default search action
9th ICISSP 2023: Lisbon, Portugal
- Paolo Mori, Gabriele Lenzini, Steven Furnell:
Proceedings of the 9th International Conference on Information Systems Security and Privacy, ICISSP 2023, Lisbon, Portugal, February 22-24, 2023. SciTePress 2023, ISBN 978-989-758-624-8
Invited Speakers
- Melanie Volkamer:
Usable Security: Security 'Warnings' 2.0. ICISSP 2023: 5 - Luca Viganò:
Cybersecurity, Nicolas Cage and Peppa Pig. ICISSP 2023: 7 - Thorsten P. Stremlau:
Protecting IoT Ecosystems and AI Leveraging TCG Standards. ICISSP 2023: 11
Papers
- Shuji Ohira, Araya Kibrom Desta, Ismail Arai, Kazutoshi Fujikawa:
IVNPROTECT: Isolable and Traceable Lightweight CAN-Bus Kernel-Level Protection for Securing in-Vehicle Communication. 17-28 - Jukka Julku, Markku Kylänpää:
Towards a Rust SDK for Keystone Enclave Application Development. 29-37 - Kris Heid, Jens Heider, Matthias Ritscher, Jan-Peter Stotz:
Tracing Cryptographic Agility in Android and iOS Apps. 38-45 - Jonas Röckl, Adam Wagenhäuser, Tilo Müller:
Veto: Prohibit Outdated Edge System Software from Booting. 46-57 - Francisco Blas Izquierdo Riera, Magnus Almgren, Pablo Picazo-Sanchez, Christian Rohner:
Clipaha: A Scheme to Perform Password Stretching on the Client. 58-69 - Kento Hasegawa, Seira Hidano, Kazuhide Fukushima:
Automating XSS Vulnerability Testing Using Reinforcement Learning. 70-80 - Francesco Antognazza, Alessandro Barenghi, Gerardo Pelosi, Ruggero Susella:
An Efficient Unified Architecture for Polynomial Multiplications in Lattice-Based Cryptoschemes. 81-88 - Patrik Burdiak, Emir Dervisevic, Amina Tankovic, Filip Lauterbach, Jan Rozhon, Lukas Kapicak, Libor Michalek, Dzana Pivac, Merima Fehric, Enio Kaljic, Mirza Hamza, Miralem Mehic, Miroslav Voznák:
Use-Case Denial of Service Attack on Actual Quantum Key Distribution Nodes. 89-94 - Thanh Tran, Phu Nguyen, Gencer Erdogan:
A Systematic Review of Secure IoT Data Sharing. 95-105 - Yichao Wang, Budi Arief, Julio C. Hernandez-Castro:
Dark Ending: What Happens when a Dark Web Market Closes down. 106-117 - Zechariah Wolf, Eric Larson, Mitchell A. Thornton:
Data Leakage in Isolated Virtualized Enterprise Computing Systems. 118-123 - Ashish Neupane, Weiqing Sun:
Exploring False Demand Attacks in Power Grids with High PV Penetration. 124-134 - Tomás Rabas, Jirí Bucek, Róbert Lórencz:
SPA Attack on NTRU Protected Implementation with Sparse Representation of Private Key. 135-143 - Mohammed M. Alani, Atefeh Mashatan, Ali Miri:
XMeDNN: An Explainable Deep Neural Network System for Intrusion Detection in Internet of Medical Things. 144-151 - Lu Li, Guanling Zhao, Kai Shi, Fengjun Zhang:
A Stochastic Game Model for Cloud Platform Security. 152-162 - Pedro A. Lohmann, Carlos Albuquerque, Raphael Machado:
Systematic Literature Review of Threat Modeling Concepts. 163-173 - Josef Kokes, Róbert Lórencz:
On the Use of Multiple Approximations in the Linear Cryptanalysis of Baby Rijndael. 174-179 - Yuri Gil Dantas, Simon Barner, Pei Ke, Vivek Nigam, Ulrich Schöpp:
Automating Vehicle SOA Threat Analysis Using a Model-Based Methodology. 180-191 - Michael Kiperberg, Aleksei Rozman, Aleksei Kuraev, Nezer Zaidenberg:
PDIFT: A Practical Dynamic Information-Flow Tracker. 192-198 - Philip Raschke, Patrick Herbke, Henry Schwerdtner:
