maziero |
| 2022 | Blind Side Channel on the Elephant LFSR. Awaleh Houssein Meraneh, Christophe Clavier, Hélène Le Bouder, Julien Maillard, Gaël Thomas |
| 2022 | Brain Waves and Evoked Potentials as Biometric User Identification Strategy: An Affordable Low-cost Approach. Roberto Saia, Salvatore Carta, Gianni Fenu, Livio Pompianu |
| 2022 | Bypassing Current Limitations for Implementing a Credential Delegation for the Industry 4.0. Santiago de Diego, Oscar Lage, Cristina Regueiro, Sergio Anguita, Gabriel Maciá-Fernández |
| 2022 | CRGC: A Practical Framework for Constructing Reusable Garbled Circuits. Christopher Harth-Kitzerow, Georg Carle, Fan Fei, André Luckow, Johannes Klepsch |
| 2022 | CatNap: Leveraging Generic MPC for Actively Secure Privacy-enhancing Proximity Testing with a Napping Party. Ivan Oleynikov, Elena Pagnin, Andrei Sabelfeld |
| 2022 | Code-based Key Encapsulation Mechanism Preserving Short Ciphertext and Secret Key. Jayashree Dey, Ratna Dutta |
| 2022 | Collusion-resistant Broadcast Encryption based on Hidden RSA Subgroups. Sigurd Eskeland |
| 2022 | Comparison-based MPC in Star Topology. Gowri R. Chandran, Carmit Hazay, Robin Hundt, Thomas Schneider |
| 2022 | Cryptanalysis of a Privacy-preserving Behavior-oriented Authentication Scheme. Sigurd Eskeland, Ahmed Fraz Baig |
| 2022 | Cyber Security When IT Meets OT. Sokratis K. Katsikas |
| 2022 | Decentralized Public Key Infrastructure with Identity Management using Hyperledger Fabric. Amisha Sinha, Debanjan Sadhya |
| 2022 | Discovering How to Attack a System. Fabrizio Baiardi, Daria Maggi, Mauro Passacantando |
| 2022 | Don't Tell Me The Cybersecurity Moon Is Shining... (Cybersecurity Show and Tell). Luca Viganò |
| 2022 | Effectiveness of Adversarial Component Recovery in Protected Netlist Circuit Designs. Jeffrey Todd McDonald, Jennifer Parnell, Todd R. Andel, Samuel H. Russ |
| 2022 | Efficient Hybrid Model for Intrusion Detection Systems. Nesrine Kaaniche, Aymen Boudguiga, Gustavo Gonzalez Granadillo |
| 2022 | Efficient IoT Device Fingerprinting Approach using Machine Learning. Richmond Osei, Habib Louafi, Malek Mouhoub, Zhongwen Zhu |
| 2022 | Evaluation of AI-based Malware Detection in IoT Network Traffic. Nuno Prazeres, Rogério Luís de C. Costa, Leonel Santos, Carlos Rabadão |
| 2022 | FAPRIL: Towards Faster Privacy-preserving Fingerprint-based Localization. Christopher van der Beets, Raine Nieminen, Thomas Schneider |
| 2022 | Federated Naive Bayes under Differential Privacy. Thomas Marchioro, Lodovico Giaretta, Evangelos P. Markatos, Sarunas Girdzijauskas |
| 2022 | From GDPR to Privacy Design Patterns: The MATERIALIST Framework. Vita Santa Barletta, Giuseppe Desolda, Domenico Gigante, Rosa Lanzilotti, Marco Saltarella |
| 2022 | GAN-based Approach to Crafting Adversarial Malware Examples against a Heterogeneous Ensemble Classifier. Saad Al-Ahmadi, Saud Al-Eyead |
| 2022 | Graph Algorithms over Homomorphic Encryption for Data Cooperatives. Mark Dockendorf, Ram Dantu, John Long |
| 2022 | HTTPFuzz: Web Server Fingerprinting with HTTP Request Fuzzing. Animesh Kar, Andrei Natadze, Enrico Branca, Natalia Stakhanova |
| 2022 | Identifying Organizations Receiving Personal Data in Android Apps. David Rodríguez Torrado, Miguel Cozar, José M. del Álamo |
