default search action
20th ACNS 2022: Rome, Italy - Workshops
- Jianying Zhou, Sridhar Adepu, Cristina Alcaraz, Lejla Batina, Emiliano Casalicchio, Sudipta Chattopadhyay, Chenglu Jin, Jingqiang Lin, Eleonora Losiouk, Suryadipta Majumdar, Weizhi Meng, Stjepan Picek, Jun Shao, Chunhua Su, Cong Wang, Yury Zhauniarovich, Saman A. Zonouz:
Applied Cryptography and Network Security Workshops - ACNS 2022 Satellite Workshops, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S&P, SCI, SecMT, SiMLA, Rome, Italy, June 20-23, 2022, Proceedings. Lecture Notes in Computer Science 13285, Springer 2022, ISBN 978-3-031-16814-7
AIBlock - Application Intelligence and Blockchain Security
- Yidan Xu, Juan Wang, Yuanzhang Li, Yajie Wang, Zixuan Xu, Dianxin Wang:
Universal Physical Adversarial Attack via Background Image. 3-14 - Jianpeng Gong, Jiaojiao Wu, Jianfeng Wang, Shichong Tan:
Efficient Verifiable Boolean Range Query for Light Clients on Blockchain Database. 15-35 - Lim Yong Zhi, Jianying Zhou, Martin Saerbeck:
SuppliedTrust: A Trusted Blockchain Architecture for Supply Chains. 36-52 - Yaoyuan Zhang, Yu-an Tan, Mingfeng Lu, Lu Liu, Quanxin Zhang, Yuanzhang Li, Dianxin Wang:
Towards Interpreting Vulnerability of Object Detection Models via Adversarial Distillation. 53-65 - Jiale Zhang, Liangqiong Tu, Jie Cai, Xiaobing Sun, Bin Li, Weitong Chen, Yu Wang:
Vulnerability Detection for Smart Contract via Backward Bayesian Active Learning. 66-83 - Shengang Hao, Jun Zheng, Jie Yang, Ziwei Ni, Quanxin Zhang, Li Zhang:
A Multi-agent Deep Reinforcement Learning-Based Collaborative Willingness Network for Automobile Maintenance Service. 84-103 - Jingci Zhang, Jun Zheng, Zheng Zhang, Tian Chen, Kefan Qiu, Quanxin Zhang, Yuanzhang Li:
Hybrid Isolation Model for Device Application Sandboxing Deployment in Zero Trust Architecture. 104-123
AIHWS - Artificial Intelligence in Hardware Security
- Stefanos Koffas, Praveen Kumar Vadnala:
On the Effect of Clock Frequency on Voltage and Electromagnetic Fault Injection. 127-145 - Yuanyuan Zhou, François-Xavier Standaert:
S-box Pooling: Towards More Efficient Side-Channel Security Evaluations. 146-164 - Sudharshan Swaminathan, Lukasz Chmielewski, Guilherme Perin, Stjepan Picek:
Deep Learning-Based Side-Channel Analysis Against AES Inner Rounds. 165-182 - Jurian van Geest, Ileana Buhan:
A Side-Channel Based Disassembler for the ARM-Cortex M0. 183-199 - Tsunato Nakai, Daisuke Suzuki, Takeshi Fujino:
Towards Isolated AI Accelerators with OP-TEE on SoC-FPGAs. 200-217 - Praveen Kulkarni, Vincent Verneuil:
Order vs. Chaos: Multi-trunk Classifier for Side-Channel Attack. 218-232
AIoTS - Artificial Intelligence and Industrial IoT Security
- Ahmed Nawaz Khan, Jeremy W. Bryans, Giedre Sabaliauskaite:
Framework for Calculating Residual Cybersecurity Risk of Threats to Road Vehicles in Alignment with ISO/SAE 21434. 235-247 - Hayato Kimura, Keita Emura, Takanori Isobe, Ryoma Ito, Kazuto Ogawa, Toshihiro Ohigashi:
Output Prediction Attacks on Block Ciphers Using Deep Learning. 248-276 - Alessandro Visintin, Flavio Toffalini, Eleonora Losiouk, Mauro Conti, Jianying Zhou:
HolA: Holistic and Autonomous Attestation for IoT Networks. 277-296
CIMSS - Critical Infrastructure and Manufacturing System Security
- Michele Ambrosi, Francesco Beltramini, Federico De Meo, Oliviero Nardi, Mattia Pacchin, Marco Rocchetto:
The Etiology of Cybersecurity. 299-319 - Zhiqiang Ma, Jun He:
Outsider Key Compromise Impersonation Attack on a Multi-factor Authenticated Key Exchange Protocol. 320-337 - Aldar C.-F. Chan, Jianying Zhou:
Toward Safe Integration of Legacy SCADA Systems in the Smart Grid. 338-357
Cloud S&P - Cloud Security and Privacy
- Robert Walther, Carsten Weinhold, Michael Roitzsch:
RATLS: Integrating Transport Layer Security with Remote Attestation. 361-379 - Stefano Braghin, Marco Simioni, Mathieu Sinn:
DLPFS: The Data Leakage Prevention FileSystem. 380-397 - Allon Adir, Ehud Aharoni, Nir Drucker, Eyal Kushnir, Ramy Masalha, Michael Mirkin, Omri Soceanu:
Privacy-Preserving Record Linkage Using Local Sensitive Hash and Private Set Intersection. 398-424
SCI - Secure Cryptographic Implementation
- Peifang Ni, Jing Xu:
UniqueChain: Achieving (Near) Optimal Transaction Settlement Time via Single Leader Election. 427-446 - Guangshen Cheng, Jiankuo Dong, Xinyi Ji, Bingyu Li, Haoling Fan, Pinchang Zhang:
PEPEC: Precomputed ECC Points Embedded in Certificates and Verified by CT Log Servers. 447-460 - Zihao Song, Junichi Sakamoto, Shigeo Mitsunari, Naoki Yoshida, Riku Anzai, Tsutomu Matsumoto:
Efficient Software Implementation of GMT6-672 and GMT8-542 Pairing-Friendly Curves for a 128-Bit Security Level. 461-478
SecMT - Security in Mobile Technologies
- Thijs Heijligenberg, Oualid Lkhaouni, Katharina Kohls:
Leaky Blinders: Information Leakage in Mobile VPNs. 481-494 - Arthur van der Staaij, Olga Gadyatskaya:
Instrumentation Blueprints: Towards Combining Several Android Instrumentation Tools. 495-512
SiMLA - Security in Machine Learning and its Applications
- Jesus Solano, Esteban Rivera, Lizzy Tengana, Christian Lopez, Johana Flórez, Martín Ochoa:
A Siamese Neural Network for Scalable Behavioral Biometrics Authentication. 515-535 - Moran Baruch, Nir Drucker, Lev Greenberg, Guy Moshkowich:
A Methodology for Training Homomorphic Encryption Friendly Neural Networks. 536-553 - Esteban Rivera, Lizzy Tengana, Jesus Solano, Christian Lopez, Johana Flórez, Martín Ochoa:
Scalable and Secure HTML5 Canvas-Based User Authentication. 554-574 - Badr Souani, Ahmed Khanfir, Alexandre Bartel, Kevin Allix, Yves Le Traon:
Android Malware Detection Using BERT. 575-591
POSTERS
- Sergejs Kozlovics, Juris Viksna:
POSTER: A Transparent Remote Quantum Random Number Generator over a Quantum-Safe Link. 595-599 - Rosario Giustolisi, Carsten Schürmann:
POSTER: Enabling User-Accountable Mechanisms in Decision Systems. 600-605 - Hong Zhao, Chunhua Su:
Poster: Key Generation Scheme Based on Physical Layer. 606-610 - Mohammed B. M. Kamel, Péter Ligeti, Christoph Reich:
POSTER: ODABE: Outsourced Decentralized CP-ABE in Internet of Things. 611-615 - Michal Glet, Kamil Kaczynski:
POSTER: Ransomware Detection Mechanism - Current State of the Project. 616-620
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.