


Остановите войну!
for scientists:


default search action
19th TrustCom 2020: Guangzhou, China
- Guojun Wang, Ryan K. L. Ko, Md. Zakirul Alam Bhuiyan, Yi Pan:
19th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2020, Guangzhou, China, December 29, 2020 - January 1, 2021. IEEE 2020, ISBN 978-1-6654-0392-4
Trust Track
- Xuewei Feng, Dongxia Wang, Zhechao Lin, Xiaohui Kuang, Gang Zhao:
Enhancing Randomization Entropy of x86-64 Code while Preserving Semantic Consistency. 1-12 - Xin Tang, Linna Zhou, Dan Liu, Boyu Liu, Xinyi Lü:
Reversible data hiding based on improved rhombus predictor and prediction error expansion. 13-21 - Dapeng Qu, Jiankun Zhang, Zhenhuan Hou, Ming Wan, Bo Dong:
A Trust Routing Scheme based on Identification of Non-complete Cooperative Nodes in Mobile Peer-to-Peer Networks. 22-29 - Jingbin Liu, Yu Qin, Dengguo Feng:
SeRoT: A Secure Runtime System on Trusted Execution Environments. 30-37 - Young Choon Lee, Jayden King
, Young Ki Kim, Seok-Hee Hong:
Robust Scheduling for Large-Scale Distributed Systems. 38-45 - Chengying Mao, Linlin Wen, Tsong Yueh Chen:
Adaptive Random Test Case Generation Based on Multi-Objective Evolutionary Search. 46-53 - Wei Yang, Anmin Fu
, Hailong Zhang, Chanying Huang:
Improving Efficiency of Key Enumeration Based on Side-Channel Analysis. 54-61 - Marcin Plata, Piotr Syga
:
Robust Spatial-spread Deep Neural Image Watermarking. 62-70 - Ha Xuan Son, Hai Trieu Le, Nadia Metoui
, Nghia Duong-Trung:
DeM-CoD: Novel Access-Control-Based Cash on Delivery Mechanism for Decentralized Marketplace. 71-78 - Ran Li, Jiaqi Yin, Huibiao Zhu:
Modeling and Analysis of RabbitMQ Using UPPAAL. 79-86 - Xiaohu Zhou, Vitor Jesus
, Yonghao Wang
, Mark B. Josephs
:
User-Controlled, Auditable, Cross-Jurisdiction Sharing of Healthcare Data Mediated by a Public Blockchain. 87-96 - Ming Liu, Zhi Xue, Xiangjian He
:
A Unified Host-based Intrusion Detection Framework using Spark in Cloud. 97-103 - Yanshul Sharma, Zinea Das, Alok Das, Sanjay Moulik:
TA-HRT: A temperature-aware scheduler for heterogeneous real-time multicore systems. 104-111 - Yin Liu
, Eli Tilevich:
Reducing the Price of Protection: Identifying and Migrating Non-Sensitive Code in TEE. 112-120 - Wentao Xie, Peng Wu:
Fairness Testing of Machine Learning Models Using Deep Reinforcement Learning. 121-128
Security Track
- Isaac Matthews
, John C. Mace, Sadegh Soudjani, Aad van Moorsel:
Cyclic Bayesian Attack Graphs: A Systematic Computational Approach. 129-136 - Qi Feng, Debiao He, Min Luo, Zengxiang Li, Kim-Kwang Raymond Choo:
Practical Secure Two-Party EdDSA Signature Generation with Key Protection and Applications in Cryptocurrency. 137-147 - Roberto Dillon, Shailey Chawla
, Dayana Hristova, Barbara Göbl, Suzana Jovicic:
Password Policies vs. Usability: When Do Users Go "Bananas"? 148-153 - Yu Ding, Shupeng Wang, Jian Xing, Xiaoyu Zhang, ZiSen Oi, Ge Fu, Qian Qiang, Haoliang Sun, Jianyu Zhang:
Malware Classification on Imbalanced Data through Self-Attention. 154-161 - Ning Zhang, Zhiqiang Lv, Yanlin Zhang, Haiyang Li, Yixin Zhang, Weiqing Huang:
Novel design of Hardware Trojan: A generic approach for defeating testability based detection. 162-173 - Munir Geden, Kasper Rasmussen:
TRUVIN: Lightweight Detection of Data-Oriented Attacks Through Trusted Value Integrity. 174-181 - Ioana Boureanu, Daniel Migault, Stere Preda, Hyame Assem Alamedine, Sanjay Mishra, Frederic Fieau, Mohammad Mannan:
LURK: Server-Controlled TLS Delegation. 182-193 - Fang Li, Ziyuan Zhu, Chao Yan, Bowen Chen, Dan Meng:
Malware Detection Based on Term Frequency Analysis of GPRs Features. 194-201 - Radu Ciucanu, Pascal Lafourcade, Marius Lombard-Platet, Marta Soare:
Secure Outsourcing of Multi-Armed Bandits. 202-209 - Yannan Liu, Yabin Lai, Kaizhi Wei, Liang Gu, Zhengzheng Yan:
NLabel: An Accurate Familial Clustering Framework for Large-scale Weakly-labeled Malware. 210-216 - Xuyang Ding, Feng Xiao, Man Zhou
, Zhibo Wang:
Active Link Obfuscation to Thwart Link-flooding Attacks for Internet of Things. 217-224 - Oleg Schell, Marcel Kneib:
VALID: Voltage-Based Lightweight Intrusion Detection for the Controller Area Network. 225-232 - Peilun Wu
, Nour Moustafa
, Shiyi Yang, Hui Guo:
Densely Connected Residual Network for Attack Recognition. 233-242 - Guoqiang Yang, Fanyu Kong, Qiuliang Xu:
Optimized FPGA Implementation of Elliptic Curve Cryptosystem over Prime Fields. 243-249 - Kemeng Wu, Yongzheng Zhang, Tao Yin:
FTPB: A Three-stage DNS Tunnel Detection Method Based on Character Feature Extraction. 250-258 - Tianning Zhang, Miao Cai, Diming Zhang, Hao Huang:
De-randomizing the Code Segment with Timing Function Attack. 259-267 - Rory Coulter, Jun Zhang, Lei Pan, Yang Xiang
:
Unmasking Windows Advanced Persistent Threat Execution. 268-276 - Changchun Yin, Hao Wang, Lu Zhou, Liming Fang:
Ciphertext-Policy Attribute-Based Encryption with Multi-Keyword Search over Medical Cloud Data. 277-284 - Chan Fan, Xiaolei Dong, Zhenfu Cao, Jiachen Shen:
VCKSCF: Efficient Verifiable Conjunctive Keyword Search Based on Cuckoo Filter for Cloud Storage. 285-292 - Xiaonan Song, Aimin Yu, Haibo Yu, Shirun Liu, Xin Bai, Lijun Cai, Dan Meng:
Program Slice based Vulnerable Code Clone Detection. 293-300 - Liu Liu, Chao Chen, Jun Zhang, Olivier Y. de Vel, Yang Xiang
:
Doc2vec-based Insider Threat Detection through Behaviour Analysis of Multi-source Security Logs. 301-309 - Tiago Fernandes, Luis Dias, Miguel Correia:
C2BID: Cluster Change-Based Intrusion Detection. 310-319 - Tianlin Huo, Wenhao Wang, Pei Zhao, Yufeng Li, Tingting Wang, Mingshu Li:
TEADS: A Defense-aware Framework for Synthesizing Transient Execution Attacks. 320-327 - Benjamin Semal, Konstantinos Markantonakis, Keith Mayes, Jan Kalbantner
:
One Covert Channel to Rule Them All: A Practical Approach to Data Exfiltration in the Cloud. 328-336 - Jiajin Cai, Tongxin Li, Can Huang, Xinhui Han:
ReDex: Unpacking Android Packed Apps by Executing Every Method. 337-344 - Tiago Espinha Gasiba, Ulrike Lechner, Maria Pinto-Albuquerque, Daniel Méndez Fernández
:
Awareness of Secure Coding Guidelines in the Industry - A first data analysis. 345-352 - Junaid Haseeb
, Masood Mansoori, Harith Al-Sahaf
, Ian Welch:
IoT Attacks: Features Identification and Clustering. 353-360 - Hoang Hai Nguyen, David M. Nicol:
Estimating Loss Due to Cyber-attack in the Presence of Uncertainty. 361-369 - Xueying Han, Rongchao Yin, Zhigang Lu, Bo Jiang, Yuling Liu, Song Liu, Chonghua Wang, Ning Li:
STIDM: A Spatial and Temporal Aware Intrusion Detection Model. 370-377 - Xiaohui Wu, Yeping He, Qiming Zhou, Hengtai Ma, Liang He, Wenhao Wang, Liheng Chen:
Partial-SMT: Core-scheduling Protection Against SMT Contention-based Attacks. 378-385 - Guga Suri, Jianming Fu, Rui Zheng, Xinying Liu:
Family Identification of AGE-Generated Android Malware Using Tree-Based Feature. 386-393 - Muhammad Rizwan Asghar, Steven D. Galbraith, Andrea Lanzi, Giovanni Russello, Lukas Zobernig:
Towards a Theory of Special-Purpose Program Obfuscation. 394-401 - Meng Li, Qi Zhong
, Leo Yu Zhang
, Yajuan Du, Jun Zhang, Yong Xiang:
Protecting the Intellectual Property of Deep Neural Networks with Watermarking: The Frequency Domain Approach. 402-409 - Johannes Lauinger, Lars Baumgärtner, Anna-Katharina Wickert, Mira Mezini:
Uncovering the Hidden Dangers: Finding Unsafe Go Code in the Wild. 410-417 - Yuzong Hu, Futai Zou, Linsen Li, Ping Yi:
Traffic Classification of User Behaviors in Tor, I2P, ZeroNet, Freenet. 418-424 - Dong Qin, Shen Fu, George T. Amariucai, Daji Qiao, Yong Guan:
MAUSPAD: Mouse-based Authentication Using Segmentation-based, Progress-Adjusted DTW. 425-433 - Yu Fu, Siming Tong, Xiangyu Guo, Liang Cheng, Yang Zhang, Dengguo Feng:
Improving the Effectiveness of Grey-box Fuzzing By Extracting Program Information. 434-441 - Joe Samuel
, Khalil Aalab, Jason Jaskolka
:
Evaluating the Soundness of Security Metrics from Vulnerability Scoring Frameworks. 442-449 - Yi Li, Xi Xiao, Xiaogang Zhu
, Xiao Chen
, Sheng Wen, Bin Zhang:
SpeedNeuzz: Speed Up Neural Program Approximation with Neighbor Edge Knowledge. 450-457 - Lars Baumgärtner, Alexandra Dmitrienko, Bernd Freisleben
, Alexander Gruler, Jonas Höchst
, Joshua Kühlberg, Mira Mezini, Richard Mitev, Markus Miettinen, Anel Muhamedagic, Thien Duc Nguyen, Alvar Penning, Dermot Frederik Pustelnik, Filipp Roos, Ahmad-Reza Sadeghi, Michael Schwarz, Christian Uhl:
Mind the GAP: Security & Privacy Risks of Contact Tracing Apps. 458-467 - Mingkai Tong, Guo Li, Runzi Zhang, Jianxin Xue, Wenmao Liu, Jiahai Yang:
Far from classification algorithm: dive into the preprocessing stage in DGA detection. 468-474 - Minghui Li, Yang Li, Liming Fang:
ELPPS: An Enhanced Location Privacy Preserving Scheme in Mobile Crowd-Sensing Network Based on Edge Computing. 475-482 - Jordan Stobbs, Biju Issac
, Seibu Mary Jacob:
Phishing Web Page Detection Using Optimised Machine Learning. 483-490 - Nan Messe, Vanea Chiprianov, Nicolas Belloir
, Jamal El Hachem, Régis Fleurquin, Salah Sadou:
Asset-Oriented Threat Modeling. 491-501 - Yipeng Zhang, Zhonghao Sun, Liqun Yang, Zhoujun Li
, Qiang Zeng, Yueying He, Xiaoming Zhang:
A11 Your PLCs Belong to Me: ICS Ransomware Is Realistic. 502-509 - Haoqi Wu, Zhengxuan Yu, Dapeng Huang, Haodong Zhang, Weili Han:
Automated Enforcement of the Principle of Least Privilege over Data Source Access. 510-517 - Chengqian Guo, Quanwei Cai, Qiongxiao Wang, Jingqiang Lin:
Extending Registration and Authentication Processes of FIDO2 External Authenticator with QR Codes. 518-529 - Zhiyu Xu, Lin Yang, Ziyuan Wang, Sheng Wen, Rob Hanson, Shiping Chen
, Yang Xiang
:
BHDA - A Blockchain-Based Hierarchical Data Access Model for Financial Services. 530-538 - Defu Cao, Jing Huang, Xuanyu Zhang, Xianhua Liu:
FTCLNet: Convolutional LSTM with Fourier Transform for Vulnerability Detection. 539-546 - Luqi Zhu, Jin Wang, Lianmin Shi, Jingya Zhou, Kejie Lu, Jianping Wang:
Secure Coded Matrix Multiplication against Cooperative Attack in Edge Computing. 547-556 - Junaid Haseeb
, Masood Mansoori, Ian Welch:
A Measurement Study of IoT-Based Attacks Using IoT Kill Chain. 557-567 - Tengfei Li
, Xiaohong Chen, Haiying Sun, Jing Liu, Jiajia Yang, Chenchen Yang, Junfeng Sun:
