The 71 full papers presented in this book were carefully reviewed and selected from 351 submissions. They were organized in topical sections as follows:
Part I: network security; attacks; fuzzing; malware; user behavior and underground economy; blockchain; machine learning; automotive; anomaly detection;
Part II: encryption; cryptography; privacy; differential privacy; zero knowledge; key exchange; multi-party computation.