


default search action
20th ARES 2025: Ghent, Belgium - Part II
- Mila Dalla Preda
, Sebastian Schrittwieser
, Vincent Naessens
, Bjorn De Sutter
:
Availability, Reliability and Security - 20th International Conference, ARES 2025, Ghent, Belgium, August 11-14, 2025, Proceedings, Part II. Lecture Notes in Computer Science 15993, Springer 2025, ISBN 978-3-032-00626-4
Usable Security and Awareness
- Abhishek Kumar Mishra
, Guillaume Gagnon
, Mathieu Cunche
, Sébastien Gambs
:
QRisk: Think Before You Scan QR Codes. 3-24 - Pascal Tippe, Michael P. Berner:
Evaluating Argon2 Adoption and Effectiveness in Real-World Software. 25-46 - Marc-André Kaufhold
, Julian Bäumler
, Nicolai Koukal, Christian Reuter
:
AdvisoryHub: Design and Evaluation of a Cross-Platform Security Advisory System for Cyber Situational Awareness. 47-68 - Roi S. Serna, Ana I. González-Tablas
, Lorena González-Manzano
, José María de Fuentes
:
Service-Aware Password Risk Meter - Helping Users to Choose Suitable Passwords in Services. 69-79
System Security
- Ines Messadi, Markus Elias Gerber, Tobias Distler
, Rüdiger Kapitza
:
TEE-Assisted Recovery and Upgrades for Long-Running BFT Services. 83-105 - Lukas Giner
, Roland Czerny
, Simon Lammer
, Aaron Giner
, Paul Gollob, Jonas Juffinger
, Daniel Gruss
:
Fast and Efficient Secure L1 Caches for SMT. 106-126 - Lukas Lamster
, Martin Unterguggenberger
, Moritz Waser
, David Schrammel, Stefan Mangard
:
FatPTE - Expanding Page Table Entries for Security. 127-148 - Moritz Waser
, Lukas Lamster
, David Schrammel, Martin Unterguggenberger
, Stefan Mangard
:
CHERI UNCHAINED: Generic Instruction and Register Control for CHERI Capabilities. 149-170 - Herinomena Andrianatrehina, Ronan Lashermes
, Joseph Paturel
, Simon Rokicki
, Thomas Rubiano:
Exploring Speculation Barriers for RISC-V Selective Speculation. 171-192 - Hugo Depuydt, Merve Gülmez, Thomas Nyman, Jan Tobias Mühlberg:
Do We Still Need Canaries in the Coal Mine? Measuring Shadow Stack Effectiveness in Countering Stack Smashing. 193-205
Supply Chain Security, Malware and Forensics
- Timo Pohl, Pavel Novák, Marc Ohm
, Michael Meier
:
SoK: Towards Reproducibility for Software Packages in Scripting Language Ecosystems. 209-230 - Martin Mocko
, Jakub Sevcech
, Daniela Chudá
:
Clustering Malware at Scale: A First Full-Benchmark Study. 231-251 - Kim Strandberg
, Mohamed Eldefrawy
:
Advances in Automotive Digital Forensics: Recent Trends and Future Directions. 252-274 - Ben Swierzy
, Timo Pohl, Marc Ohm
, Michael Meier
:
Exploring the Susceptibility to Fraud of Monetary Incentive Mechanisms for Strengthening FOSS Projects. 275-296
Machine Learning and Security
- William Valentine, Etienne Borde
, Mengmeng Ge
:
Multi-agent Simulation and Reinforcement Learning to Optimize Moving Target Defense. 299-320 - Qi Lei, Christian Wressnegger:
LeaX: Class-Focused Explanations for Locating Leakage in Learning-Based Profiling Attacks. 321-342 - Emanuele Mezzi
, Fabio Massacci
, Katja Tuma
:
Large Language Models Are Unreliable for Cyber Threat Intelligence. 343-364 - Nour Alhussien, Gagan Agrawal
, Ahmed Aleroud
:
Augmented Tabular Adversarial Evasion Attacks with Constraint Satisfaction Guarantees. 365-386 - Dzenan Hamzic, Florian Skopik
, Max Landauer
, Markus Wurzenberger
, Andreas Rauber
:
TTP Classification with Minimal Labeled Data: A Retrieval-Based Few-Shot Learning Approach. 387-408 - Jeetesh Gupta, Jan Pfeifer, Anum Talpur, Mathias Fischer:
C2 Beaconing Detection via AI-Based Time-Series Analysis. 409-419 - José Areia
, Leonel Santos
, Rogério Luís de C. Costa:
Fooling Rate and Perceptual Similarity: A Study on the Effectiveness and Quality of DCGAN-based Adversarial Attacks. 420-430

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.