


default search action
21st SECRYPT 2024: Dijon, France
- Sabrina De Capitani di Vimercati, Pierangela Samarati:

Proceedings of the 21st International Conference on Security and Cryptography, SECRYPT 2024, Dijon, France, July 8-10, 2024. SCITEPRESS 2024, ISBN 978-989-758-709-2
Invited Speakers
- Vicenç Torra:

Explainability and Privacy-Preserving Data-Driven Models. SECRYPT 2024: 5 - Vincenzo Piuri:

Artificial Intelligence for Biometrics. SECRYPT 2024: 7
Papers
- Argiro Anagnostopoulou, Thomas Papaloukas, George Stergiopoulos, Dimitris Gritzalis:

From Plant to Lab: Industrial Emulation Tools for Real-World Security Testing in Industrial Control Systems. 13-25 - Leonard Bradatsch, Artur Hermann, Frank Kargl:

Attribute Threat Analysis and Risk Assessment for ABAC and TBAC Systems. 26-39 - Sara Majbour, Morgan Barbier, Jean-Marie Le Bars:

Fuzzy Vault Security Enhancement Avoid Statistical Biases. 40-51 - Georg Bramm

, Melek Önen, Martin Schanzenbach
, Ilya Komarov, Frank Morgner, Christian Tiebel, Juan Cadavid:
UPCARE: User Privacy-Preserving Cancer Research Platform. 52-63 - Mónica P. Arenas, Gabriele Lenzini, Mohammadamin Rakeei, Peter Y. A. Ryan, Marjan Skrobot, Maria Zhekova:

Verifying Artifact Authenticity with Unclonable Optical Tags. 64-77 - Peter Amthor, René Gorges

:
A Composition Algebra for Decentralized Enforcement of Access Control Policies with an Application to Vehicular Networks. 78-90 - Helene Orsini, Yufei Han:

DYNAMO: Towards Network Attack Campaign Attribution via Density-Aware Active Learning. 91-102 - Rudrapatna K. Shyamasundar:

Characterization of Consensus Correctness in Ripple (XRP) Networks. 103-113 - Mahdi Akil

, Leonardo A. Martucci, Jaap-Henk Hoepman:
A Secure and Privacy-Preserving Authentication Scheme with a Zero-Trust Approach to Vehicle Renting in VANETs. 114-127 - Ferucio Laurentiu Tiplea:

On Privacy of RFID-Based Authentication Protocols. 128-139 - Matthew Yudin, Achyut Reddy, Sridhar Venkatesan, Rauf Izmailov:

Backdoor Attacks During Retraining of Machine Learning Models: A Mitigation Approach. 140-150 - Vanessa Bracamonte, Yohko Orito, Yasunori Fukuta, Kiyoshi Murata, Takamasa Isohara:

Perception of Privacy Tools for Social Media: A Qualitative Analysis Among Japanese. 151-162 - Derkjan Elzinga, Stan Ruessink, Giuseppe Cascavilla

, Damian A. Tamburri, Francesco Leotta, Massimo Mecella, Willem-Jan van den Heuvel:
Violence Detection: A Serious-Gaming Approach. 163-174 - Elijah Bass, Massimiliano Albanese, Marcos Zampieri:

DISC: A Dataset for Information Security Classification. 175-185 - Mohammed Lansari, Reda Bellafqira, Katarzyna Kapusta, Vincent Thouvenot, Olivier Bettan, Gouenou Coatrieux:

A White-Box Watermarking Modulation for Encrypted DNN in Homomorphic Federated Learning. 186-197 - Mounira Msahli, Pascal Lafourcade, Dhekra Mahmoud:

Formal Analysis of C-ITS PKI Protocols. 198-210 - Md. Al Amin, Hemanth Tummala, Rushabh Shah, Indrajit Ray:

Balancing Patient Privacy and Health Data Security: The Role of Compliance in Protected Health Information (PHI) Sharing. 211-223 - Myria Bouhaddi

, Kamel Adi
:
Enhancing Privacy in Machine Learning: A Robust Approach for Preventing Attribute Inference Attacks. 224-236 - Alphaeus Dmonte, Marcos Zampieri, Kevin Lybarger

, Massimiliano Albanese
, Genya Coulter:
Classifying Human-Generated and AI-Generated Election Claims in Social Media. 237-248 - Frederik Armknecht

, Christian Müller
:
Towards a Cryptographic Model for Wireless Communication. 249-261 - Julien Maillard, Thomas Hiscock, Maxime Lecomte, Christophe Clavier:

Cache Side-Channel Attacks Through Electromagnetic Emanations of DRAM Accesses. 262-273 - Clémentine Gritti, Emanuel Regnath

