Abstract is missing.
- The Certification PanaceaRigo Wenning. 5
- Large Language Models for Code Obfuscation Evaluation of the Obfuscation Capabilities of OpenAI's GPT-3.5 on C Source CodePatrick Kochberger, Maximilian Gramberger, Sebastian Schrittwieser, Caroline Lawitschka, Edgar R. Weippl. 7-19 [doi]
- MEMES: Memory Encryption-Based Memory Safety on Commodity HardwareDavid Schrammel, Salmin Sultana, Karanvir Grewal, Michael LeMay, David M. Durham, Martin Unterguggenberger, Pascal Nasahl, Stefan Mangard. 25-36 [doi]
- K-Anonymous Privacy Preserving Manifold LearningSonakshi Garg, Vicenç Torra. 37-48 [doi]
- AIS Authentication Using Certificateless CryptographyAxel Rousselot, Nora Cuppens, Samra Bouakkaz. 49-61 [doi]
- CAPoW: Context-Aware AI-Assisted Proof of Work Based DDoS DefenseTrisha Chakraborty, Shaswata Mitra, Sudip Mittal. 62-72 [doi]
- Adapting P2P Mixnets to Provide Anonymity for Uplink-Intensive ApplicationsFrancesco Buccafurri, Vincenzo De Angelis, Sara Lazzaro. 73-84 [doi]
- Classical to Post-Quantum Secure ABE-IBE Proxy Re-Encryption SchemeMuhammad Nauman Khan, Asha Rao, Seyit Camtepe, Josef Pieprzyk. 85-98 [doi]
- ZT-NIDS: Zero Trust, Network Intrusion Detection SystemAbeer Z. Alalmaie, Priyadarsi Nanda, Xiangjian He. 99-110 [doi]
- On the Effectiveness of Re-Identification Attacks and Local Differential Privacy-Based Solutions for Smart Meter DataZeynep Sila Kaya, Mehmet Emre Gursoy. 111-122 [doi]
- A First Appraisal of Cryptographic Mechanisms for the Selective Disclosure of Verifiable CredentialsAndrea Flamini, Silvio Ranise, Giada Sciarretta, Mario Scuro, Amir Sharif, Alessandro Tomasi 0001. 123-134 [doi]
- BeeHIVE: Behavioral Biometric System Based on Object Interactions in Smart EnvironmentsKlaudia Krawiecka, Simon Birnbach, Simon Eberz, Ivan Martinovic. 135-146 [doi]
- Griffin: Towards Mixed Multi-Key Homomorphic EncryptionThomas Schneider 0003, Hossein Yalame, Michael Yonli. 147-158 [doi]
- Informed Consent as Patient Driven Policy for Clinical Diagnosis and Treatment: A Smart Contract Based ApproachMd. Al-Amin, Amani Altarawneh, Indrajit Ray. 159-170 [doi]
- Using Untrusted and Unreliable Cloud Providers to Obtain Private EmailNicolas Chiapputo, Yvo Desmedt, Kirill Morozov. 171-182 [doi]
- Towards Usable Scoring of Common WeaknessesOlutola Adebiyi, Massimiliano Albanese. 183-191 [doi]
- Heterogeneous Graph Storage and Leakage Prevention for Data CooperativesMark Dockendorf, Ram Dantu. 192-205 [doi]
- Generic Blockchain on Generic Human BehaviorClémentine Gritti, Frédéric A. Hayek, Pascal Lafourcade 0001. 206-217 [doi]
- Smart Bulbs Can Be Hacked to Hack into Your HouseholdDavide Bonaventura, Sergio Esposito, Giampaolo Bella. 218-229 [doi]
- Optimizing Attribute-Based Encryption for Circuits Using Compartmented Access StructuresAlexandru Ionita. 230-241 [doi]
- RSSI-Based Fingerprinting of Bluetooth Low Energy DevicesGuillaume Gagnon, Sébastien Gambs, Mathieu Cunche. 242-253 [doi]
- Receipt-Free Electronic Voting from zk-SNARKMaryam Sheikhi, Rosario Giustolisi, Carsten Schürmann. 254-266
- Anomaly-Based Intrusion Detection System for DDoS Attack with Deep Learning TechniquesDavide Agostinello, Angelo Genovese, Vincenzo Piuri. 267-275 [doi]
- Privacy Protection of Synthetic Smart Grid Data Simulated via Generative Adversarial NetworksKayode S. Adewole, Vicenç Torra. 279-286 [doi]
- JShelter: Give Me My Browser BackLibor Polcák, Marek Salon, Giorgio Maone, Radek Hranický, Michael McMahon. 287-294 [doi]
