Skip to main content

Accepted Papers

The following technical papers have been accepted for this year's program.

On Key Reinstallation Attacks over 4G LTE Network: Feasibility and Negative Impact
Muhammad Taqi Raza (The University of Arizona), Yunqi Guo (UCLA), Songwu Lu (UCLA), Fatima Muhammad Anwar (UMASS Amherst)

ARID: Anonymous Remote IDentification of Unmanned Aerial Vehicles
Pietro Tedeschi (Hamad Bin Khalifa University (HBKU) - College of Science and Engineering), Savio Sciancalepore (Eindhoven University of Technology (TU/e)), Roberto Di Pietro (Hamad Bin Khalifa University (HBKU) - College of Science and Engineering)

MineHunter: A Practical Cryptomining Traffic Detection Algorithm Based on Time Series Tracking
Shize Zhang (Tsinghua University), Zhiliang Wang (Tsinghua University), Jiahai Yang (Tsinghua University), Xin Cheng (Tsinghua University), XiaoQian Ma (Beijing Wuzi University), Hui Zhang (Tsinghua University), Bo Wang (Tsinghua University), Zimu Li (Tsinghua University), Jianping Wu (Tsinghua University)

argXtract: Deriving IoT Security Configurations via Automated Static Analysis of Stripped ARM Cortex-M Binaries
Pallavi Sivakumaran (Royal Holloway, University of London), Jorge Blasco (Royal Holloway, University of London)

Eluding ML-based Adblockers With Actionable Adversarial Examples
Shitong Zhu (University of California, Riverside), Zhongjie Wang (University of California, Riverside), Xun Chen (Samsung Research America), Shasha Li (University of California, Riverside), Keyu Man (University of California, Riverside), Umar Iqbal (University of Iowa), Zhiyun Qian (University of California, Riverside), Kevin Chan (US Army Research Laboratory), Srikanth Krishnamurthy (University of California, Riverside), Zubair Shafiq (University of California, Davis), Yu Hao (University of California, Riverside), Guoren Li (University of California, Riverside), Zheng Zhang (University of California, Riverside), Xiaochen Zou (University of California, Riverside)

Advanced System Resiliency Based on Virtualization Techniques for IoT Devices
Jonas Röckl (Friedrich-Alexander-Universität Erlangen-Nürnberg (FAU)), Mykolai Protsenko (Fraunhofer AISEC), Monika Huber (Fraunhofer AISEC), Tilo Müller (Friedrich-Alexander-Universität Erlangen-Nürnberg (FAU)), Felix C. Freiling (Friedrich-Alexander-Universität Erlangen-Nürnberg (FAU))

Group Time-based One-time Passwords and its Application to Efficient Privacy-Preserving Proof of Location
Zheng Yang (Southwest University), Chenglu Jin (CWI Amsterdam), Jianting Ning (Fujian Normal University), Zengpeng Li (Shandong University), Anh Dinh (Singapore University of Technology and Design), Jianying Zhou (Singapore University of Technology and Design)

FINN: Fingerprinting Network Flows using Neural Networks
Fatemeh Rezaei (UMass Amherst), Amir Houmansadr (UMass Amherst)

BadNL: Backdoor Attacks against NLP models with Semantic-preserving Improvements
Xiaoyi Chen (Peking University), Ahmed Salem (CISPA Helmholtz Center for Information Security), Dingfan Chen (CISPA Helmholtz Center for Information Security), Michael Backes (CISPA Helmholtz Center for Information Security), Shiqing Ma (Rutgers University), Qingni Shen (Peking University), Zhonghai Wu (Peking University), Yang Zhang (CISPA Helmholtz Center for Information Security)

Stealing Machine Learning Models: Attacks and Countermeasures for Generative Adversarial Networks
Hailong Hu (University of Luxembourg), Jun Pang (University of Luxembourg)

Time to Rethink the Design of Qi Standard? Security and Privacy Vulnerability Analysis of Qi Wireless Charging
Yi Wu (University of Tennessee, Knoxville), Zhuohang Li (University of Tennessee, Knoxville), Nicholas Van Nostrand (University of Tennessee, Knoxville), Jian Liu (University of Tennessee, Knoxville)

