


default search action
20th ACNS 2022: Rome, Italy - Workshops
- Jianying Zhou
, Sridhar Adepu
, Cristina Alcaraz
, Lejla Batina
, Emiliano Casalicchio
, Sudipta Chattopadhyay
, Chenglu Jin
, Jingqiang Lin
, Eleonora Losiouk
, Suryadipta Majumdar
, Weizhi Meng
, Stjepan Picek
, Jun Shao, Chunhua Su
, Cong Wang
, Yury Zhauniarovich
, Saman A. Zonouz:
Applied Cryptography and Network Security Workshops - ACNS 2022 Satellite Workshops, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S&P, SCI, SecMT, SiMLA, Rome, Italy, June 20-23, 2022, Proceedings. Lecture Notes in Computer Science 13285, Springer 2022, ISBN 978-3-031-16814-7
AIBlock - Application Intelligence and Blockchain Security
- Yidan Xu, Juan Wang, Yuanzhang Li, Yajie Wang, Zixuan Xu, Dianxin Wang:
Universal Physical Adversarial Attack via Background Image. 3-14 - Jianpeng Gong, Jiaojiao Wu, Jianfeng Wang, Shichong Tan:
Efficient Verifiable Boolean Range Query for Light Clients on Blockchain Database. 15-35 - Lim Yong Zhi
, Jianying Zhou, Martin Saerbeck:
SuppliedTrust: A Trusted Blockchain Architecture for Supply Chains. 36-52 - Yaoyuan Zhang, Yu-an Tan, Mingfeng Lu, Lu Liu, Quanxin Zhang, Yuanzhang Li, Dianxin Wang:
Towards Interpreting Vulnerability of Object Detection Models via Adversarial Distillation. 53-65 - Jiale Zhang
, Liangqiong Tu, Jie Cai, Xiaobing Sun, Bin Li, Weitong Chen
, Yu Wang:
Vulnerability Detection for Smart Contract via Backward Bayesian Active Learning. 66-83 - Shengang Hao, Jun Zheng, Jie Yang, Ziwei Ni, Quanxin Zhang, Li Zhang:
A Multi-agent Deep Reinforcement Learning-Based Collaborative Willingness Network for Automobile Maintenance Service. 84-103 - Jingci Zhang, Jun Zheng, Zheng Zhang, Tian Chen, Kefan Qiu, Quanxin Zhang, Yuanzhang Li:
Hybrid Isolation Model for Device Application Sandboxing Deployment in Zero Trust Architecture. 104-123
AIHWS - Artificial Intelligence in Hardware Security
- Stefanos Koffas, Praveen Kumar Vadnala:
On the Effect of Clock Frequency on Voltage and Electromagnetic Fault Injection. 127-145 - Yuanyuan Zhou
, François-Xavier Standaert:
S-box Pooling: Towards More Efficient Side-Channel Security Evaluations. 146-164 - Sudharshan Swaminathan, Lukasz Chmielewski, Guilherme Perin, Stjepan Picek:
Deep Learning-Based Side-Channel Analysis Against AES Inner Rounds. 165-182 - Jurian van Geest, Ileana Buhan:
A Side-Channel Based Disassembler for the ARM-Cortex M0. 183-199 - Tsunato Nakai, Daisuke Suzuki, Takeshi Fujino:
Towards Isolated AI Accelerators with OP-TEE on SoC-FPGAs. 200-217 - Praveen Kulkarni, Vincent Verneuil:
Order vs. Chaos: Multi-trunk Classifier for Side-Channel Attack. 218-232
AIoTS - Artificial Intelligence and Industrial IoT Security
- Ahmed Nawaz Khan
, Jeremy W. Bryans
, Giedre Sabaliauskaite
:
Framework for Calculating Residual Cybersecurity Risk of Threats to Road Vehicles in Alignment with ISO/SAE 21434. 235-247 - Hayato Kimura, Keita Emura, Takanori Isobe, Ryoma Ito
, Kazuto Ogawa, Toshihiro Ohigashi
:
Output Prediction Attacks on Block Ciphers Using Deep Learning. 248-276 - Alessandro Visintin, Flavio Toffalini, Eleonora Losiouk, Mauro Conti
, Jianying Zhou:
HolA: Holistic and Autonomous Attestation for IoT Networks. 277-296
CIMSS - Critical Infrastructure and Manufacturing System Security
- Michele Ambrosi, Francesco Beltramini, Federico De Meo, Oliviero Nardi, Mattia Pacchin, Marco Rocchetto:
The Etiology of Cybersecurity. 299-319 - Zhiqiang Ma
, Jun He
:
Outsider Key Compromise Impersonation Attack on a Multi-factor Authenticated Key Exchange Protocol. 320-337 - Aldar C.-F. Chan
, Jianying Zhou:
Toward Safe Integration of Legacy SCADA Systems in the Smart Grid. 338-357
Cloud S&P - Cloud Security and Privacy
- Robert Walther, Carsten Weinhold, Michael Roitzsch
:
RATLS: Integrating Transport Layer Security with Remote Attestation. 361-379 - Stefano Braghin
, Marco Simioni, Mathieu Sinn:
DLPFS: The Data Leakage Prevention FileSystem. 380-397 - Allon Adir
, Ehud Aharoni
, Nir Drucker
, Eyal Kushnir
, Ramy Masalha
, Michael Mirkin
, Omri Soceanu
:
Privacy-Preserving Record Linkage Using Local Sensitive Hash and Private Set Intersection. 398-424
SCI - Secure Cryptographic Implementation
- Peifang Ni
, Jing Xu
:
UniqueChain: Achieving (Near) Optimal Transaction Settlement Time via Single Leader Election. 427-446 - Guangshen Cheng, Jiankuo Dong, Xinyi Ji, Bingyu Li, Haoling Fan, Pinchang Zhang:
PEPEC: Precomputed ECC Points Embedded in Certificates and Verified by CT Log Servers. 447-460 - Zihao Song, Junichi Sakamoto, Shigeo Mitsunari, Naoki Yoshida, Riku Anzai, Tsutomu Matsumoto:
Efficient Software Implementation of GMT6-672 and GMT8-542 Pairing-Friendly Curves for a 128-Bit Security Level. 461-478
SecMT - Security in Mobile Technologies
- Thijs Heijligenberg, Oualid Lkhaouni, Katharina Kohls:
Leaky Blinders: Information Leakage in Mobile VPNs. 481-494 - Arthur van der Staaij, Olga Gadyatskaya
:
Instrumentation Blueprints: Towards Combining Several Android Instrumentation Tools. 495-512
SiMLA - Security in Machine Learning and its Applications
- Jesus Solano, Esteban Rivera, Lizzy Tengana, Christian Lopez, Johana Flórez
, Martín Ochoa:
A Siamese Neural Network for Scalable Behavioral Biometrics Authentication. 515-535 - Moran Baruch
, Nir Drucker
, Lev Greenberg
, Guy Moshkowich
:
A Methodology for Training Homomorphic Encryption Friendly Neural Networks. 536-553 - Esteban Rivera, Lizzy Tengana, Jesus Solano, Christian Lopez, Johana Flórez
, Martín Ochoa:
Scalable and Secure HTML5 Canvas-Based User Authentication. 554-574 - Badr Souani, Ahmed Khanfir, Alexandre Bartel, Kevin Allix, Yves Le Traon:
Android Malware Detection Using BERT. 575-591
POSTERS
- Sergejs Kozlovics, Juris Viksna:
POSTER: A Transparent Remote Quantum Random Number Generator over a Quantum-Safe Link. 595-599 - Rosario Giustolisi, Carsten Schürmann:
POSTER: Enabling User-Accountable Mechanisms in Decision Systems. 600-605 - Hong Zhao
, Chunhua Su
:
Poster: Key Generation Scheme Based on Physical Layer. 606-610 - Mohammed B. M. Kamel, Péter Ligeti, Christoph Reich
:
POSTER: ODABE: Outsourced Decentralized CP-ABE in Internet of Things. 611-615 - Michal Glet
, Kamil Kaczynski
:
POSTER: Ransomware Detection Mechanism - Current State of the Project. 616-620

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.