top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Advances in Cyber Security: Principles, Techniques, and Applications / / edited by Kuan-Ching Li, Xiaofeng Chen, Willy Susilo
Advances in Cyber Security: Principles, Techniques, and Applications / / edited by Kuan-Ching Li, Xiaofeng Chen, Willy Susilo
Edizione [1st ed. 2019.]
Pubbl/distr/stampa Singapore : , : Springer Singapore : , : Imprint : Springer, , 2019
Descrizione fisica 1 online resource (270 pages)
Disciplina 005.8
Soggetto topico Computer security
Data encryption (Computer science)
Coding theory
Information theory
Systems and Data Security
Cryptology
Coding and Information Theory
ISBN 981-13-1483-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Lightweight Solutions for Public Key Encryption in Resource-Constrained Environments: A Survey of Stateful Public Key Encryption Schemes -- Non-Intrusive Load Monitoring Algorithms for Privacy Mining in Smart Grid -- Accountable Anonymous Credentials -- CAPTCHA Design and Security Issues -- Ring Signature -- Data Authentication with Privacy Protection -- A Methodology for Retrofitting Privacy and Its Application to e-Shopping Transactions -- Pseudonymous Signature Schemes.
Record Nr. UNINA-9910350238003321
Singapore : , : Springer Singapore : , : Imprint : Springer, , 2019
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
AsiaCCS '19 : proceedings of the 2019 ACM Asia Conference on Computer and Communications Security : July 9-12, 2019, Auckland, New Zealand / / Steven Galbraith, Giovanni Russello, Willy Susilo
AsiaCCS '19 : proceedings of the 2019 ACM Asia Conference on Computer and Communications Security : July 9-12, 2019, Auckland, New Zealand / / Steven Galbraith, Giovanni Russello, Willy Susilo
Autore Galbraith Steven
Pubbl/distr/stampa New York, New York : , : Association for Computing Machinery, , 2019
Descrizione fisica 1 online resource (695 pages) : illustrations
Disciplina 005.8
Soggetto topico Computer networks - Security measures
Computer security
Wireless communication systems - Security measures
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910412088703321
Galbraith Steven  
New York, New York : , : Association for Computing Machinery, , 2019
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cyber security meets machine learning / / Xiaofeng Chen, Willy Susilo, Elisa Bertino
Cyber security meets machine learning / / Xiaofeng Chen, Willy Susilo, Elisa Bertino
Autore Chen Xiaofeng
Pubbl/distr/stampa Singapore : , : Springer, , [2021]
Descrizione fisica 1 online resource (168 pages)
Disciplina 006.31
Soggetto topico Machine learning - Technique
Machine learning - Security measures
ISBN 981-336-726-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Contents -- IoT Attacks and Malware -- 1 Introduction -- 2 Background -- 2.1 Cybersecurity Kill Chains -- 2.2 Major IoT Security Concerns -- 3 Attack Classification -- 3.1 Passive/Information Stealing Attacks -- 3.2 Service Degradation Attacks -- 3.3 DDoS Attacks -- 4 IoT Malware Analysis and Classification -- 5 AI-Based IDS Solutions -- 6 Conclusion -- References -- Machine Learning-Based Online Source Identification for Image Forensics -- 1 Introduction -- 2 Related Work -- 2.1 Features Engineering for Image Source Identification -- 2.2 Statistical Learning-Based Image Source Identification -- 3 Proposed Scheme: OSIU -- 3.1 Unknown Sample Triage -- 3.2 Unknown Image Discovery -- 3.3 (K+1)-class Classification -- 4 Experiments and Results -- 4.1 Dataset and Experiment Settings -- 4.2 Features -- 4.3 Evaluation Metrics -- 4.4 Performance of Triaging Unknown Samples -- 4.5 Performance of OSIU -- 5 Conclusion -- References -- Reinforcement Learning Based Communication Security for Unmanned Aerial Vehicles -- 1 Introduction -- 2 Communication Security for Unmanned Aerial Vehicles -- 2.1 UAV Communication Model -- 2.2 Attack Model -- 3 Reinforcement Learning Based UAV Communication Security -- 3.1 Reinforcement Learning Based Anti-Jamming Communications -- 3.2 Reinforcement Learning Based UAV Communications Against Smart Attacks -- 4 UAV Secure Communication Game -- 4.1 Game Model -- 4.2 Nash Equilibrium of the Game -- 5 Related Work -- 5.1 General Anti-jamming Policies in UAV-Aided Communication -- 5.2 Reinforcement Learning in Anti-jamming Communication -- 5.3 Game Theory in Anti-jamming Communication -- 6 Conclusion -- References -- Visual Analysis of Adversarial Examples in Machine Learning -- 1 Introduction -- 2 Adversarial Examples -- 3 Generation of Adversarial Examples -- 4 Properties of Adversarial Examples.
5 Distinguishing Adversarial Examples -- 6 Robustness of Models -- 7 Challenges and Research Directions -- 8 Conclusion -- References -- Adversarial Attacks Against Deep Learning-Based Speech Recognition Systems -- 1 Introduction -- 2 Background and Related Work -- 2.1 Speech Recognition -- 2.2 Adversarial Examples -- 2.3 Related Work -- 3 Overview -- 3.1 Motivation -- 3.2 Technical Challenges -- 4 White-Box Attack -- 4.1 Threat Model of White-Box Attack -- 4.2 The Detail Decoding Process of Kaldi -- 4.3 Gradient Descent to Craft Audio Clip -- 4.4 Practical Adversarial Attack Against White-Box Model -- 4.5 Experiment Setup of CommanderSong Attack -- 4.6 Evaluation of CommanderSong Attack -- 5 Black-Box Attack -- 5.1 Threat Model of Black-Box Attack -- 5.2 Transferability Based Approach -- 5.3 Local Model Approximation Approach -- 5.4 Alternate Models Based Generation Approach -- 5.5 Experiment Setup of Devil's Whisper Attack -- 5.6 Evaluation of Devil's Whisper Attack -- 6 Defense -- 7 Conclusion -- Appendix -- References -- A Survey on Secure Outsourced Deep Learning -- 1 Introduction -- 2 Deep Learning -- 2.1 Brief Survey on Deep Learning -- 2.2 Architecture of Deep Learning -- 2.3 Main Computation in Deep Learning -- 3 Outsourced Computation -- 3.1 Brief Survey on Outsourced Computation -- 3.2 System Model -- 3.3 Security Requirements -- 4 Outsourced Deep Learning -- 4.1 Brief Review on Outsourced Deep Learning -- 4.2 Privacy Concerns in Outsourced Deep Learning -- 4.3 Privacy-Preserving Techniques for Outsourced Deep Learning -- 4.4 Taxonomy Standard -- 4.5 Privacy-Preserving Training Outsourcing -- 4.6 Privacy-Preserving Inference Outsourcing -- 5 Conclusion and Future Research Perspectives -- References.