, Sebastian Steinhorst:
MATRaCAE: Time-Based Revocable Access Control in the IoT. 274-285 - Kevin Dennis, Bianca Dehaan, Parisa Momeni, Gabriel Laverghetta, Jay Ligatti:

Large-Scale Analysis of GitHub and CVEs to Determine Prevalence of SQL Concatenations. 286-297 - Arijit Karati

, Ting-Yu Chen, Kai-Yao Lin:
QuDPas-FHA: Quantum-Defended Privacy-Preserved Fast Handover Authentication in Space Information Networks. 298-309 - Tymoteusz Lindner, Tomasz Hawro, Piotr Syga

:
Imperceptible QR Watermarks in High-Resolution Videos. 310-322 - Sebastian Raubitzek, Sebastian Schrittwieser, Caroline Lawitschka, Kevin Mallinger, Andreas Ekelhart, Edgar R. Weippl:

Code Obfuscation Classification Using Singular Value Decomposition on Grayscale Image Representations. 323-333 - Chiara Braghin, Elvinia Riccobene, Simone Valentini:

An ASM-Based Approach for Security Assessment of Ethereum Smart Contracts. 334-344 - El Mostapha Chakir, Marouane Hachimi, Mohammed Erradi:

Towards a Secure and Intelligent Access Control Policy Adapter for Big Data Environment. 345-356 - Inoussa Mouiche, Sherif Saad:

TI-NERmerger: Semi-Automated Framework for Integrating NER Datasets in Cybersecurity. 357-370 - Buvana Ganesh

, Mosabbah Mushir Ahmed, Alieeldin Mady:
Higher Order Leakage Assessment and Neural Network-based Attack on CRYSTALS-Kyber. 373-380 - Koon-Ming Chan

, Swee-Huay Heng, Syh-Yuan Tan, Shing Chiang Tan:
K-Resilient Public Key Authenticated Encryption with Keyword Search. 381-388 - Benjamin Aziz, Estabraq H. Makiyah

, Aysha Bukhelli:
An Extended Method for Transmitting Secret Messages in Textual Documents Based on Paragraph Resizing. 389-396 - Salah S. Harb, M. Omair Ahmad, M. N. S. Swamy:

High-Speed Pipelined FPGA Implementation of a Robust Steganographic Scheme for Secure Data Communication Systems. 397-406 - Sara Nikula

, Anssi Lintulampi
, Kimmo Halunen:
Security Analysis for BB84 Key Distillation. 407-415 - Claudio Curto

, Daniela Giordano, Simone Palazzo, Daniel Gustav Indelicato:
MultiVD: A Transformer-based Multitask Approach for Software Vulnerability Detection. 416-423 - Natan Talon, Valérie Viet Triem Tong, Gilles Guette, Yufei Han, Youssef Laarouchi:

SCWAD: Automated Pentesting of Web Applications. 424-433 - José Areia

, Bruno Santos, Mário Antunes:
Dvorak: A Browser Credential Dumping Malware. 434-441 - Calebe Helpa, Tiago Heinrich, Marcus Botacin, Newton Carlos Will, Rafael R. Obelheiro, Carlos Alberto Maziero:

The Use of the DWARF Debugging Format for the Identification of Potentially Unwanted Applications (PUAs) in WebAssembly Binaries. 442-449 - Riccardo Germenia

, Salvatore Manfredi
, Matteo Rizzi, Giada Sciarretta, Alessandro Tomasi
, Silvio Ranise:
Automating Compliance for Improving TLS Security Postures: An Assessment of Public Administration Endpoints. 450-458 - Mahdieh Heidaripour, Ladan Kian

, Maryam Rezapour
, Mark Holcomb, Benjamin Fuller, Gagan Agrawal, Hoda Maleki:
Organizing Records for Retrieval in Multi-Dimensional Range Searchable Encryption. 459-466 - Lucía Alonso, Mina Alishahi:

Autoencoder for Detecting Malicious Updates in Differentially Private Federated Learning. 467-474 - Roberto van Eeden, Matteo Paier, Marino Miculan

:
A Formal Analysis of CIE Level 2 Multi-Factor Authentication via SMS OTP. 483-491 - Alba Martinez Anton, Clara Bertolissi, Jean-Marc Talbot:

Solving Access Control Conflicts in Multi-User Systems. 492-499 - Massimiliano Albanese, Olutola Adebiyi, Frank Onovae:

CVE2CWE: Automated Mapping of Software Vulnerabilities to Weaknesses Based on CVE Descriptions. 500-507 - Riccardo Longo, Chiara Spadafora

:
Amun: Securing E-Voting Against Over-the-Shoulder Coercion. 508-517 - Julien Maillard, Thomas Hiscock, Maxime Lecomte, Christophe Clavier:

