default search action
17th SecureComm 2021: Virtual Event
- Joaquín García-Alfaro, Shujun Li, Radha Poovendran, Hervé Debar, Moti Yung:
Security and Privacy in Communication Networks - 17th EAI International Conference, SecureComm 2021, Virtual Event, September 6-9, 2021, Proceedings, Part II. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 399, Springer 2021, ISBN 978-3-030-90021-2
Web/OSN Security and Privacy
- Naoki Fukushi, Takashi Koide, Daiki Chiba, Hiroki Nakano, Mitsuaki Akiyama:
Analyzing Security Risks of Ad-Based URL Shortening Services Caused by Users' Behaviors. 3-22 - Zhenhua Wang, Wei Xie, Jing Tao, Yong Tang, Enze Wang:
XHunter: Understanding XXE Vulnerability via Automatic Analysis. 23-42 - Francesco Buccafurri, Vincenzo De Angelis, Maria Francesca Idone, Cecilia Labrini:
Anonymous Short Communications over Social Networks. 43-63 - Xiaojie Xu, Jian Dong, Zhengyu Liu, Jin Yang, Bin Wang, Zhaoyuan Wang:
A Sybil Detection Method in OSN Based on DistilBERT and Double-SN-LSTM for Text Analysis. 64-76
ePayment Security
- Shangcheng Shi, Xianbo Wang, Kyle Zeng, Ronghai Yang, Wing Cheong Lau:
An Empirical Study on Mobile Payment Credential Leaks and Their Exploits. 79-98 - Nikolay Ivanov, Qiben Yan:
System-Wide Security for Offline Payment Terminals. 99-119 - Md Shahab Uddin, Mohammad Mannan, Amr M. Youssef:
Horus: A Security Assessment Framework for Android Crypto Wallets. 120-139
Systems Security
- Mojtaba Zaheri, Reza Curtmola:
Leakuidator: Leaky Resource Attacks and Countermeasures. 143-163 - Octavian Ciprian Bordeanu, Gianluca Stringhini, Yun Shen, Toby Davies:
JABBIC Lookups: A Backend Telemetry-Based System for Malware Triage. 164-184 - Yifan Wang, Yuchen Zhang, Chengbin Pang, Peng Li, Nikolaos Triandopoulos, Jun Xu:
Facilitating Parallel Fuzzing with Mutually-Exclusive Task Distribution. 185-206 - Nicolae Paladi, Marco Tiloca, Pegah Nikbakht Bideh, Martin Hell:
Flowrider: Fast On-Demand Key Provisioning for Cloud Networks. 207-228
Mobile Security and Privacy
- Douglas J. Leith:
Mobile Handset Privacy: Measuring the Data iOS and Android Send to Apple and Google. 231-251 - Pallavi Sivakumaran, Jorge Blasco:
Who's Accessing My Data? Application-Level Access Control for Bluetooth Low Energy. 252-272 - Yin Liu, Breno Dantas Cruz, Eli Tilevich:
HTPD: Secure and Flexible Message-Based Communication for Mobile Apps. 273-294 - Chengbin Hu, Yao Liu, Zhuo Lu, Shangqing Zhao, Xiao Han, Junjie Xiong:
Smartphone Location Spoofing Attack in Wireless Networks. 295-313
IoT Security and Privacy
- Pol Van Aubel, Erik Poll:
Compromised Through Compression - Privacy Implications of Smart Meter Traffic Analysis. 317-337 - Md Hasan Shahriar, Mohammad Ashiqur Rahman, Nur Imtiazul Haque, Badrul H. Chowdhury, Steven G. Whisenant:
iDDAF: An Intelligent Deceptive Data Acquisition Framework for Secure Cyber-Physical Systems. 338-359
PhD and Poster Track
- Alexandre Augusto Giron:
Encouraging the Adoption of Post-Quantum Hybrid Key Exchange in Network Security. 363-371 - Ryan Karl:
Quantitative and Qualitative Investigations into Trusted Execution Environments. 372-383 - Linshu Ouyang, Yongzheng Zhang:
Phishing Web Page Detection with Semi-Supervised Deep Anomaly Detection. 384-393 - Zelei Cheng, Zuotian Li:
Poisoning Attack for Inter-agent Transfer Learning. 394-404
PQC-SC Workshop
- Parhat Abla, Mingsheng Wang:
An Efficient Post-Quantum PKE from RLWR with Simple Security Proof. 407-423 - Pakize Sanal, Emrah Karagoz, Hwajeong Seo, Reza Azarderakhsh, Mehran Mozaffari Kermani:
Kyber on ARM64: Compact Implementations of Kyber on 64-Bit ARM Cortex-A Processors. 424-440 - Mila Anastasova, Mojtaba Bisheh-Niasar, Reza Azarderakhsh, Mehran Mozaffari Kermani:
Compressed SIKE Round 3 on ARM Cortex-M4. 441-457 - Simone Perriello, Alessandro Barenghi, Gerardo Pelosi:
A Quantum Circuit to Speed-Up the Cryptanalysis of Code-Based Cryptosystems. 458-474 - Reza Azarderakhsh, Rami Elkhatib, Brian Koziel, Brandon Langenberg:
Hardware Deployment of Hybrid PQC: SIKE+ECDH. 475-491
CPS-STS Workshop
- Shashank Reddy Danda, Xiaoyong Yuan, Bo Chen:
Towards Stealing Deep Neural Networks on Mobile Devices. 495-508 - Said A. Salloum, Tarek Gaber, Sunil Vadera, Khaled Shaalan:
Phishing Website Detection from URLs Using Classical Machine Learning ANN Model. 509-523
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.