Record Nr. UNINA-9910488713403321
Chen Xiaofeng  
Singapore : , : Springer, , [2021]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cyber security meets machine learning / / Xiaofeng Chen, Willy Susilo, Elisa Bertino
Cyber security meets machine learning / / Xiaofeng Chen, Willy Susilo, Elisa Bertino
Autore Chen Xiaofeng
Pubbl/distr/stampa Singapore : , : Springer, , [2021]
Descrizione fisica 1 online resource (168 pages)
Disciplina 006.31
Soggetto topico Machine learning - Technique
Machine learning - Security measures
ISBN 981-336-726-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Contents -- IoT Attacks and Malware -- 1 Introduction -- 2 Background -- 2.1 Cybersecurity Kill Chains -- 2.2 Major IoT Security Concerns -- 3 Attack Classification -- 3.1 Passive/Information Stealing Attacks -- 3.2 Service Degradation Attacks -- 3.3 DDoS Attacks -- 4 IoT Malware Analysis and Classification -- 5 AI-Based IDS Solutions -- 6 Conclusion -- References -- Machine Learning-Based Online Source Identification for Image Forensics -- 1 Introduction -- 2 Related Work -- 2.1 Features Engineering for Image Source Identification -- 2.2 Statistical Learning-Based Image Source Identification -- 3 Proposed Scheme: OSIU -- 3.1 Unknown Sample Triage -- 3.2 Unknown Image Discovery -- 3.3 (K+1)-class Classification -- 4 Experiments and Results -- 4.1 Dataset and Experiment Settings -- 4.2 Features -- 4.3 Evaluation Metrics -- 4.4 Performance of Triaging Unknown Samples -- 4.5 Performance of OSIU -- 5 Conclusion -- References -- Reinforcement Learning Based Communication Security for Unmanned Aerial Vehicles -- 1 Introduction -- 2 Communication Security for Unmanned Aerial Vehicles -- 2.1 UAV Communication Model -- 2.2 Attack Model -- 3 Reinforcement Learning Based UAV Communication Security -- 3.1 Reinforcement Learning Based Anti-Jamming Communications -- 3.2 Reinforcement Learning Based UAV Communications Against Smart Attacks -- 4 UAV Secure Communication Game -- 4.1 Game Model -- 4.2 Nash Equilibrium of the Game -- 5 Related Work -- 5.1 General Anti-jamming Policies in UAV-Aided Communication -- 5.2 Reinforcement Learning in Anti-jamming Communication -- 5.3 Game Theory in Anti-jamming Communication -- 6 Conclusion -- References -- Visual Analysis of Adversarial Examples in Machine Learning -- 1 Introduction -- 2 Adversarial Examples -- 3 Generation of Adversarial Examples -- 4 Properties of Adversarial Examples.
5 Distinguishing Adversarial Examples -- 6 Robustness of Models -- 7 Challenges and Research Directions -- 8 Conclusion -- References -- Adversarial Attacks Against Deep Learning-Based Speech Recognition Systems -- 1 Introduction -- 2 Background and Related Work -- 2.1 Speech Recognition -- 2.2 Adversarial Examples -- 2.3 Related Work -- 3 Overview -- 3.1 Motivation -- 3.2 Technical Challenges -- 4 White-Box Attack -- 4.1 Threat Model of White-Box Attack -- 4.2 The Detail Decoding Process of Kaldi -- 4.3 Gradient Descent to Craft Audio Clip -- 4.4 Practical Adversarial Attack Against White-Box Model -- 4.5 Experiment Setup of CommanderSong Attack -- 4.6 Evaluation of CommanderSong Attack -- 5 Black-Box Attack -- 5.1 Threat Model of Black-Box Attack -- 5.2 Transferability Based Approach -- 5.3 Local Model Approximation Approach -- 5.4 Alternate Models Based Generation Approach -- 5.5 Experiment Setup of Devil's Whisper Attack -- 5.6 Evaluation of Devil's Whisper Attack -- 6 Defense -- 7 Conclusion -- Appendix -- References -- A Survey on Secure Outsourced Deep Learning -- 1 Introduction -- 2 Deep Learning -- 2.1 Brief Survey on Deep Learning -- 2.2 Architecture of Deep Learning -- 2.3 Main Computation in Deep Learning -- 3 Outsourced Computation -- 3.1 Brief Survey on Outsourced Computation -- 3.2 System Model -- 3.3 Security Requirements -- 4 Outsourced Deep Learning -- 4.1 Brief Review on Outsourced Deep Learning -- 4.2 Privacy Concerns in Outsourced Deep Learning -- 4.3 Privacy-Preserving Techniques for Outsourced Deep Learning -- 4.4 Taxonomy Standard -- 4.5 Privacy-Preserving Training Outsourcing -- 4.6 Privacy-Preserving Inference Outsourcing -- 5 Conclusion and Future Research Perspectives -- References.
Record Nr. UNISA-996464488703316
Chen Xiaofeng  
Singapore : , : Springer, , [2021]
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Cyberspace safety and security : 14th International Symposium, CSS 2022, Xi'an, China, October 16-18, 2022, Proceedings / / edited by Xiaofeng Chen, Jian Shen, and Willy Susilo
Cyberspace safety and security : 14th International Symposium, CSS 2022, Xi'an, China, October 16-18, 2022, Proceedings / / edited by Xiaofeng Chen, Jian Shen, and Willy Susilo
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2022]
Descrizione fisica 1 online resource (381 pages)
Disciplina 016.391
Collana Lecture Notes in Computer Science
Soggetto topico Data encryption (Computer science)
Computer security
ISBN 3-031-18067-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Organization -- Contents -- Cryptography and Its Applications -- Publicly Verifiable Conjunctive Keyword Search with Balanced Verification Overhead -- 1 Introduction -- 1.1 Our Contribution -- 1.2 Related Work -- 2 Preliminaries -- 2.1 RSA Group -- 2.2 RSA Accumulator -- 2.3 Hardness Assumptions -- 2.4 Security Definitions -- 3 Publicly Verifiable SSE Based on Accumulator -- 4 Security Analysis -- 5 Performance Analysis -- 6 Conclusion -- References -- A Secure and Efficient Certificateless Authenticated Key Agreement Scheme for Smart Healthcare -- 1 Introduction -- 2 Security Model -- 3 Review and Cryptanalysis of WHX AKA Protocol -- 3.1 Review of WHX AKA Protocol -- 3.2 Cryptanalysis of WHX AKA Protocol -- 4 The Improved Scheme -- 4.1 Initialization Phase -- 4.2 Registration Phase -- 4.3 Authentication and Key Agreement Phase -- 5 Security Analysis of the Proposed Scheme -- 6 Performance Analysis -- 6.1 Security Comparison -- 6.2 Computation Cost -- 6.3 Communication Cost -- 7 Conclusion -- References -- Digital Signature Scheme to Match Generalized Reed-Solomon Code over GF(q) -- 1 Introduction -- 2 Preliminary -- 2.1 Public Key Cryptosystem Based on Error Correction Codes -- 2.2 Digital Signature Scheme Based on Error Correction Code -- 2.3 Security Concept -- 3 The Proposed Scheme -- 3.1 Reductionist Security Proof -- 4 Performance Analysis of the Proposed Algorithm -- 4.1 Signature Complexity -- 4.2 Public Key Size -- 4.3 Signature Length -- 5 Security Analysis -- 5.1 Information Set Decoding Attack -- 5.2 Distinguisher Attack -- 6 Result -- 7 Conclusions -- References -- A Collaborative Access Control Scheme Based on Incentive Mechanisms -- 1 Introduction -- 2 Related Work -- 3 The Proposed Scheme -- 3.1 Setup -- 3.2 KenGey -- 3.3 Encryption -- 3.4 Decryption -- 3.5 Incentive Mechanism of Blockchain -- 4 Analysis.
