default search action
18th SecureComm 2022: Virtual Event
- Fengjun Li, Kaitai Liang, Zhiqiang Lin, Sokratis K. Katsikas:
Security and Privacy in Communication Networks - 18th EAI International Conference, SecureComm 2022, Virtual Event, October 2022, Proceedings. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 462, Springer 2023, ISBN 978-3-031-25537-3
AI for Security
- Maryam Davari, Mohammad Zulkernine:
Classification-Based Anomaly Prediction in XACML Policies. 3-19 - Jingfei Bian, Nan Yu, Hong Li, Hongsong Zhu, Qiang Wang, Limin Sun:
An Evolutionary Learning Approach Towards the Open Challenge of IoT Device Identification. 20-38 - Ehsan Aghaei, Xi Niu, Waseem G. Shadid, Ehab Al-Shaer:
SecureBERT: A Domain-Specific Language Model for Cybersecurity. 39-56 - Haitao Xiao, Chen Zhang, Song Liu, Bo Jiang, Zhigang Lu, Fei Wang, Yuling Liu:
CapsITD: Malicious Insider Threat Detection Based on Capsule Neural Network. 57-71 - Haochen Zhai, Futai Zou, Junhua Tang, Yue Wu:
Towards High Transferability on Neural Network for Black-Box Adversarial Attacks. 72-88 - Zhengyu Liu, Haochen Su, Nannan Wang, Cheng Huang:
Coreference Resolution for Cybersecurity Entity: Towards Explicit, Comprehensive Cybersecurity Knowledge Graph with Low Redundancy. 89-108
Applied Cryptography
- Ziqiang Ma, Shuaigang Li, Jingqiang Lin, Quanwei Cai, Shuqin Fan, Fan Zhang, Bo Luo:
Another Lattice Attack Against ECDSA with the wNAF to Recover More Bits per Signature. 111-129 - Omar Adel Ibrahim, Savio Sciancalepore, Roberto Di Pietro:
MAG-PUF: Magnetic Physical Unclonable Functions for Device Authentication in the IoT. 130-149 - Niusen Chen, Bo Chen, Weisong Shi:
A Cross-layer Plausibly Deniable Encryption System for Mobile Devices. 150-169
Binary Analysis
- Farzaneh Abazari, Enrico Branca, Evgeniya Novikova, Natalia Stakhanova:
Language and Platform Independent Attribution of Heterogeneous Code. 173-191 - Qige Song, Yongzheng Zhang, Shuhao Li:
Multi-relational Instruction Association Graph for Cross-Architecture Binary Similarity Comparison. 192-211 - Qian Qiang, Yige Chen, Yang Hu, Tianning Zang, Mian Cheng, Quanbo Pan, Yu Ding, Zisen Qi:
Cost-Effective Malware Classification Based on Deep Active Learning. 212-227
Blockchain
- Jingzhe Wang, Balaji Palanisamy:
CTDRB: Controllable Timed Data Release Using Blockchains. 231-249 - Peyman Momeni, Sergey Gorbunov, Bohan Zhang:
FairBlock: Preventing Blockchain Front-Running with Minimal Overheads. 250-271 - Ruizhong Du, Tianhe Zhang:
Blockchain-Based Ciphertext Policy-Hiding Access Control Scheme. 272-289 - Shohei Kakei, Yoshiaki Shiraishi, Shoichi Saito:
Granting Access Privileges Using OpenID Connect in Permissioned Distributed Ledgers. 290-308 - Kemin Zhang, Li Yang, Lu Zhou, Jianfeng Ma:
Decentralized and Efficient Blockchain Rewriting with Bi-level Validity Verification. 309-328
Cryptography
- Jonathan Takeshita, Zachariah Carmichael, Ryan Karl, Taeho Jung:
TERSE: Tiny Encryptions and Really Speedy Execution for Post-Quantum Private Stream Aggregation. 331-352 - Alexandros Bakas, Eugene Frimpong, Antonis Michalas:
Symmetrical Disguise: Realizing Homomorphic Encryption Services from Symmetric Primitives. 353-370 - Juanjuan Guo, Mengjie Shuai, Qiongxiao Wang, Wenyuan Li, Jingqiang Lin:
Replicated Additive Secret Sharing with the Optimized Number of Shares. 371-389 - Hanyu Jia, Xiangxue Li, Qiang Li, Yue Bao, Xintian Hou:
Generic 2-Party PFE with Constant Rounds and Linear Active Security, and Efficient Instantiation. 390-410
