default search action
20th ICISS 2024: Jaipur, India
- Vishwas T. Patil, Ram Krishnan, Rudrapatna K. Shyamasundar:
Information Systems Security - 20th International Conference, ICISS 2024, Jaipur, India, December 16-20, 2024, Proceedings. Lecture Notes in Computer Science 15416, Springer 2025, ISBN 978-3-031-80019-1
System Security
- Zane Weissman, Thore Tiemann, Thomas Eisenbarth, Berk Sunar:
Microarchitectural Security of Firecracker VMM for Serverless Cloud Platforms. 3-24 - Soma Kato, Yui Koyanagi, Tomoaki Ukezono:
An OS Support for Tamper-Resistant Software Execution Using Empty Interruptions. 25-41 - Rakesh Podder, Tyler Rios, Indrajit Ray, Presanna Raman, Stefano Righi:
S-RFUP: Secure Remote Firmware Update Protocol. 42-62 - Oluwatosin Falebita, Mahmoud Abdelgawad, Evan Anspach, Indrakshi Ray:
Securing Virtual Reality Apps Inter-process Communication. 63-84
Network Security
- Urvashi Kishnani, Sanchari Das:
Securing the Web: Analysis of HTTP Security Headers in Popular Global Websites. 87-106 - Julian Parkin, Mahesh Tripunitara:
Countering Subscription Concealed Identifier (SUCI)-Catchers in Cellular Communications. 107-126 - Harika Narumanchi, Lakshmi Padmaja Maddali, N. Narendra Kumar:
BP-MAP: A Secure and Convenient Mutual Authentication Protocol. 127-145 - Steven Triplett, Simon Minami, Rakesh M. Verma:
Effects of Soft-Domain Transfer and Named Entity Information on Deception Detection. 146-155
Attack
- Shubham Tomar, Meenakshi Tripathi:
Paving the Way: Advancing V2X Safety Through Innovative Attack Generation and Analysis Framework (V2X-SAF). 159-179 - N'Famoussa Kounon Nanamou, Christopher Neal, Nora Boulahia-Cuppens, Frédéric Cuppens, Anis Bkakria:
From Traits to Threats: Learning Risk Indicators of Malicious Insider Using Psychometric Data. 180-200 - Blessy Thomas, Sabu M. Thampi, Preetam Mukherjee:
Identifying Insecure Network Configurations Through Attack Modeling and Explainable AI. 201-212 - Lee Jun Quan, Tan Jia Ye, Goh Geok Ling, Vivek Balachandran:
QIris: Quantum Implementation of Rainbow Table Attacks. 213-222
Malware and Vulnerability Detection
- Fabiha Hashmat, Zeyad Alwaleed Aljaali, Mingjie Shen, Aravind Machiry:
Insights from Running 24 Static Analysis Tools on Open Source Software Repositories. 225-245 - Sanchit Gupta, Vireshwar Kumar:
REMEDII: Robust Malware Detection with Iterative and Intelligent Adversarial Training. 246-264 - Maitri Kushwaha, Arnab Mukherjee, Aishwarya Pandey, Raju Halder:
Semantics-Based Static Vulnerability Detection in Solidity Using Abstract Interpretation. 265-285
Privacy and Usability
- Gayatri Priyadarsini, Anshika Saxena, Aditi Dey, Prakriti, Abhishek Bichhawat:
Web Privacy Perceptions Amongst Indian Users. 289-309 - Rohit Gupta, Rishabh Kumar, Sutapa Mondal, Mangesh S. Gharote, Sachin Lodha:
Enabling Privacy in IT Service Operations. 310-319 - Ashley Fraser, Abubakar-Sadiq Shehu, Nick Frymann, Paul Haynes, Steve Schneider:
Privacy-Preserving Photo Sharing: An SSI Use Case. 320-329 - Shyam Murthy, Santosh Kumar Upadhyaya, Srinivas Vivek:
Zone Recovery Attack on a Secure Privacy-Preserving Ride-Matching Protocol. 330-337 - Shamim Bin Zahid, Aishwarya Ghosh Bristy, Md. Musfikur Hasan Oli, Md. Fahim, Sarker T. Ahmed Rumee, Moinul Islam Zaber:
Making EULA Great Again: A Novel Nudge Mechanism to Improve Readability, User Attention and Awareness. 338-358 - Vishwas Patil, R. K. Shyamasundar:
A Decoupling Mechanism for Transaction Privacy. 359-379
AI Security
- Shungo Sato, Hidema Tanaka:
Protecting Ownership of Trained DNN Models with Zero-Knowledge Proofs. 383-403 - Mandru Suma Sri, Chakka Srikanth Yadav, Tikaram Sanyashi, Virendra Singh:
MALAI: ML-Based Attack on Learning with Error Problem. 404-421 - Debasmita Manna, Somanath Tripathy:
Patch Based Backdoor Attack on Deep Neural Networks. 422-440
Industry Demo/Practice
- Vipul Walunj, Vasanth Rajaraman, Jyotirmoy Dutta, Abhay Sharma:
Integrating Crypto-Based Payment Systems for Data Marketplaces: Enhancing Efficiency, Security, and User Autonomy. 443-452 - Surabhi Dwivedi, Balaji Rajendran, P. V. Akshay, Akshaya Acha, Praveen Ampatt, Sithu D. Sudarsan:
IntelliSOAR: Intelligent Alert Enrichment Using Security Orchestration Automation and Response (SOAR). 453-462 - N. Muraleedharan, Hrishikesh Rajendra Neve, Samar Sarkar, Balaji Rajendran:
InTrust: An Asset Monitoring, Analysis and Vulnerability Assessment System for Zero Trust Network. 463-472
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.