- Threshold Cryptosystems Based on 2^k-th Power Residue SymbolsGeorge Teseleanu. 295-302 [doi]
- Improvement of Winternitz OTS with a Novel Fingerprinting FunctionMotonari Honda, Yuichi Kaji. 303-311 [doi]
- Lessons Learned: Defending Against Property Inference AttacksJoshua Stock, Jens Wettlaufer, Daniel Demmler, Hannes Federrath. 312-323 [doi]
- When the Few Outweigh the Many: Illicit Content Recognition with Few-Shot LearningGiuseppe Cascavilla, Gemma Catolino, Mauro Conti, D. Mellios, Damian A. Tamburri. 324-334 [doi]
- Context-Aware Behavioral Fingerprinting of IoT Devices via Network Traffic AnalysisArjun Prasad, Kevin Kanichery Biju, Soumya Somani, Barsha Mitra. 335-344
- One to Bind Them: Binding Verifiable Credentials to User AttributesAlexander Mühle, Katja Assaf, Christoph Meinel. 345-352 [doi]
- A Note on a CBC-Type Mode of OperationGeorge Teseleanu. 353-360 [doi]
- On the Security of the Novel Authentication Scheme for UAV-Ground Station and UAV-UAV CommunicationMustapha Benssalah, Karim Drouiche. 361-368 [doi]
- SEBDA: A Secure and Efficient Blockchain Based Data Aggregation SchemeSehrish Shafeeq, Mathias Fischer 0001. 369-376 [doi]
- Risk-Based Illegal Information Flow Detection in the IIoTArgiro Anagnostopoulou, Ioannis Mavridis, Dimitris Gritzalis. 377-384 [doi]
- A Method for Robust and Explainable Image-Based Network Traffic Classification with Deep LearningAmine Hattak, Giacomo Iadarola, Fabio Martinelli, Francesco Mercaldo, Antonella Santone. 385-393 [doi]
- Towards a Geometric Deep Learning-Based Cyber Security: Network System Intrusion Detection Using Graph Neural NetworksRocco Zaccagnino, Antonio Cirillo, Alfonso Guarino, Nicola Lettieri, Delfina Malandrino, Gianluca Zaccagnino. 394-401 [doi]
- Trans-IDS: A Transformer-Based Intrusion Detection SystemEl Mahdi Mercha, El Mostapha Chakir, Mohammed Erradi. 402-409 [doi]
- Regulating Cyber Incidents: A Review of Recent Reporting RequirementsAngelica Marotta, Stuart E. Madnick. 410-416 [doi]
- BAGUETTE: Hunting for Evidence of Malicious Behavior in Dynamic Analysis ReportsVincent Raulin, Pierre-François Gimenez, Yufei Han, Valérie Viet Triem Tong. 417-424 [doi]
- PIUDI: Private Information Update for Distributed InfrastructureShubham Raj, Snehil Joshi, Kannan Srinathan. 425-432 [doi]
- OCScraper: Automated Analysis of the Fingerprintability of the iOS APIGerald Palfinger. 433-441 [doi]
- XACML Extension for Graphs: Flexible Authorization Policy Specification and Datastore-Independent EnforcementAya Mohamed, Dagmar Auer, Daniel Hofer, Josef Küng. 442-449 [doi]
- Automated Feature Engineering for AutoML Using Genetic AlgorithmsKevin Shi, Sherif Saad. 450-459 [doi]
- Smoothing the Ride: Providing a Seamless Upgrade Path from Established Cross-Border eID Workflows Towards eID Wallet SystemsRoland Czerny, Christian Kollmann, Blaz Podgorelec, Bernd Prünster, Thomas Zefferer. 460-468 [doi]
- Unclonable Cryptography: A Tale of Two No-Cloning ParadigmsGhada Almashaqbeh, Rohit Chatterjee. 469-477 [doi]
- Design of a New Hardware IP-HLS for Real-Time Image Chaos-Based EncryptionMohamed Salah Azzaz, Redouane Kaibou, Hamdane Kamelia, Abdenour Kifouche, Djamel Teguig. 478-485 [doi]
- Virtual Private Networks in the Quantum Era: A Security in Depth ApproachDavid Schatz, Friedrich Altheide, Hedwig Koerfgen, Michael Rossberg, Guenter Schaefer. 486-494 [doi]
- Secure E-Commerce Protocol with Complex Trading Capabilities of IntermediariesCatalin V. Bîrjoveanu, Mirela Bîrjoveanu. 495-502 [doi]