VIA: Analyzing Device Interfaces of Protected Virtual Machines
Felicitas Hetzelt (TU Berlin), Martin Radev (Fraunhofer AISEC), Robert Buhren (TU Berlin), Mathias Morbitzer (Fraunhofer AISEC), Jean-Pierre Seifert (TU Berlin)

Detecting and Characterizing SMS Spearphising Attacks
Mingxuan Liu (Tsinghua University), Yiming Zhang (Tsinghua University), Baojun Liu (Tsinghua University), Zhou Li (University of California, Irvine), Haixin Duan (Tsinghua University; QI-ANXIN Technology Research Institute; Beijing National Research Center for Information Science and Technology; Peng Cheng Laboratory), Donghong Sun (Tsinghua University)

On Detecting Growing-Up Behaviors of Malicious Accounts in Privacy-Centric Mobile Social Networks
Zijie Yang (Tsinghua University), Binghui Wang (Illinois institute of technology), Haoran Li (Tsinghua University), Dong Yuan (Tsinghua University), Zhuotao Liu (Tsinghua University), Neil Gong (Duke University), Chang Liu (Berkeley), Qi Li (Tsinghua University), Xiao Liang (Tencent Inc.), Shaofeng Hu (Tencent Inc.)

The Many-faced God: Attacking Face Verification System with Embedding and Image Recovery
Mingtian Tan (Fudan University), Zhe Zhou (Fudan University), Zhou Li (University of California, Irvine)

Efficient, Private and Robust Federated Learning
Meng Hao (University of Electronic Science and Technology of China), Hongwei Li (University of Electronic Science and Technology of China), Guowen Xu (Nanyang Technological University), Hanxiao Chen (University of Electronic Science and Technology of China), Tianwei Zhang (Nanyang Technological University)

RUPAIR: Towards Automatic Buffer Overflow Detection and Rectification for Rust
Baojian Hua (University of Science and Technology of China), Wanrong Ouyang (University of Science and Technology of China), Chengman Jiang (University of Science and Technology of China), Qiliang Fan (University of Science and Technology of China), Zhizhong Pan (University of Science and Technology of China)

SolSaviour: A Defending Framework for Deployed Defective Smart Contracts
Li Zecheng (The Hong Kong Polytechnic University), Zhou Yu (The Hong Kong Polytechnic University), Songtao Guo (Chongqing University), Xiao Bin (The Hong Kong Polytechnic University)

Optimized Paillier's Cryptosystem with Fast Encryption and Decryption
Huanyu Ma (Ant Group), Shuai Han (Ant Group), Hao Lei (Ant Group)

TLB Poisoning Attacks on AMD Secure Encrypted Virtualization
Mengyuan Li (The Ohio State University), Yinqian Zhang (Southern University of Science and Technology), Huibo Wang (Baidu Security), Kang Li (Baidu Security), Yueqiang Cheng (NIO Security Research)

They See Me Rollin': Inherent Vulnerability of the Rolling Shutter in CMOS Image Sensors
Sebastian Köhler (University of Oxford), Giulio Lovisotto (University of Oxford), Simon Birnbach (University of Oxford), Richard Baker (University of Oxford), Ivan Martinovic (University of Oxford)

Heterogeneous-PAKE: Bridging the Gap between PAKE Protocols and Their Real-World Deployment
Rong Wei (State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China), Fangyu Zheng (State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China), Lili Gao (State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China), Jiankuo Dong (School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing, China), Guang Fan (State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China), Lipeng Wan (State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China), Jingqiang Lin (School of Cyber Security, University of Science and Technology of China, Hefei, China), Yuewu Wang (State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China)

Reinhardt: Real-time Reconfigurable Hardware Architecture for Regular Expression Matching in DPI
Taejune Park (Chonnam National University), Jaehyun Nam (AccuKnox), Seung Ho Na (KAIST), Jaewoong Chung (Atto Research), Seungwon Shin (KAIST)

Is Visualization Enough? Evaluating the Efficacy of MUD-Visualizer in Enabling Ease of Deployment for Manufacturer Usage Description (MUD)
Vafa Andalibi (Indiana University Bloomington), Jayati Dev (Indiana University Bloomington), DongInn Kim (Indiana University Bloomington), Eliot Lear (Cisco Systems), L. Jean Camp (Indiana University Bloomington)