4.1 Security Analysis -- 4.2 Performance Analysis -- 5 Conclusion -- References -- Quartet: A Logarithmic Size Linkable Ring Signature Scheme from DualRing -- 1 Introduction -- 1.1 Organization -- 2 Preliminaries -- 2.1 Notations -- 2.2 Sum Arguments of Knowledge -- 2.3 The DL-Based DualRing Signature -- 3 Syntax and Security Model -- 3.1 Syntax of LRS -- 3.2 Security Model -- 4 The Proposed Linkable Ring Signatures -- 4.1 Quartet: a Basic Version -- 4.2 Security Analysis of Quartet -- 4.3 Quartet+: An Improved Version with Logarithmic Size -- 4.4 Security Analysis of Quartet+ -- 5 Evaluation and Analysis -- 5.1 Communication Cost -- 5.2 Computation Cost -- 6 Conclusion -- References -- Updatable Hybrid Encryption Scheme with No-Directional Key Update for Cloud Storage -- 1 Introduction -- 1.1 Our Motivations and Contributions -- 1.2 Related Works -- 2 Preliminaries -- 3 Formal Updatable Hybrid Encryption -- 3.1 Syntax -- 3.2 Instantiation Scheme -- 3.3 Correctness -- 3.4 UP-IND-CCA Security -- 3.5 Evaluation of the Proposed UHE Scheme -- 4 Conclusions -- References -- Data Security -- FDLedger: Dynamic and Efficient Anonymous Audit for Distributed Ledgers -- 1 Introduction -- 1.1 Our Contributions -- 1.2 Related Work -- 2 Preliminaries -- 2.1 Notation -- 2.2 ElGamal Encryption Variant -- 2.3 Order-Revealing Encryption -- 2.4 Consensus -- 3 System Model -- 3.1 Architecture -- 3.2 Assumptions -- 3.3 Security Goals -- 4 FDLedger Construction -- 4.1 Main Idea -- 4.2 Sparse Prefix Symbol Tree -- 4.3 Our Construction -- 4.4 Discussions and Comparisons -- 5 Security Analysis -- 6 Performance Evaluation -- 6.1 Experiment Setup -- 6.2 Experiment Evaluation -- 7 Conclusion -- References -- A Method of Traceless File Deletion for NTFS File System -- 1 Introduction -- 2 Related Work -- 3 Brief Introduction for NTFS File System.
4 A Method of Traceless Data Deletion for NTFS File System -- 4.1 The Requirements of Traceless Data Deletion -- 4.2 A Traceless Method of Data Deletion for NTFS File System -- 5 Performance Analysis -- 5.1 Experiment Result -- 5.2 Performance Analysis -- 6 Conclusion -- References -- Efficient and Collusion Resistant Multi-party Private Set Intersection Protocols for Large Participants and Small Sets Setting -- 1 Introduction -- 1.1 Contributions -- 2 Related Work -- 2.1 Traditional PSI -- 2.2 Collusion Resisting MP-PSI -- 3 Preliminaries -- 3.1 Diffie-Hellman Key Agreement -- 3.2 Zero Sharing Technique -- 4 Security Model -- 4.1 Functionality -- 4.2 Security Definitions -- 5 Concrete Protocols -- 5.1 System Initialization Step -- 5.2 Key Agreement Step -- 5.3 Zero Sharing Step -- 5.4 Intersection Calculation Step -- 6 Security Analysis -- 6.1 Correctness -- 6.2 Security Proof -- 6.3 Malicious Secure MP-PSI -- 7 Performance and Performance -- 7.1 Complexity Analysis -- 7.2 Experimental Implementation -- 7.3 Experiment Results -- 8 Conclusion -- References -- Multi-user Verifiable Database with Efficient Keyword Search -- 1 Introduction -- 1.1 Our Contribution -- 1.2 Related Work -- 1.3 Organization -- 2 Preliminaries -- 2.1 Mathematical Assumption -- 2.2 Verifiable Database (VDB) -- 3 Multi-user Verifiable Database with Efficient Keyword Search -- 3.1 Framework -- 3.2 High Level Description -- 3.3 A Concrete MUVDB Scheme -- 3.4 Extended Construction: Support Conjunctive Keyword Search -- 4 Security and Efficiency Analysis -- 4.1 Security -- 4.2 Comparison -- 5 Conclusion -- References -- A Blockchain-Based Collaborative Auditing Scheme for Cloud Storage -- 1 Introduction -- 1.1 Our Contribution -- 2 Public Provable Data Possession Scheme -- 2.1 System Model -- 2.2 Adversary Model and Design Goals -- 2.3 EigenTrust Model -- 2.4 A Concrete Scheme.