- 5G Handover: When Forward Security BreaksNavya Sivaraman, Simin Nadjm-Tehrani. 503-510 [doi]
- The Explainability-Privacy-Utility Trade-Off for Machine Learning-Based Tabular Data AnalysisWisam Abbasi, Paolo Mori, Andrea Saracino. 511-519 [doi]
- VerifMSI: Practical Verification of Hardware and Software Masking Schemes ImplementationsQuentin L. Meunier, Abdul Rahman Taleb. 520-527 [doi]
- A Lightweight Access Control Scheme with Attribute Policy for Blockchain-Enabled Internet of ThingsSyed Sajid Ullah, Vladimir A. Oleshchuk, Harsha S. Gardiyawasam Pussewalage. 528-539 [doi]
- On Single-Server Delegation Without PrecomputationMatluba Khodjaeva, Giovanni Di Crescenzo. 540-547 [doi]
- WebAppAuth: An Architecture to Protect from Compromised First-Party Web ServersPascal Wichmann, Sam Ansari, Hannes Federrath, Jens Lindemann 0001. 548-556 [doi]
- ERC20: Correctness via Linearizability and Interference Freedom of the Underlying Smart ContractRudrapatna K. Shyamasundar. 557-566 [doi]
- A Rand Index-Based Analysis of Consensus ProtocolsSangita Roy, Rudrapatna K. Shyamasundar. 567-576 [doi]
- Δ SFL: (Decoupled Server Federated Learning) to Utilize DLG Attacks in Federated Learning by Decoupling the ServerSudipta Paul, Vicenç Torra. 577-584 [doi]
- Light Quantum Key Distribution Network Security Estimation ToolSara Nikula, Pekka Koskela, Outi-Marja Latvala, Sami Lehtonen. 587-596 [doi]
- Evaluating Label Flipping Attack in Deep Learning-Based NIDSHesamodin Mohammadian, Arash Habibi Lashkari, Ali A. Ghorbani 0001. 597-603 [doi]
- Security for Next-Gen Analytics for Cross-Organisation CollaborationLaurent Gomez, Francesco Capano, Patrick Duverger. 604-609 [doi]
- Leveraging Hardware Reverse Engineering to Improve the Cyber Security and Resilience of the Smart GridArne Roar Nygård, Sokratis K. Katsikas. 610-616 [doi]
- On the Implementation of a Lattice-Based Revocable Hierarchical IbeMikael Carmona, Doryan Lesaignoux, Antoine Loiseau. 617-623 [doi]
- Privacy in Practice: Private COVID-19 Detection in X-Ray ImagesLucas Lange, Maja Schneider, Peter Christen, Erhard Rahm. 624-633 [doi]
- ArmorDroid: A Rule-Set Customizable Plugin for Secure Android Application DevelopmentCong-Binh Le, Bao-Thi Nguyen-Le, Phuoc-Loc Truong, Minh-Triet Tran, Anh Duy Tran. 634-641 [doi]
- SQLi Detection with ML: A Data-Source PerspectiveBalázs Pejó, Nikolett Kapui. 642-648 [doi]
- Guidelines and a Framework to Improve the Delivery of Network Intrusion Detection DatasetsBrian Lewandowski. 649-658 [doi]
- Labelled Vulnerability Dataset on Android Source Code (LVDAndro) to Develop AI-Based Code Vulnerability Detection ModelsJanaka Senanayake, Harsha K. Kalutarage, M. Omar Al-Kadri, Luca Piras, Andrei Petrovski 0001. 659-666 [doi]
- A Comprehensive Risk Assessment Framework for IoT-Enabled Healthcare EnvironmentMofareh Waqdan, Habib Louafi, Malek Mouhoub. 667-672 [doi]
- Robust Three-Factor Lightweight Authentication Based on Extended Chaotic Maps for Portable Resource-Constrained DevicesArijit Karati, Yu-Sheng Chang, Ting-Yu Chen. 673-682 [doi]
- Data Protection and Security Issues with Network Error LoggingLibor Polcák, Kamil Jerábek. 683-690 [doi]
- Defeating MageCart Attacks in a NAISS WayCatalin Rus, Dipti Kapoor Sarmah, Mohammed El-hajj 0001. 691-697 [doi]
- Fidelis: Verifiable Keyword Search with No Trust AssumptionLaltu Sardar, Subhra Mazumdar 0001. 698-703 [doi]
