


default search action
19th SECRYPT 2022: Lisbon, Portugal
- Sabrina De Capitani di Vimercati, Pierangela Samarati:

Proceedings of the 19th International Conference on Security and Cryptography, SECRYPT 2022, Lisbon, Portugal, July 11-13, 2022. SCITEPRESS 2022, ISBN 978-989-758-590-6
Invited Speakers
- Sokratis K. Katsikas:

Cyber Security When IT Meets OT. SECRYPT 2022: 5 - Luca Viganò:

Don't Tell Me The Cybersecurity Moon Is Shining... (Cybersecurity Show and Tell). SECRYPT 2022: 7
Papers
- Souha Masmoudi, Maryline Laurent, Nesrine Kaaniche

:
SEVIL: Secure and Efficient VerifIcation over Massive Proofs of KnowLedge. 13-24 - Awaleh Houssein Meraneh, Christophe Clavier, Hélène Le Bouder, Julien Maillard, Gaël Thomas:

Blind Side Channel on the Elephant LFSR. 25-34 - Panagiotis Dedousis, Melina Raptaki, George Stergiopoulos, Dimitris Gritzalis:

Towards an Automated Business Process Model Risk Assessment: A Process Mining Approach. 35-46 - Libor Polcák

, Petr Matousek:
Metering Homes: Do Energy Efficiency and Privacy Need to Be in Conflict? 47-58 - Anh-Tuan Hoang, Neil Hanley, Ayesha Khalid, Dur-e-Shahwar Kundi, Máire O'Neill:

Stacked Ensemble Model for Enhancing the DL based SCA. 59-68 - Gowri R. Chandran, Carmit Hazay, Robin Hundt, Thomas Schneider

:
Comparison-based MPC in Star Topology. 69-82 - Christopher Harth-Kitzerow, Georg Carle, Fan Fei, André Luckow

, Johannes Klepsch:
CRGC: A Practical Framework for Constructing Reusable Garbled Circuits. 83-95 - Miguel Calvo

, Marta Beltrán:
An Adaptive Web Application Firewall. 96-107 - Christopher van der Beets, Raine Nieminen

, Thomas Schneider
:
FAPRIL: Towards Faster Privacy-preserving Fingerprint-based Localization. 108-120 - Adam Janovsky, Davide Maiorca, Dominik Macko, Vashek Matyas, Giorgio Giacinto:

A Longitudinal Study of Cryptographic API: A Decade of Android Malware. 121-133 - Dusan Klinec, Marek Sýs

, Karel Kubicek
, Petr Svenda, Vashek Matyás:
Large-scale Randomness Study of Security Margins for 100+ Cryptographic Functions. 134-146 - Varun Gumma

, Barsha Mitra, Soumyadeep Dey, Pratik Shashikantbhai Patel, Sourabh Suman, Saptarshi Das, Jaideep Vaidya:
PAMMELA: Policy Administration Methodology using Machine Learning. 147-157 - Panagiotis Rizomiliotis, Christos Diou, Aikaterini Triakosia, Ilias Kyrannas, Konstantinos Tserpes:

Partially Oblivious Neural Network Inference. 158-169 - Thomas Marchioro, Lodovico Giaretta, Evangelos P. Markatos, Sarunas Girdzijauskas:

Federated Naive Bayes under Differential Privacy. 170-180 - Jeffrey Todd McDonald, Jennifer Parnell, Todd R. Andel

, Samuel H. Russ:
Effectiveness of Adversarial Component Recovery in Protected Netlist Circuit Designs. 181-192 - Antonin Voyez, Tristan Allard

, Gildas Avoine, Pierre Cauchois, Élisa Fromont
, Matthieu Simonin:
Membership Inference Attacks on Aggregated Time Series with Linear Programming. 193-204 - Mark Dockendorf, Ram Dantu, John Long:

Graph Algorithms over Homomorphic Encryption for Data Cooperatives. 205-214 - Ibifubara Iganibo

, Massimiliano Albanese
, Kaan Turkmen, Thomas R. Campbell, Marc Mosko:
Mason Vulnerability Scoring Framework: A Customizable Framework for Scoring Common Vulnerabilities and Weaknesses. 215-225 - Hassan Chaitou, Thomas Robert, Jean Leneutre, Laurent Pautet

