


default search action
18th ACNS 2020: Rome, Italy - Workshops
- Jianying Zhou
, Mauro Conti
, Chuadhry Mujeeb Ahmed
, Man Ho Au
, Lejla Batina
, Zhou Li
, Jingqiang Lin, Eleonora Losiouk
, Bo Luo, Suryadipta Majumdar
, Weizhi Meng
, Martín Ochoa
, Stjepan Picek
, Georgios Portokalidis
, Cong Wang
, Kehuan Zhang:
Applied Cryptography and Network Security Workshops - ACNS 2020 Satellite Workshops, AIBlock, AIHWS, AIoTS, Cloud S&P, SCI, SecMT, and SiMLA, Rome, Italy, October 19-22, 2020, Proceedings. Lecture Notes in Computer Science 12418, Springer 2020, ISBN 978-3-030-61637-3
AIBlock - Application Intelligence and Blockchain Security
- Gustavo Betarte, Maximiliano Cristiá
, Carlos Daniel Luna, Adrián Silveira
, Dante Zanarini:
Towards a Formally Verified Implementation of the MimbleWimble Cryptocurrency Protocol. 3-23 - Javier Arcenegui
, Rosario Arjona
, Iluminada Baturone
:
Secure Management of IoT Devices Based on Blockchain Non-fungible Tokens and Physical Unclonable Functions. 24-40 - Alexandre Augusto Giron, Jean Everson Martina, Ricardo Felipe Custódio:
Bitcoin Blockchain Steganographic Analysis. 41-57 - Yasar Berkay Taçyildiz, Orhan Ermis, Gürkan Gür
, Fatih Alagöz:
Dynamic Group Key Agreement for Resource-constrained Devices Using Blockchains. 58-76 - Ashutosh Gupta, Jash Rathod, Dhiren Patel, Jay Bothra, Sanket Shanbhag, Tanmay Bhalerao:
Tokenization of Real Estate Using Blockchain Technology. 77-90
AIHWS - Artificial Intelligence in Hardware Security
- Dirmanto Jap, Ville Yli-Mäyry, Akira Ito, Rei Ueno, Shivam Bhasin, Naofumi Homma:
Practical Side-Channel Based Model Extraction Attack on Tree-Based Machine Learning Algorithm. 93-105 - Servio Paguada
, Unai Rioja
, Igor Armendariz
:
Controlling the Deep Learning-Based Side-Channel Analysis: A Way to Leverage from Heuristics. 106-125 - Huimin Li, Marina Krcek, Guilherme Perin:
A Comparison of Weight Initializers in Deep Learning-Based Side-Channel Analysis. 126-143 - Valence Cristiani, Maxime Lecomte, Philippe Maurine:
Leakage Assessment Through Neural Estimation of the Mutual Information. 144-162 - Mansoureh Labafniya, Shahram Etemadi Borujeni, Nele Mentens
:
Evolvable Hardware Architectures on FPGA for Side-Channel Security. 163-180 - Go Takatoi, Takeshi Sugawara
, Kazuo Sakiyama, Yang Li:
Simple Electromagnetic Analysis Against Activation Functions of Deep Neural Networks. 181-197 - Leo Weissbart:
Performance Analysis of Multilayer Perceptron in Profiling Side-Channel Analysis. 198-216 - Servio Paguada
, Igor Armendariz
:
The Forgotten Hyperparameter: - Introducing Dilated Convolution for Boosting CNN-Based Side-Channel Attacks. 217-236
AIoTS - Artificial Intelligence and Industrial IoT Security
- Rong Fan
, Jianfeng Pan, Shaomang Huang:
ARM-AFL: Coverage-Guided Fuzzing Framework for ARM-Based IoT Devices. 239-254 - Andrei Bytes, Jianying Zhou
:
Post-exploitation and Persistence Techniques Against Programmable Logic Controller. 255-273 - Sridhar Adepu, Venkata Reddy Palleti, Gyanendra Mishra, Aditya Mathur:
Investigation of Cyber Attacks on a Water Distribution System. 274-291
Cloud S&P - Cloud Security and Privacy
- Abbass Madi, Renaud Sirdey
, Oana Stan
:
Computing Neural Networks with Homomorphic Encryption and Verifiable Computing. 295-317 - Hai-Van Dang, Amjad Ullah, Alexandros Bakas, Antonis Michalas
:
Attribute-Based Symmetric Searchable Encryption. 318-336 - Tanusree Sharma, Tian Wang, Carlo Di Giulio, Masooda N. Bashir
:
Towards Inclusive Privacy Protections in the Cloud. 337-359 - Benjamin Semal, Konstantinos Markantonakis, Raja Naeem Akram
, Jan Kalbantner
:
A Study on Microarchitectural Covert Channel Vulnerabilities in Infrastructure-as-a-Service. 360-377
SCI - Secure Cryptographic Implementation
- Yanhua Zhang, Ximeng Liu, Yifeng Yin
, Qikun Zhang, Huiwen Jia:
On New Zero-Knowledge Proofs for Fully Anonymous Lattice-Based Group Signature Scheme with Verifier-Local Revocation. 381-399 - Weijing You, Bo Chen:
Proofs of Ownership on Encrypted Cloud Data via Intel SGX. 400-416 - Bowen Xu, Xin Xu, Quanwei Cai, Wei Wang, Qiongxiao Wang:
On the Verification of Signed Messages. 417-434 - Ziqiang Ma, Bingyu Li, Quanwei Cai, Jun Yang:
Applications and Developments of the Lattice Attack in Side Channel Attacks. 435-452 - Bingyu Li, Fengjun Li
, Ziqiang Ma, Qianhong Wu:
Exploring the Security of Certificate Transparency in the Wild. 453-470
SecMT - Security in Mobile Technologies
- Alexander Druffel, Kris Heid:
DaVinci: Android App Analysis Beyond Frida via Dynamic System Call Instrumentation. 473-489 - Davide Caputo
, Luca Verderame
, Alessio Merlo
:
MobHide: App-Level Runtime Data Anonymization on Mobile. 490-507 - Christos Avraam, Elias Athanasopoulos:
Evaluation of the Adoption and Privacy Risks of Google Prompts. 508-522 - Anatoli Kalysch, Joschua Schilling, Tilo Müller:
On the Evolution of Security Issues in Android App Versions. 523-541
SiMLA - Security in Machine Learning and Its Applications
- Thomas Thebaud
, Gaël Le Lan
, Anthony Larcher
:
Unsupervised Labelling of Stolen Handwritten Digit Embeddings with Density Matching. 545-563 - Michael McCoyd
, Won Park
, Steven Chen, Neil Shah, Ryan Roggenkemper, Minjune Hwang
, Jason Xinyu Liu
, David A. Wagner:
Minority Reports Defense: Defending Against Adversarial Patches. 564-582

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.