Home
Attending
Program
Accepted Papers
Travel & Registration
Venue
Authors
Call for Papers
Organization
Organizing Committee
Sponsorship
Previous Workshops
Accepted Papers
Time Will Tell: A Longitudinal Analysis of the Evolution of Security and Privacy of Three IoT Device Types
Swaathi Vetrivel, Michel van Eeten and Carlos Gañán
Defending Against Intelligent Attackers at Large Scales
Andrew Lohn
Cybersecurity and Market Share in Digital Ecosystems with Network Externalities
Daniel Arce
Ransomware Insurance and Strategic Ransom Demand
Manos Perdikakis
Disentangling the Sources of Cyber Risk Premia
Loïc Maréchal and Nathan Monnet
“I’m the mess that you wanted”: Evaluating the Accuracy of WHOIS Asset Discovery Against Self-Reported Data
Yana Angelova, Aksel Ethembabaoglu, Rolf van Wegberg, Carlos Gañán and Michel van Eeten
Domijn: The Security of Domain Registrars and the Risk of a Domain Name Takeover
Koen van Hove, Jeroen van der Ham-de Vos and Roland van Rijswijk-Deij
LASB: A Liquidity-Adjusted Security Metric for Consensus Attacks
Ke Wang, Wenbin Wu and Alexander Neumueller
Stand-Alone Complex or Vibercrime? Exploring the Adoption and Innovation of GenAI Tools, Coding Assistants, and Agents within Cybercrime Ecosystems
Jack Hughes, Ben Collier and Daniel Thomas
How Do Cyber Attacks Impact Corporate Balance Sheets and Income Statements? An Empirical Study
Teyyub Mutallimov, Dana Itzhaki and Tyler Moore
The Impact of Cyber Attacks on Security Investment: Evidence from Firm-Level Panel Data
Abulfaz Hajizada, Dana Etgar Itzhaki, Noa Barnir, Tyler Moore and Neil Gandal
Privacy Agents in the Field
Aileen Nielsen and Yafit Lev-Aretz
Analyzing Investment Incentives under METI’s New Rating System via a Stepwise Extension of the Gordon-Loeb Model
Ryoma Kanai and Kanta Matsuura
Who Wants Privacy Anyway? Comparative Evidence on CBDC Design Preference
Vagisha Srivastava
Cybercrime and Prevention: Colonel Blotto in Social Engineering
Gergely Benkő, Katalin Parti and Gergely Biczók
“People were not happy when admitting mistakes”: Evolving Past Defensiveness in Running Coordinated Vulnerability Disclosure Programs
Sandra Rivera Pérez, Amy Tjin Tjoen Jin, Michel van Eeten and Carlos Gañán
The Emergence of Public Key Infrastructures: Changing Authority Structures and the Automation of Trust in Cyberspace
Milton Mueller
Estimating the Social Cost of Corporate Data Breaches
Lina Alkarmi, Armin Sarabi and Mingyan Liu
Privacy Interventions and Publishers’ Revenues: Evidence on Long-Run Effects and Ad-Traffic Heterogeneity
Tobias Kircher, Riley Grossman, Mike Smith, Alessandro Acquisti, Cristian Borcea, Yi Chen and Cristobal Cheyre
Cybersecurity Ratings to Support Domain-Specific Financial Decisions: Applications to National Infrastructures, Cyberinsurance, Gordon-Loeb Model, and NPV Analysis
William Yurcik, Gregory Pluta and Fábio Miranda
Organizers
Sponsors
Gold
Silver
TBD