Modeling and Verification of Spatio-Temporal Intelligent Transportation Systems. 568-575 - Tianyi Zhang, Jian Wang:
Secure Outsourcing Algorithms of Modular Exponentiations in Edge Computing. 576-583 - Xuren Wang, Mengbo Xiong, Yali Luo, Ning Li, Zhengwei Jiang, Zihan Xiong:
Joint Learning for Document-Level Threat Intelligence Relation Extraction and Coreference Resolution Based on GCN. 584-591 - Francis Onodueze, Darsana Josyula:
Anomaly Detection on MIL-STD-1553 Dataset using Machine Learning Algorithms. 592-598
Privacy Track
- Meng Li, Jianbo Gao, Yifei Chen, Jingcheng Zhao, Mamoun Alazab
:
Privacy-Preserving Ride-Hailing with Verifiable Order-Linking in Vehicular Networks. 599-606 - Eduardo Gomes, Igor Zavalyshyn, Nuno Santos
, João Silva
, Axel Legay:
Flowverine: Leveraging Dataflow Programming for Building Privacy-Sensitive Android Applications. 607-614 - Chen Tian, Yazhe Wang, Peng Liu, Yu Wang, Ruirui Dai, Anyuan Zhou, Zhen Xu:
Prihook: Differentiated context-aware hook placement for different owners' smartphones. 615-622 - Wen Huang, Shijie Zhou, Tianqing Zhu, Yongjian Liao, Chunjiang Wu, Shilin Qiu:
Improving Laplace Mechanism of Differential Privacy by Personalized Sampling. 623-630 - De Li, Jinyan Wang, Zhou Tan, Xianxian Li, Yuhang Hu:
Differential Privacy Preservation in Interpretable Feedforward-Designed Convolutional Neural Networks. 631-638 - Zhihao Zheng, Zhenfu Cao, Jiachen Shen:
Practical and Secure Circular Range Search on Private Spatial Data. 639-645 - Hugo Sbaï, Jassim Happa, Michael Goldsmith, Samy Meftali:
Dataset Construction and Analysis of Screenshot Malware. 646-655 - Shiwei Xu, Xiaowen Cai, Yizhi Zhao, Zhengwei Ren, Lingjuan Wu, Huanguo Zhang, Le Du, Yan Tong:
zkrpChain: Privacy-preserving Data Auditing for Consortium Blockchains Based on Zero-knowledge Range Proofs. 656-663 - Thomas Cory, Philip Raschke, Axel Küpper:
Heimdall: Illuminating the Hidden Depths of Third-party Tracking in Android Applications. 676-682 - Tianyuan Liu, Hongpeng Guo, Claudiu Danilov, Klara Nahrstedt:
A Privacy-preserving Data Collection and Processing Framework for Third-party UAV Services. 683-690 - Mina Sheikhalishahi, Nicola Zannone
:
On the Comparison of Classifiers' Construction over Private Inputs. 691-698 - Muqian Chen, Xuebin Wang, Jinqiao Shi, Can Zhao, Meiqi Wang, Binxing Fang:
Napping Guard: Deanonymizing Tor Hidden Service in a Stealthy Way. 699-706 - Linpeng Lu, Ning Ding:
Multi-Party Private Set Intersection in Vertical Federated Learning. 707-714
Forensics and Analytics Track
- Fucheng Liu, Yu Wen, Yanna Wu, Shuangshuang Liang, Xihe Jiang, Dan Meng:
MLTracer: Malicious Logins Detection System via Graph Neural Network. 715-726 - Nour Moustafa, Mohiuddin Ahmed
, Sherif Ahmed:
Data Analytics-enabled Intrusion Detection: Evaluations of ToN IoT Linux Datasets. 727-735 - Runzi Zhang, Mingkai Tong, Lei Chen, Jianxin Xue, Wenmao Liu, Feng Xie:
CMIRGen: Automatic Signature Generation Algorithm for Malicious Network Traffic. 736-743 - Xiaojian Li, Bo Li, Hailan Wang, Jiajia Zhang, Haopeng Yang
, Jingang Liu:
A Novel Violation Tracing Model for Cloud Service Accountability. 744-750 - Lida Ketsbaia, Biju Issac
, Xiaomin Chen:
Detection of Hate Tweets using Machine Learning and Deep Learning. 751-758 - Jack Hance, Jeremy Straub:
Use of Bash History Novelty Detection for Identification of Similar Source Attack Generation. 759-766 - Adnan Anwar, S. M. Abu Adnan Abir:
