default search action
22nd ISC 2019: New York City, NY, USA
- Zhiqiang Lin, Charalampos Papamanthou, Michalis Polychronakis:
Information Security - 22nd International Conference, ISC 2019, New York City, NY, USA, September 16-18, 2019, Proceedings. Lecture Notes in Computer Science 11723, Springer 2019, ISBN 978-3-030-30214-6
Attacks and Cryptanalysis
- Junming Ke, Pawel Szalachowski, Jianying Zhou, Qiuliang Xu, Zheng Yang:
IBWH: An Intermittent Block Withholding Attack with Optimal Mining Reward Rate. 3-24 - Evangelia Anna Markatou, Roberto Tamassia:
Full Database Reconstruction with Access and Search Pattern Leakage. 25-43 - Jingchun Yang, Meicheng Liu, Dongdai Lin:
Cube Cryptanalysis of Round-Reduced ACORN. 44-64
Crypto I: Secure Computation and Storage
- Iraklis Leontiadis, Reza Curtmola:
Auditable Compressed Storage. 67-86 - Chloé Hébant, Duong Hieu Phan, David Pointcheval:
Decentralized Evaluation of Quadratic Polynomials on Encrypted Data. 87-106 - Bei Liang, Aikaterini Mitrokotsa:
Robust Distributed Pseudorandom Functions for mNP Access Structures. 107-126
Machine Learning and Security
- Apostolis Zarras, Ilias Gerostathopoulos, Daniel Méndez Fernández:
Can Today's Machine Learning Pass Image-Based Turing Tests? 129-148 - Maksim Tsikhanovich, Malik Magdon-Ismail, Muhammad Ishaq, Vassilis Zikas:
PD-ML-Lite: Private Distributed Machine Learning from Lightweight Cryptography. 149-167
Crypto II: Zero-Knowledge Proofs
- Carlo Brunetta, Bei Liang, Aikaterini Mitrokotsa:
Code-Based Zero Knowledge PRF Arguments. 171-189 - Yanhua Zhang, Yupu Hu, Qikun Zhang, Huiwen Jia:
On New Zero-Knowledge Proofs for Lattice-Based Group Signatures with Verifier-Local Revocation. 190-208
Defenses
- Arash Alavi, Rajiv Gupta, Zhiyun Qian:
When the Attacker Knows a Lot: The GAGA Graph Anonymizer. 211-230 - Evangelia Anna Markatou, Roberto Tamassia:
Mitigation Techniques for Attacks on 1-Dimensional Databases that Support Range Queries. 231-251
Web Security
- Walter Rweyemamu, Tobias Lauinger, Christo Wilson, William K. Robertson, Engin Kirda:
Getting Under Alexa's Umbrella: Infiltration Attacks Against Internet Top Domain Lists. 255-276 - Panagiotis Papadopoulos, Panagiotis Ilia, Evangelos P. Markatos:
Truth in Web Mining: Measuring the Profitability and the Imposed Overheads of Cryptojacking. 277-296
Side Channels
- Quanqi Ye, Yan Zhang, Guangdong Bai, Naipeng Dong, Zhenkai Liang, Jin Song Dong, Haoyu Wang:
LightSense: A Novel Side Channel for Zero-permission Mobile User Tracking. 299-318 - Thales Bandiera Paiva, Javier Navaridas, Routo Terada:
Robust Covert Channels Based on DRAM Power Consumption. 319-338
Malware Analysis
- Carter Yagemann, Salmin Sultana, Li Chen, Wenke Lee:
Barnum: Detecting Document Malware via Control Flow Anomalies in Hardware Traces. 341-359 - Abbas Acar, Long Lu, A. Selcuk Uluagac, Engin Kirda:
An Analysis of Malware Trends in Enterprise Networks. 360-380 - Tamy Beppler, Marcus Botacin, Fabricio Ceschin, Luiz E. S. Oliveira, André Grégio:
L(a)ying in (Test)Bed - How Biased Datasets Produce Impractical Results for Actual Malware Families' Classification. 381-401 - Syed Ali Qasim, Juan Lopez Jr., Irfan Ahmed:
Automated Reconstruction of Control Logic for Programmable Logic Controller Forensics. 402-422
Crypto III: Signatures and Authentication
- Hanwen Feng, Jianwei Liu, Qianhong Wu:
Secure Stern Signatures in Quantum Random Oracle Model. 425-444 - Xueli Wang, Yu Chen, Xuecheng Ma:
Adding Linkability to Ring Signatures with One-Time Signatures. 445-464 - Sailesh Simhadri, James Steel, Benjamin Fuller:
Cryptographic Authentication from the Iris. 465-485
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.