default search action
18th ACNS 2020: Rome, Italy - Workshops
- Jianying Zhou, Mauro Conti, Chuadhry Mujeeb Ahmed, Man Ho Au, Lejla Batina, Zhou Li, Jingqiang Lin, Eleonora Losiouk, Bo Luo, Suryadipta Majumdar, Weizhi Meng, Martín Ochoa, Stjepan Picek, Georgios Portokalidis, Cong Wang, Kehuan Zhang:
Applied Cryptography and Network Security Workshops - ACNS 2020 Satellite Workshops, AIBlock, AIHWS, AIoTS, Cloud S&P, SCI, SecMT, and SiMLA, Rome, Italy, October 19-22, 2020, Proceedings. Lecture Notes in Computer Science 12418, Springer 2020, ISBN 978-3-030-61637-3
AIBlock - Application Intelligence and Blockchain Security
- Gustavo Betarte, Maximiliano Cristiá, Carlos Daniel Luna, Adrián Silveira, Dante Zanarini:
Towards a Formally Verified Implementation of the MimbleWimble Cryptocurrency Protocol. 3-23 - Javier Arcenegui, Rosario Arjona, Iluminada Baturone:
Secure Management of IoT Devices Based on Blockchain Non-fungible Tokens and Physical Unclonable Functions. 24-40 - Alexandre Augusto Giron, Jean Everson Martina, Ricardo Felipe Custódio:
Bitcoin Blockchain Steganographic Analysis. 41-57 - Yasar Berkay Taçyildiz, Orhan Ermis, Gürkan Gür, Fatih Alagöz:
Dynamic Group Key Agreement for Resource-constrained Devices Using Blockchains. 58-76 - Ashutosh Gupta, Jash Rathod, Dhiren Patel, Jay Bothra, Sanket Shanbhag, Tanmay Bhalerao:
Tokenization of Real Estate Using Blockchain Technology. 77-90
AIHWS - Artificial Intelligence in Hardware Security
- Dirmanto Jap, Ville Yli-Mäyry, Akira Ito, Rei Ueno, Shivam Bhasin, Naofumi Homma:
Practical Side-Channel Based Model Extraction Attack on Tree-Based Machine Learning Algorithm. 93-105 - Servio Paguada, Unai Rioja, Igor Armendariz:
Controlling the Deep Learning-Based Side-Channel Analysis: A Way to Leverage from Heuristics. 106-125 - Huimin Li, Marina Krcek, Guilherme Perin:
A Comparison of Weight Initializers in Deep Learning-Based Side-Channel Analysis. 126-143 - Valence Cristiani, Maxime Lecomte, Philippe Maurine:
Leakage Assessment Through Neural Estimation of the Mutual Information. 144-162 - Mansoureh Labafniya, Shahram Etemadi Borujeni, Nele Mentens:
Evolvable Hardware Architectures on FPGA for Side-Channel Security. 163-180 - Go Takatoi, Takeshi Sugawara, Kazuo Sakiyama, Yang Li:
Simple Electromagnetic Analysis Against Activation Functions of Deep Neural Networks. 181-197 - Leo Weissbart:
Performance Analysis of Multilayer Perceptron in Profiling Side-Channel Analysis. 198-216 - Servio Paguada, Igor Armendariz:
The Forgotten Hyperparameter: - Introducing Dilated Convolution for Boosting CNN-Based Side-Channel Attacks. 217-236
AIoTS - Artificial Intelligence and Industrial IoT Security
- Rong Fan, Jianfeng Pan, Shaomang Huang:
ARM-AFL: Coverage-Guided Fuzzing Framework for ARM-Based IoT Devices. 239-254 - Andrei Bytes, Jianying Zhou:
Post-exploitation and Persistence Techniques Against Programmable Logic Controller. 255-273 - Sridhar Adepu, Venkata Reddy Palleti, Gyanendra Mishra, Aditya Mathur:
Investigation of Cyber Attacks on a Water Distribution System. 274-291
Cloud S&P - Cloud Security and Privacy
- Abbass Madi, Renaud Sirdey, Oana Stan:
Computing Neural Networks with Homomorphic Encryption and Verifiable Computing. 295-317 - Hai-Van Dang, Amjad Ullah, Alexandros Bakas, Antonis Michalas:
Attribute-Based Symmetric Searchable Encryption. 318-336 - Tanusree Sharma, Tian Wang, Carlo Di Giulio, Masooda N. Bashir:
Towards Inclusive Privacy Protections in the Cloud. 337-359 - Benjamin Semal, Konstantinos Markantonakis, Raja Naeem Akram, Jan Kalbantner:
A Study on Microarchitectural Covert Channel Vulnerabilities in Infrastructure-as-a-Service. 360-377
SCI - Secure Cryptographic Implementation
- Yanhua Zhang, Ximeng Liu, Yifeng Yin, Qikun Zhang, Huiwen Jia:
On New Zero-Knowledge Proofs for Fully Anonymous Lattice-Based Group Signature Scheme with Verifier-Local Revocation. 381-399 - Weijing You, Bo Chen:
Proofs of Ownership on Encrypted Cloud Data via Intel SGX. 400-416 - Bowen Xu, Xin Xu, Quanwei Cai, Wei Wang, Qiongxiao Wang:
On the Verification of Signed Messages. 417-434 - Ziqiang Ma, Bingyu Li, Quanwei Cai, Jun Yang:
Applications and Developments of the Lattice Attack in Side Channel Attacks. 435-452 - Bingyu Li, Fengjun Li, Ziqiang Ma, Qianhong Wu:
Exploring the Security of Certificate Transparency in the Wild. 453-470
SecMT - Security in Mobile Technologies
- Alexander Druffel, Kris Heid:
DaVinci: Android App Analysis Beyond Frida via Dynamic System Call Instrumentation. 473-489 - Davide Caputo, Luca Verderame, Alessio Merlo:
MobHide: App-Level Runtime Data Anonymization on Mobile. 490-507 - Christos Avraam, Elias Athanasopoulos:
Evaluation of the Adoption and Privacy Risks of Google Prompts. 508-522 - Anatoli Kalysch, Joschua Schilling, Tilo Müller:
On the Evolution of Security Issues in Android App Versions. 523-541
SiMLA - Security in Machine Learning and Its Applications
- Thomas Thebaud, Gaël Le Lan, Anthony Larcher:
Unsupervised Labelling of Stolen Handwritten Digit Embeddings with Density Matching. 545-563 - Michael McCoyd, Won Park, Steven Chen, Neil Shah, Ryan Roggenkemper, Minjune Hwang, Jason Xinyu Liu, David A. Wagner:
Minority Reports Defense: Defending Against Adversarial Patches. 564-582
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.