Simulating SASCA on Keccak: Security Implications for Post-Quantum Cryptographic Schemes. 518-527 - Fabrizio Baiardi, Filippo Boni, Giovanni Braccini, Emanuele Briganti, Luca Deri:

Kex-Filtering: A Proactive Approach to Filtering. 528-535 - Arka Ghosh

, Massimiliano Albanese, Preetam Mukherjee
, Amir Alipour-Fanid
:
Improving the Efficiency of Intrusion Detection Systems by Optimizing Rule Deployment Across Multiple IDSs. 536-543 - George Stergiopoulos, Michalis Detsis, Sozon Leventopoulos, Dimitris Gritzalis:

Utilizing Machine Learning for Optimizing Cybersecurity Spending in Critical Infrastructures. 544-551 - Emmanuele Massidda

, Lorenzo Pisu, Davide Maiorca, Giorgio Giacinto:
Bringing Binary Exploitation at Port 80: Understanding C Vulnerabilities in WebAssembly. 552-559 - Sebastian Schrittwieser, Andreas Ekelhart, Esther Seidl, Edgar R. Weippl:

Safe or Scam? An Empirical Simulation Study on Trust Indicators in Online Shopping. 560-567 - Lorenzo Binosi, Pietro Mazzini, Alessandro Sanna

, Michele Carminati
, Giorgio Giacinto, Riccardo Lazzeretti, Stefano Zanero, Mario Polino, Emilio Coppa, Davide Maiorca:
Do You Trust Your Device? Open Challenges in IoT Security Analysis. 568-575 - Aya Mohamed, Dagmar Auer, Daniel Hofer, Josef Küng:

Comparison of Access Control Approaches for Graph-Structured Data. 576-583 - Vahideh Moghtadaiee

, Amir Fathalizadeh
, Mina Alishahi:
Membership Inference Attacks Against Indoor Location Models. 584-591 - Luca Corbucci, Anna Monreale, Roberto Pellungrini:

Enhancing Privacy and Utility in Federated Learning: A Hybrid P2P and Server-Based Approach with Differential Privacy Protection. 592-602 - Bernhards Blumbergs:

Black Sheep Wall: Towards Multiple Vantage Point-Based Information Space Situational Awareness. 605-614 - Philip Zimmermann, Sebastian Obermeier:

Evaluating Digital Forensic Readiness: A Honeypot Approach. 615-621 - Sebastian Obermeier, Giorgio Tresoldi, Bernhard Tellenbach, Vincent Lenders:

HydroLab: A Versatile Hydroelectric Power Lab for Security Research and Education. 622-627 - Ryan Seah, Daren Khu, Alexander Hoover, Ruth Ng:

LAMA: Leakage Abuse Attacks Against Microsoft Always Encrypted. 628-633 - Devharsh Trivedi

, Nesrine Kaaniche, Aymen Boudguiga, Nikos Triandopoulos:
chiku: Efficient Probabilistic Polynomial Approximations Library. 634-641 - Doryan Lesaignoux, Mikael Carmona:

On the Implementation of a Lattice-Based DAA for Vanet System. 642-648 - Alfredo Cuzzocrea, Islam Belmerabet:

Towards Privacy-Preserving Multi-Cloud Identity Management Using SOLID. 649-654 - Tomoaki Mimoto, Yuta Gempei, Kentaro Kita, Takamasa Isohara, Shinsaku Kiyomoto, Toshiaki Tanaka:

Linkage Between CVE and ATT&CK with Public Information. 655-660 - Miroslav Puskaric

:
A Framework for Federated Analysis of Health Data Using Multiparty Homomorphic Encryption. 661-667 - Ridwane Aissaoui, Jean-Christophe Deneuville, Christophe Guerber, Alain Pirovano:

A Performant Quantum-Resistant KEM for Constrained Hardware: Optimized HQC. 668-673 - Junki Yuasa, Taisho Sasada, Christophe Kiennert, Gregory Blanc, Yuzo Taenaka, Youki Kadobayashi:

OIPM: Access Control Method to Prevent ID/Session Token Abuse on OpenID Connect. 674-679 - B. Pradeep Kumar Reddy, Ruchika Meel, Ayantika Chatterjee:

Encrypted KNN Implementation on Distributed Edge Device Network. 680-685 - Shyamili Toluchuri, Aishwarya Upadhyay, Smita Naval, Vijay Laxmi, Manoj Singh Gaur:

GAN-based Seed Generation for Efficient Fuzzing. SECRYPT 2024: 686-691 - Jesús E. Díaz Verdejo, Javier Muñoz-Calle, Rafael M. Estepa-Alonso, Antonio Estepa Alonso:

InspectorLog: A New Tool for Offline Attack Detection over Web Log Trace Files. 692-697 - Nir Soffer

, Erez Waisbard:
An Efficient Hash Function Construction for Sparse Data. 698-703 - Farha Masroor, Adarsh Gopalakrishnan, Neena Goveas:

Securing Patient Data in IoT Devices: A Blockchain-NFT Approach for Privacy, Security, and Authentication. 704-709 - Hamdi Ouechtati, Nadia Ben Azzouna:

Towards an Adaptive Trust Management Model Based on ANFIS in the SIoT. SECRYPT 2024: 710-715 - Nouf Al-Juaid, Alexei Lisitsa, Sven Schewe:

Secure Multi-Party Traversal Queries over Federated Graph Databases. 716-721 - Amine Hattak, Fabio Martinelli, Francesco Mercaldo, Antonella Santone:

Leveraging Deep Learning for Intrusion Detection in IoT Through Visualized Network Data. 722-729 - Calvo Mayaudón Haroldo, Nakojah Chris David, Mahdi Madani, El-Bay Bourennane:

FPGA Implementation of AES-Based on Optimized Dynamic s-Box. 730-737 - Fatema Rashid, Ali Miri:

Privacy-Preserving Anomaly Detection Through Sampled, Synthetic Data Generation. 738-747 - Bartlomiej Marek, Wojciech Wodo

:
Spellchecker Analysis for Behavioural Biometric of Typing Errors Scenario. 748-757 - Md. Morshedul Islam

, Md. Khairul Anam:
Enhancing Adversarial Defense in Behavioral Authentication Systems Through Random Projections. 758-763 - Gabriela Mendes Corrêa de Miranda, José Antônio Moreira Xexéo, Renato Hidaka Torres:

Lightweight Cryptographic Algorithms: A Position Paper. 764-770 - Harpreet Singh, Habib Louafi, Yiyu Yao:

An Uncertain Reasoning-Based Intrusion Detection System for DoS/DDoS Detection. 771-776 - Aditya Kuppa, Jack Nicholls, Nhien-An Le-Khac

:
Manipulating Prompts and Retrieval-Augmented Generation for LLM Service Providers. 777-785 - Syed Badruddoja, Ram Dantu, Mark Dockendorf, Abiola Salau, Kritagya Upadhyay

:
Revolutionizing Blockchain Consensus: Towards Deliberative and Unanimous Agreement. 786-791 - Jaroslaw Bernacki

, Rafal Scherer:
Compact Representation of Digital Camera's Fingerprint with Convolutional Autoencoder. 792-797 - Marcus Gelderie:

On the Privacy Afforded by Opaque Identifiers in Traffic Monitoring. 798-803 - Basker Palaniswamy, Arijit Karati

:
QPTA: Quantum-Safe Privacy-Preserving Multi-Factor Authentication Scheme for Lightweight Devices. 804-811 - Pierre Fobougong Saha, Mohamed Mejri, Kamel Adi

:
Toward the Foundation of Digital Identity Theory. 812-819 - Lisa Bruder, Mina Alishahi:

Local Differential Privacy for Data Clustering. 820-825 - Petr Tuma, Jan Hajny, Petr Muzikant

, Jan Havlin, Lukas Malina, Patrik Dobias, Jan Willemson:
Open-Source Post-Quantum Encryptor: Design, Implementation and Deployment. 826-831 - Eric Filiol, Pierre Filiol:

Graph-Based Modelling of Maximum Period Property for Nonlinear Feedback Shift Registers. 832-837 - Poonam Namdeo Shelke, Saurav Gupta

, Sukumar Nandi:
BlueDoS: A Novel Approach to Perform and Analyse DoS Attacks on Bluetooth Devices. 838-843 - Roberto De Prisco, Sergiy Shevchenko, Pompeo Faruolo:

Enhancing OpenID Connect for Verifiable Credentials with DIDComm. 844-849 - Saloni Kwatra, Anna Monreale, Francesca Naretto:

Balancing Act: Navigating the Privacy-Utility Spectrum in Principal Component Analysis. 850-857 - Abhishek Joshi, Divyateja Pasupuleti, P. Nischith, Sarvesh Sutaone, Soumil Ray, Soumyadeep Dey, Barsha Mitra:

Malware Analysis Using Transformer Based Models: An Empirical Study. 858-865 - Christophe Nègre, Mbaye Ngom:

Virtually Free Randomisations of NTT in RLWE Cryptosystem to Counteract Side Channel Attack Based on Belief Propagation. SECRYPT 2024: 866-875 - Joshua Stock

, Lucas Lange, Erhard Rahm, Hannes Federrath:
Property Inference as a Regression Problem: Attacks and Defense. 876-885

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














