


default search action
18th NSS 2024: Abu Dhabi, United Arab Emirates
- Houbing Herbert Song
, Roberto Di Pietro
, Saed Alrabaee
, Mohammad Tubishat
, Mousa Al-Kfairy
, Omar Alfandi
:
Network and System Security - 18th International Conference, NSS 2024, Abu Dhabi, United Arab Emirates, November 20-22, 2024, Proceedings. Lecture Notes in Computer Science 15564, Springer 2025, ISBN 978-981-96-3530-6
Authentication and Security
- Yoshiro Matsuoka, Sohto Chiku, Keisuke Hara
, Junji Shikata
:
How to Accomplish Key and Communication Compression Over Authentication Channels - Proxy Re-authentication and Its Instantiations. 3-20 - Ryan Williams, Anthony Gavazzi, Engin Kirda:
Enhancing Network Security Through Vulnerability Monitoring. 21-38 - Gerald Palfinger
:
AndroPROTECT: Hardening the Android API Against Fingerprinting. 39-59
Privacy and Encryption
- David Monschein
, Oliver P. Waldhorst
:
Optimizing Privacy-Preserving Continuous Authentication of Mobile Devices. 63-81 - Ali Reza Ghavamipour
, Benjamin Zi Hao Zhao
, Fatih Turkmen
:
PPDL: Efficient Dropout-Resilient Aggregation for Privacy-Preserving Decentralized Learning. 82-106 - Edona Fasllija
, Jakob Heher, Stefan More
:
Credential Issuance Transparency: A Privacy-Preserving Audit Log of Credential Issuance. 107-126 - Shota Tokuda, Shohei Kakei
, Yoshiaki Shiraishi
, Shoichi Saito
:
Decentralized Data Usage Control with Confidential Data Processing on Trusted Execution Environment and Distributed Ledger Technology. 127-144
Malware Detection and Prevention
- Minh Tien Truong, Nils Gruschka
, Luigi Lo Iacono
:
You Can't Touch This: Detecting Typosquatting Packages for Enhanced Malware Prevention in Software Supply Chains. 147-166 - Attila Mester
, Zalán Bodó, P. Vinod
, Mauro Conti
:
Towards a Malware Family Classification Model Using Static Call Graph Instruction Visualization. 167-186 - Safayat Bin Hakim, Muhammad Adil, Kamal Acharya, Houbing Herbert Song:
Decoding Android Malware with a Fraction of Features: An Attention-Enhanced MLP-SVM Approach. 187-209
System Security and Prevention
- Hiroki Kuzuno
, Toshihiro Yamauchi
:
RKPM: Restricted Kernel Page Mechanism to Mitigate Privilege Escalation Attacks. 213-231 - Muhammad Salman, I. Wayan Budi Santana, Muhammad Ikram, Mohamed Ali Kâafar:
Auditing and Attributing Behaviours of Suspicious Android Health Applications. 232-253 - Yazan Alahmed
, Reema Abadla, Mahmoud Khasawneh
:
Perceived Privacy Conflicts and Monitoring: A Study of Their Effects on Trust and Data Sharing in Social Networks. 254-274
Network and Infrastructure Security
- Zeya Umayya, Arpit Nandi, Amartyo Roy, Sambuddho Chakravarty:
Every Sherlock Needs a Watson: Practical Semi-realtime Attack Elaboration System. 277-300 - Maurantonio Caprolu
, Simone Raponi
, Roberto Di Pietro
:
Sharing Is (S)caring: Security and Privacy Issues in Decentralized Physical Infrastructure Networks (DePIN). 301-318 - S. Jithin, Richa Gupta, Reeshabh Kumar Ranjan, Shreyansh Nagpal, Mukulika Maity, Sambuddho Chakravarty:
VoIP Vanguard: A Practical Front Line Defense Against VoIP Identification Attacks in Tor. 319-346
Blockchain and Smart Contracts
- Wan Kai Wong, Naipeng Dong, Cong Minh Dinh:
PQS-BC: Comparative Analysis of NIST Post-quantum Signatures for Blockchain. 349-369 - Partha Sarathi Chakraborty
, Somanath Tripathy
:
SPVPC: Smart Contract Based Publicly Verifiable Polynomial Computations. 370-386 - Gayle Frisbie, Omar A. Darwish
, Anas M. R. Alsobeh
, Abdallah Al-shorman:
Identifying the Origins of Business Data Breaches Through CTC Detection. 387-406
Data Security
- Zian Liu, Shigang Liu, Lei Pan, Chao Chen, Ejaz Ahmed, Jun Zhang, Dongxi Liu:
VulMatch: Binary-Level Vulnerability Detection Through Signature. 409-427 - Saed Alrabaee, Mousa Al-Kfairy, Mohammad Bany Taha, Omar Alfandi, Fatma Taher, Jie Tang:
Revisiting Binary Code Authorship Analysis. 428-449

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.