3 Security Analysis and Efficiency Analysis -- 3.1 Correctness -- 3.2 Security Analysis -- 4 Performance Evaluation -- 4.1 Functionality Comparisons -- 4.2 Implementation -- 5 Conclusion -- References -- Attack and Defense Techniques -- High Quality Audio Adversarial Examples Without Using Psychoacoustics -- 1 Introduction -- 2 Related Work -- 3 Problem Definition -- 3.1 Threat Model and Assumptions -- 3.2 Evaluation Metrics -- 4 Method -- 4.1 Adversarial Convolution -- 4.2 Regularization -- 4.3 Impulse Response -- 4.4 Two-Stage Generation Process -- 5 Experimental Results -- 5.1 Setup -- 5.2 Regularization -- 5.3 Adversarial Example Generation -- 5.4 Robustness -- 6 Conclusion and Future Work -- References -- Working Mechanism of Eternalblue and Its Application in Ransomworm -- 1 Introduction -- 2 Eternalblue's Working Mechanism in Metasploit -- 2.1 Crafting Original List -- 2.2 Buffer Grooming -- 2.3 Sending the Shellcode -- 3 Code Analysis -- 3.1 Summary of Wannacry's Network Behaviour -- 3.2 Detailed Analysis of Wannacry Network Behaviour -- 4 Conclusion -- References -- Substitution Attacks Against Sigma Protocols -- 1 Introduction -- 2 Preliminaries -- 2.1 Notations and Definitions -- 2.2 Protocols -- 3 ASA Models for Protocols -- 3.1 Subverting Prover -- 3.2 Subverting Verifier -- 4 Mounting ASAs on Protocols -- 4.1 The Biased-Commitment Attack -- 4.2 The Biased-Challenge Attack -- 5 Instantiations of Subvertible Protocols -- 5.1 Schnorr's Identification Protocol -- 5.2 Okamoto's Protocol for Representations -- 6 Conclusion -- References -- A Multi-stage APT Attack Detection Method Based on Sample Enhancement -- 1 Introduction -- 2 Related Work -- 3 Multi-stage APT Attack Detection Method Based on Sample Enhancement -- 3.1 Multi-stage Sample Enhancement -- 3.2 Multi-stage APT Attack Detection -- 4 Experimental Results.
4.1 Environment and Evaluation Metrics -- 4.2 Experimental Results and Analysis -- 5 Conclusion -- References -- VDHGT: A Source Code Vulnerability Detection Method Based on Heterogeneous Graph Transformer -- 1 Introduction -- 2 Overview -- 3 VDHGT Method -- 3.1 Generation of VDRG -- 3.2 Node Embedding -- 3.3 Graph Learning Network and Vulnerability Detection -- 4 Experiment and Result Analysis -- 4.1 Experimental Dataset -- 4.2 Experimental Results and Analysis -- 5 Conclusion -- References -- Anomalous Network Traffic Detection Based on CK Sketch and Machine Learning -- 1 Introduction -- 2 Related Work -- 2.1 Sketch Structure -- 2.2 Sketch Improvement Structure on the Basis of Cuckoo Hash -- 3 Anomalous Network Traffic Detection Solution on the Basis of Machine Learning and CK Sketch -- 3.1 Design of the Anomalous Network Traffic Detection Process -- 3.2 CK Sketch Structure Improvement -- 4 Experience -- 4.1 Experimental Environment and Data Set -- 4.2 Metrics -- 4.3 Experimental Comparison Analysis -- 5 Conclusion -- References -- FedMCS: A Privacy-Preserving Mobile Crowdsensing Defense Scheme -- 1 Introduction -- 2 Related Works -- 3 Problem Formulation -- 3.1 System Model -- 3.2 Threat Model -- 3.3 Design Goals -- 4 Preliminaries -- 4.1 Notations -- 4.2 Poisoning Attack -- 4.3 Paillier Encryption System -- 5 Proposed Scheme -- 5.1 Request Task Publishing -- 5.2 Sensing Gradient Uploading -- 5.3 Model Secure Aggregation -- 6 Safety Certificate -- 7 Performance Evaluation -- 7.1 Experimental Settings -- 7.2 Experiment Results -- 8 Conclusion -- References -- Membership Inference Attacks Against Robust Graph Neural Network -- 1 Introduction -- 2 Related Work -- 2.1 Graph Convolutional Networks -- 2.2 Graph Adversarial Training -- 2.3 Graph Inference Attacks -- 3 Background -- 3.1 Graph Convolutional Network -- 3.2 Graph Membership Inference Attacks.
3.3 Graph Adversarial Training.
Record Nr. UNISA-996490358003316
Cham, Switzerland : , : Springer, , [2022]
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Cyberspace safety and security : 14th International Symposium, CSS 2022, Xi'an, China, October 16-18, 2022, Proceedings / / edited by Xiaofeng Chen, Jian Shen, and Willy Susilo
Cyberspace safety and security : 14th International Symposium, CSS 2022, Xi'an, China, October 16-18, 2022, Proceedings / / edited by Xiaofeng Chen, Jian Shen, and Willy Susilo
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2022]
Descrizione fisica 1 online resource (381 pages)
Disciplina 016.391
Collana Lecture Notes in Computer Science
Soggetto topico Data encryption (Computer science)
Computer security
ISBN 3-031-18067-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Organization -- Contents -- Cryptography and Its Applications -- Publicly Verifiable Conjunctive Keyword Search with Balanced Verification Overhead -- 1 Introduction -- 1.1 Our Contribution -- 1.2 Related Work -- 2 Preliminaries -- 2.1 RSA Group -- 2.2 RSA Accumulator -- 2.3 Hardness Assumptions -- 2.4 Security Definitions -- 3 Publicly Verifiable SSE Based on Accumulator -- 4 Security Analysis -- 5 Performance Analysis -- 6 Conclusion -- References -- A Secure and Efficient Certificateless Authenticated Key Agreement Scheme for Smart Healthcare -- 1 Introduction -- 2 Security Model -- 3 Review and Cryptanalysis of WHX AKA Protocol -- 3.1 Review of WHX AKA Protocol -- 3.2 Cryptanalysis of WHX AKA Protocol -- 4 The Improved Scheme -- 4.1 Initialization Phase -- 4.2 Registration Phase -- 4.3 Authentication and Key Agreement Phase -- 5 Security Analysis of the Proposed Scheme -- 6 Performance Analysis -- 6.1 Security Comparison -- 6.2 Computation Cost -- 6.3 Communication Cost -- 7 Conclusion -- References -- Digital Signature Scheme to Match Generalized Reed-Solomon Code over GF(q) -- 1 Introduction -- 2 Preliminary -- 2.1 Public Key Cryptosystem Based on Error Correction Codes -- 2.2 Digital Signature Scheme Based on Error Correction Code -- 2.3 Security Concept -- 3 The Proposed Scheme -- 3.1 Reductionist Security Proof -- 4 Performance Analysis of the Proposed Algorithm -- 4.1 Signature Complexity -- 4.2 Public Key Size -- 4.3 Signature Length -- 5 Security Analysis -- 5.1 Information Set Decoding Attack -- 5.2 Distinguisher Attack -- 6 Result -- 7 Conclusions -- References -- A Collaborative Access Control Scheme Based on Incentive Mechanisms -- 1 Introduction -- 2 Related Work -- 3 The Proposed Scheme -- 3.1 Setup -- 3.2 KenGey -- 3.3 Encryption -- 3.4 Decryption -- 3.5 Incentive Mechanism of Blockchain -- 4 Analysis.
