


default search action
18th SecureComm 2022: Virtual Event
- Fengjun Li

, Kaitai Liang
, Zhiqiang Lin
, Sokratis K. Katsikas
:
Security and Privacy in Communication Networks - 18th EAI International Conference, SecureComm 2022, Virtual Event, October 2022, Proceedings. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 462, Springer 2023, ISBN 978-3-031-25537-3
AI for Security
- Maryam Davari, Mohammad Zulkernine:

Classification-Based Anomaly Prediction in XACML Policies. 3-19 - Jingfei Bian, Nan Yu, Hong Li, Hongsong Zhu, Qiang Wang, Limin Sun:

An Evolutionary Learning Approach Towards the Open Challenge of IoT Device Identification. 20-38 - Ehsan Aghaei, Xi Niu, Waseem G. Shadid, Ehab Al-Shaer:

SecureBERT: A Domain-Specific Language Model for Cybersecurity. 39-56 - Haitao Xiao, Chen Zhang, Song Liu, Bo Jiang, Zhigang Lu, Fei Wang

, Yuling Liu:
CapsITD: Malicious Insider Threat Detection Based on Capsule Neural Network. 57-71 - Haochen Zhai, Futai Zou, Junhua Tang, Yue Wu:

Towards High Transferability on Neural Network for Black-Box Adversarial Attacks. 72-88 - Zhengyu Liu

, Haochen Su, Nannan Wang, Cheng Huang:
Coreference Resolution for Cybersecurity Entity: Towards Explicit, Comprehensive Cybersecurity Knowledge Graph with Low Redundancy. 89-108
Applied Cryptography
- Ziqiang Ma, Shuaigang Li, Jingqiang Lin, Quanwei Cai, Shuqin Fan, Fan Zhang, Bo Luo

:
Another Lattice Attack Against ECDSA with the wNAF to Recover More Bits per Signature. 111-129 - Omar Adel Ibrahim

, Savio Sciancalepore
, Roberto Di Pietro:
MAG-PUF: Magnetic Physical Unclonable Functions for Device Authentication in the IoT. 130-149 - Niusen Chen, Bo Chen

, Weisong Shi:
A Cross-layer Plausibly Deniable Encryption System for Mobile Devices. 150-169
Binary Analysis
- Farzaneh Abazari, Enrico Branca

, Evgeniya Novikova, Natalia Stakhanova:
Language and Platform Independent Attribution of Heterogeneous Code. 173-191 - Qige Song, Yongzheng Zhang, Shuhao Li:

Multi-relational Instruction Association Graph for Cross-Architecture Binary Similarity Comparison. 192-211 - Qian Qiang, Yige Chen, Yang Hu, Tianning Zang, Mian Cheng, Quanbo Pan, Yu Ding, Zisen Qi:

Cost-Effective Malware Classification Based on Deep Active Learning. 212-227
Blockchain
- Jingzhe Wang, Balaji Palanisamy:

CTDRB: Controllable Timed Data Release Using Blockchains. 231-249 - Peyman Momeni, Sergey Gorbunov, Bohan Zhang

:
FairBlock: Preventing Blockchain Front-Running with Minimal Overheads. 250-271 - Ruizhong Du, Tianhe Zhang:

Blockchain-Based Ciphertext Policy-Hiding Access Control Scheme. 272-289 - Shohei Kakei

, Yoshiaki Shiraishi
, Shoichi Saito
:
Granting Access Privileges Using OpenID Connect in Permissioned Distributed Ledgers. 290-308 - Kemin Zhang, Li Yang, Lu Zhou, Jianfeng Ma:

Decentralized and Efficient Blockchain Rewriting with Bi-level Validity Verification. 309-328
Cryptography
- Jonathan Takeshita, Zachariah Carmichael, Ryan Karl, Taeho Jung:

TERSE: Tiny Encryptions and Really Speedy Execution for Post-Quantum Private Stream Aggregation. 331-352 - Alexandros Bakas, Eugene Frimpong

, Antonis Michalas
:
Symmetrical Disguise: Realizing Homomorphic Encryption Services from Symmetric Primitives. 353-370 - Juanjuan Guo, Mengjie Shuai, Qiongxiao Wang, Wenyuan Li, Jingqiang Lin:

Replicated Additive Secret Sharing with the Optimized Number of Shares. 371-389 - Hanyu Jia, Xiangxue Li, Qiang Li, Yue Bao, Xintian Hou:

Generic 2-Party PFE with Constant Rounds and Linear Active Security, and Efficient Instantiation. 390-410
Data Security
- Qiang Liu, Hequ Xian, Jiancheng Zhang, Kunpeng Liu:

A Random Reversible Watermarking Scheme for Relational Data. 413-430 - Wen Xie, Niusen Chen, Bo Chen

:
Enabling Accurate Data Recovery for Mobile Devices Against Malware Attacks. 431-449 - Sangat Vaidya, Santiago Torres-Arias, Justin Cappos, Reza Curtmola:

Bootstrapping Trust in Community Repository Projects. 450-469
Intrusion Detection
- Md Ali Reza Al Amin, Sachin Shetty

, Valerio Formicola
, Martin Otto:
Assessing the Quality of Differentially Private Synthetic Data for Intrusion Detection. 473-490 - Sanjeev Shukla

, Manoj Misra, Gaurav Varshney:
Forensic Analysis and Detection of Spoofing Based Email Attack Using Memory Forensics and Machine Learning. 491-509 - Yuedong Pan, Lijun Cai, Tao Leng, Lixin Zhao, Jiangang Ma, Aimin Yu, Dan Meng:

AttackMiner: A Graph Neural Network Based Approach for Attack Detection from Audit Logs. 510-528 - Sivaanandh Muneeswaran, Vinay Sachidananda, Rajendra Patil, Hongyi Peng, Mingchang Liu, Mohan Gurusamy:

Hiatus: Unsupervised Generative Approach for Detection of DoS and DDoS Attacks. 529-546
Mobile Security
- Douglas J. Leith

:
What Data Do the Google Dialer and Messages Apps on Android Send to Google? 549-568 - Xiantong Hao, Dandan Ma, Hongliang Liang:

Detection and Privacy Leakage Analysis of Third-Party Libraries in Android Apps. 569-587 - Spandan Mahadevegowda, Ryan M. Gerdes, Thidapat Chantem

, Rose Qingyang Hu:
Secure CV2X Using COTS Smartphones over LTE Infrastructure. 588-607
Network Security
- Muhammad Shadi Hajar

, Harsha K. Kalutarage
, M. Omar Al-Kadri
:
DQR: A Double Q Learning Multi Agent Routing Protocol for Wireless Medical Sensor Network. 611-629 - Mengyao Shi, Zhu Wang, Tingting Peng, Fenghua Li:

Message Recovery Attack of Kyber Based on Information Leakage in Decoding Operation. 630-647 - Qiying Dong, Ding Wang, Yaosheng Shen, Chunfu Jia:

PII-PSM: A New Targeted Password Strength Meter Using Personally Identifiable Information. 648-669
Privacy
- Pranay Kapoor, Rohan Pagey, Mohammad Mannan, Amr M. Youssef:

Silver Surfers on the Tech Wave: Privacy Analysis of Android Apps for the Elderly. 673-691 - Robert Cantaragiu, Antonis Michalas

, Eugene Frimpong
, Alexandros Bakas:
MetaPriv: Acting in Favor of Privacy on Social Media Platforms. 692-709 - Xiaoting Li, Lingwei Chen, Dinghao Wu:

Adversary for Social Good: Leveraging Attribute-Obfuscating Attack to Protect User Privacy on Social Networks. 710-728
Software Security
- Zhengxiang Zhou

, Cong Wang, Qingchuan Zhao
:
No-Fuzz: Efficient Anti-fuzzing Techniques. 731-751 - Tianning Zhang

, Miao Cai, Diming Zhang, Hao Huang:
eSROP Attack: Leveraging Signal Handler to Implement Turing-Complete Attack Under CFI Defense. 752-769 - Tongwei Ren, Ryan Williams, Sirshendu Ganguly, Lorenzo De Carli, Long Lu:

Breaking Embedded Software Homogeneity with Protocol Mutations. 770-790
Security and Privacy-Preserving Solutions in the Internet of Things (S/P-IoT) Workshop
- Nanda Rani, Ayushi Mishra

, Rahul Kumar, Sarbajit Ghosh
, Sandeep K. Shukla, Priyanka Bagade:
A Generalized Unknown Malware Classification. 793-806 - Xiaoyi Duan, Ye Huang, Yonghua Su, Yujin Li, Xiaohong Fan:

Research on the Grouping Method of Side-Channel Leakage Detection. 807-818 - Cavidan Yakupoglu

, Kurt Rohloff
:
PREFHE, PREFHE-AES and PREFHE-SGX: Secure Multiparty Computation Protocols from Fully Homomorphic Encryption and Proxy ReEncryption with AES and Intel SGX. 819-837

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