- Lightweight FHE-based Protocols Achieving Results Consistency for Data Encrypted Under Different KeysMarina Checri, Jean-Paul Bultel, Renaud Sirdey, Aymen Boudguiga. 704-709 [doi]
- Approximate Homomorphic Pre-Processing for CNNsShabnam Khanna, Ciara Rafferty. 710-715 [doi]
- A 10-Layer Model for Service Availability Risk ManagementJan Marius Evang. 716-723 [doi]
- Lattice-Based Threshold Signature Implementation for Constrained DevicesPatrik Dobias, Sara Ricci, Petr Dzurenda, Lukas Malina, Nikita Snetkov. 724-730 [doi]
- How to Plausibly Deny Steganographic SecretsShahzad Ahmad, Stefan Rass. 731-737 [doi]
- Proctoring Online Exam Using Eye TrackingWaheeb Yaqub, Manoranjan Mohanty, Basem Suleiman. 738-745 [doi]
- Blockchain Data ReplicationRoberto De Prisco, Sergiy Shevchenko, Pompeo Faruolo. 746-751 [doi]
- Toward a Compliant Token-Based e-Voting System with SSI-Granted EligibilityDario Castellano, Roberto De Prisco, Pompeo Faruolo. 752-757 [doi]
- Self-Sovereign Identity (SSI) Attribute-Based Web AuthenticationBiagio Boi, Marco De Santis, Christian Esposito 0001. 758-763 [doi]
- International Mutual Recognition: A Description of Trust Services in US, UK, EU and JP and the Testbed "Hakoniwa"Satoshi Kai, Takao Kondo, Naghmeh Karimi, Konstantinos Mersinas, Marc Sel, Roberto Yus, Satoru Tezuka. 764-771 [doi]
- Improving Intrusion Detection Systems with Multi-Agent Deep Reinforcement Learning: Enhanced Centralized and Decentralized ApproachesAmani Bacha, Farah Barika Ktata, Faten Louati. 772-777 [doi]
- Combining Generators of Adversarial Malware Examples to Increase Evasion RateMatous Kozák, Martin Jurecek. 778-786 [doi]
- Detecting BrakTooth AttacksAchyuth Nandikotkur, Issa Traoré, Mohammad Mamun 0001. 787-792 [doi]
- SoK: Towards CCA Secure Fully Homomorphic EncryptionHiroki Okada 0001, Kazuhide Fukushima. 793-798 [doi]
- IMAGINE Dataset: Digital Camera Identification Image Benchmarking DatasetJaroslaw Bernacki, Rafal Scherer. 799-804 [doi]
- Remote Security Assessment for Cyber-Physical Systems: Adapting Design Patterns for Enhanced DiagnosisKazutaka Matsuzaki, Kenji Sawada, Shinichi Honiden. 805-812 [doi]
- Uncovering Flaws in Anti-Phishing Blacklists for Phishing Websites Using Novel Cloaking TechniquesWenhao Li, Yongqing He, Zhimin Wang, Saleh Mansor Alqahtani, Priyadarsi Nanda. 813-821 [doi]
- CNN-HMM Model for Real Time DGA CategorizationAimen Mahmood, Haider Abbas, M. Faisal Amjad. 822-829 [doi]
- Anomaly Detection in Smart Grid Networks Using Power Consumption DataHasina Rahman, Priyadarsi Nanda, Manoranjan Mohanty, Nazim Uddin Sheikh. 830-837 [doi]
- Security for Distributed Machine LearningLaurent Gomez, Tianchi Yu, Patrick Duverger. 838-843 [doi]
- A Secure Emergency Framework in an IoT Based Patient Monitoring SystemNeila Mekki, Mohamed Hamdi, Taoufik Aguili, Tai-Hoon Kim. 844-849 [doi]
- A Two-Party Hierarchical Deterministic Wallets in PracticeChihYun Chuang, IHung Hsu, TingFang Lee. 850-856 [doi]
- Migrating Applications to Post-Quantum Cryptography: Beyond Algorithm ReplacementAlexandre Augusto Giron. 857-862 [doi]
- Analyzing Image Based Strategies for Android Malware Detection and Classification: An Empirical ExplorationChirag Jaju, Dhairya Agrawal, Rishi Poddar, Shubh Badjate, Sidharth Anand, Barsha Mitra, Soumyadeep Dey. 863-869 [doi]
- Multi-Environment Training Against Reward Poisoning Attacks on Deep Reinforcement LearningMyria Bouhaddi, Kamel Adi. 870-875 [doi]
- Privacy-Preserving Algorithms for Data Cooperatives with Directed GraphsMark Dockendorf, Ram Dantu. 876-884 [doi]