4.1 Security Analysis -- 4.2 Performance Analysis -- 5 Conclusion -- References -- Quartet: A Logarithmic Size Linkable Ring Signature Scheme from DualRing -- 1 Introduction -- 1.1 Organization -- 2 Preliminaries -- 2.1 Notations -- 2.2 Sum Arguments of Knowledge -- 2.3 The DL-Based DualRing Signature -- 3 Syntax and Security Model -- 3.1 Syntax of LRS -- 3.2 Security Model -- 4 The Proposed Linkable Ring Signatures -- 4.1 Quartet: a Basic Version -- 4.2 Security Analysis of Quartet -- 4.3 Quartet+: An Improved Version with Logarithmic Size -- 4.4 Security Analysis of Quartet+ -- 5 Evaluation and Analysis -- 5.1 Communication Cost -- 5.2 Computation Cost -- 6 Conclusion -- References -- Updatable Hybrid Encryption Scheme with No-Directional Key Update for Cloud Storage -- 1 Introduction -- 1.1 Our Motivations and Contributions -- 1.2 Related Works -- 2 Preliminaries -- 3 Formal Updatable Hybrid Encryption -- 3.1 Syntax -- 3.2 Instantiation Scheme -- 3.3 Correctness -- 3.4 UP-IND-CCA Security -- 3.5 Evaluation of the Proposed UHE Scheme -- 4 Conclusions -- References -- Data Security -- FDLedger: Dynamic and Efficient Anonymous Audit for Distributed Ledgers -- 1 Introduction -- 1.1 Our Contributions -- 1.2 Related Work -- 2 Preliminaries -- 2.1 Notation -- 2.2 ElGamal Encryption Variant -- 2.3 Order-Revealing Encryption -- 2.4 Consensus -- 3 System Model -- 3.1 Architecture -- 3.2 Assumptions -- 3.3 Security Goals -- 4 FDLedger Construction -- 4.1 Main Idea -- 4.2 Sparse Prefix Symbol Tree -- 4.3 Our Construction -- 4.4 Discussions and Comparisons -- 5 Security Analysis -- 6 Performance Evaluation -- 6.1 Experiment Setup -- 6.2 Experiment Evaluation -- 7 Conclusion -- References -- A Method of Traceless File Deletion for NTFS File System -- 1 Introduction -- 2 Related Work -- 3 Brief Introduction for NTFS File System.
4 A Method of Traceless Data Deletion for NTFS File System -- 4.1 The Requirements of Traceless Data Deletion -- 4.2 A Traceless Method of Data Deletion for NTFS File System -- 5 Performance Analysis -- 5.1 Experiment Result -- 5.2 Performance Analysis -- 6 Conclusion -- References -- Efficient and Collusion Resistant Multi-party Private Set Intersection Protocols for Large Participants and Small Sets Setting -- 1 Introduction -- 1.1 Contributions -- 2 Related Work -- 2.1 Traditional PSI -- 2.2 Collusion Resisting MP-PSI -- 3 Preliminaries -- 3.1 Diffie-Hellman Key Agreement -- 3.2 Zero Sharing Technique -- 4 Security Model -- 4.1 Functionality -- 4.2 Security Definitions -- 5 Concrete Protocols -- 5.1 System Initialization Step -- 5.2 Key Agreement Step -- 5.3 Zero Sharing Step -- 5.4 Intersection Calculation Step -- 6 Security Analysis -- 6.1 Correctness -- 6.2 Security Proof -- 6.3 Malicious Secure MP-PSI -- 7 Performance and Performance -- 7.1 Complexity Analysis -- 7.2 Experimental Implementation -- 7.3 Experiment Results -- 8 Conclusion -- References -- Multi-user Verifiable Database with Efficient Keyword Search -- 1 Introduction -- 1.1 Our Contribution -- 1.2 Related Work -- 1.3 Organization -- 2 Preliminaries -- 2.1 Mathematical Assumption -- 2.2 Verifiable Database (VDB) -- 3 Multi-user Verifiable Database with Efficient Keyword Search -- 3.1 Framework -- 3.2 High Level Description -- 3.3 A Concrete MUVDB Scheme -- 3.4 Extended Construction: Support Conjunctive Keyword Search -- 4 Security and Efficiency Analysis -- 4.1 Security -- 4.2 Comparison -- 5 Conclusion -- References -- A Blockchain-Based Collaborative Auditing Scheme for Cloud Storage -- 1 Introduction -- 1.1 Our Contribution -- 2 Public Provable Data Possession Scheme -- 2.1 System Model -- 2.2 Adversary Model and Design Goals -- 2.3 EigenTrust Model -- 2.4 A Concrete Scheme.
3 Security Analysis and Efficiency Analysis -- 3.1 Correctness -- 3.2 Security Analysis -- 4 Performance Evaluation -- 4.1 Functionality Comparisons -- 4.2 Implementation -- 5 Conclusion -- References -- Attack and Defense Techniques -- High Quality Audio Adversarial Examples Without Using Psychoacoustics -- 1 Introduction -- 2 Related Work -- 3 Problem Definition -- 3.1 Threat Model and Assumptions -- 3.2 Evaluation Metrics -- 4 Method -- 4.1 Adversarial Convolution -- 4.2 Regularization -- 4.3 Impulse Response -- 4.4 Two-Stage Generation Process -- 5 Experimental Results -- 5.1 Setup -- 5.2 Regularization -- 5.3 Adversarial Example Generation -- 5.4 Robustness -- 6 Conclusion and Future Work -- References -- Working Mechanism of Eternalblue and Its Application in Ransomworm -- 1 Introduction -- 2 Eternalblue's Working Mechanism in Metasploit -- 2.1 Crafting Original List -- 2.2 Buffer Grooming -- 2.3 Sending the Shellcode -- 3 Code Analysis -- 3.1 Summary of Wannacry's Network Behaviour -- 3.2 Detailed Analysis of Wannacry Network Behaviour -- 4 Conclusion -- References -- Substitution Attacks Against Sigma Protocols -- 1 Introduction -- 2 Preliminaries -- 2.1 Notations and Definitions -- 2.2 Protocols -- 3 ASA Models for Protocols -- 3.1 Subverting Prover -- 3.2 Subverting Verifier -- 4 Mounting ASAs on Protocols -- 4.1 The Biased-Commitment Attack -- 4.2 The Biased-Challenge Attack -- 5 Instantiations of Subvertible Protocols -- 5.1 Schnorr's Identification Protocol -- 5.2 Okamoto's Protocol for Representations -- 6 Conclusion -- References -- A Multi-stage APT Attack Detection Method Based on Sample Enhancement -- 1 Introduction -- 2 Related Work -- 3 Multi-stage APT Attack Detection Method Based on Sample Enhancement -- 3.1 Multi-stage Sample Enhancement -- 3.2 Multi-stage APT Attack Detection -- 4 Experimental Results.