Data Security
- Qiang Liu, Hequ Xian, Jiancheng Zhang, Kunpeng Liu:
A Random Reversible Watermarking Scheme for Relational Data. 413-430 - Wen Xie, Niusen Chen, Bo Chen:
Enabling Accurate Data Recovery for Mobile Devices Against Malware Attacks. 431-449 - Sangat Vaidya, Santiago Torres-Arias, Justin Cappos, Reza Curtmola:
Bootstrapping Trust in Community Repository Projects. 450-469
Intrusion Detection
- Md Ali Reza Al Amin, Sachin Shetty, Valerio Formicola, Martin Otto:
Assessing the Quality of Differentially Private Synthetic Data for Intrusion Detection. 473-490 - Sanjeev Shukla, Manoj Misra, Gaurav Varshney:
Forensic Analysis and Detection of Spoofing Based Email Attack Using Memory Forensics and Machine Learning. 491-509 - Yuedong Pan, Lijun Cai, Tao Leng, Lixin Zhao, Jiangang Ma, Aimin Yu, Dan Meng:
AttackMiner: A Graph Neural Network Based Approach for Attack Detection from Audit Logs. 510-528 - Sivaanandh Muneeswaran, Vinay Sachidananda, Rajendra Patil, Hongyi Peng, Mingchang Liu, Mohan Gurusamy:
Hiatus: Unsupervised Generative Approach for Detection of DoS and DDoS Attacks. 529-546
Mobile Security
- Douglas J. Leith:
What Data Do the Google Dialer and Messages Apps on Android Send to Google? 549-568 - Xiantong Hao, Dandan Ma, Hongliang Liang:
Detection and Privacy Leakage Analysis of Third-Party Libraries in Android Apps. 569-587 - Spandan Mahadevegowda, Ryan M. Gerdes, Thidapat Chantem, Rose Qingyang Hu:
Secure CV2X Using COTS Smartphones over LTE Infrastructure. 588-607
Network Security
- Muhammad Shadi Hajar, Harsha K. Kalutarage, M. Omar Al-Kadri:
DQR: A Double Q Learning Multi Agent Routing Protocol for Wireless Medical Sensor Network. 611-629 - Mengyao Shi, Zhu Wang, Tingting Peng, Fenghua Li:
Message Recovery Attack of Kyber Based on Information Leakage in Decoding Operation. 630-647 - Qiying Dong, Ding Wang, Yaosheng Shen, Chunfu Jia:
PII-PSM: A New Targeted Password Strength Meter Using Personally Identifiable Information. 648-669
Privacy
- Pranay Kapoor, Rohan Pagey, Mohammad Mannan, Amr M. Youssef:
Silver Surfers on the Tech Wave: Privacy Analysis of Android Apps for the Elderly. 673-691 - Robert Cantaragiu, Antonis Michalas, Eugene Frimpong, Alexandros Bakas:
MetaPriv: Acting in Favor of Privacy on Social Media Platforms. 692-709 - Xiaoting Li, Lingwei Chen, Dinghao Wu:
Adversary for Social Good: Leveraging Attribute-Obfuscating Attack to Protect User Privacy on Social Networks. 710-728
Software Security
- Zhengxiang Zhou, Cong Wang, Qingchuan Zhao:
No-Fuzz: Efficient Anti-fuzzing Techniques. 731-751 - Tianning Zhang, Miao Cai, Diming Zhang, Hao Huang:
eSROP Attack: Leveraging Signal Handler to Implement Turing-Complete Attack Under CFI Defense. 752-769 - Tongwei Ren, Ryan Williams, Sirshendu Ganguly, Lorenzo De Carli, Long Lu:
Breaking Embedded Software Homogeneity with Protocol Mutations. 770-790
Security and Privacy-Preserving Solutions in the Internet of Things (S/P-IoT) Workshop
- Nanda Rani, Ayushi Mishra, Rahul Kumar, Sarbajit Ghosh, Sandeep K. Shukla, Priyanka Bagade:
A Generalized Unknown Malware Classification. 793-806 - Xiaoyi Duan, Ye Huang, Yonghua Su, Yujin Li, Xiaohong Fan:
Research on the Grouping Method of Side-Channel Leakage Detection. 807-818 - Cavidan Yakupoglu, Kurt Rohloff:
PREFHE, PREFHE-AES and PREFHE-SGX: Secure Multiparty Computation Protocols from Fully Homomorphic Encryption and Proxy ReEncryption with AES and Intel SGX. 819-837
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.