t.ex-Graph: Automated Web Tracker Detection Using Centrality Metrics and Data Flow Characteristics. 199-209 - Nouf Al-Juaid, Alexei Lisitsa, Sven Schewe:
Secure Joint Querying Over Federated Graph Databases Utilising SMPC Protocols. 210-217 - Ahmed Khoumsi:
Automata-Based Study of Dynamic Access Control Policies. 218-227 - Jace Kline, Prasad Kulkarni:
A Framework for Assessing Decompiler Inference Accuracy of Source-Level Program Constructs. 228-239 - Shaojie Chen, Bo Lang, Chong Xie:
Fast-Flux Malicious Domain Name Detection Method Based on Domain Resolution Spatial Features. 240-251 - Filippo Galli, Sayan Biswas, Kangsoo Jung, Tommaso Cucinotta, Catuscia Palamidessi:
Group Privacy for Personalized Federated Learning. 252-263 - Yuri Gil Dantas, Ulrich Schöpp:
SeCloud: Computer-Aided Support for Selecting Security Measures for Cloud Architectures. 264-275 - Philipp Hofer, Michael Roland, Philipp Schwarz, René Mayrhofer:
Efficient Aggregation of Face Embeddings for Decentralized Face Recognition Deployments. 279-286 - Saida Farhat, Manel Abdelkader, Amel Meddeb-Makhlouf, Faouzi Zarai:
Evaluation of DoS/DDoS Attack Detection with ML Techniques on CIC-IDS2017 Dataset. 287-295 - Gencer Erdogan, Ragnhild Halvorsrud, Costas Boletsis, Simeon Tverdal, John Brian Pickering:
Cybersecurity Awareness and Capacities of SMEs. 296-304 - Francesco Mercaldo, Fabio Martinelli, Antonella Santone:
An Explainable Convolutional Neural Network for Dynamic Android Malware Detection. 305-312 - Ryu Watanabe, Takashi Matsunaka, Ayumu Kubota, Jumpei Urakawa:
Machine Learning Based Prediction of Vulnerability Information Subject to a Security Alert. 313-320 - Keita Emura, Masato Yoshimi:
An End-to-End Encrypted Cache System with Time-Dependent Access Control. 321-328 - Shintaro Narisada, Shohei Beppu, Kazuhide Fukushima, Shinsaku Kiyomoto:
Concrete Quantum Circuits to Prepare Generalized Dicke States on a Quantum Machine. 329-338 - Devi Padmavathi Alagarswamy, Christian Berghoff, Vasilios Danos, Fabian Langer, Thora Markert, Georg Schneider, Arndt von Twickel, Fabian Woitschek:
Towards Audit Requirements for AI-Based Systems in Mobility Applications. 339-348 - António Marques, Bruno Sousa:
CHARRA-PM: An Attestation Approach Relying on the Passport Model. 349-356 - Anastasia Dimaratos, Daniela Pöhn:
Evaluation Scheme to Analyze Keystroke Dynamics Methods. 357-365 - Hiroki Okada, Kazuhide Fukushima:
Revisiting the DFT Test in the NIST SP 800-22 Randomness Test Suite. 366-372 - Frédéric Ruellé, Quentin Guellaën, Arnaud Rosay:
SHOID: A Secure Herd of IoT Devices Firmware Update Protocol. 373-380 - Ciarán Bryce:
An Analysis of Cybersecurity Awareness Efforts for Swiss SMEs. 381-388 - Jennifer Bellizzi, Mark Vella, Christian Colombo, Julio C. Hernandez-Castro:
Using Infrastructure-Based Agents to Enhance Forensic Logging of Third-Party Applications. 389-401 - Marcus Walkow, Daniela Pöhn:
Systematically Searching for Identity-Related Information in the Internet with OSINT Tools. 402-409 - George Teseleanu:
Security Analysis of a Color Image Encryption Scheme Based on Dynamic Substitution and Diffusion Operations. 410-417 - Filip Lauterbach, Libor Michalek, Piotr Rydlichowski, Patrik Burdiak, Jaroslav Zdralek, Miroslav Voznák:
Measurements of Cross-Border Quantum Key Distribution Link. 418-423 - Marcello Maugeri, Cristian Daniele, Giampaolo Bella, Erik Poll:
Evaluating the Fork-Awareness of Coverage-Guided Fuzzers. 424-429 - Anne Borcherding, Nikolay Penkov, Mark Giraud, Jürgen Beyerer:
SWaTEval: An Evaluation Framework for Stateful Web Application Testing. 430-441 - Ahmad Akmal Aminuddin Mohd Kamal, Keiichi Iwamura:
TTP-Aided Searchable Encryption of Documents Using Threshold Secret Sharing. 442-449 - Shukun Tokas, Gencer Erdogan, Ketil Stølen:
Privacy-Aware IoT: State-of-the-Art and Challenges. 450-461 - Pia Bauspieß, Lasse Vad, Håvard Myrekrok, Anamaria Costache, Jascha Kolberg, Christian Rathgeb:
On the Feasibility of Fully Homomorphic Encryption of Minutiae-Based Fingerprint Representations. 462-470 - Alexandra Rocha, Rui Alves, Tiago Pedrosa:
Query Log Analysis for SQL Injection Detection. 471-476 - Andreas Eipper, Daniela Pöhn:
How to Design a Blue Team Scenario for Beginners on the Example of Brute-Force Attacks on Authentications. 477-484 - Daniel Reti, Karina Elzer, Hans Dieter Schotten:
SCANTRAP: Protecting Content Management Systems from Vulnerability Scanners with Cyber Deception and Obfuscation. 485-492 - Risa Sugai, Yuichi Sei, Yasuyuki Tahara, Akihiko Ohsuga:
A k-Anonymization Method for Social Network Data with Link Prediction. 493-500 - Mathew Nicho, Ibrahim Sabry:
Bypassing Multiple Security Layers Using Malicious USB Human Interface Device. 501-508 - Kaiying Luan, Ragnhild Halvorsrud, Costas Boletsis:
Evaluation of a Tool to Increase Cybersecurity Awareness Among Non-experts (SME Employees). 509-518 - Günther R. Drevin, Dirk P. Snyman, Lynette Drevin, Hennie A. Kruger, Johann Allers:
The Story of Safety Snail and Her e-Mail: A Digital Wellness and Cybersecurity Serious Game for Pre-School Children. 519-527 - Ilias Belalis, Georgios P. Spathoulas, Ioannis Anagnostopoulos:
Evading Detection During Network Reconnaissance. 528-534 - Harrison Bullock, Matthew Edwards:
Temporal Constraints in Online Dating Fraud Classification. 535-542 - Michael Diener, Thomas Bolz:
Cloud Inspector: A Tool-Based Approach for Public Administrations to Establish Information Security Processes Towards Public Clouds. 543-551 - Amélie Dieterich, Matthias Schopp, Lars Stiemert, Christoph Steininger, Daniela Pöhn:
Evaluation of Persistence Methods Used by Malware on Microsoft Windows Systems. 552-559 - Vitomir Pavlov, Florian Hahn, Mohammad El-Hajj:
Security Aspects of Digital Twins in IoT. 560-567 - Feiyang Tang, Bjarte M. Østvold, Magiel Bruntink:
Identifying Personal Data Processing for Code Review. 568-575 - Yinzheng Zhong, Alexei Lisitsa:
Online Transition-Based Feature Generation for Anomaly Detection in Concurrent Data Streams. 576-582 - Witali Bartsch, Prosanta Gope, Elif Bilge Kavun, Owen Millwood, Andriy Panchenko, Aryan Mohammadi Pasikhani, Ilia Polian:
Design Rationale for Symbiotically Secure Key Management Systems in IoT and Beyond. 583-591 - Samiah Alghamdi, Steven Furnell:
Assessing Security and Privacy Insights for Smart Home Users. 592-599 - Alexandros Karakasidis, Vassilios Vassalos:
On the Design of GDPR Compliant Workflows for Responsible Neuroimage Data Sharing. 600-607 - César Vásquez Flores, José Gonzales, Miranda Kajtazi, Joseph Bugeja, Bahtijar Vogel:
Human Factors for Cybersecurity Awareness in a Remote Work Environment. 608-616 - Chansu Han, Akira Tanaka, Jun'ichi Takeuchi, Takeshi Takahashi, Tomohiro Morikawa, Tsung-Nan Lin:
Towards Long-Term Continuous Tracing of Internet-Wide Scanning Campaigns Based on Darknet Analysis. 617-625 - Chiara Bodei, Gianpiero Costantino, Marco De Vincenzi, Ilaria Matteucci, Anna Monreale:
Vehicle Data Collection: A Privacy Policy Analysis and Comparison. 626-633 - Maria Leitner:
A Scenario-Driven Cyber Security Awareness Exercise Utilizing Dynamic Polling: Methodology and Lessons Learned. 634-642 - James R. Elste, David T. Croasdell:
Cyber Teaching Hospitals: Developing Cyber Workforce Competence. 643-650 - Hanwen Zhang, Wenyong Wang, Lisheng Huang, Junrui Wu, Fengjun Zhang, Kai Shi:
Correlating Intrusion Detection with Attack Graph on Virtual Computer Networkings. 651-658 - Rauli Kaksonen, Kimmo Halunen, Juha Röning:
Vulnerabilities in IoT Devices, Backends, Applications, and Components. 659-668 - Vanessa Bracamonte, Sebastian Pape, Sascha Löbner:
Comparing the Effect of Privacy and Non-Privacy Social Media Photo Tools on Factors of Privacy Concern. 669-676 - Yevhen Zolotavkin, Yurii Baryshev, Vitalii Lukichov, Jannik Mähn, Stefan Köpsell:
Improving Unlinkability in C-ITS: A Methodology For Optimal Obfuscation. 677-685 - Jens Leicht, Maritta Heisel:
P2BAC: Privacy Policy Based Access Control Using P-LPL. 686-697 - Ludwig Seitz, Marco Tiloca, Martin Gunnarsson, Rikard Höglund:
Secure Software Updates for IoT Based on Industry Requirements. 698-705 - Paul Tavolato, Robert Luh, Sebastian Eresheim:
A Game Theoretic Analysis of Cyber Threats. 706-713 - Michele Guerra, Roberto Milanese, Rocco Oliveto, Fausto Fasano:
RPCDroid: Runtime Identification of Permission Usage Contexts in Android Applications. 714-721 - Elias Seid, Oliver Popov, Fredrik Blix:
Towards Security Attack Event Monitoring for Cyber Physical-Systems. 722-732 - Mohammad Reza Heidari Iman, Pavel Chikul, Gert Jervan, Hayretdin Bahsi, Tara Ghasempouri:
Anomalous File System Activity Detection Through Temporal Association Rule Mining. 733-740 - Daniele Albanese, Rosangela Casolare, Giovanni Ciaramella, Giacomo Iadarola, Fabio Martinelli, Francesco Mercaldo, Marco Russodivito, Antonella Santone:
StegWare: A Novel Malware Model Exploiting Payload Steganography and Dynamic Compilation. 741-748 - Hervé Chabanne:
A Biometric Self Authentication Scheme. 749-756 - Kostas Loumponias, Sotiris Raptis, Eleni Darra, Theodora Tsikrika, Stefanos Vrochidis, Ioannis Kompatsiaris:
Forecasting Cyber-Attacks to Destination Ports Using Machine Learning. 757-764 - Areeg Samir, Håvard Dagenborg Johansen:
A Self-Configuration Controller To Detect, Identify, and Recover Misconfiguration at IoT Edge Devices and Containerized Cluster System. 765-773 - Kaushik Krishnan Balaji, Dimah Almani, Steven Furnell:
Assessing the Impact of Attacks on Connected and Autonomous Vehicles in Vehicular Ad Hoc Networks. 774-782 - Mahboobeh Dorafshanian, Mohamed Mejri:
Differential Privacy: Toward a Better Tuning of the Privacy Budget (ε) Based on Risk. 783-792 - Erika A. Leal, Cimone Wright-Hamor, Joseph B. Manzano, Nicholas J. Multari, Kevin J. Barker, David O. Manz, Jiang Ming:
Assessing Risk in High Performance Computing Attacks. 793-803
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.