Securing LSB embedding against structural steganalysis
This work explores the extent to which LSB embedding can be made secure against structural steganalysis through a modification of cover image statistics prior to message embedding. LSB embedding disturbs the statistics of consecutive k-tuples of pixels, ...
Deep learning for detecting logic-flaw-exploiting network attacks: An end-to-end approach
Network attacks have become a major security concern for organizations worldwide. A category of network attacks that exploit the logic (security) flaws of a few widely-deployed authentication protocols has been commonly observed in recent years. Such ...
Automatic generation of sources lemmas in Tamarin: Towards automatic proofs of security protocols1
- Véronique Cortier,
- Stéphanie Delaune,
- Jannik Dreier,
- Elise Klein,
- Kaitai Liang,
- Liqun Chen,
- Ninghui Li,
- Steve Schneider
Tamarin is a popular tool dedicated to the formal analysis of security protocols. One major strength of the tool is that it offers an interactive mode, allowing to go beyond what push-button tools can typically handle. Tamarin is for example able to ...
On the feasibility of crawling-based attacks against recommender systems1
- Fabio Aiolli,
- Mauro Conti,
- Stjepan Picek,
- Mirko Polato,
- Kaitai Liang,
- Liqun Chen,
- Ninghui Li,
- Steve Schneider
Nowadays, online services, like e-commerce or streaming services, provide a personalized user experience through recommender systems. Recommender systems are built upon a vast amount of data about users/items acquired by the services. Such knowledge ...
Towards post-quantum security for cyber-physical systems: Integrating PQC into industrial M2M communication1
The threat of a cryptographically relevant quantum computer contributes to an increasing interest in the field of post-quantum cryptography (PQC). Compared to existing research efforts regarding the integration of PQC into the Transport Layer Security (...