4.1 Environment and Evaluation Metrics -- 4.2 Experimental Results and Analysis -- 5 Conclusion -- References -- VDHGT: A Source Code Vulnerability Detection Method Based on Heterogeneous Graph Transformer -- 1 Introduction -- 2 Overview -- 3 VDHGT Method -- 3.1 Generation of VDRG -- 3.2 Node Embedding -- 3.3 Graph Learning Network and Vulnerability Detection -- 4 Experiment and Result Analysis -- 4.1 Experimental Dataset -- 4.2 Experimental Results and Analysis -- 5 Conclusion -- References -- Anomalous Network Traffic Detection Based on CK Sketch and Machine Learning -- 1 Introduction -- 2 Related Work -- 2.1 Sketch Structure -- 2.2 Sketch Improvement Structure on the Basis of Cuckoo Hash -- 3 Anomalous Network Traffic Detection Solution on the Basis of Machine Learning and CK Sketch -- 3.1 Design of the Anomalous Network Traffic Detection Process -- 3.2 CK Sketch Structure Improvement -- 4 Experience -- 4.1 Experimental Environment and Data Set -- 4.2 Metrics -- 4.3 Experimental Comparison Analysis -- 5 Conclusion -- References -- FedMCS: A Privacy-Preserving Mobile Crowdsensing Defense Scheme -- 1 Introduction -- 2 Related Works -- 3 Problem Formulation -- 3.1 System Model -- 3.2 Threat Model -- 3.3 Design Goals -- 4 Preliminaries -- 4.1 Notations -- 4.2 Poisoning Attack -- 4.3 Paillier Encryption System -- 5 Proposed Scheme -- 5.1 Request Task Publishing -- 5.2 Sensing Gradient Uploading -- 5.3 Model Secure Aggregation -- 6 Safety Certificate -- 7 Performance Evaluation -- 7.1 Experimental Settings -- 7.2 Experiment Results -- 8 Conclusion -- References -- Membership Inference Attacks Against Robust Graph Neural Network -- 1 Introduction -- 2 Related Work -- 2.1 Graph Convolutional Networks -- 2.2 Graph Adversarial Training -- 2.3 Graph Inference Attacks -- 3 Background -- 3.1 Graph Convolutional Network -- 3.2 Graph Membership Inference Attacks.
3.3 Graph Adversarial Training.
Record Nr. UNINA-9910616395803321
Cham, Switzerland : , : Springer, , [2022]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Information and Communication Security [[electronic resource] ] : 13th International Conference, ICICS 2011, Beijing, China, November 23-26, 2011, Proceedings / / edited by Sihan Qing, Willy Susilo, Guilin Wang, Dongmei Liu
Information and Communication Security [[electronic resource] ] : 13th International Conference, ICICS 2011, Beijing, China, November 23-26, 2011, Proceedings / / edited by Sihan Qing, Willy Susilo, Guilin Wang, Dongmei Liu
Edizione [1st ed. 2011.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2011
Descrizione fisica 1 online resource (XIII, 432 p. 86 illus., 47 illus. in color.)
Disciplina 005.82
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Data structures (Computer science)
Coding theory
Information theory
Computer security
Algorithms
Computer communication systems
Cryptology
Data Structures and Information Theory
Coding and Information Theory
Systems and Data Security
Algorithm Analysis and Problem Complexity
Computer Communication Networks
ISBN 3-642-25243-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISA-996465699903316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2011
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Information security : 25th International Conference, ISC 2022, Bali, Indonesia, December 18-22, 2022 : proceedings / / Willy Susilo [and four others]
Information security : 25th International Conference, ISC 2022, Bali, Indonesia, December 18-22, 2022 : proceedings / / Willy Susilo [and four others]
Pubbl/distr/stampa Cham, Switzerland : , : Springer International Publishing, , [2022]
Descrizione fisica 1 online resource (522 pages)
Disciplina 005.8
Collana Lecture Notes in Computer Science Ser.
Soggetto topico Computer networks - Security measures
Computer networks - Security measures - Automation
ISBN 3-031-22390-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Organization -- Keynote and Invited Talks -- Efficiently Deployable and Efficiently Searchable Encryption (EDESE) - Applications, Attacks, and Countermeasures -- Software Vulnerability Detection by Fuzzing and Deep Learning -- Cybersecurity Policies and Challenges in Indonesia -- Blockchain Security: Primitives and Protocols -- Covert Communication: Past, Present and Future -- Contents -- Cryptography -- Privacy Preserving Computation in Cloud Using Reusable Garbled Oblivious RAMs -- 1 Introduction -- 2 Cloud Data Storage and Oblivious RAMs -- 3 Reusable Garbled ORAMs -- 3.1 Constrained Peseudo Random Functions -- 3.2 Garbled Circuits (GC) -- 3.3 Indistinguishability Obfuscation and Reusable Garbled Circuits -- 3.4 Construction of Reusable Garbled ORAMs -- 3.5 Proof of Security -- 4 Conclusion -- References -- Efficient Private Set Intersection Cardinality Protocol in the Reverse Unbalanced Setting -- 1 Introduction -- 2 Related Work -- 3 Preliminaries -- 3.1 Notations -- 3.2 Cuckoo Filter -- 3.3 Commutative Encryption -- 3.4 Hash-Prefix Filter -- 3.5 The Semi-honest Model -- 4 Our Proposal -- 5 Security Analysis -- 6 Performance Evaluation -- 6.1 Complexity Analysis -- 6.2 Environment and Parameters -- 6.3 Overhead Analysis -- 6.4 Feasibility Analysis of Anonymous Identity Authentication -- 7 Conclusions -- References -- Crypto-Steganographic Validity for Additive Manufacturing (3D Printing) Design Files -- 1 Introduction -- 2 Background -- 3 Definitions: Watermarking for AM -- 4 Steganographic Channels in STL File Format -- 4.1 STL Transformations for Bit Encoding -- 4.2 Steganographic Channels in STL File Format -- 5 Validity: STL Watermarking and Fingerprinting -- 6 Defining and Verifying Semantic Preservation for AM -- 6.1 Verifying G-Code Toolpath-Based Semantic Preservation.
