


default search action
17th SecureComm 2024: Dubai, UAE - Part III
- Saed Alrabaee

, Kim-Kwang Raymond Choo
, Ernesto Damiani
, Robert H. Deng
:
Security and Privacy in Communication Networks - 20th EAI International Conference, SecureComm 2024, Dubai, United Arab Emirates, October 28-30, 2024, Proceedings, Part III. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 629, Springer 2026, ISBN 978-3-031-94454-3
Fuzzing and IoT Security
- Mingfeng Xin, Liting Deng, Hui Wen, Dongliang Fang, Shichao Lv, Limin Sun:

Fast Firmware Fuzz with Input/Output Reposition. 3-27 - Saurabh Joshi, Paria Shirani:

ChipFuzzer: Towards Fuzzing Matter-Based IoT Devices for Vulnerability Detection. 28-50 - Masaru Matsubayashi, Toshiki Shibahara, Takuma Koyama, Masashi Tanaka:

Reusability Evaluation of Reports in Security Operation Centers for IoT with Sentence ALBERT and Jaccard Similarity. 51-72 - Haofei Wang, Li-Ping Wang, Liang Feng Zhang, Huaxiong Wang:

Multi-Server Publicly Verifiable Computation of Polynomials. 73-90 - Zineb Meriem Ferdjouni, Abdullah Qasem, Mourad Debbabi:

Siamese Neural Network for Robust IoT Device-Type Identification: A Few-Shot Learning Approach. 91-112 - Hao Pan, Xiangpu Song, Honglin Wu, Kai Wang, Shanqing Guo, Xing Yang:

FISFuzzer: A Grey-Box Protocol Fuzzer Based on Field Inference and Scheduling. 113-135
Malware and Attack Analysis
- Hong Lei, Hequn Xian, Xiaowei Peng:

Mal-POBM: A Genetic Algorithm for Malware Adversarial Sample Generation. 139-153 - Priti Prabhakar Wakodikar, Joon-Young Gwak, Meng Wang, Guanhua Yan, Xiaokui Shu, Scott D. Stoller, Ping Yang:

Graphite: Real-Time Graph-Based Detection of Windows Fileless Malware Attacks. 154-178 - Riccardo Spolaor, Tianhao Chen, Pengfei Hu, Xiuzhen Cheng:

Robust Network Intrusion Detection via Semi-supervised Deep Reinforcement Learning. 179-202 - Fei Zuo, Cody Tompkins, Qiang Zeng, Lannan Luo, Yung Ryn Choe, Junghwan Rhee:

BinSimDB: Benchmark Dataset Construction for Fine-Grained Binary Code Similarity Analysis. 203-225 - Zhengxin Xu, Jie Cao, Yujie Hou, Yuwei Xu, Guang Cheng:

OnionPeeler: A Novel Input-Enriched Website Fingerprinting Attack on Tor Onion Services. 226-246
Web Security
- Bahareh Parhizkari, Antonio Ken Iannillo, Christof Ferreira Torres, Sebastian Banescu, Joseph Jiaqi Xu, Radu State:

Beyond the Public Mempool: Catching DeFi Attacks Before They Happen with Real-Time Smart Contract Analysis. 249-273 - Shubham Joshi, Dillon Davidson, Yeonjoon Lee, Homook Cho, Junggab Son:

Ensuring Integrity in Online Content Usage and Download Counting with Smart Contracts. 274-296 - Takashi Koide, Naoki Fukushi, Hiroki Nakano, Daiki Chiba:

ChatSpamDetector: Leveraging Large Language Models for Effective Phishing Email Detection. 297-319 - Beliz Kaleli, Manuel Egele, Gianluca Stringhini:

EasyCSPeasy: A Server-Side and Language-Agnostic XSS Mitigation by Devising and Ensuring Compliance with CSP. 320-346 - Jemin Ahn, Dorian Akhavan, Woohwan Jung, Kyungtae Kang, Junggab Son:

Encoder-Based Multimodal Ensemble Learning for High Compatibility and Accuracy in Phishing Website Detection. 347-365 - Jiachen Zhang, He Yang, Yueming Lu, Daoqi Han, Gang Jin:

Bag-of-Characters: A Multiple Instance Learning Framework for URL Embedding in Web Security. 366-383 - Nan Zhuang, Haonan Miao, Xiangxue Li:

AutoS2ploit: From Automotive Safety-Critical Functionalities to Security Exploit. 384-405 - Samir Hodzic, Andreas Brasen Kidmose, Brooke Elizabeth Kidmose, Lars Ramkilde Knudsen, Weizhi Meng:

Pitfalls of Data Masking Techniques: Re-identification Attacks. 406-428 - Yujun Liu, Ning Ding:

Faster Three-Party Constant-Round Comparison with Application in Neural Network Inference. 429-447 - Zhiming Hu, Yang Fan, Xi Yang, Guoqiang Zhang:

WtLDP: Generating Synthetic Decentralized Weighted Graphs with Local Differential Privacy. 448-462 - Yuwei Xu, Yunpeng Bai, Jie Cao, Yuanyuan Xu, Liang He, Guang Cheng:

Tarnhelm: Using Adversarial Samples to Protect User Privacy Against Traffic Identification. 463-482

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














