


default search action
28th ISC 2025: Seoul, South Korea
- Sang Kil Cha

, Jeongeun Park
:
Information Security - 28th International Conference, ISC 2025, Seoul, South Korea, October 20-22, 2025, Proceedings. Lecture Notes in Computer Science 16186, Springer 2026, ISBN 978-3-032-08123-0
Cryptanalysis and Cipher Security
- Zhongxin Zhang

, Yincen Chen, Ling Song
, Yin Lv
:
Improving the Differential-Linear Attack with Applications to GIFT-COFB, GIFT-64 and HyENA. 3-23 - Senlin Liu

, Dongshu Cai, Dongchi Han
, Hongbo Liu, Xianhui Lu:
Keyless Physical-Layer Cryptography. 24-44 - Yusuke Naito, Yu Sasaki, Takeshi Sugawara:

The Multi-user Security of GCM-SST and Further Enhancements. 45-65
Network Security
- Jinghui Cheng

, Fanping Zeng:
SimSeq: A Robust TLS Traffic Classification Method. 69-88 - Chengdong Wang, Bo Yu, Lin Yang:

EvoFuzz: Enhancing State Space Exploration and Seed Prioritization in Stateful Protocol Fuzzing Using Evolutionary Game Theory. 89-106 - Johanna Henrich, Nicolai Schmitt

, Nouri Alnahawi
, Andreas Heinemann
:
A Lot of Data and Added Complexity. How Does PQC Affect the Performance of My TLS Connection? 107-128
Post-quantum Cryptography
- Lisha Yao, Jian Weng, Pengfei Wu, Guofeng Tang, Guomin Yang, Haiyang Xue, Robert H. Deng:

Conditional Attribute-Based PRE: Definition and Construction from LWE. 131-151 - Sohyun Jeon

, Calvin Abou Haidar
, Mehdi Tibouchi
:
LastRings: Lattice-Based Scalable Threshold Ring Signatures. 152-172
Side-Channel Attacks and Countermeasures
- Nicolai Schmitt

, Jannik Zeitschner, Andreas Heinemann
:
Simulation-Based Software Leakage Evaluation for the RISC-V Platform. 175-195 - Hao Ma, Zhidong Wang, Da Xie, Ciyan Ouyang, Wei Song:

GIR-Cache: Mitigating Conflict-Based Cache Side-Channel Attacks via Global Indirect Replacement. 196-215 - Anastasiia Belousova

, Francesco Marchiori
, Mauro Conti
:
Inference Attacks on Encrypted Online Voting via Traffic Analysis. 216-236
AI Security
- Yinglong Li, Bingyuan Chen, Qingyan Jiang, Tieming Chen:

MSPP-Net: Fine-Grained Image Privacy Identification via Multi-stage Semantic Perception. 239-257 - Xiaofei Huang, Xiaojie Zhu, Chi Chen:

Exploring Backdoor Attacks in Federated Learning Under Parameter-Efficient Fine-Tuning. 258-278 - Shahriar Rahman Khan

, Tariqul Islam
, Raiful Hasan:
Spoofing Camera Source Attribution via PRNU Transfer Attacks on Physical and AI Generated Images. 279-299
Biometric Security
- Wataru Nakamura

, Yusei Suzuki, Masakazu Fujio, Kenta Takahashi:
Comparative Evaluation of Lattices for Fuzzy Extractors and Fuzzy Signatures. 303-322 - Sara Majbour, Morgan Barbier, Jean-Marie Le Bars:

A New Code-Based Formulation of the Fuzzy Vault Scheme. 323-344
Malware Analysis
- Yanbing Shen, Hao Sun, Jiacheng Wang, Haitao Xu, Gang Liu, Fan Zhang:

HoneySentry: A High-Fidelity Interactive IoT Honeypot for Advanced Threat Detection. 347-366 - Kensei Ma, Chansu Han, Akira Tanaka, Takeshi Takahashi, Jun'ichi Takeuchi:

Towards Architecture-Independent Function Call Analysis for IoT Malware. 367-387 - Mohammad Reza Norouzian, Claudia M. Eckert:

HGANN-Mal: A Hypergraph Attention Neural Network Approach for Android Malware Detection. 388-408
Systems Security
- Magnus Wiik Eckhoff, Peter Marius Flydal, Siem Peters, Martin Eian, Jonas Halvorsen, Vasileios Mavroeidis, Gudmund Grov:

A Graph-Based Approach to Alert Contextualisation in Security Operations Centres. 411-430 - Lionel Hemmerlé, Guillaume Hiet, Frédéric Tronel

, Pierre Wilke, Jean-Christophe Prévotet:
HYPERSEC: An Extensible Hypervisor-Assisted Framework for Kernel Rootkit Detection. 431-451 - Jihoon Kwon, Junho Lee

, Myeongyeol Lee
, Hyuna Seo
, Jinho Jung:
BootMarker: UEFI Bootkit Defense via Control-Flow Verification. 452-473 - Xinyu Bai, Yisen Wang, Jiajun Du, Chen Liang, Siyuan Liang, Zirui Jiang:

Ali2Vul: Binary Vulnerability Dataset Expansion via Cross-Modal Alignment. 474-493
Access Control and Privacy
- Tassos Dimitriou, Shahad Alshaher:

CryptNyx: Password-Hardened Encryption with Strong Anonymity Guarantees. 497-517 - Amin Mohammadali, Riham AlTawy

:
Efficient Dynamic Group Signatures with Forward Security. 518-538 - Nikhill Vombatkere

, Philip W. L. Fong:
Zero Trust Continuous Authentication Models and Automated Policy Formulation. 539-559
Smart Contracts and Blockchain Security
- Zixuan Niu, Xiaofeng Li, He Zhao, Tong Zhou, Haotian Cheng:

Jakiro: A Cross-Modal Contrastive Learning Framework for Detecting Vulnerabilities in Smart Contracts. 563-580 - Chi Feng

, Lei Fan
:
BlockLens: Detecting Malicious Transactions in Ethereum Using LLM Techniques. 581-601

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














