04181nam 22005055 450 991102041420332120250809130203.03-032-00627-910.1007/978-3-032-00627-1(MiAaPQ)EBC32257411(Au-PeEL)EBL32257411(CKB)40158933300041(DE-He213)978-3-032-00627-1(EXLCZ)994015893330004120250809d2025 u| 0engurcnu||||||||txtrdacontentcrdamediacrrdacarrierAvailability, Reliability and Security 20th International Conference, ARES 2025, Ghent, Belgium, August 11–14, 2025, Proceedings, Part II /edited by Mila Dalla Preda, Sebastian Schrittwieser, Vincent Naessens, Bjorn De Sutter1st ed. 2025.Cham :Springer Nature Switzerland :Imprint: Springer,2025.1 online resource (611 pages)Lecture Notes in Computer Science,1611-3349 ;159933-032-00626-0 Usable Security and Awareness: QRisk: Think Before You Scan QR codes -- Evaluating Argon2 Adoption and Effectiveness in Real-World Software -- AdvisoryHub: Design and Evaluation of a Cross-Platform Security Advisory System for Cyber Situational Awareness -- Service-aware password risk meter – Helping users to choose suitable passwords in services. System Security: TEE-Assisted Recovery and Upgrades for Long-Running BFT Services -- Fast and Efficient Secure L1 Caches for SMT -- FatPTE - Expanding Page Table Entries for Security -- CHERI UNCHAINED: Generic Instruction and Register Control for CHERI Capabilities -- Exploring speculation barriers for RISC-V selective speculation -- Do we still need canaries in the coal mine? Measuring shadow stack effectiveness in countering stack smashing. Supply Chain Security, Malware and Forensics: SoK: Towards Reproducibility for Software Packages in Scripting Language Ecosystems -- Clustering Malware at Scale: A First Full-Benchmark Study -- Advances in Automotive Digital Forensics: Recent Trends and Future Directions -- Exploring the Susceptibility to Fraud of Monetary Incentive Mechanisms for Strengthening FOSS Projects. Machine Learning and Security: Multi-Agent Simulation and Reinforcement Learning to Optimize Moving Target Defense -- LeaX: Class-Focused Explanations for Locating Leakage in Learning-based Profiling Attacks -- Large Language Models are Unreliable for Cyber Threat Intelligence -- Augmented Tabular Adversarial Evasion Attacks with Constraint Satisfaction Guarantees -- TTP Classification with Minimal Labeled Data: A Retrieval-Based Few-Shot Learning Approach -- C2 Beaconing Detection via AI-based Time-Series Analysis -- Fooling Rate and Perceptual Similarity: A Study on the Effectiveness and Quality of DCGAN-based Adversarial Attacks.This two-volume set LNCS 15992-15993 constitutes the proceedings of the 20th International Conference on Availability, Reliability and Security, ARES 2025, in Ghent, Belgium, during August 11-14, 2025. The 34 full papers presented in this book together with 8 short papers were carefully reviewed and selected from 186 submissions. They cover topics such as: Privacy-Enhancing Technologies and Legal Compliance; Network and Communication Security; IoT and Embedded Systems Security; Machine Learning and Privacy; Usable Security and Awareness; System Security; Supply Chain Security, Malware and Forensics; and Machine Learning and Security.Lecture Notes in Computer Science,1611-3349 ;15993Data protectionData and Information SecurityData protection.Data and Information Security.005.8Dalla Preda Mila1840318Schrittwieser Sebastian1840319Naessens Vincent1840320De Sutter Bjorn1840321MiAaPQMiAaPQMiAaPQBOOK9911020414203321Availability, Reliability and Security4419860UNINA