6.2 Verification of Form- And Fit-Based Semantic Preservation -- 7 Conclusion -- References -- Witness Encryption from Smooth Projective Hashing System -- 1 Introduction -- 2 Related Work -- 3 Preliminaries -- 3.1 Notations and Conventions -- 3.2 Non-Interactive Zero-Knowledge Arguments of Knowledge -- 3.3 Smooth Projective Hashing Functions -- 3.4 Symmetric Key Encryption -- 4 Witness Encryption over Smooth Projective Hashing -- 4.1 Definition -- 4.2 Our Construction 1 -- 4.3 Correctness -- 4.4 Security Proof -- 5 Instantiating of SPHFfrom SNARK -- 5.1 Tools -- 5.2 Our Construction 2: SPHFfor SNARK -- 5.3 Correctness and Security of SPHF -- 6 Discussion -- 7 Conclusion -- References -- Post-quantum Cryptography -- More Efficient Adaptively Secure Lattice-Based IBE with Equality Test in the Standard Model -- 1 Introduction -- 1.1 Our Contribution -- 2 Identity-Based Encryption with Equality Test -- 3 Construction -- 3.1 ABB-Type Identity-Based Encryption -- 3.2 Constructions of IBEET Schemes from ABB-Type IBE -- References -- QUIC Protocol with Post-quantum Authentication -- 1 Introduction -- 2 Background of QUIC and NIST PQC -- 2.1 QUIC Protocol -- 2.2 NIST PQC Ciphers -- 3 Performance Analysis -- 3.1 Implementation and Experimentation -- 3.2 QUIC and TCP/TLS Performance -- 3.3 Performance with Packet Dropping (D) -- 4 Related Work -- 5 Conclusion -- References -- Batched Fully Homomorphic Encryption from TFHE -- 1 Introduction -- 1.1 Our Contributions -- 1.2 Related Work -- 1.3 Roadmap -- 2 Preliminaries -- 2.1 Background on TFHE -- 2.2 Number Theoretic Transform -- 2.3 Homomorphic Evalutation of Automorphisms -- 3 Building Blocks -- 3.1 Key Switching on TLWE Ciphertexts -- 3.2 Binary Packing Tree -- 3.3 Homomorphic Ring Decryption -- 4 Batched FHE from TFHE -- 4.1 The Construction -- 4.2 Analysis -- 4.3 Comparisons -- 5 Performance Evaluation.
6 Conclusion -- References -- Implicit Rejection in Fujisaki-Okamoto: Framework and a Novel Realization -- 1 Introduction -- 1.1 Our Contributions -- 1.2 Technical Overview -- 1.3 A New Realization for Our Framework -- 1.4 Related Works -- 1.5 Paper Organization -- 2 Preliminaries -- 2.1 Public-Key Encryption -- 2.2 Key Encapsulation Mechanism -- 2.3 Quantum Random Oracle Model -- 3 Our Framework -- 3.1 Transformation T: From IND-CPA to OW-qPCA -- 3.2 Our Framework for Implicit Rejection -- 3.3 Explanation for FO by Using Our Framework -- 4 Our New Realization -- 5 Conclusions -- References -- Cryptanalysis -- Further Cryptanalysis of a Type of RSA Variants -- 1 Introduction -- 1.1 Background -- 1.2 Our Contributions -- 1.3 Organization -- 2 Preliminaries -- 3 Multiple Private Keys Attack -- 4 Partial Key Exposure Attack -- 5 Small Prime Difference Attack -- 6 Experimental Results -- 7 Conclusion -- References -- The SAT-Based Automatic Searching and Experimental Verification for Differential Characteristics with Application to Midori64 -- 1 Introduction -- 2 A Brief Description of Midori64 -- 3 The Method Proposed by Sun et al. with Application to Midori64 -- 4 Verifying the Validity of Differential Characteristics Based on SAT -- 5 Our New Algorithm for Finding Valid Differential Characteristics -- 6 Conclusion and Future Work -- References -- Efficient Scalar Multiplication on Koblitz Curves with Pre-computation -- 1 Introduction -- 2 Preliminary -- 2.1 Double Bases -- 2.2 Koblitz Curves -- 2.3 The Width- -NAF -- 2.4 Curve Operations' Costs on Koblitz Curves -- 3 DBNS Recoding and Scalar Multiplication -- 3.1 Theoretical Background -- 3.2 Our New Recoding Algorithms -- 4 Costs of Scalar Multiplications -- 4.1 Scalar Multiplications on 4-Koblitz Curves -- 4.2 Comparison with Other Methods -- 5 Conclusion.
A Scalar Multiplications Using LD Coordinates -- References -- Blockchain -- Efficient ECDSA-Based Adaptor Signature for Batched Atomic Swaps -- 1 Introduction -- 1.1 Our Contributions -- 2 Preliminaries -- 2.1 Notations -- 2.2 Hard Relation and Zero-Knowledge Proof -- 2.3 Adaptor Signature Scheme -- 2.4 ECDSA -- 3 ECDSA-Based Adaptor Signature -- 4 Fast ECDSA-Based Adaptor Signature Schemes with Offline/Online Pre-signing -- 5 Performance and Experimental Results -- 5.1 Theoretical Analysis -- 5.2 Experimental Analysis -- 6 Application -- 6.1 Verification Scenario -- 6.2 Batched Atomic Swaps -- 7 Conclusion -- References -- Searching for Encrypted Data on Blockchain: An Efficient, Secure and Fair Realization -- 1 Introduction -- 2 Overview -- 2.1 System Model -- 2.2 Threat Model -- 2.3 Append-Only Block Store -- 2.4 ABS-Based Lookup Table -- 2.5 ABS-Based Publicly Verifiable Searchable Symmetric Encryption -- 2.6 Cryptographic Primitives -- 3 The Proposed Constructions -- 3.1 B' Tree: An Implementation of the ABS-Based Lookup Table -- 3.2 ABSPVSSE Construction -- 3.3 fair Construction -- 4 Security Analysis -- 4.1 Confidentiality -- 4.2 Soundness -- 4.3 Fairness -- 5 Implementation and Experimental Results -- 5.1 Implementation Details -- 5.2 Performance Evaluation -- 6 Conclusion -- References -- GRUZ: Practical Resource Fair Exchange Without Blockchain -- 1 Introduction -- 2 Preliminaries -- 2.1 Relation and Language -- 2.2 Zero-Knowledge Proof -- 2.3 Garbling Scheme -- 2.4 Garbled Circuits and Elliptic Curves Group -- 2.5 Symmetric Encryption -- 2.6 Commitment -- 2.7 ECDSA -- 3 Construction -- 3.1 Intuitions -- 3.2 Zero-Knowledge Verification of ECDSA -- 3.3 Free-XOR on Elliptic Curves Group -- 3.4 Protocol Description -- 3.5 Security Analysis -- 4 Implementation and Experimental Results -- 5 Conclusion and Future Directions -- References.