:
Threats to Adversarial Training for IDSs and Mitigation. 226-236 - Ivan Oleynikov, Elena Pagnin, Andrei Sabelfeld:

CatNap: Leveraging Generic MPC for Actively Secure Privacy-enhancing Proximity Testing with a Napping Party. 237-248 - Daniel Morales

, Isaac Agudo, Javier López:
Real-time Crowd Counting based on Wearable Ephemeral IDs. 249-260 - Animesh Kar, Andrei Natadze, Enrico Branca

, Natalia Stakhanova:
HTTPFuzz: Web Server Fingerprinting with HTTP Request Fuzzing. 261-271 - Roberto Saia, Salvatore Carta, Gianni Fenu, Livio Pompianu:

A Region-based Training Data Segmentation Strategy to Credit Scoring. 275-282 - Rafael Dowsley, Mylène C. Q. Farias

, Mario Larangeira, Anderson Nascimento, Jot Virdee:
A Spendable Cold Wallet from QR Video. 283-290 - Sigurd Eskeland:

Collusion-resistant Broadcast Encryption based on Hidden RSA Subgroups. 291-298 - Sigurd Eskeland, Ahmed Fraz Baig

:
Cryptanalysis of a Privacy-preserving Behavior-oriented Authentication Scheme. 299-304 - Antonín Dufka

, Vladimir Sedlacek, Petr Svenda:
SHINE: Resilience via Practical Interoperability of Multi-party Schnorr Signature Schemes. 305-316 - Lukas Brodschelm, Marcus Gelderie

:
Application Sandboxing for Linux Desktops: A User-friendly Approach. 317-324 - Jeyamohan Neera, Xiaomin Chen, Nauman Aslam, Biju Issac

, Eve O'Brien:
A Local Differential Privacy based Hybrid Recommendation Model with BERT and Matrix Factorization. 325-332 - Amanda B. Viescinski, Tiago Heinrich

, Newton Carlos Will, Carlos Maziero:
Behavior Modeling of a Distributed Application for Anomaly Detection. 333-340 - Andrei Kazlouski, Thomas Marchioro, Evangelos P. Markatos:

What your Fitbit Says about You: De-anonymizing Users in Lifelogging Datasets. 341-348 - Anushree Belel, Ratna Dutta, Sourav Mukhopadhyay:

Key Encapsulation Mechanism in Ciphertext-policy Attribute based Setting Featuring Revocation and Key-homomorphic Property. 349-356 - David Holm Audran, Marcus Braunschweig Andersen, Mark Højer Hansen, Mikkel Møller Andersen, Thomas B. Frederiksen, Kasper H. Hansen, Dimitrios Georgoulias

, Emmanouil Vasilomanolakis
:
Tick Tock Break the Clock: Breaking CAPTCHAs on the Darkweb. 357-365 - Samiran Bag, Indranil Ghosh Ray, Feng Hao:

A New Leakage Resilient Symmetric Searchable Encryption Scheme for Phrase Search. 366-373 - Jayashree Dey, Ratna Dutta:

Code-based Key Encapsulation Mechanism Preserving Short Ciphertext and Secret Key. 374-381 - Axel Durbet

, Paul-Marie Grollemund
, Pascal Lafourcade, Kevin Thiry-Atighehchi:
Near-collisions and Their Impact on Biometric Security. 382-389 - Kyrylo Rudavskyy, Ali Miri:

Resilience of GANs against Adversarial Attacks. 390-397 - S. Seng, Joaquín García-Alfaro

, Y. Laarouci:
Implementation of a Stateful Network Protocol Intrusion Detection Systems. 398-405 - Thomas Lavaur, Jérôme Lacan:

zkBeacon: Proven Randomness Beacon based on Zero-knowledge Verifiable Computation. SECRYPT 2022: 406-414 - Marek Bielik, Martin Jurecek

, Olha Jurecková, Róbert Lórencz:
Yet Another Algebraic Cryptanalysis of Small Scale Variants of AES. 415-427 - Tristan Bilot, Grégoire Geis, Badis Hammi:

PhishGNN: A Phishing Website Detection Framework using Graph Neural Networks. 428-435 - Yvo Desmedt:

Are Clouds making Our Research Irrelevant and Who Is at Fault? (Position Paper). 436-442 - Nirmal Kumar Boran, Pranil Joshi, Virendra Singh:

PASS-P: Performance and Security Sensitive Dynamic Cache Partitioning. 443-450 - Saad Al-Ahmadi

, Saud Al-Eyead:
GAN-based Approach to Crafting Adversarial Malware Examples against a Heterogeneous Ensemble Classifier. 451-460 - Arne Roar Nygård, Arvind Sharma, Sokratis K. Katsikas:

Reverse Engineering for Thwarting Digital Supply Chain Attacks in Critical Infrastructures: Ethical Considerations. 461-468 - Abubakar-Sadiq Shehu, António Pinto

, Manuel Eduardo Correia
:
A Decentralised Real Estate Transfer Verification based on Self-Sovereign Identity and Smart Contracts. 469-476 - Rahul Sankalana Gunawardhana

, Kavinga Yapa Abeywardana:
Irreversible Applications for Windows NT Systems. 479-484 - Santiago de Diego

, Oscar Lage, Cristina Regueiro, Sergio Anguita, Gabriel Maciá-Fernández:
Bypassing Current Limitations for Implementing a Credential Delegation for the Industry 4.0. 485-490 - Ahmed Fraz Baig

, Sigurd Eskeland:
A Generic Privacy-preserving Protocol for Keystroke Dynamics-based Continuous Authentication. 491-498 - Loris Dal Lago

, Fabio Federici
, Davide Martintoni
, Valerio Senni:
Risk-driven Model-based Architecture Design for Secure Information Flows in Manufacturing Infrastructures. 499-506 - Marcus Gelderie

, Valentin Barth, Maximilian Luff, Julian Birami:
Seccomp Filters from Fuzzing. 507-512 - Giuseppe Crincoli, Fabiana Fierro, Giacomo Iadarola, Piera Elena La Rocca, Fabio Martinelli, Francesco Mercaldo, Antonella Santone:

A Method for Road Accident Prevention in Smart Cities based on Deep Reinforcement Learning. 513-518 - Wisnu Uriawan, Youakim Badr, Omar Hasan, Lionel Brunie:

TrustLend: Using Borrower Trustworthiness for Lending on Ethereum. 519-524 - Richmond Osei, Habib Louafi, Malek Mouhoub, Zhongwen Zhu:

Efficient IoT Device Fingerprinting Approach using Machine Learning. 525-533 - Francesco Mercaldo, Rosangela Casolare, Giovanni Ciaramella, Giacomo Iadarola, Fabio Martinelli, Francesco Ranieri, Antonella Santone:

A Real-time Method for CAN Bus Intrusion Detection by Means of Supervised Machine Learning. 534-539 - Rahul Roy, Abhijit Das, Dipanwita Roy Chowdhury:

Parallel and Distributed Implementations of the Wiedemann and the Block-Wiedemann Methods over GF(2). 540-547 - Fabrizio Baiardi

, Daria Maggi, Mauro Passacantando
:
Discovering How to Attack a System. 548-553 - Amisha Sinha, Debanjan Sadhya

:
Decentralized Public Key Infrastructure with Identity Management using Hyperledger Fabric. 554-559 - Eva Anastasiadi, Elias Athanasopoulos, Evangelos P. Markatos:

The Weakest Link: On Breaking the Association between Usernames and Passwords in Authentication Systems. 560-567 - Axel Durbet

, Paul-Marie Grollemund
, Pascal Lafourcade, Denis Migdal, Kevin Thiry-Atighehchi:
Authentication Attacks on Projection-based Cancelable Biometric Schemes. 568-573 - Alexandru Ionita:

Weighted Attribute-based Encryption with Parallelized Decryption. 574-579 - Nuno Prazeres, Rogério Luís de C. Costa