Measurement Unit Placement Against Injection Attacks for the Secured Operation of an IIoT-based Smart Grid. 767-774 - Yen-Ting Lee, Tao Ban, Tzu-Ling Wan, Shin-Ming Cheng, Ryoichi Isawa, Takeshi Takahashi, Daisuke Inoue:
Cross Platform IoT- Malware Family Classification based on Printable Strings. 775-784 - Yuqing Pan, Xi Xiao, Guangwu Hu, Bin Zhang, Qing Li, Haitao Zheng:
ALBFL: A Novel Neural Ranking Model for Software Fault Localization via Combining Static and Dynamic Features. 785-792 - Behzad Asadi, Vijay Varadharajan:
Towards a Robust Classifier: An MDL-Based Method for Generating Adversarial Examples. 793-801 - Matthew J. Ryan, Morshed U. Chowdhury, Frank Jiang, Robin Doss
:
Avoiding Geographic Regions in Tor. 802-809 - Paul Black
, Iqbal Gondal, Peter Vamplew, Arun Lakhotia:
Identifying Cross-Version Function Similarity Using Contextual Features. 810-818 - Yunan Zhang, Aidong Xu, Yixin Jiang:
Scalable and Accurate Binary Search Method based on Simhash and Partial Trace. 818-826 - Taejun Choi, Guangdong Bai, Ryan K. L. Ko, Naipeng Dong, Wenlu Zhang, Shunyao Wang
:
An Analytics Framework for Heuristic Inference Attacks against Industrial Control Systems. 827-835 - Shinelle Hutchinson, Neesha Shantaram, Umit Karabiyik:
Forensic Analysis of Dating Applications on Android and iOS Devices. 836-847 - Nour Moustafa
, Marwa Keshk, Essam Soliman Debie, Helge Janicke:
Federated TON_IoT Windows Datasets for Evaluating AI-based Security Applications. 848-855 - Sara Salim, Nour Moustafa, Benjamin P. Turnbull:
Privacy-Encoding Models for Preserving Utility of Machine Learning Algorithms in Social Media. 856-863
Emerging Technologies Track
- Mengxiang Wan, Hanbing Yao, Xin Yan:
Generation of malicious webpage samples based on GAN. 864-869 - Dali Zhu, Yuchen Ma, Yinlong Liu:
A Flexible Attentive Temporal Graph Networks for Anomaly Detection in Dynamic Networks. 870-875 - Lei Xu, Lin Chen, Zhimin Gao, Han-Yee Kim, Taeweon Suh, Weidong Shi:
FPGA based Blockchain System for Industrial IoT. 876-883 - Handong Cui
, Tsz Hon Yuen:
Address-based Signature. 884-891 - Shunsheng Zhang, Yuling Luo, Lvchen Cao, Junxiu Liu:
Cryptanalysis of a Chaos-based Block Cryptosystem Using Multiple Samples Correlation Power Analysis. 892-898 - Giulio Zizzo, Chris Hankin
, Sergio Maffeis
, Kevin Jones:
Adversarial Attacks on Time-Series Intrusion Detection for Industrial Control Systems. 899-910 - Alban Siffer, Pierre-Alain Fouque
, Alexandre Termier, Christine Largouët:
Netspot: a simple Intrusion Detection System with statistical learning. 911-918 - Zhongkai Tong, Ziyuan Zhu, Zhanpeng Wang, Limin Wang, Yusha Zhang, Yuxin Liu:
Cache side-channel attacks detection based on machine learning. 919-926 - Xiaohui Hu, Rui Sun, Kejia Xu, Yongzheng Zhang, Peng Chang:
Exploit Internal Structural Information for IoT Malware Detection Based on Hierarchical Transformer Model. 927-934 - Paul Walther, Thorsten Strufe:
Inference Attacks on Physical Layer Channel State Information. 935-942 - Enzo Tartaglione, Marco Grangetto:
A non-discriminatory approach to ethical deep learning. 943-950 - Amjad Qashlan, Priyadarsi Nanda, Xiangian He:
Security and Privacy Implementation in Smart Home: Attributes Based Access Control and Smart Contracts. 951-958 - Rahma Mukta, James Martens, Hye-Young Paik
, Qinghua Lu
, Salil S. Kanhere:
Blockchain-based Verifiable Credential Sharing with Selective Disclosure. 959-966