default search action
19th TrustCom 2020: Guangzhou, China
- Guojun Wang, Ryan K. L. Ko, Md. Zakirul Alam Bhuiyan, Yi Pan:
19th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2020, Guangzhou, China, December 29, 2020 - January 1, 2021. IEEE 2020, ISBN 978-1-6654-0392-4
Trust Track
- Xuewei Feng, Dongxia Wang, Zhechao Lin, Xiaohui Kuang, Gang Zhao:
Enhancing Randomization Entropy of x86-64 Code while Preserving Semantic Consistency. 1-12 - Xin Tang, Linna Zhou, Dan Liu, Boyu Liu, Xinyi Lü:
Reversible data hiding based on improved rhombus predictor and prediction error expansion. 13-21 - Dapeng Qu, Jiankun Zhang, Zhenhuan Hou, Ming Wan, Bo Dong:
A Trust Routing Scheme based on Identification of Non-complete Cooperative Nodes in Mobile Peer-to-Peer Networks. 22-29 - Jingbin Liu, Yu Qin, Dengguo Feng:
SeRoT: A Secure Runtime System on Trusted Execution Environments. 30-37 - Young Choon Lee, Jayden King, Young Ki Kim, Seok-Hee Hong:
Robust Scheduling for Large-Scale Distributed Systems. 38-45 - Chengying Mao, Linlin Wen, Tsong Yueh Chen:
Adaptive Random Test Case Generation Based on Multi-Objective Evolutionary Search. 46-53 - Wei Yang, Anmin Fu, Hailong Zhang, Chanying Huang:
Improving Efficiency of Key Enumeration Based on Side-Channel Analysis. 54-61 - Marcin Plata, Piotr Syga:
Robust Spatial-spread Deep Neural Image Watermarking. 62-70 - Ha Xuan Son, Hai Trieu Le, Nadia Metoui, Nghia Duong-Trung:
DeM-CoD: Novel Access-Control-Based Cash on Delivery Mechanism for Decentralized Marketplace. 71-78 - Ran Li, Jiaqi Yin, Huibiao Zhu:
Modeling and Analysis of RabbitMQ Using UPPAAL. 79-86 - Xiaohu Zhou, Vitor Jesus, Yonghao Wang, Mark B. Josephs:
User-Controlled, Auditable, Cross-Jurisdiction Sharing of Healthcare Data Mediated by a Public Blockchain. 87-96 - Ming Liu, Zhi Xue, Xiangjian He:
A Unified Host-based Intrusion Detection Framework using Spark in Cloud. 97-103 - Yanshul Sharma, Zinea Das, Alok Das, Sanjay Moulik:
TA-HRT: A temperature-aware scheduler for heterogeneous real-time multicore systems. 104-111 - Yin Liu, Eli Tilevich:
Reducing the Price of Protection: Identifying and Migrating Non-Sensitive Code in TEE. 112-120 - Wentao Xie, Peng Wu:
Fairness Testing of Machine Learning Models Using Deep Reinforcement Learning. 121-128
Security Track
- Isaac Matthews, John C. Mace, Sadegh Soudjani, Aad van Moorsel:
Cyclic Bayesian Attack Graphs: A Systematic Computational Approach. 129-136 - Qi Feng, Debiao He, Min Luo, Zengxiang Li, Kim-Kwang Raymond Choo:
Practical Secure Two-Party EdDSA Signature Generation with Key Protection and Applications in Cryptocurrency. 137-147 - Roberto Dillon, Shailey Chawla, Dayana Hristova, Barbara Göbl, Suzana Jovicic:
Password Policies vs. Usability: When Do Users Go "Bananas"? 148-153 - Yu Ding, Shupeng Wang, Jian Xing, Xiaoyu Zhang, ZiSen Oi, Ge Fu, Qian Qiang, Haoliang Sun, Jianyu Zhang:
Malware Classification on Imbalanced Data through Self-Attention. 154-161 - Ning Zhang, Zhiqiang Lv, Yanlin Zhang, Haiyang Li, Yixin Zhang, Weiqing Huang:
Novel design of Hardware Trojan: A generic approach for defeating testability based detection. 162-173 - Munir Geden, Kasper Rasmussen:
TRUVIN: Lightweight Detection of Data-Oriented Attacks Through Trusted Value Integrity. 174-181 - Ioana Boureanu, Daniel Migault, Stere Preda, Hyame Assem Alamedine, Sanjay Mishra, Frederic Fieau, Mohammad Mannan:
