default search action
21st SECRYPT 2024: Dijon, France
- Sabrina De Capitani di Vimercati, Pierangela Samarati:
Proceedings of the 21st International Conference on Security and Cryptography, SECRYPT 2024, Dijon, France, July 8-10, 2024. SCITEPRESS 2024, ISBN 978-989-758-709-2
Invited Speakers
- Vicenç Torra:
Explainability and Privacy-Preserving Data-Driven Models. SECRYPT 2024: 5 - Vincenzo Piuri:
Artificial Intelligence for Biometrics. SECRYPT 2024: 7
Papers
- Argiro Anagnostopoulou, Thomas Papaloukas, George Stergiopoulos, Dimitris Gritzalis:
From Plant to Lab: Industrial Emulation Tools for Real-World Security Testing in Industrial Control Systems. 13-25 - Leonard Bradatsch, Artur Hermann, Frank Kargl:
Attribute Threat Analysis and Risk Assessment for ABAC and TBAC Systems. 26-39 - Sara Majbour, Morgan Barbier, Jean-Marie Le Bars:
Fuzzy Vault Security Enhancement Avoid Statistical Biases. 40-51 - Georg Bramm, Melek Önen, Martin Schanzenbach, Ilya Komarov, Frank Morgner, Christian Tiebel, Juan Cadavid:
UPCARE: User Privacy-Preserving Cancer Research Platform. 52-63 - Mónica P. Arenas, Gabriele Lenzini, Mohammadamin Rakeei, Peter Y. A. Ryan, Marjan Skrobot, Maria Zhekova:
Verifying Artifact Authenticity with Unclonable Optical Tags. 64-77 - Peter Amthor, René Gorges:
A Composition Algebra for Decentralized Enforcement of Access Control Policies with an Application to Vehicular Networks. 78-90 - Helene Orsini, Yufei Han:
DYNAMO: Towards Network Attack Campaign Attribution via Density-Aware Active Learning. 91-102 - Rudrapatna K. Shyamasundar:
Characterization of Consensus Correctness in Ripple (XRP) Networks. 103-113 - Mahdi Akil, Leonardo A. Martucci, Jaap-Henk Hoepman:
A Secure and Privacy-Preserving Authentication Scheme with a Zero-Trust Approach to Vehicle Renting in VANETs. 114-127 - Ferucio Laurentiu Tiplea:
On Privacy of RFID-Based Authentication Protocols. 128-139 - Matthew Yudin, Achyut Reddy, Sridhar Venkatesan, Rauf Izmailov:
Backdoor Attacks During Retraining of Machine Learning Models: A Mitigation Approach. 140-150 - Vanessa Bracamonte, Yohko Orito, Yasunori Fukuta, Kiyoshi Murata, Takamasa Isohara:
Perception of Privacy Tools for Social Media: A Qualitative Analysis Among Japanese. 151-162 - Derkjan Elzinga, Stan Ruessink, Giuseppe Cascavilla, Damian A. Tamburri, Francesco Leotta, Massimo Mecella, Willem-Jan van den Heuvel:
Violence Detection: A Serious-Gaming Approach. 163-174 - Elijah Bass, Massimiliano Albanese, Marcos Zampieri:
DISC: A Dataset for Information Security Classification. 175-185 - Mohammed Lansari, Reda Bellafqira, Katarzyna Kapusta, Vincent Thouvenot, Olivier Bettan, Gouenou Coatrieux:
A White-Box Watermarking Modulation for Encrypted DNN in Homomorphic Federated Learning. 186-197 - Mounira Msahli, Pascal Lafourcade, Dhekra Mahmoud:
Formal Analysis of C-ITS PKI Protocols. 198-210 - Md. Al Amin, Hemanth Tummala, Rushabh Shah, Indrajit Ray:
Balancing Patient Privacy and Health Data Security: The Role of Compliance in Protected Health Information (PHI) Sharing. 211-223 - Myria Bouhaddi, Kamel Adi:
Enhancing Privacy in Machine Learning: A Robust Approach for Preventing Attribute Inference Attacks. 224-236 - Alphaeus Dmonte, Marcos Zampieri, Kevin Lybarger, Massimiliano Albanese, Genya Coulter:
Classifying Human-Generated and AI-Generated Election Claims in Social Media. 237-248 - Frederik Armknecht, Christian Müller:
Towards a Cryptographic Model for Wireless Communication. 249-261 - Julien Maillard, Thomas Hiscock, Maxime Lecomte, Christophe Clavier:
Cache Side-Channel Attacks Through Electromagnetic Emanations of DRAM Accesses. 262-273 - Clémentine Gritti, Emanuel Regnath, Sebastian Steinhorst:
MATRaCAE: Time-Based Revocable Access Control in the IoT. 274-285 - Kevin Dennis, Bianca Dehaan, Parisa Momeni, Gabriel Laverghetta, Jay Ligatti:
Large-Scale Analysis of GitHub and CVEs to Determine Prevalence of SQL Concatenations. 286-297 - Arijit Karati, Ting-Yu Chen, Kai-Yao Lin:
QuDPas-FHA: Quantum-Defended Privacy-Preserved Fast Handover Authentication in Space Information Networks. 298-309 - Tymoteusz Lindner, Tomasz Hawro, Piotr Syga:
Imperceptible QR Watermarks in High-Resolution Videos. 310-322 - Sebastian Raubitzek, Sebastian Schrittwieser, Caroline Lawitschka, Kevin Mallinger, Andreas Ekelhart, Edgar R. Weippl:
Code Obfuscation Classification Using Singular Value Decomposition on Grayscale Image Representations. 323-333 - Chiara Braghin, Elvinia Riccobene, Simone Valentini:
An ASM-Based Approach for Security Assessment of Ethereum Smart Contracts. 334-344 - El Mostapha Chakir, Marouane Hachimi, Mohammed Erradi:
Towards a Secure and Intelligent Access Control Policy Adapter for Big Data Environment. 345-356 - Inoussa Mouiche, Sherif Saad:
TI-NERmerger: Semi-Automated Framework for Integrating NER Datasets in Cybersecurity. 357-370 - Buvana Ganesh, Mosabbah Mushir Ahmed, Alieeldin Mady:
Higher Order Leakage Assessment and Neural Network-based Attack on CRYSTALS-Kyber. 373-380 - Koon-Ming Chan, Swee-Huay Heng, Syh-Yuan Tan, Shing Chiang Tan:
K-Resilient Public Key Authenticated Encryption with Keyword Search. 381-388 - Benjamin Aziz, Estabraq Makiyah, Aysha Bukhelli:
An Extended Method for Transmitting Secret Messages in Textual Documents Based on Paragraph Resizing. 389-396 - Salah S. Harb, M. Omair Ahmad, M. N. S. Swamy:
High-Speed Pipelined FPGA Implementation of a Robust Steganographic Scheme for Secure Data Communication Systems. 397-406 - Sara Nikula, Anssi Lintulampi, Kimmo Halunen:
Security Analysis for BB84 Key Distillation. 407-415 - Claudio Curto, Daniela Giordano, Simone Palazzo, Daniel Gustav Indelicato:
MultiVD: A Transformer-based Multitask Approach for Software Vulnerability Detection. 416-423 - Natan Talon, Valérie Viet Triem Tong, Gilles Guette, Yufei Han, Youssef Laarouchi:
SCWAD: Automated Pentesting of Web Applications. 424-433 - José Areia, Bruno Santos, Mário Antunes:
Dvorak: A Browser Credential Dumping Malware. 434-441 - Calebe Helpa, Tiago Heinrich, Marcus Botacin, Newton Carlos Will, Rafael R. Obelheiro, Carlos Alberto Maziero:
The Use of the DWARF Debugging Format for the Identification of Potentially Unwanted Applications (PUAs) in WebAssembly Binaries. 442-449 - Riccardo Germenia, Salvatore Manfredi, Matteo Rizzi, Giada Sciarretta, Alessandro Tomasi, Silvio Ranise:
Automating Compliance for Improving TLS Security Postures: An Assessment of Public Administration Endpoints. 450-458 - Mahdieh Heidaripour, Ladan Kian, Maryam Rezapour, Mark Holcomb, Benjamin Fuller, Gagan Agrawal, Hoda Maleki:
Organizing Records for Retrieval in Multi-Dimensional Range Searchable Encryption. 459-466 - Lucía Alonso, Mina Alishahi:
Autoencoder for Detecting Malicious Updates in Differentially Private Federated Learning. 467-474 - Roberto van Eeden, Matteo Paier, Marino Miculan:
A Formal Analysis of CIE Level 2 Multi-Factor Authentication via SMS OTP. 483-491 - Alba Martinez Anton, Clara Bertolissi, Jean-Marc Talbot:
Solving Access Control Conflicts in Multi-User Systems. 492-499 - Massimiliano Albanese, Olutola Adebiyi, Frank Onovae:
CVE2CWE: Automated Mapping of Software Vulnerabilities to Weaknesses Based on CVE Descriptions. 500-507 - Riccardo Longo, Chiara Spadafora:
Amun: Securing E-Voting Against Over-the-Shoulder Coercion. 508-517 - Julien Maillard, Thomas Hiscock, Maxime Lecomte, Christophe Clavier:
Simulating SASCA on Keccak: Security Implications for Post-Quantum Cryptographic Schemes. 518-527 - Fabrizio Baiardi, Filippo Boni, Giovanni Braccini, Emanuele Briganti, Luca Deri:
Kex-Filtering: A Proactive Approach to Filtering. 528-535 - Arka Ghosh, Massimiliano Albanese, Preetam Mukherjee, Amir Alipour-Fanid:
Improving the Efficiency of Intrusion Detection Systems by Optimizing Rule Deployment Across Multiple IDSs. 536-543 - George Stergiopoulos, Michalis Detsis, Sozon Leventopoulos, Dimitris Gritzalis:
Utilizing Machine Learning for Optimizing Cybersecurity Spending in Critical Infrastructures. 544-551 - Emmanuele Massidda, Lorenzo Pisu, Davide Maiorca, Giorgio Giacinto:
Bringing Binary Exploitation at Port 80: Understanding C Vulnerabilities in WebAssembly. 552-559 - Sebastian Schrittwieser, Andreas Ekelhart, Esther Seidl, Edgar R. Weippl:
Safe or Scam? An Empirical Simulation Study on Trust Indicators in Online Shopping. 560-567 - Lorenzo Binosi, Pietro Mazzini, Alessandro Sanna, Michele Carminati, Giorgio Giacinto, Riccardo Lazzeretti, Stefano Zanero, Mario Polino, Emilio Coppa, Davide Maiorca:
Do You Trust Your Device? Open Challenges in IoT Security Analysis. 568-575 - Aya Mohamed, Dagmar Auer, Daniel Hofer, Josef Küng:
Comparison of Access Control Approaches for Graph-Structured Data. 576-583 - Vahideh Moghtadaiee, Amir Fathalizadeh, Mina Alishahi:
Membership Inference Attacks Against Indoor Location Models. 584-591 - Luca Corbucci, Anna Monreale, Roberto Pellungrini:
Enhancing Privacy and Utility in Federated Learning: A Hybrid P2P and Server-Based Approach with Differential Privacy Protection. 592-602 - Bernhards Blumbergs:
Black Sheep Wall: Towards Multiple Vantage Point-Based Information Space Situational Awareness. 605-614 - Philip Zimmermann, Sebastian Obermeier:
Evaluating Digital Forensic Readiness: A Honeypot Approach. 615-621 - Sebastian Obermeier, Giorgio Tresoldi, Bernhard Tellenbach, Vincent Lenders:
HydroLab: A Versatile Hydroelectric Power Lab for Security Research and Education. 622-627 - Ryan Seah, Daren Khu, Alexander Hoover, Ruth Ng:
LAMA: Leakage Abuse Attacks Against Microsoft Always Encrypted. 628-633 - Devharsh Trivedi, Nesrine Kaaniche, Aymen Boudguiga, Nikos Triandopoulos:
chiku: Efficient Probabilistic Polynomial Approximations Library. 634-641 - Doryan Lesaignoux, Mikael Carmona:
On the Implementation of a Lattice-Based DAA for Vanet System. 642-648 - Alfredo Cuzzocrea, Islam Belmerabet:
Towards Privacy-Preserving Multi-Cloud Identity Management Using SOLID. 649-654 - Tomoaki Mimoto, Yuta Gempei, Kentaro Kita, Takamasa Isohara, Shinsaku Kiyomoto, Toshiaki Tanaka:
Linkage Between CVE and ATT&CK with Public Information. 655-660 - Miroslav Puskaric:
A Framework for Federated Analysis of Health Data Using Multiparty Homomorphic Encryption. 661-667 - Ridwane Aissaoui, Jean-Christophe Deneuville, Christophe Guerber, Alain Pirovano:
A Performant Quantum-Resistant KEM for Constrained Hardware: Optimized HQC. 668-673 - Junki Yuasa, Taisho Sasada, Christophe Kiennert, Gregory Blanc, Yuzo Taenaka, Youki Kadobayashi:
OIPM: Access Control Method to Prevent ID/Session Token Abuse on OpenID Connect. 674-679 - B. Pradeep Kumar Reddy, Ruchika Meel, Ayantika Chatterjee:
Encrypted KNN Implementation on Distributed Edge Device Network. 680-685 - Shyamili Toluchuri, Aishwarya Upadhyay, Smita Naval, Vijay Laxmi, Manoj Singh Gaur:
GAN-based Seed Generation for Efficient Fuzzing. SECRYPT 2024: 686-691 - Jesús E. Díaz Verdejo, Javier Muñoz-Calle, Rafael M. Estepa-Alonso, Antonio Estepa Alonso:
InspectorLog: A New Tool for Offline Attack Detection over Web Log Trace Files. 692-697 - Nir Soffer, Erez Waisbard:
An Efficient Hash Function Construction for Sparse Data. 698-703 - Farha Masroor, Adarsh Gopalakrishnan, Neena Goveas:
Securing Patient Data in IoT Devices: A Blockchain-NFT Approach for Privacy, Security, and Authentication. 704-709 - Hamdi Ouechtati, Nadia Ben Azzouna:
Towards an Adaptive Trust Management Model Based on ANFIS in the SIoT. SECRYPT 2024: 710-715 - Nouf Al-Juaid, Alexei Lisitsa, Sven Schewe:
Secure Multi-Party Traversal Queries over Federated Graph Databases. 716-721 - Amine Hattak, Fabio Martinelli, Francesco Mercaldo, Antonella Santone:
Leveraging Deep Learning for Intrusion Detection in IoT Through Visualized Network Data. 722-729 - Calvo Mayaudón Haroldo, Nakojah Chris David, Mahdi Madani, El-Bay Bourennane:
FPGA Implementation of AES-Based on Optimized Dynamic s-Box. 730-737 - Fatema Rashid, Ali Miri:
Privacy-Preserving Anomaly Detection Through Sampled, Synthetic Data Generation. 738-747 - Bartlomiej Marek, Wojciech Wodo:
Spellchecker Analysis for Behavioural Biometric of Typing Errors Scenario. 748-757 - Md. Morshedul Islam, Md. Khairul Anam:
Enhancing Adversarial Defense in Behavioral Authentication Systems Through Random Projections. 758-763 - Gabriela Mendes Corrêa de Miranda, José Antônio Moreira Xexéo, Renato Hidaka Torres:
Lightweight Cryptographic Algorithms: A Position Paper. 764-770 - Harpreet Singh, Habib Louafi, Yiyu Yao:
An Uncertain Reasoning-Based Intrusion Detection System for DoS/DDoS Detection. 771-776 - Aditya Kuppa, Jack Nicholls, Nhien-An Le-Khac:
Manipulating Prompts and Retrieval-Augmented Generation for LLM Service Providers. 777-785 - Syed Badruddoja, Ram Dantu, Mark Dockendorf, Abiola Salau, Kritagya Upadhyay:
Revolutionizing Blockchain Consensus: Towards Deliberative and Unanimous Agreement. 786-791 - Jaroslaw Bernacki, Rafal Scherer:
Compact Representation of Digital Camera's Fingerprint with Convolutional Autoencoder. 792-797 - Marcus Gelderie:
On the Privacy Afforded by Opaque Identifiers in Traffic Monitoring. 798-803 - Basker Palaniswamy, Arijit Karati:
QPTA: Quantum-Safe Privacy-Preserving Multi-Factor Authentication Scheme for Lightweight Devices. 804-811 - Pierre Fobougong Saha, Mohamed Mejri, Kamel Adi:
Toward the Foundation of Digital Identity Theory. 812-819 - Lisa Bruder, Mina Alishahi:
Local Differential Privacy for Data Clustering. 820-825 - Petr Tuma, Jan Hajny, Petr Muzikant, Jan Havlin, Lukas Malina, Patrik Dobias, Jan Willemson:
Open-Source Post-Quantum Encryptor: Design, Implementation and Deployment. 826-831 - Eric Filiol, Pierre Filiol:
Graph-Based Modelling of Maximum Period Property for Nonlinear Feedback Shift Registers. 832-837 - Poonam Namdeo Shelke, Saurav Gupta, Sukumar Nandi:
BlueDoS: A Novel Approach to Perform and Analyse DoS Attacks on Bluetooth Devices. 838-843 - Roberto De Prisco, Sergiy Shevchenko, Pompeo Faruolo:
Enhancing OpenID Connect for Verifiable Credentials with DIDComm. 844-849 - Saloni Kwatra, Anna Monreale, Francesca Naretto:
Balancing Act: Navigating the Privacy-Utility Spectrum in Principal Component Analysis. 850-857 - Abhishek Joshi, Divyateja Pasupuleti, P. Nischith, Sarvesh Sutaone, Soumil Ray, Soumyadeep Dey, Barsha Mitra:
Malware Analysis Using Transformer Based Models: An Empirical Study. 858-865 - Christophe Nègre, Mbaye Ngom:
Virtually Free Randomisations of NTT in RLWE Cryptosystem to Counteract Side Channel Attack Based on Belief Propagation. SECRYPT 2024: 866-875 - Joshua Stock, Lucas Lange, Erhard Rahm, Hannes Federrath:
Property Inference as a Regression Problem: Attacks and Defense. 876-885
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.