| 2022 | Illicit Darkweb Classification via Natural-language Processing: Classifying Illicit Content of Webpages based on Textual Information. Giuseppe Cascavilla, Gemma Catolino, Mirella Sangiovanni |
| 2022 | Implementation of a Stateful Network Protocol Intrusion Detection Systems. S. Seng, Joaquín García-Alfaro, Y. Laarouci |
| 2022 | Irreversible Applications for Windows NT Systems. Rahul Sankalana Gunawardhana, Kavinga Yapa Abeywardena |
| 2022 | JCAlgTest: Robust Identification Metadata for Certified Smartcards. Petr Svenda, Rudolf Kvasnovský, Imrich Nagy, Antonín Dufka |
| 2022 | Key Encapsulation Mechanism in Ciphertext-policy Attribute based Setting Featuring Revocation and Key-homomorphic Property. Anushree Belel, Ratna Dutta, Sourav Mukhopadhyay |
| 2022 | Large-scale Randomness Study of Security Margins for 100+ Cryptographic Functions. Dusan Klinec, Marek Sýs, Karel Kubicek, Petr Svenda, Vashek Matyás |
| 2022 | Mason Vulnerability Scoring Framework: A Customizable Framework for Scoring Common Vulnerabilities and Weaknesses. Ibifubara Iganibo, Massimiliano Albanese, Kaan Turkmen, Thomas R. Campbell, Marc Mosko |
| 2022 | Membership Inference Attacks on Aggregated Time Series with Linear Programming. Antonin Voyez, Tristan Allard, Gildas Avoine, Pierre Cauchois, Élisa Fromont, Matthieu Simonin |
| 2022 | Metering Homes: Do Energy Efficiency and Privacy Need to Be in Conflict? Libor Polcák, Petr Matousek |
| 2022 | Moving Target Defense Router: MaTaDoR. Berkan Ufuk, Mehmet Tahir Sandikkaya |
| 2022 | Near-collisions and Their Impact on Biometric Security. Axel Durbet, Paul-Marie Grollemund, Pascal Lafourcade, Kevin Thiry-Atighehchi |
| 2022 | Novel Design for IE-Cache to Mitigate Conflict-based Cache-side Channel Attacks with Reduced Energy Consumption. Saqib Javed, Muhammad Asim Mukhtar, Muhammad Khurram Bhatti, Guy Gogniat |
| 2022 | Offline-verifiable Data from Distributed Ledger-based Registries. Stefan More, Jakob Heher, Clemens Walluschek |
| 2022 | On the Efficiency and Security of Quantum-resistant Key Establishment Mechanisms on FPGA Platforms. Lukas Malina, Sara Ricci, Patrik Dobias, Petr Jedlicka, Jan Hajny, Kim-Kwang Raymond Choo |
| 2022 | On the Practicality of Relying on Simulations in Different Abstraction Levels for Pre-silicon Side-Channel Analysis. Javad Bahrami, Mohammad Ebrahimabadi, Sofiane Takarabt, Jean-Luc Danger, Sylvain Guilley, Naghmeh Karimi |
| 2022 | PAMMELA: Policy Administration Methodology using Machine Learning. Varun Gumma, Barsha Mitra, Soumyadeep Dey, Pratik Shashikantbhai Patel, Sourabh Suman, Saptarshi Das, Jaideep Vaidya |
| 2022 | PASS-P: Performance and Security Sensitive Dynamic Cache Partitioning. Nirmal Kumar Boran, Pranil Joshi, Virendra Singh |
| 2022 | PE-AONT: Partial Encryption All or Nothing Transform. Katarzyna Kapusta, Gérard Memmi |
| 2022 | Parallel and Distributed Implementations of the Wiedemann and the Block-Wiedemann Methods over GF(2). Rahul Roy, Abhijit Das, Dipanwita Roy Chowdhury |
| 2022 | Partially Oblivious Neural Network Inference. Panagiotis Rizomiliotis, Christos Diou, Aikaterini Triakosia, Ilias Kyrannas, Konstantinos Tserpes |
| 2022 | PhishGNN: A Phishing Website Detection Framework using Graph Neural Networks. Tristan Bilot, Grégoire Geis, Badis Hammi |
| 2022 | Proceedings of the 19th International Conference on Security and Cryptography, SECRYPT 2022, Lisbon, Portugal, July 11-13, 2022. Sabrina De Capitani di Vimercati, Pierangela Samarati |
| 2022 | Real-time Crowd Counting based on Wearable Ephemeral IDs. Daniel Morales, Isaac Agudo, Javier López |
| 2022 | Resilience of GANs against Adversarial Attacks. Kyrylo Rudavskyy, Ali Miri |
| 2022 | Reverse Engineering for Thwarting Digital Supply Chain Attacks in Critical Infrastructures: Ethical Considerations. Arne Roar Nygård, Arvind Sharma, Sokratis K. Katsikas |
| 2022 | Risk-driven Model-based Architecture Design for Secure Information Flows in Manufacturing Infrastructures. Loris Dal Lago, Fabio Federici, Davide Martintoni, Valerio Senni |
| 2022 | SEVIL: Secure and Efficient VerifIcation over Massive Proofs of KnowLedge. Souha Masmoudi, Maryline Laurent, Nesrine Kaaniche |
| 2022 | SHINE: Resilience via Practical Interoperability of Multi-party Schnorr Signature Schemes. Antonín Dufka, Vladimir Sedlacek, Petr Svenda |
| 2022 | Seccomp Filters from Fuzzing. Marcus Gelderie, Valentin Barth, Maximilian Luff, Julian Birami |
| 2022 | Side-channel Analysis and Countermeasure for Implementation of Lattice-based Signature. Kazuhide Fukushima, Hiroki Okada, Sofiane Takarabt, Amina Korchi, Meziane Hamoud, Khaled Karray, Youssef Souissy, Sylvain Guilley |
| 2022 | Stacked Ensemble Model for Enhancing the DL based SCA. Anh-Tuan Hoang, Neil Hanley, Ayesha Khalid, Dur-e-Shahwar Kundi, Máire O'Neill |
| 2022 | Switched-based Control Testbed to Assure Cyber-physical Resilience by Design. Mariana Segovia, Jose Rubio-Hernan, Ana R. Cavalli, Joaquín García-Alfaro |
| 2022 | The Weakest Link: On Breaking the Association between Usernames and Passwords in Authentication Systems. Eva Anastasiadi, Elias Athanasopoulos, Evangelos P. Markatos |
| 2022 | Threats to Adversarial Training for IDSs and Mitigation. Hassan Chaitou, Thomas Robert, Jean Leneutre, Laurent Pautet |
| 2022 | Tick Tock Break the Clock: Breaking CAPTCHAs on the Darkweb. David Holm Audran, Marcus Braunschweig Andersen, Mark Højer Hansen, Mikkel Møller Andersen, Thomas B. Frederiksen, Kasper H. Hansen, Dimitrios Georgoulias, Emmanouil Vasilomanolakis |
| 2022 | Towards Heterogeneous Remote Attestation Protocols. Paul Georg Wagner, Jürgen Beyerer |
| 2022 | Towards a Threat Model and Security Analysis for Data Cooperatives. Abiola Salau, Ram Dantu, Kirill Morozov, Kritagya Upadhyay, Syed Badruddoja |
| 2022 | Towards an Automated Business Process Model Risk Assessment: A Process Mining Approach. Panagiotis Dedousis, Melina Raptaki, George Stergiopoulos, Dimitris Gritzalis |
| 2022 | Transient State Signaling for Spectre/Meltdown Transient Cache Side-channel Prevention. Zelong Li, Akhilesh Tyagi |
| 2022 | TrustLend: Using Borrower Trustworthiness for Lending on Ethereum. Wisnu Uriawan, Youakim Badr, Omar Hasan, Lionel Brunie |
| 2022 | Verification of PUF-based IoT Protocols with AVISPA and Scyther. Tomás Rabas, Róbert Lórencz, Jirí Bucek |
| 2022 | Weighted Attribute-based Encryption with Parallelized Decryption. Alexandru Ionita |
| 2022 | What your Fitbit Says about You: De-anonymizing Users in Lifelogging Datasets. Andrei Kazlouski, Thomas Marchioro, Evangelos P. Markatos |
| 2022 | Yet Another Algebraic Cryptanalysis of Small Scale Variants of AES. Marek Bielik, Martin Jurecek, Olha Jurecková, Róbert Lórencz |
| 2022 | zkBeacon: Proven Randomness Beacon based on Zero-knowledge Verifiable Computation. Thomas Lavaur, Jérôme Lacan |