LURK: Server-Controlled TLS Delegation. 182-193 - Fang Li, Ziyuan Zhu, Chao Yan, Bowen Chen, Dan Meng:
Malware Detection Based on Term Frequency Analysis of GPRs Features. 194-201 - Radu Ciucanu, Pascal Lafourcade, Marius Lombard-Platet, Marta Soare:
Secure Outsourcing of Multi-Armed Bandits. 202-209 - Yannan Liu, Yabin Lai, Kaizhi Wei, Liang Gu, Zhengzheng Yan:
NLabel: An Accurate Familial Clustering Framework for Large-scale Weakly-labeled Malware. 210-216 - Xuyang Ding, Feng Xiao, Man Zhou, Zhibo Wang:
Active Link Obfuscation to Thwart Link-flooding Attacks for Internet of Things. 217-224 - Oleg Schell, Marcel Kneib:
VALID: Voltage-Based Lightweight Intrusion Detection for the Controller Area Network. 225-232 - Peilun Wu, Nour Moustafa, Shiyi Yang, Hui Guo:
Densely Connected Residual Network for Attack Recognition. 233-242 - Guoqiang Yang, Fanyu Kong, Qiuliang Xu:
Optimized FPGA Implementation of Elliptic Curve Cryptosystem over Prime Fields. 243-249 - Kemeng Wu, Yongzheng Zhang, Tao Yin:
FTPB: A Three-stage DNS Tunnel Detection Method Based on Character Feature Extraction. 250-258 - Tianning Zhang, Miao Cai, Diming Zhang, Hao Huang:
De-randomizing the Code Segment with Timing Function Attack. 259-267 - Rory Coulter, Jun Zhang, Lei Pan, Yang Xiang:
Unmasking Windows Advanced Persistent Threat Execution. 268-276 - Changchun Yin, Hao Wang, Lu Zhou, Liming Fang:
Ciphertext-Policy Attribute-Based Encryption with Multi-Keyword Search over Medical Cloud Data. 277-284 - Chan Fan, Xiaolei Dong, Zhenfu Cao, Jiachen Shen:
VCKSCF: Efficient Verifiable Conjunctive Keyword Search Based on Cuckoo Filter for Cloud Storage. 285-292 - Xiaonan Song, Aimin Yu, Haibo Yu, Shirun Liu, Xin Bai, Lijun Cai, Dan Meng:
Program Slice based Vulnerable Code Clone Detection. 293-300 - Liu Liu, Chao Chen, Jun Zhang, Olivier Y. de Vel, Yang Xiang:
Doc2vec-based Insider Threat Detection through Behaviour Analysis of Multi-source Security Logs. 301-309 - Tiago Fernandes, Luis Dias, Miguel Correia:
C2BID: Cluster Change-Based Intrusion Detection. 310-319 - Tianlin Huo, Wenhao Wang, Pei Zhao, Yufeng Li, Tingting Wang, Mingshu Li:
TEADS: A Defense-aware Framework for Synthesizing Transient Execution Attacks. 320-327 - Benjamin Semal, Konstantinos Markantonakis, Keith Mayes, Jan Kalbantner:
One Covert Channel to Rule Them All: A Practical Approach to Data Exfiltration in the Cloud. 328-336 - Jiajin Cai, Tongxin Li, Can Huang, Xinhui Han:
ReDex: Unpacking Android Packed Apps by Executing Every Method. 337-344 - Tiago Espinha Gasiba, Ulrike Lechner, Maria Pinto-Albuquerque, Daniel Méndez Fernández:
Awareness of Secure Coding Guidelines in the Industry - A first data analysis. 345-352 - Junaid Haseeb, Masood Mansoori, Harith Al-Sahaf, Ian Welch:
IoT Attacks: Features Identification and Clustering. 353-360 - Hoang Hai Nguyen, David M. Nicol:
Estimating Loss Due to Cyber-attack in the Presence of Uncertainty. 361-369 - Xueying Han, Rongchao Yin, Zhigang Lu, Bo Jiang, Yuling Liu, Song Liu, Chonghua Wang, Ning Li:
STIDM: A Spatial and Temporal Aware Intrusion Detection Model. 370-377 - Xiaohui Wu, Yeping He, Qiming Zhou, Hengtai Ma, Liang He, Wenhao Wang, Liheng Chen:
Partial-SMT: Core-scheduling Protection Against SMT Contention-based Attacks. 378-385 - Guga Suri, Jianming Fu, Rui Zheng, Xinying Liu:
Family Identification of AGE-Generated Android Malware Using Tree-Based Feature. 386-393 - Muhammad Rizwan Asghar, Steven D. Galbraith, Andrea Lanzi, Giovanni Russello, Lukas Zobernig:
Towards a Theory of Special-Purpose Program Obfuscation. 394-401 - Meng Li, Qi Zhong, Leo Yu Zhang, Yajuan Du, Jun Zhang, Yong Xiang:
Protecting the Intellectual Property of Deep Neural Networks with Watermarking: The Frequency Domain Approach. 402-409 - Johannes Lauinger, Lars Baumgärtner, Anna-Katharina Wickert, Mira Mezini:
Uncovering the Hidden Dangers: Finding Unsafe Go Code in the Wild. 410-417 - Yuzong Hu, Futai Zou, Linsen Li, Ping Yi:
Traffic Classification of User Behaviors in Tor, I2P, ZeroNet, Freenet. 418-424 - Dong Qin, Shen Fu, George T. Amariucai, Daji Qiao, Yong Guan:
MAUSPAD: Mouse-based Authentication Using Segmentation-based, Progress-Adjusted DTW. 425-433 - Yu Fu, Siming Tong, Xiangyu Guo, Liang Cheng, Yang Zhang, Dengguo Feng:
Improving the Effectiveness of Grey-box Fuzzing By Extracting Program Information. 434-441 - Joe Samuel, Khalil Aalab, Jason Jaskolka:
Evaluating the Soundness of Security Metrics from Vulnerability Scoring Frameworks. 442-449 - Yi Li, Xi Xiao, Xiaogang Zhu, Xiao Chen, Sheng Wen, Bin Zhang:
SpeedNeuzz: Speed Up Neural Program Approximation with Neighbor Edge Knowledge. 450-457 - Lars Baumgärtner, Alexandra Dmitrienko, Bernd Freisleben, Alexander Gruler, Jonas Höchst, Joshua Kühlberg, Mira Mezini, Richard Mitev, Markus Miettinen, Anel Muhamedagic, Thien Duc Nguyen, Alvar Penning, Dermot Frederik Pustelnik, Filipp Roos, Ahmad-Reza Sadeghi, Michael Schwarz, Christian Uhl:
Mind the GAP: Security & Privacy Risks of Contact Tracing Apps. 458-467 - Mingkai Tong, Guo Li, Runzi Zhang, Jianxin Xue, Wenmao Liu, Jiahai Yang:
Far from classification algorithm: dive into the preprocessing stage in DGA detection. 468-474 - Minghui Li, Yang Li, Liming Fang:
ELPPS: An Enhanced Location Privacy Preserving Scheme in Mobile Crowd-Sensing Network Based on Edge Computing. 475-482 - Jordan Stobbs, Biju Issac, Seibu Mary Jacob:
Phishing Web Page Detection Using Optimised Machine Learning. 483-490 - Nan Messe, Vanea Chiprianov, Nicolas Belloir, Jamal El Hachem, Régis Fleurquin, Salah Sadou:
Asset-Oriented Threat Modeling. 491-501 - Yipeng Zhang, Zhonghao Sun, Liqun Yang, Zhoujun Li, Qiang Zeng, Yueying He, Xiaoming Zhang:
A11 Your PLCs Belong to Me: ICS Ransomware Is Realistic. 502-509 - Haoqi Wu, Zhengxuan Yu, Dapeng Huang, Haodong Zhang, Weili Han:
Automated Enforcement of the Principle of Least Privilege over Data Source Access. 510-517 - Chengqian Guo, Quanwei Cai, Qiongxiao Wang, Jingqiang Lin:
Extending Registration and Authentication Processes of FIDO2 External Authenticator with QR Codes. 518-529 - Zhiyu Xu, Lin Yang, Ziyuan Wang, Sheng Wen, Rob Hanson, Shiping Chen, Yang Xiang:
BHDA - A Blockchain-Based Hierarchical Data Access Model for Financial Services. 530-538 - Defu Cao, Jing Huang, Xuanyu Zhang, Xianhua Liu:
FTCLNet: Convolutional LSTM with Fourier Transform for Vulnerability Detection. 539-546 - Luqi Zhu, Jin Wang, Lianmin Shi, Jingya Zhou, Kejie Lu, Jianping Wang:
Secure Coded Matrix Multiplication against Cooperative Attack in Edge Computing. 547-556 - Junaid Haseeb, Masood Mansoori, Ian Welch:
A Measurement Study of IoT-Based Attacks Using IoT Kill Chain. 557-567 - Tengfei Li, Xiaohong Chen, Haiying Sun, Jing Liu, Jiajia Yang, Chenchen Yang, Junfeng Sun:
Modeling and Verification of Spatio-Temporal Intelligent Transportation Systems. 568-575 - Tianyi Zhang, Jian Wang:
Secure Outsourcing Algorithms of Modular Exponentiations in Edge Computing. 576-583 - Xuren Wang, Mengbo Xiong, Yali Luo, Ning Li, Zhengwei Jiang, Zihan Xiong:
Joint Learning for Document-Level Threat Intelligence Relation Extraction and Coreference Resolution Based on GCN. 584-591 - Francis Onodueze, Darsana Josyula:
Anomaly Detection on MIL-STD-1553 Dataset using Machine Learning Algorithms. 592-598
Privacy Track
- Meng Li, Jianbo Gao, Yifei Chen, Jingcheng Zhao, Mamoun Alazab:
Privacy-Preserving Ride-Hailing with Verifiable Order-Linking in Vehicular Networks. 599-606 - Eduardo Gomes, Igor Zavalyshyn, Nuno Santos, João Silva, Axel Legay:
Flowverine: Leveraging Dataflow Programming for Building Privacy-Sensitive Android Applications. 607-614 - Chen Tian, Yazhe Wang, Peng Liu, Yu Wang, Ruirui Dai, Anyuan Zhou, Zhen Xu:
Prihook: Differentiated context-aware hook placement for different owners' smartphones. 615-622 - Wen Huang, Shijie Zhou, Tianqing Zhu, Yongjian Liao, Chunjiang Wu, Shilin Qiu:
Improving Laplace Mechanism of Differential Privacy by Personalized Sampling. 623-630 - De Li, Jinyan Wang, Zhou Tan, Xianxian Li, Yuhang Hu:
Differential Privacy Preservation in Interpretable Feedforward-Designed Convolutional Neural Networks. 631-638 - Zhihao Zheng, Zhenfu Cao, Jiachen Shen:
Practical and Secure Circular Range Search on Private Spatial Data. 639-645 - Hugo Sbaï, Jassim Happa, Michael Goldsmith, Samy Meftali:
Dataset Construction and Analysis of Screenshot Malware. 646-655 - Shiwei Xu, Xiaowen Cai, Yizhi Zhao, Zhengwei Ren, Lingjuan Wu, Huanguo Zhang, Le Du, Yan Tong:
zkrpChain: Privacy-preserving Data Auditing for Consortium Blockchains Based on Zero-knowledge Range Proofs. 656-663 - Thomas Cory, Philip Raschke, Axel Küpper:
Heimdall: Illuminating the Hidden Depths of Third-party Tracking in Android Applications. 676-682 - Tianyuan Liu, Hongpeng Guo, Claudiu Danilov, Klara Nahrstedt:
A Privacy-preserving Data Collection and Processing Framework for Third-party UAV Services. 683-690 - Mina Sheikhalishahi, Nicola Zannone:
On the Comparison of Classifiers' Construction over Private Inputs. 691-698 - Muqian Chen, Xuebin Wang, Jinqiao Shi, Can Zhao, Meiqi Wang, Binxing Fang:
Napping Guard: Deanonymizing Tor Hidden Service in a Stealthy Way. 699-706 - Linpeng Lu, Ning Ding:
Multi-Party Private Set Intersection in Vertical Federated Learning. 707-714
Forensics and Analytics Track
- Fucheng Liu, Yu Wen, Yanna Wu, Shuangshuang Liang, Xihe Jiang, Dan Meng:
MLTracer: Malicious Logins Detection System via Graph Neural Network. 715-726 - Nour Moustafa, Mohiuddin Ahmed, Sherif Ahmed:
Data Analytics-enabled Intrusion Detection: Evaluations of ToN IoT Linux Datasets. 727-735 - Runzi Zhang, Mingkai Tong, Lei Chen, Jianxin Xue, Wenmao Liu, Feng Xie:
CMIRGen: Automatic Signature Generation Algorithm for Malicious Network Traffic. 736-743 - Xiaojian Li, Bo Li, Hailan Wang, Jiajia Zhang, Haopeng Yang, Jingang Liu:
A Novel Violation Tracing Model for Cloud Service Accountability. 744-750 - Lida Ketsbaia, Biju Issac, Xiaomin Chen:
Detection of Hate Tweets using Machine Learning and Deep Learning. 751-758 - Jack Hance, Jeremy Straub:
Use of Bash History Novelty Detection for Identification of Similar Source Attack Generation. 759-766 - Adnan Anwar, S. M. Abu Adnan Abir:
Measurement Unit Placement Against Injection Attacks for the Secured Operation of an IIoT-based Smart Grid. 767-774 - Yen-Ting Lee, Tao Ban, Tzu-Ling Wan, Shin-Ming Cheng, Ryoichi Isawa, Takeshi Takahashi, Daisuke Inoue:
Cross Platform IoT- Malware Family Classification based on Printable Strings. 775-784 - Yuqing Pan, Xi Xiao, Guangwu Hu, Bin Zhang, Qing Li, Haitao Zheng:
ALBFL: A Novel Neural Ranking Model for Software Fault Localization via Combining Static and Dynamic Features. 785-792 - Behzad Asadi, Vijay Varadharajan:
Towards a Robust Classifier: An MDL-Based Method for Generating Adversarial Examples. 793-801 - Matthew J. Ryan, Morshed U. Chowdhury, Frank Jiang, Robin Doss:
Avoiding Geographic Regions in Tor. 802-809 - Paul Black, Iqbal Gondal, Peter Vamplew, Arun Lakhotia:
Identifying Cross-Version Function Similarity Using Contextual Features. 810-818 - Yunan Zhang, Aidong Xu, Yixin Jiang:
Scalable and Accurate Binary Search Method based on Simhash and Partial Trace. 818-826 - Taejun Choi, Guangdong Bai, Ryan K. L. Ko, Naipeng Dong, Wenlu Zhang, Shunyao Wang:
An Analytics Framework for Heuristic Inference Attacks against Industrial Control Systems. 827-835 - Shinelle Hutchinson, Neesha Shantaram, Umit Karabiyik:
Forensic Analysis of Dating Applications on Android and iOS Devices. 836-847 - Nour Moustafa, Marwa Keshk, Essam Soliman Debie, Helge Janicke:
Federated TON_IoT Windows Datasets for Evaluating AI-based Security Applications. 848-855 - Sara Salim, Nour Moustafa, Benjamin P. Turnbull:
Privacy-Encoding Models for Preserving Utility of Machine Learning Algorithms in Social Media. 856-863
Emerging Technologies Track
- Mengxiang Wan, Hanbing Yao, Xin Yan:
Generation of malicious webpage samples based on GAN. 864-869 - Dali Zhu, Yuchen Ma, Yinlong Liu:
A Flexible Attentive Temporal Graph Networks for Anomaly Detection in Dynamic Networks. 870-875 - Lei Xu, Lin Chen, Zhimin Gao, Han-Yee Kim, Taeweon Suh, Weidong Shi:
FPGA based Blockchain System for Industrial IoT. 876-883 - Handong Cui, Tsz Hon Yuen:
Address-based Signature. 884-891 - Shunsheng Zhang, Yuling Luo, Lvchen Cao, Junxiu Liu:
Cryptanalysis of a Chaos-based Block Cryptosystem Using Multiple Samples Correlation Power Analysis. 892-898 - Giulio Zizzo, Chris Hankin, Sergio Maffeis, Kevin Jones:
Adversarial Attacks on Time-Series Intrusion Detection for Industrial Control Systems. 899-910 - Alban Siffer, Pierre-Alain Fouque, Alexandre Termier, Christine Largouët:
Netspot: a simple Intrusion Detection System with statistical learning. 911-918 - Zhongkai Tong, Ziyuan Zhu, Zhanpeng Wang, Limin Wang, Yusha Zhang, Yuxin Liu:
Cache side-channel attacks detection based on machine learning. 919-926 - Xiaohui Hu, Rui Sun, Kejia Xu, Yongzheng Zhang, Peng Chang:
Exploit Internal Structural Information for IoT Malware Detection Based on Hierarchical Transformer Model. 927-934 - Paul Walther, Thorsten Strufe:
Inference Attacks on Physical Layer Channel State Information. 935-942 - Enzo Tartaglione, Marco Grangetto:
A non-discriminatory approach to ethical deep learning. 943-950 - Amjad Qashlan, Priyadarsi Nanda, Xiangjian He:
Security and Privacy Implementation in Smart Home: Attributes Based Access Control and Smart Contracts. 951-958