Physical Logic Bombs in 3D Printers via Emerging 4D Techniques
Tuan Le (Rutgers University), Sriharsha Etigowni (Rutgers University), Sizhuang Liang (Georgia Institute of Technology), Xirui Peng (Georgia Institute of Technology), Jerry Qi (Georgia Institute of Technology), Mehdi Javanmard (Rutgers University), Saman Zonouz (Rutgers University), Raheem Beyah (Georgia Institute of Technology)

Understanding the Threats of Trojaned Quantized Neural Network in Model Supply Chains
Xudong Pan (Fudan University), Mi Zhang (Fudan University), Yifan Yan (Fudan University), Min Yang (Fudan University)

A Cross-role and Bi-national Analysis on Security Efforts and Constraints of Software Development Projects
Fumihiro Kanei (NTT), Ayako Akiyama Hasegawa (NTT), Eitaro Shioji (NTT), Mitsuaki Akiyama (NTT)

S2-CAN: Sufficiently Secure Controller Area Network
Mert D. Pesé (University of Michigan - Ann Arbor), Jay W. Schauer (University of Michigan - Ann Arbor), Junhui Li (University of Michigan - Ann Arbor), Kang G. Shin (University of Michigan - Ann Arbor)

The Emperor's New Autofill Framework: A Security Analysis of Autofill on iOS and Android
Sean Oesch (The University of Tennessee), Anuj Gautam (The University of Tennessee), Scott Ruoti (The University of Tennessee)

Program Hardening via ABI Debiasing
David Demicco (Binghamton University), Rukayat Erinfolami (Binghamton University), Aravind Prakash (Binghamton University)

A formal analysis of IKEv2's post-quantum extension
Stefan-Lukas Gazdag (genua GmbH), Sophia Grundner-Culemann (MNM-Team, Ludwig-Maximilians-Universität München), Tobias Guggemos (MNM-Team, Ludwig-Maximilians-Universität München & Institute of Earth Observation, German Aerospace Center (DLR)), Tobias Heider (genua GmbH), Daniel Loebenberger (Fraunhofer AISEC)

Rocky: Replicating Block Devices for Tamper and Failure Resistant Edge-based Virtualized Desktop Infrastructure
Beom Heyn Kim (University of Toronto), Hyoungshick Kim (Sungkyunkwan University)

OPay: an Orientation-based Contactless Payment Solution Against Passive Attacks
Mahshid Mehr Nezhd (University of Warwick), Feng Hao (University of Warwickp>

Characterizing Improper Input Validation Vulnerabilities of Mobile Crowdsourcing Services
Sojhal Ismail Khan (University of Southern California), Dominika C Woszczyk (Imperial College London), Chengzeng You (Imperial College London), Soteris Demetriou (Imperial College London), Muhammad Naveed (University of Southern California)

A Look Back on a Function Identification Problem
Hyungjoon Koo (Sungkyunkwan University), Soyeon Park (Georgia Institute of Technology), Taesoo Kim (Georgia Institute of Technology)

Systematization of Password Manager Use Cases and Design Paradigms
James Simmons (The University of Tennessee), Oumar Diallo (The University of Tennessee), Sean Oesch (The University of Tennessee), Scott Ruoti (The University of Tennessee)

MAppGraph: Mobile-App Classification on Encrypted Network Traffic using Deep Graph Convolution Neural Networks
Thai-Dien Pham (Tan Tao University), Thien-Lac Ho (Tan Tao University), Tram Truong-Huu (Singapore Institute of Technology), Tien-Dung Cao (Tan Tao University), Hong-Linh Truong (Aalto University)

BAPM: Block Attention Profiling Model for Multi-tab Website Fingerprinting Attacks on Tor
Zhong Guan (Institute of Information Engineering, Chinese Academy of Sciences; School of Cyber Security, University of Chinese Academy of Sciences), Gang Xiong (Institute of Information Engineering, Chinese Academy of Sciences; School of Cyber Security, University of Chinese Academy of Sciences), Gaopeng Gou (Institute of Information Engineering, Chinese Academy of Sciences; School of Cyber Security, University of Chinese Academy of Sciences), Zhen Li (Institute of Information Engineering, Chinese Academy of Sciences; School of Cyber Security, University of Chinese Academy of Sciences), Mingxin Cui (Institute of Information Engineering, Chinese Academy of Sciences; School of Cyber Security, University of Chinese Academy of Sciences), Chang Liu (Institute of Information Engineering, Chinese Academy of Sciences; School of Cyber Security, University of Chinese Academy of Sciences)