, Leonel Santos, Carlos Rabadão
:
Evaluation of AI-based Malware Detection in IoT Network Traffic. 580-585 - Paul Georg Wagner

, Jürgen Beyerer:
Towards Heterogeneous Remote Attestation Protocols. 586-591 - David Rodríguez Torrado, Miguel Cozar, José M. del Álamo:

Identifying Organizations Receiving Personal Data in Android Apps. 592-596 - Petr Svenda, Rudolf Kvasnovský, Imrich Nagy, Antonín Dufka

:
JCAlgTest: Robust Identification Metadata for Certified Smartcards. 597-604 - Lukas Malina, Sara Ricci, Patrik Dobias, Petr Jedlicka, Jan Hajny, Kim-Kwang Raymond Choo:

On the Efficiency and Security of Quantum-resistant Key Establishment Mechanisms on FPGA Platforms. 605-613 - Roberto Saia, Salvatore Carta, Gianni Fenu, Livio Pompianu:

Brain Waves and Evoked Potentials as Biometric User Identification Strategy: An Affordable Low-cost Approach. 614-619 - Giuseppe Cascavilla, Gemma Catolino, Mirella Sangiovanni:

Illicit Darkweb Classification via Natural-language Processing: Classifying Illicit Content of Webpages based on Textual Information. 620-626 - Tomás Rabas

, Róbert Lórencz, Jirí Bucek:
Verification of PUF-based IoT Protocols with AVISPA and Scyther. 627-635 - Katarzyna Kapusta, Gérard Memmi

:
PE-AONT: Partial Encryption All or Nothing Transform. 636-641 - Vita Santa Barletta

, Giuseppe Desolda, Domenico Gigante
, Rosa Lanzilotti, Marco Saltarella:
From GDPR to Privacy Design Patterns: The MATERIALIST Framework. 642-648 - Berkan Ufuk, Mehmet Tahir Sandikkaya:

Moving Target Defense Router: MaTaDoR. 649-654 - Zelong Li, Akhilesh Tyagi

:
Transient State Signaling for Spectre/Meltdown Transient Cache Side-channel Prevention. 655-660 - Javad Bahrami, Mohammad Ebrahimabadi, Sofiane Takarabt, Jean-Luc Danger, Sylvain Guilley, Naghmeh Karimi:

On the Practicality of Relying on Simulations in Different Abstraction Levels for Pre-silicon Side-Channel Analysis. 661-668 - Oana Stan, Vincent Thouvenot, Aymen Boudguiga, Katarzyna Kapusta, Martin Zuber, Renaud Sirdey:

A Secure Federated Learning: Analysis of Different Cryptographic Tools. 669-674 - Saqib Javed, Muhammad Asim Mukhtar, Muhammad Khurram Bhatti, Guy Gogniat:

Novel Design for IE-Cache to Mitigate Conflict-based Cache-side Channel Attacks with Reduced Energy Consumption. 675-680 - Mariana Segovia, Jose Rubio-Hernan

, Ana R. Cavalli, Joaquín García-Alfaro:
Switched-based Control Testbed to Assure Cyber-physical Resilience by Design. 681-686 - Stefan More

, Jakob Heher, Clemens Walluschek:
Offline-verifiable Data from Distributed Ledger-based Registries. 687-693 - Nesrine Kaaniche

, Aymen Boudguiga, Gustavo Gonzalez Granadillo:
Efficient Hybrid Model for Intrusion Detection Systems. 694-700 - Kazuhide Fukushima, Hiroki Okada, Sofiane Takarabt, Amina Korchi, Meziane Hamoud, Khaled Karray, Youssef Souissy, Sylvain Guilley:

Side-channel Analysis and Countermeasure for Implementation of Lattice-based Signature. 701-706 - Abiola Salau

, Ram Dantu, Kirill Morozov, Kritagya Upadhyay
, Syed Badruddoja
:
Towards a Threat Model and Security Analysis for Data Cooperatives. 707-713 - Benjamin Aziz, Aysha Bukhelli, Rinat Khusainov

, Alaa Mohasseb
:
A Novel Method for Embedding and Extracting Secret Messages in Textual Documents based on Paragraph Resizing. 714-719

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














