default search action
16th FPS 2023: Bordeaux, France - Part I
- Mohamed Mosbah, Florence Sèdes, Nadia Tawbi, Toufik Ahmed, Nora Boulahia-Cuppens, Joaquín García-Alfaro:
Foundations and Practice of Security - 16th International Symposium, FPS 2023, Bordeaux, France, December 11-13, 2023, Revised Selected Papers, Part I. Lecture Notes in Computer Science 14551, Springer 2024, ISBN 978-3-031-57536-5
AI and Cybersecurity
- João Vitorino, Miguel Silva, Eva Maia, Isabel Praça:
An Adversarial Robustness Benchmark for Enterprise Network Intrusion Detection. 3-17 - Sadaf Md. Halim, Md Delwar Hossain, Latifur Khan, Anoop Singhal, Hiroyuki Inoue, Hideya Ochiai, Kevin W. Hamlen, Youki Kadobayashi:
Securing Smart Vehicles Through Federated Learning. 18-35 - Daniel Fentham, David Parker, Mark Ryan:
Using Reed-Muller Codes for Classification with Rejection and Recovery. 36-52 - Victor Aurora, Christopher Neal, Alexandre Proulx, Nora Boulahia-Cuppens, Frédéric Cuppens:
Unsupervised Clustering of Honeypot Attacks by Deep HTTP Packet Inspection. 53-68
Security Analysis
- Mohamed Mekkouri, Christine Hennebert:
Practices for Assessing the Security Level of Solidity Smart Contracts. 71-86 - Ruturaj K. Vaidya, Prasad A. Kulkarni:
Effectiveness of Binary-Level CFI Techniques. 87-103 - Maxwel Bar-on, Bruhadeshwar Bezawada, Indrakshi Ray, Indrajit Ray:
A Small World-Privacy Preserving IoT Device-Type Fingerprinting with Small Datasets. 104-122 - Pierre-Victor Besson, Valérie Viet Triem Tong, Gilles Guette, Guillaume Piolle, Erwan Abgrall:
URSID: Automatically Refining a Single Attack Scenario into Multiple Cyber Range Architectures. 123-138
Phishing and Social Network
- Yukiko Sawaya, Ayane Sano, Takamasa Isohara, Akira Yamada, Ayako Komatsu:
Does the Anchoring Effect Influence Individuals' Anti-phishing Behavior Intentions? 141-156 - Eric Edem Dzeha, Guy-Vincent Jourdan:
IntelliTweet: A Multifaceted Feature Approach to Detect Malicious Tweets. 157-173 - Emad Badawi, Guy-Vincent Jourdan, Iosif-Viorel Onut:
Web Scams Detection System. 174-188
Vulnerabilities and Exploits
- Mahmoud Zamani, Saquib Irtiza, Latifur Khan, Kevin W. Hamlen:
VulMAE: Graph Masked Autoencoders for Vulnerability Detection from Source and Binary Codes. 191-207 - Raphaël Khoury, Jérémy Bolduc, Jason Lafrenière-Nickopoulos, Abdel-Gany Odedele:
Analysis of Cryptographic CVEs: Lessons Learned and Perspectives. 208-218 - Mohamed El Amine Bekhouche, Kamel Adi:
A BERT-Based Framework for Automated Extraction of Behavioral Indicators of Compromise from Security Incident Reports. 219-232 - Norah Ridley, Enrico Branca, Jadyn Kimber, Natalia Stakhanova:
Enhancing Code Security Through Open-Source Large Language Models: A Comparative Study. 233-249
Network and System Threat
- Seyed Behnam Andarzian, Cristian Daniele, Erik Poll:
Green-Fuzz: Efficient Fuzzing for Network Protocol Implementations. 253-268 - Farnood Faghihi, Mohammad Zulkernine, Steven H. H. Ding:
Unmasking of Maskware: Detection and Prevention of Next-Generation Mobile Crypto-Ransomware. 269-284 - Pierre Crochelet, Christopher Neal, Nora Boulahia-Cuppens, Frédéric Cuppens, Alexandre Proulx:
Automated Attacker Behaviour Classification Using Threat Intelligence Insights. 285-301 - Wassim Mohamed Laïd Koribeche, David Espes, Cédric Morin:
UDP State Manipulation: Description of a Packet Filtering Vulnerability in Stateful Firewalls. 302-317
Malware Analysis
- Julien Cassagne, Ettore Merlo, Guy-Vincent Jourdan, Iosif-Viorel Onut:
Following the Obfuscation Trail: Identifying and Exploiting Obfuscation Signatures in Malicious Code. 321-338 - Serena Lucca, Christophe Crochet, Charles-Henry Bertrand Van Ouytsel, Axel Legay:
On Exploiting Symbolic Execution to Improve the Analysis of RAT Samples with angr. 339-354 - Thanh-Hung Pham, Mizuhito Ogawa:
Original Entry Point Detection Based on Graph Similarity. 355-371 - Martin Brisfors, Michail Moraitis, Gabriel Klasson Landin, Truls Jilborg:
Attacking and Securing the Clock Randomization and Duplication Side-Channel Attack Countermeasure. 372-387
Security Design
- John Breton, Jason Jaskolka, George O. M. Yee:
Hardening Systems Against Data Corruption Attacks at Design Time. 391-407 - Ludovic Paillat, Claudia-Lavinia Ignat, Davide Frey, Mathieu Turuani, Amine Ismail:
Design of an Efficient Distributed Delivery Service for Group Key Agreement Protocols. 408-423 - Ruize Wang, Elena Dubrova:
A Shared Key Recovery Attack on a Masked Implementation of CRYSTALS-Kyber's Encapsulation Algorithm. 424-439 - Sayan Biswas, Kangsoo Jung, Catuscia Palamidessi:
Tight Differential Privacy Guarantees for the Shuffle Model with k-Randomized Response. 440-458
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.