FlexFilt: Towards Flexible Instruction Filtering for Security
Leila Delshadtehrani (Boston University), Sadullah Canakci (Boston University), William Blair (Boston University), Manuel Egele (Boston University), Ajay Joshi (Boston University)

Reproducible and Adaptable Log Data Generation for Sound Cybersecurity Experiments
Rafael Uetz (Fraunhofer FKIE), Christian Hemminghaus (Fraunhofer FKIE), Louis HacklΣnder (Fraunhofer FKIE), Philipp Schlipper (Fraunhofer FKIE), Martin Henze (RWTH Aachen University & Fraunhofer FKIE)

CommanderGabble: A Universal Attack Against ASR Systems Leveraging Fast Speech
Zhaohe (John) Zhang (University of Oklahoma), Edwin Yang (University of Oklahoma), Song Fang (University of Oklahoma)

Dynamic Taint Analysis versus Obfuscated Self-Checking
Sebastian Banescu (Technical University of Munich), Samuel Valenzuela (Technical University of Munich), Marius Guggenmos (Technical University of Munich), Mohsen Ahmadvand (Technical University of Munich), Alexander Pretschner (Technical University of Munich)

Obfuscation Revealed: Leveraging Electromagnetic Signals for Obfuscated Malware Classification
Duy-Phuc Pham (Univ Rennes, Inria, CNRS, IRISA, France), Damien Marion (Univ Rennes, Inria, CNRS, IRISA, France), Matthieu Mastio (Univ Rennes, Inria, CNRS, IRISA, France), Annelie Heuser (Univ Rennes, Inria, CNRS, IRISA, France)

An Efficient Man-Machine Recognition Method Based On Mouse Trajectory Feature De-redundancy
Xiaofeng Lu (School of Cyberspace Security, Beijing University of Posts and Telecommunications, Beijing, China), Zhenhan Feng (School of Cyberspace Security, Beijing University of Posts and Telecommunications, Beijing, China), Jupeng Xia (Alipay (Hangzhou) Information & Technology Co., Ltd, Hangzhou, China)

Evaluating the Effectiveness of Protection Jamming Devices in Mitigating Smart Speaker Eavesdropping Attacks Using Gaussian White Noise
Payton Walker (University of Alabama at Birmingham), Nitesh Saxena (University of Alabama at Birmingham)

VASA: Vector AES Instructions for Security Applications
Jean-Pierre Münch (TU Darmstadt), Thomas Schneider (TU Darmstadt), Hossein Yalame (TU Darmstadt)

Security of Multicarrier Time-of-Flight Ranging
Patrick Leu (ETH Zurich), Martin Kotuliak (ETH Zurich), Marc Roeschlin (ETH Zurich), Srdjan Capkun (ETH Zurich)

Morphence: Moving Target Defense Against Adversarial Examples
Abderrahmen Amich (University of Michigan, Dearborn), Birhanu Eshete (University of Michigan, Dearborn)

ReCFA: Resilient Control-Flow Attestation
Yumei Zhang (Xidian University), Xinzhi Liu (Xidian University), Cong Sun (Xidian University), Dongrui Zeng (Pennsylvania State University), Gang Tan (Pennsylvania State University), Xiao Kan (Xidian University), Siqi Ma (The University of Queensland)

Towards Stalkerware Detection with Precise Warnings
Yufei Han (INRIA), Kevin Alejandro Roundy (Nortonlifelock Research Group), Acar Tamersoy (Nortonlifelock Research Group)

An Exploration of ARM System-Level Cache and GPU Side Channels
Patrick Cronin (University of Delaware), Xing Gao (University of Delaware), Haining Wang (Virginia Tech), Chase Cotton (University of Delaware)

Keeping Safe Rust Safe with Galeed
Elijah Rivera (MIT CSAIL), Samuel Mergendahl (MIT Lincoln Laboratory), Howard Shrobe (MIT CSAIL), Hamed Okhravi (MIT Lincoln Laboratory), Nathan Burow (MIT Lincoln Laboratory)

Two Souls in an Adversarial Image: Towards Universal Adversarial Example Detection using Multi-view Inconsistency
Sohaib Kiani (University of Kansas), Sana Awan (University of Kansas), Chao Lan (University of Oklahoma), Fengjun Li (University of Kansas), Bo Luo (University of Kansas)

Repack Me If You Can: An Anti-Repackaging Solution based on Android Virtualization
Antonio Ruggia (University of Genoa), Eleonora Losiouk (University of Padua), Luca Verderame (University of Genoa), Mauro Conti (University of Padua), Alessio Merlo (University of Genoa)

RingRAM: A Unified Hardware Security Primitive for IoT Devices that Gets Better with Age
Michael Moukarzel (Virginia Tech), Matthew Hicks (Virginia Tech)

Global Feature Analysis and Comparative Evaluation of Freestyle In-Air-Handwriting Passcode for User Authentication
Duo Lu (Arizona State University), Yuli Deng (Arizona State University), Dijiang Huang (Arizona State University)

Westworld: Fuzzing-Assisted Remote Dynamic Symbolic Execution of Smart Apps on IoT Cloud Platforms
Lannan Luo (University of South Carolina), Qiang Zeng (University of South Carolina), Bokai Yang (University of South Carolina), Fei Zuo (University of South Carolina), Junzhe Wang (University of South Carolina)

Towards Practical Post-quantum Signatures for Resource-Limited Internet of Things
Rouzbeh Behnia (University of South Florida), Attilla Altay Yavuz (University of South Florida)

DistAppGaurd: Distributed Application Behaviour Profiling in Cloud-Based Environment
Mohammad Mahdi Ghorbani (University of Quebec), Fereydoun Farrahi Moghaddam (Ericsson Security Research), Mengyuan Zhang (The Hong Kong Polytechnic University), Makan Pourzandi (Ericsson Security Research), Kim Khoa Nguyen (University of Quebec), Mohamed Cheriet (University of Quebec)

Platform-Oblivious Anti-Spam Gateway
Yihe Zhang (University of Louisiana at Lafayette), Xu Yuan (University of Louisiana at Lafayette), Nianfeng Tzeng (University of Louisiana at Lafayette)

MISA: Online Defense of Trojaned Models using Misattributions
Panagiota Kiourti (Boston University), Wenchao Li (Boston University), Karan Sikka (SRI International), Anirban Roy (SRI International), Susmit Jha (SRI International)

Digit Semantics based Optimization for Practical Password Cracking Tools
Haodong Zhang (Fudan University), Chuanwang Wang (Fudan University), Wenqiang Ruan (Fudan University), Junjie Zhang (Fudan University), Ming Xu (Fudan University), Weili Han (Fudan University)

Practical Attestation for Edge Devices Running Compute Heavy Machine Learning Applications
Ismi Abidi (IIT Delhi), Vireshwar Kumar (IIT Delhi), Rijurekha Sen (IIT Delhi)

2D-2FA: A New Dimension in Two-Factor Authentication
Maliheh Shirvanian (Visa Research), Shashank Agrawal (Western Digital Research)

LaserShark: Establishing Fast, Bidirectional Communication into Air-Gapped Systems
Niclas Kühnapfel (TU Berlin), Stefan Preußler (TU Braunschweig), Maximilian Noppel (Karlsruhe Institute of Technology (KIT)), Thomas Schneider (TU Braunschweig), Konrad Rieck (TU Braunschweig), Christian Wressnegger (Karlsruhe Institute of Technology (KIT))

Detecting Audio Adversarial Examples with Logit Noising
Namgyu Park (POSTECH), Sangwoo Ji (POSTECH), Jong Kim (POSTECH)

Dicos: Discovering Insecure Code Snippets from Stack Overflow Posts by Leveraging User Discussions
Hyunji Hong (Korea University), Seunghoon Woo (Korea University), Heejo Lee (Korea University)

Software Watermarking via a Binary Function Relocation
Honggoo Kang (Korea University), Yonghwi Kwon (University of Virginia), Sangjin Lee (Korea University), Hyungjoon Koo (Sungkyunkwan University)

Improving Streaming Cryptocurrency Transaction Classification via Biased Sampling and Graph Feedback
Shaltiel Eloul (JP Morgan Chase), Sean J Moran (JP Morgan Chase), Jacob Mendel (JP Morgan Chase)