Daric: A Storage Efficient Payment Channel with Punishment Mechanism -- 1 Introduction -- 1.1 Contributions -- 1.2 Related Works -- 2 Background and Notations -- 2.1 Outputs and Transactions -- 2.2 Payment Channel -- 3 Solution Overview -- 4 Protocol Description -- 4.1 Create -- 4.2 Update -- 4.3 Close -- 4.4 Punish -- 5 Security Analysis -- 5.1 Notation and Security Model -- 5.2 Ideal Functionality -- 6 Daric Versus Eltoo -- 6.1 HTLC Security -- 6.2 Punishment Mechanism -- 7 Performance Analysis -- A Ideal Functionality -- References -- A Blockchain-Based Mutual Authentication Protocol for Smart Home -- 1 Introduction -- 1.1 Contributions -- 1.2 Organization -- 2 Review of HomeChain -- 3 Cryptanalysis of HomeChain -- 3.1 Linkable Message Attack -- 3.2 Untraceable Signature Attack -- 4 The Enhanced Protocol -- 4.1 Correctness and Security Analysis -- 5 Experiment Analysis -- 6 Conclusions -- References -- Email and Web Security -- OblivSend: Secure and Ephemeral File Sharing Services with Oblivious Expiration Control -- 1 Introduction -- 1.1 Motivation -- 1.2 Our Contributions -- 2 Related Work -- 2.1 Existing Secure File Sharing Services -- 2.2 Privacy-Preserving Web Services -- 3 Preliminaries -- 4 System Overview -- 4.1 Intuition -- 4.2 Framework -- 4.3 Threat Models and Security Goals -- 5 Detailed Construction -- 5.1 Security Guarantee -- 6 Implementation and Evaluation -- 6.1 Implementation -- 6.2 Evaluation -- 7 Conclusion -- References -- EarlyCrow: Detecting APT Malware Command and Control over HTTP(S) Using Contextual Summaries -- 1 Introduction -- 2 Threat Model -- 2.1 TTP Relevant Data -- 2.2 Measurements -- 3 EarlyCrow -- 3.1 Architecture Overview -- 3.2 PairFlow -- 3.3 PairFlow Features -- 3.4 Profiles Features -- 3.5 ContextualSummary -- 3.6 ContextualSummary Updating Process -- 4 Evaluation -- 4.1 Datasets.
4.2 Classification Performance.
Record Nr. UNISA-996503470903316
Cham, Switzerland : , : Springer International Publishing, , [2022]
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Information Security : 25th International Conference, ISC 2022, Bali, Indonesia, December 18–22, 2022, Proceedings / / edited by Willy Susilo, Xiaofeng Chen, Fuchun Guo, Yudi Zhang, Rolly Intan
Information Security : 25th International Conference, ISC 2022, Bali, Indonesia, December 18–22, 2022, Proceedings / / edited by Willy Susilo, Xiaofeng Chen, Fuchun Guo, Yudi Zhang, Rolly Intan
Edizione [1st ed. 2022.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2022
Descrizione fisica 1 online resource (522 pages)
Disciplina 005.8
Collana Lecture Notes in Computer Science
Soggetto topico Data protection
Computer engineering
Computer networks
Cryptography
Data encryption (Computer science)
Computer networks - Security measures
Data and Information Security
Computer Engineering and Networks
Cryptology
Mobile and Network Security
ISBN 3-031-22390-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cryptography -- Privacy Preserving Computation in Cloud Using Reusable Garbled Oblivious RAMs -- Efficient Private Set Intersection Cardinality Protocol in the Reverse Unbalanced Setting -- Crypto-Steganographic Validity for Additive Manufacturing (3D Printing) Design Files -- Witness Encryption from Smooth Projective Hashing System -- Post-Quantum Cryptography -- More Efficient Adaptively Secure Lattice-based IBE with Equality Test in the Standard Model -- QUIC Protocol with Post-Quantum Authentication -- Batched Fully Homomorphic Encryption from TFHE -- Implicit Rejection in Fujisaki-Okamoto: Framework and a Novel Realization -- Cryptanalysis -- Further Cryptanalysis of a Type of RSA Variants -- The SAT-Based Automatic Searching and Experimental Verification for Differential Characteristics with Application to Midori64 -- Efficient Scalar Multiplication on Koblitz Curves with Pre-computation -- Blockchain -- Efficient ECDSA-based Adaptor Signature for Batched Atomic Swaps -- Searching for Encrypted Data on Blockchain: An Efficient, Secure and Fair Realization -- GRUZ : Practical Resource Fair Exchange without Blockchain -- Daric: A Storage Efficient Payment Channel With Punishment Mechanism -- A Blockchain-based Mutual Authentication Protocol for Smart Home -- Email and Web Security -- OblivSend: Secure and Ephemeral File Sharing Services with Oblivious Expiration Control -- EarlyCrow: Detecting APT Malware Command and Control Over HTTP(S) Using Contextual Summaries -- Malware -- ATLAS: A Practical Attack Detection and Live Malware Analysis System for IoT Threat Intelligence -- Dissecting Applications Uninstallers & Removers: Are they effective? -- Representing LLVM-IR in a Code Property Graph -- Why we need a theory of maliciousness: Hardware Performance Counters in security -- Anatomist: Enhanced Firmware Vulnerability Discovery Based on Program State Abnormality Determination With Whole-system Replay -- AI Security -- AspIOC: Aspect-Enhanced Deep Neural Network for Actionable Indicator of Compromise Recognition -- HeHe: Balancing the Privacy and Efficiency in Training CNNs over the Semi-honest Cloud -- Deep Learning Assisted Key Recovery Attack for Round-Reduced Simeck32/64 -- CFL: Cluster Federated Learning in Large-scale Peer-to-Peer Networks -- Bilateral Privacy-Preserving Task Assignment with Personalized Participant Selection for Mobile Crowdsensing -- Communication-Efficient and Secure Federated Learning Based on Adaptive One-bit Compressed Sensing.
Record Nr. UNINA-9910634047803321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2022
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Information security : 23rd International Conference, ISC 2020, Bali, Indonesia, December 16-18, 2020, proceedings / / Willy Susilo [and four others] editors
Information security : 23rd International Conference, ISC 2020, Bali, Indonesia, December 16-18, 2020, proceedings / / Willy Susilo [and four others] editors
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2020]
Descrizione fisica 1 online resource (XIII, 426 p. 117 illus., 83 illus. in color.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
ISBN 3-030-62974-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Public-key Cryptography -- Symmetric-key Cryptography and Lattice -- Attacks and Cryptanalysis -- Malware Analysis -- Network and System Security -- Blockchain -- Security Applications. .
Record Nr. UNISA-996418222803316
Cham, Switzerland : , : Springer, , [2020]
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui