default search action
15th FPS 2022: Ottawa, ON, Canada
- Guy-Vincent Jourdan, Laurent Mounier, Carlisle M. Adams, Florence Sèdes, Joaquín García-Alfaro:
Foundations and Practice of Security - 15th International Symposium, FPS 2022, Ottawa, ON, Canada, December 12-14, 2022, Revised Selected Papers. Lecture Notes in Computer Science 13877, Springer 2023, ISBN 978-3-031-30121-6
Cryptography
- Baptiste Cottier, David Pointcheval:
Security Analysis of Improved EDHOC Protocol. 3-18 - Mirko Koscina, Pascal Lafourcade, Gaël Marcadet, Charles Olivier-Anclin, Léo Robert:
A Survey on Identity-Based Blind Signature. 19-37 - Martin Brisfors, Michail Moraitis, Elena Dubrova:
Do Not Rely on Clock Randomization: A Side-Channel Attack on a Protected Hardware Implementation of AES. 38-53 - Slim Bettaieb, Loïc Bidoux, Olivier Blazy, Baptiste Cottier, David Pointcheval:
Post-quantum and UC-Secure Oblivious Transfer from SPHF with Grey Zone. 54-70 - Ahmed Zawia, M. Anwar Hasan:
A New Class of Trapdoor Verifiable Delay Functions. 71-87 - Adda-Akram Bendoukha, Oana Stan, Renaud Sirdey, Nicolas Quero, Luciano Freitas de Souza:
Practical Homomorphic Evaluation of Block-Cipher-Based Hash Functions with Applications. 88-103 - Julian Hohm, Andreas Heinemann, Alexander Wiesmaier:
Towards a Maturity Model for Crypto-Agility Assessment. 104-119
Machine Learning
- Amirhossein Ebrahimi, Francesco Regazzoni, Paolo Palmieri:
Reducing the Cost of Machine Learning Differential Attacks Using Bit Selection and a Partial ML-Distinguisher. 123-141 - Solayman Ayoubi, Gregory Blanc, Houda Jmila, Thomas Silverston, Sébastien Tixeuil:
Data-Driven Evaluation of Intrusion Detectors: A Methodological Framework. 142-157 - Muhammad Mohzary, Khalid J. Almalki, Baek-Young Choi, Sejun Song:
CHIEFS: Corneal-Specular Highlights Imaging for Enhancing Fake-Face Spotter. 158-172
Cybercrime and Privacy
- Guillaume Bonfante, Anuyan Ithayakumar:
Where is the Virtual Machine Within Cpython? 175-191 - Daniel Fraunholz, Dominik Brunke, Lorenz Dumanski, Hartmut König:
Automating Device Fingerprinting Attacks in 4G and 5G NSA Mobile Networks. 192-207 - Olivier de Casanove, Florence Sèdes:
Malicious Human Behaviour in Information System Security: Contribution to a Threat Model for Event Detection Algorithms. 208-220 - Sumit Kumar Paul, D. A. Knox:
A Taxonomy and Gap-Analysis in Digital Privacy Education. 221-235 - Kamalkumar Macwan, Abdessamad Imine, Michaël Rusinowitch:
Differentially Private Friends Recommendation. 236-251
Physical-Layer Security
- Yannick Beaupré, Michel Barbeau, Stéphane Blouin:
Underwater Confidential Communications in JANUS. 255-270 - Alvi Jawad, Jason Jaskolka:
Defense Models for Data Recovery in Industrial Control Systems. 271-286 - Jean-Benoit Larouche, Sébastien Roy, Frédéric Mailhot, Pierre-Martin Tardif, Marc Frappier:
SCADA Radio Blackbox Reverse Engineering. 287-302
Blockchain
- Puneet Gill, Indrani Ray, Alireza Lotfi Takami, Mahesh Tripunitara:
Finding Unchecked Low-Level Calls with Zero False Positives and Negatives in Ethereum Smart Contracts. 305-321 - Sahar Salimpour, Farhad Keramat, Jorge Peña Queralta, Tomi Westerlund:
Decentralized Vision-Based Byzantine Agent Detection in Multi-robot Systems with IOTA Smart Contracts. 322-337 - Momoko Shiraishi, Hitoshi Aida:
Money Transfer on Transaction Signature-Based Ledger. 338-354 - Thierry Sans, Ziming Liu, Kevin Oh:
A Decentralized Mnemonic Backup System for Non-custodial Cryptocurrency Wallets. 355-370
IoT and Security Protocols
- Anthony Tam, Furkan Alaca, David Barrera:
If-This-Then-Allow-That (to Phone Home): A Trigger-Based Network Policy Enforcement Framework for Smart Homes. 373-388 - Konrad-Felix Krentz, Thiemo Voigt:
Reducing Trust Assumptions with OSCORE, RISC-V, and Layer 2 One-Time Passwords. 389-405 - Conner Bradley, David Barrera:
Towards Characterizing IoT Software Update Practices. 406-422 - Omar Tahmi, Chamseddine Talhi, Yacine Challal:
Two-Layer Architecture for Signature-Based Attacks Detection over Encrypted Network Traffic. 423-440
Short Papers
- Pavlo Burda, Luca Allodi, Nicola Zannone:
A Decision-Support Tool for Experimentation on Zero-Hour Phishing Detection. 443-452 - Andreas Schaad, Dominik Binder:
Deep-Learning-Based Vulnerability Detection in Binary Executables. 453-460 - Shah Fahd, Mehreen Afzal, Dawood Shah, Waseem Iqbal, Atiya Hai:
Robustness of Affine and Extended Affine Equivalent Surjective S-Box(es) Against Differential Cryptanalysis. 461-471
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.