ICS3Fuzzer: A Framework for Discovering Protocol Implementation Bugs in ICS Supervisory Software by Fuzzing
Dongliang Fang (Institute of Information Engineering, CAS; School of Cyber Security, University of Chinese Academy of Sciences), Zhanwei Song (Institute of Information Engineering, CAS; School of Cyber Security, University of Chinese Academy of Sciences), Le Guan (Department of Computer Science, the University of Georgia, USA), Puzhuo Liu (Institute of Information Engineering, CAS; School of Cyber Security, University of Chinese Academy of Sciences), Anni Peng (National Computer Network Intrusion Protection Center; University of Chinese Academy of Sciences), Kai Cheng (Institute of Information Engineering, CAS; School of Cyber Security, University of Chinese Academy of Sciences), Yaowen Zheng (Nanyang Technological University, Singapore), Peng Liu (College of Information Sciences and Technology, Pennsylvania State University), Hongsong Zhu (Institute of Information Engineering, CAS; School of Cyber Security, University of Chinese Academy of Sciences), Limin Sun (Institute of Information Engineering, CAS; School of Cyber Security, University of Chinese Academy of Sciences)

Don't hand it Over: Vulnerabilities in the Handover Procedure of Cellular Telecommunications
Evangelos Bitsikas (New York University Abu Dhabi), Christina Pöpper (New York University Abu Dhabi)

MITOSIS: Practically Scaling Permissioned Blockchains
Giorgia Azzurra Marson (NEC Labs Europe), Sebastien Andreina (NEC Labs Europe), Lorenzo Alluminio (NEC Labs Europe), Konstantin Munichev (NEC Labs Europe), Ghassan Karame (NEC Labs Europe)

Can We Leverage Predictive Uncertainty to Detect Dataset Shift and Adversarial Examples in Android Malware Detection?
Deqiang Li (Nanjing University of Science and Technology), Tian Qiu (Nanjing University of Science and Technology), Shuo Chen (RIKEN), Qianmu Li (Nanjing University of Science and Technology), Shouhuai Xu (University of Colorado Colorado Springs)

SMap: Internet-Wide Scanning for Spoofing
Tianxiang Dai (ATHENE Center, Germany & Fraunhofer SIT, Germany), Haya Shulman (ATHENE Center, Germany & Fraunhofer SIT, Germany)

SODA: A System for Cyber Deception Orchestration and Automation
Md Sajidul Islam Sajid (University of North Carolina at Charlotte), Jinpeng Wei (University of North Carolina at Charlotte), Basel Abdeen (University of Texas at Dallas), Ehab Al-Shaer (Carnegie Mellon University), Md Mazharul Islam (University of North Carolina at Charlotte), Walter Diong (Carnegie Mellon University), Latifur Khan (University of Texas at Dallas)

TEEKAP: Self-Expiring Data Capsule using Trusted Execution Environment
Mingyuan Gao (School of Computing, National University of Singapore), Hung Dang (School of Computing, National University of Singapore), Ee-Chien Chang (School of Computing, National University of Singapore)

Crypto-Chain: A Relay Resilience Framework for Smart Vehicles
Abubakar Sadiq Sani (University of Greenwich), Dong Yuan (The University of Sydney), Elisa Bertino (Purdue University), Zhao Yang Dong (University of New South Wales)

Try before You Buy: Privacy-preserving Data Evaluation on Cloud-based Machine Learning Data Marketplace
Qiyang Song (George Mason University), Jiahao Cao (Tsinghua University), Kun Sun (George Mason University), Qi Li (Tsinghua University), Ke Xu (Tsinghua University)

Sipster: Settling IOU of Smart Meters Privately and Quickly
Sherman S. M. Chow (The Chinese University of Hong Kong), Ming Li (The University of Texas at Arlington), Yongjun Zhao (Nanyang Technological University), Wenqiang Jin (The University of Texas at Arlington)

What's in a Cyber Threat Intelligence sharing platform? A mixed-methods user experience investigation of MISP
Borce Stojkovski (SnT, University of Luxembourg), Gabriele Lenzini (University of Luxembourg), Vincent KOENIG (University of Luxembourg), Salvador Rivas (University of Luxembourg)