default search action
19th SECRYPT 2022: Lisbon, Portugal
- Sabrina De Capitani di Vimercati, Pierangela Samarati:
Proceedings of the 19th International Conference on Security and Cryptography, SECRYPT 2022, Lisbon, Portugal, July 11-13, 2022. SCITEPRESS 2022, ISBN 978-989-758-590-6
Invited Speakers
- Sokratis K. Katsikas:
Cyber Security When IT Meets OT. SECRYPT 2022: 5 - Luca Viganò:
Don't Tell Me The Cybersecurity Moon Is Shining... (Cybersecurity Show and Tell). SECRYPT 2022: 7
Papers
- Souha Masmoudi, Maryline Laurent, Nesrine Kaaniche:
SEVIL: Secure and Efficient VerifIcation over Massive Proofs of KnowLedge. 13-24 - Awaleh Houssein Meraneh, Christophe Clavier, Hélène Le Bouder, Julien Maillard, Gaël Thomas:
Blind Side Channel on the Elephant LFSR. 25-34 - Panagiotis Dedousis, Melina Raptaki, George Stergiopoulos, Dimitris Gritzalis:
Towards an Automated Business Process Model Risk Assessment: A Process Mining Approach. 35-46 - Libor Polcák, Petr Matousek:
Metering Homes: Do Energy Efficiency and Privacy Need to Be in Conflict? 47-58 - Anh-Tuan Hoang, Neil Hanley, Ayesha Khalid, Dur-e-Shahwar Kundi, Máire O'Neill:
Stacked Ensemble Model for Enhancing the DL based SCA. 59-68 - Gowri R. Chandran, Carmit Hazay, Robin Hundt, Thomas Schneider:
Comparison-based MPC in Star Topology. 69-82 - Christopher Harth-Kitzerow, Georg Carle, Fan Fei, André Luckow, Johannes Klepsch:
CRGC: A Practical Framework for Constructing Reusable Garbled Circuits. 83-95 - Miguel Calvo, Marta Beltrán:
An Adaptive Web Application Firewall. 96-107 - Christopher van der Beets, Raine Nieminen, Thomas Schneider:
FAPRIL: Towards Faster Privacy-preserving Fingerprint-based Localization. 108-120 - Adam Janovsky, Davide Maiorca, Dominik Macko, Vashek Matyas, Giorgio Giacinto:
A Longitudinal Study of Cryptographic API: A Decade of Android Malware. 121-133 - Dusan Klinec, Marek Sýs, Karel Kubicek, Petr Svenda, Vashek Matyás:
Large-scale Randomness Study of Security Margins for 100+ Cryptographic Functions. 134-146 - Varun Gumma, Barsha Mitra, Soumyadeep Dey, Pratik Shashikantbhai Patel, Sourabh Suman, Saptarshi Das, Jaideep Vaidya:
PAMMELA: Policy Administration Methodology using Machine Learning. 147-157 - Panagiotis Rizomiliotis, Christos Diou, Aikaterini Triakosia, Ilias Kyrannas, Konstantinos Tserpes:
Partially Oblivious Neural Network Inference. 158-169 - Thomas Marchioro, Lodovico Giaretta, Evangelos P. Markatos, Sarunas Girdzijauskas:
Federated Naive Bayes under Differential Privacy. 170-180 - Jeffrey Todd McDonald, Jennifer Parnell, Todd R. Andel, Samuel H. Russ:
Effectiveness of Adversarial Component Recovery in Protected Netlist Circuit Designs. 181-192 - Antonin Voyez, Tristan Allard, Gildas Avoine, Pierre Cauchois, Élisa Fromont, Matthieu Simonin:
Membership Inference Attacks on Aggregated Time Series with Linear Programming. 193-204 - Mark Dockendorf, Ram Dantu, John Long:
Graph Algorithms over Homomorphic Encryption for Data Cooperatives. 205-214 - Ibifubara Iganibo, Massimiliano Albanese, Kaan Turkmen, Thomas R. Campbell, Marc Mosko:
Mason Vulnerability Scoring Framework: A Customizable Framework for Scoring Common Vulnerabilities and Weaknesses. 215-225 - Hassan Chaitou, Thomas Robert, Jean Leneutre, Laurent Pautet:
Threats to Adversarial Training for IDSs and Mitigation. 226-236 - Ivan Oleynikov, Elena Pagnin, Andrei Sabelfeld:
CatNap: Leveraging Generic MPC for Actively Secure Privacy-enhancing Proximity Testing with a Napping Party. 237-248 - Daniel Morales Escalera, Isaac Agudo, Javier López:
Real-time Crowd Counting based on Wearable Ephemeral IDs. 249-260 - Animesh Kar, Andrei Natadze, Enrico Branca, Natalia Stakhanova:
HTTPFuzz: Web Server Fingerprinting with HTTP Request Fuzzing. 261-271 - Roberto Saia, Salvatore Carta, Gianni Fenu, Livio Pompianu:
A Region-based Training Data Segmentation Strategy to Credit Scoring. 275-282 - Rafael Dowsley, Mylène C. Q. Farias, Mario Larangeira, Anderson Nascimento, Jot Virdee:
A Spendable Cold Wallet from QR Video. 283-290 - Sigurd Eskeland:
Collusion-resistant Broadcast Encryption based on Hidden RSA Subgroups. 291-298 - Sigurd Eskeland, Ahmed Fraz Baig:
Cryptanalysis of a Privacy-preserving Behavior-oriented Authentication Scheme. 299-304 - Antonin Dufka, Vladimir Sedlacek, Petr Svenda:
SHINE: Resilience via Practical Interoperability of Multi-party Schnorr Signature Schemes. 305-316 - Lukas Brodschelm, Marcus Gelderie:
Application Sandboxing for Linux Desktops: A User-friendly Approach. 317-324 - Jeyamohan Neera, Xiaomin Chen, Nauman Aslam, Biju Issac, Eve O'Brien:
A Local Differential Privacy based Hybrid Recommendation Model with BERT and Matrix Factorization. 325-332 - Amanda B. Viescinski, Tiago Heinrich, Newton Carlos Will, Carlos Maziero:
Behavior Modeling of a Distributed Application for Anomaly Detection. 333-340 - Andrei Kazlouski, Thomas Marchioro, Evangelos P. Markatos:
What your Fitbit Says about You: De-anonymizing Users in Lifelogging Datasets. 341-348 - Anushree Belel, Ratna Dutta, Sourav Mukhopadhyay:
Key Encapsulation Mechanism in Ciphertext-policy Attribute based Setting Featuring Revocation and Key-homomorphic Property. 349-356 - David Holm Audran, Marcus Braunschweig Andersen, Mark Højer Hansen, Mikkel Møller Andersen, Thomas B. Frederiksen, Kasper H. Hansen, Dimitrios Georgoulias, Emmanouil Vasilomanolakis:
Tick Tock Break the Clock: Breaking CAPTCHAs on the Darkweb. 357-365 - Samiran Bag, Indranil Ghosh Ray, Feng Hao:
A New Leakage Resilient Symmetric Searchable Encryption Scheme for Phrase Search. 366-373 - Jayashree Dey, Ratna Dutta:
Code-based Key Encapsulation Mechanism Preserving Short Ciphertext and Secret Key. 374-381 - Axel Durbet, Paul-Marie Grollemund, Pascal Lafourcade, Kevin Thiry-Atighehchi:
Near-collisions and Their Impact on Biometric Security. 382-389 - Kyrylo Rudavskyy, Ali Miri:
Resilience of GANs against Adversarial Attacks. 390-397 - S. Seng, Joaquín García-Alfaro, Y. Laarouci:
Implementation of a Stateful Network Protocol Intrusion Detection Systems. 398-405 - Thomas Lavaur, Jérôme Lacan:
zkBeacon: Proven Randomness Beacon based on Zero-knowledge Verifiable Computation. SECRYPT 2022: 406-414 - Marek Bielik, Martin Jurecek, Olha Jurecková, Róbert Lórencz:
Yet Another Algebraic Cryptanalysis of Small Scale Variants of AES. 415-427 - Tristan Bilot, Grégoire Geis, Badis Hammi:
PhishGNN: A Phishing Website Detection Framework using Graph Neural Networks. 428-435 - Yvo Desmedt:
Are Clouds making Our Research Irrelevant and Who Is at Fault? (Position Paper). 436-442 - Nirmal Kumar Boran, Pranil Joshi, Virendra Singh:
PASS-P: Performance and Security Sensitive Dynamic Cache Partitioning. 443-450 - Saad Al-Ahmadi, Saud Al-Eyead:
GAN-based Approach to Crafting Adversarial Malware Examples against a Heterogeneous Ensemble Classifier. 451-460 - Arne Roar Nygård, Arvind Sharma, Sokratis K. Katsikas:
Reverse Engineering for Thwarting Digital Supply Chain Attacks in Critical Infrastructures: Ethical Considerations. 461-468 - Abubakar-Sadiq Shehu, António Pinto, Manuel Eduardo Correia:
A Decentralised Real Estate Transfer Verification based on Self-Sovereign Identity and Smart Contracts. 469-476 - Rahul Sankalana Gunawardhana, Kavinga Yapa Abeywardana:
Irreversible Applications for Windows NT Systems. 479-484 - Santiago de Diego, Oscar Lage, Cristina Regueiro, Sergio Anguita, Gabriel Maciá-Fernández:
Bypassing Current Limitations for Implementing a Credential Delegation for the Industry 4.0. 485-490 - Ahmed Fraz Baig, Sigurd Eskeland:
A Generic Privacy-preserving Protocol for Keystroke Dynamics-based Continuous Authentication. 491-498 - Loris Dal Lago, Fabio Federici, Davide Martintoni, Valerio Senni:
Risk-driven Model-based Architecture Design for Secure Information Flows in Manufacturing Infrastructures. 499-506 - Marcus Gelderie, Valentin Barth, Maximilian Luff, Julian Birami:
Seccomp Filters from Fuzzing. 507-512 - Giuseppe Crincoli, Fabiana Fierro, Giacomo Iadarola, Piera Elena La Rocca, Fabio Martinelli, Francesco Mercaldo, Antonella Santone:
A Method for Road Accident Prevention in Smart Cities based on Deep Reinforcement Learning. 513-518 - Wisnu Uriawan, Youakim Badr, Omar Hasan, Lionel Brunie:
TrustLend: Using Borrower Trustworthiness for Lending on Ethereum. 519-524 - Richmond Osei, Habib Louafi, Malek Mouhoub, Zhongwen Zhu:
Efficient IoT Device Fingerprinting Approach using Machine Learning. 525-533 - Francesco Mercaldo, Rosangela Casolare, Giovanni Ciaramella, Giacomo Iadarola, Fabio Martinelli, Francesco Ranieri, Antonella Santone:
A Real-time Method for CAN Bus Intrusion Detection by Means of Supervised Machine Learning. 534-539 - Rahul Roy, Abhijit Das, Dipanwita Roy Chowdhury:
Parallel and Distributed Implementations of the Wiedemann and the Block-Wiedemann Methods over GF(2). 540-547 - Fabrizio Baiardi, Daria Maggi, Mauro Passacantando:
Discovering How to Attack a System. 548-553 - Amisha Sinha, Debanjan Sadhya:
Decentralized Public Key Infrastructure with Identity Management using Hyperledger Fabric. 554-559 - Eva Anastasiadi, Elias Athanasopoulos, Evangelos P. Markatos:
The Weakest Link: On Breaking the Association between Usernames and Passwords in Authentication Systems. 560-567 - Axel Durbet, Paul-Marie Grollemund, Pascal Lafourcade, Denis Migdal, Kevin Thiry-Atighehchi:
Authentication Attacks on Projection-based Cancelable Biometric Schemes. 568-573 - Alexandru Ionita:
Weighted Attribute-based Encryption with Parallelized Decryption. 574-579 - Nuno Prazeres, Rogério Luís C. Costa, Leonel Santos, Carlos Rabadão:
Evaluation of AI-based Malware Detection in IoT Network Traffic. 580-585 - Paul Georg Wagner, Jürgen Beyerer:
Towards Heterogeneous Remote Attestation Protocols. 586-591 - David Rodríguez Torrado, Miguel Cozar, José M. del Álamo:
Identifying Organizations Receiving Personal Data in Android Apps. 592-596 - Petr Svenda, Rudolf Kvasnovský, Imrich Nagy, Antonin Dufka:
JCAlgTest: Robust Identification Metadata for Certified Smartcards. 597-604 - Lukas Malina, Sara Ricci, Patrik Dobias, Petr Jedlicka, Jan Hajny, Kim-Kwang Raymond Choo:
On the Efficiency and Security of Quantum-resistant Key Establishment Mechanisms on FPGA Platforms. 605-613 - Roberto Saia, Salvatore Carta, Gianni Fenu, Livio Pompianu:
Brain Waves and Evoked Potentials as Biometric User Identification Strategy: An Affordable Low-cost Approach. 614-619 - Giuseppe Cascavilla, Gemma Catolino, Mirella Sangiovanni:
Illicit Darkweb Classification via Natural-language Processing: Classifying Illicit Content of Webpages based on Textual Information. 620-626 - Tomás Rabas, Róbert Lórencz, Jirí Bucek:
Verification of PUF-based IoT Protocols with AVISPA and Scyther. 627-635 - Katarzyna Kapusta, Gérard Memmi:
PE-AONT: Partial Encryption All or Nothing Transform. 636-641 - Vita Santa Barletta, Giuseppe Desolda, Domenico Gigante, Rosa Lanzilotti, Marco Saltarella:
From GDPR to Privacy Design Patterns: The MATERIALIST Framework. 642-648 - Berkan Ufuk, Mehmet Tahir Sandikkaya:
Moving Target Defense Router: MaTaDoR. 649-654 - Zelong Li, Akhilesh Tyagi:
Transient State Signaling for Spectre/Meltdown Transient Cache Side-channel Prevention. 655-660 - Javad Bahrami, Mohammad Ebrahimabadi, Sofiane Takarabt, Jean-Luc Danger, Sylvain Guilley, Naghmeh Karimi:
On the Practicality of Relying on Simulations in Different Abstraction Levels for Pre-silicon Side-Channel Analysis. 661-668 - Oana Stan, Vincent Thouvenot, Aymen Boudguiga, Katarzyna Kapusta, Martin Zuber, Renaud Sirdey:
A Secure Federated Learning: Analysis of Different Cryptographic Tools. 669-674 - Saqib Javed, Muhammad Asim Mukhtar, Muhammad Khurram Bhatti, Guy Gogniat:
Novel Design for IE-Cache to Mitigate Conflict-based Cache-side Channel Attacks with Reduced Energy Consumption. 675-680 - Mariana Segovia, Jose Rubio-Hernan, Ana R. Cavalli, Joaquín García-Alfaro:
Switched-based Control Testbed to Assure Cyber-physical Resilience by Design. 681-686 - Stefan More, Jakob Heher, Clemens Walluschek:
Offline-verifiable Data from Distributed Ledger-based Registries. 687-693 - Nesrine Kaaniche, Aymen Boudguiga, Gustavo Gonzalez Granadillo:
Efficient Hybrid Model for Intrusion Detection Systems. 694-700 - Kazuhide Fukushima, Hiroki Okada, Sofiane Takarabt, Amina Korchi, Meziane Hamoud, Khaled Karray, Youssef Souissy, Sylvain Guilley:
Side-channel Analysis and Countermeasure for Implementation of Lattice-based Signature. 701-706 - Abiola Salau, Ram Dantu, Kirill Morozov, Kritagya Upadhyay, Syed Badruddoja:
Towards a Threat Model and Security Analysis for Data Cooperatives. 707-713 - Benjamin Aziz, Aysha Bukhelli, Rinat Khusainov, Alaa Mohasseb:
A Novel Method for Embedding and Extracting Secret Messages in Textual Documents based on Paragraph Resizing. 714-719
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.