


default search action
20th ARES 2025: Ghent, Belgium - Part II
- Mila Dalla Preda

, Sebastian Schrittwieser
, Vincent Naessens
, Bjorn De Sutter
:
Availability, Reliability and Security - 20th International Conference, ARES 2025, Ghent, Belgium, August 11-14, 2025, Proceedings, Part II. Lecture Notes in Computer Science 15993, Springer 2025, ISBN 978-3-032-00626-4
Usable Security and Awareness
- Abhishek Kumar Mishra

, Guillaume Gagnon
, Mathieu Cunche
, Sébastien Gambs
:
QRisk: Think Before You Scan QR Codes. 3-24 - Pascal Tippe, Michael P. Berner:

Evaluating Argon2 Adoption and Effectiveness in Real-World Software. 25-46 - Marc-André Kaufhold

, Julian Bäumler
, Nicolai Koukal, Christian Reuter
:
AdvisoryHub: Design and Evaluation of a Cross-Platform Security Advisory System for Cyber Situational Awareness. 47-68 - Roi S. Serna

, Ana I. González-Tablas
, Lorena González-Manzano
, José María de Fuentes
:
Service-Aware Password Risk Meter - Helping Users to Choose Suitable Passwords in Services. 69-79
System Security
- Ines Messadi, Markus Elias Gerber, Tobias Distler

, Rüdiger Kapitza
:
TEE-Assisted Recovery and Upgrades for Long-Running BFT Services. 83-105 - Lukas Giner

, Roland Czerny
, Simon Lammer
, Aaron Giner
, Paul Gollob
, Jonas Juffinger
, Daniel Gruss
:
Fast and Efficient Secure L1 Caches for SMT. 106-126 - Lukas Lamster

, Martin Unterguggenberger
, Moritz Waser
, David Schrammel, Stefan Mangard
:
FatPTE - Expanding Page Table Entries for Security. 127-148 - Moritz Waser

, Lukas Lamster
, David Schrammel, Martin Unterguggenberger
, Stefan Mangard
:
CHERI UNCHAINED: Generic Instruction and Register Control for CHERI Capabilities. 149-170 - Herinomena Andrianatrehina, Ronan Lashermes

, Joseph Paturel
, Simon Rokicki
, Thomas Rubiano:
Exploring Speculation Barriers for RISC-V Selective Speculation. 171-192 - Hugo Depuydt, Merve Gülmez, Thomas Nyman, Jan Tobias Mühlberg:

Do We Still Need Canaries in the Coal Mine? Measuring Shadow Stack Effectiveness in Countering Stack Smashing. 193-205
Supply Chain Security, Malware and Forensics
- Timo Pohl, Pavel Novák, Marc Ohm

, Michael Meier
:
SoK: Towards Reproducibility for Software Packages in Scripting Language Ecosystems. 209-230 - Martin Mocko

, Jakub Sevcech
, Daniela Chudá
:
Clustering Malware at Scale: A First Full-Benchmark Study. 231-251 - Kim Strandberg

, Mohamed Eldefrawy
:
Advances in Automotive Digital Forensics: Recent Trends and Future Directions. 252-274 - Ben Swierzy

, Timo Pohl, Marc Ohm
, Michael Meier
:
Exploring the Susceptibility to Fraud of Monetary Incentive Mechanisms for Strengthening FOSS Projects. 275-296
Machine Learning and Security
- William Valentine

, Etienne Borde
, Mengmeng Ge
:
Multi-agent Simulation and Reinforcement Learning to Optimize Moving Target Defense. 299-320 - Qi Lei, Christian Wressnegger:

LeaX: Class-Focused Explanations for Locating Leakage in Learning-Based Profiling Attacks. 321-342 - Emanuele Mezzi

, Fabio Massacci
, Katja Tuma
:
Large Language Models Are Unreliable for Cyber Threat Intelligence. 343-364 - Nour Alhussien, Gagan Agrawal

, Ahmed Aleroud
:
Augmented Tabular Adversarial Evasion Attacks with Constraint Satisfaction Guarantees. 365-386 - Dzenan Hamzic, Florian Skopik

, Max Landauer
, Markus Wurzenberger
, Andreas Rauber
:
TTP Classification with Minimal Labeled Data: A Retrieval-Based Few-Shot Learning Approach. 387-408 - Jeetesh Gupta, Jan Pfeifer, Anum Talpur, Mathias Fischer:

C2 Beaconing Detection via AI-Based Time-Series Analysis. 409-419 - José Areia

, Leonel Santos
, Rogério Luís de C. Costa:
Fooling Rate and Perceptual Similarity: A Study on the Effectiveness and Quality of DCGAN-based Adversarial Attacks. 420-430

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














