Applied Cryptography and Network Security Workshops

Applied Cryptography and Network Security Workshops

ACNS 2022 Satellite Workshops, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S&P, SCI, SecMT, SiMLA, Rome, Italy, June 20-23, 2022, Proceedings

Adepu, Sridhar; Alcaraz, Cristina; Majumdar, Suryadipta; Casalicchio, Emiliano; Batina, Lejla; Chattopadhyay, Sudipta; Losiouk, Eleonora; Zhou, Jianying; Jin, Chenglu; Lin, Jingqiang

Springer International Publishing AG

09/2022

622

Mole

Inglês

9783031168147

15 a 20 dias

960

Descrição não disponível.
AIBlock - Application Intelligence and Blockchain Security.- Universal Physical Adversarial Attack via Background Image.- Efficient Verifiable Boolean Range Query for Light Clients on Blockchain Database.- SuppliedTrust: A Trusted Blockchain Architecture for Supply Chains.- Towards Interpreting Vulnerability of Object Detection Models via Adver[1]sarial Distillation.- Vulnerability Detection for Smart Contract via Backward Bayesian Active Learning.- A Multi-Agent Deep Reinforcement Learning-Based Collaborative.- Hybrid Isolation Model for Device Application Sandboxing Deployment in Zero Trust Architecture.- AIHWS - Artificial Intelligence in Hardware Security.- On the Effect of Clock Frequency on Voltage and Electromagnetic Fault Injection.- S-box Pooling: Towards More Efficient Side-Channel Security Evaluations.- Deep Learning-based Side-channel Analysis against AES Inner Rounds.- A side-channel based disassembler for the ARM-Cortex M0.- Towards Isolated AI Acceleratorswith OP-TEE on SoC-FPGAs.- Order Vs. Chaos: Multi-trunk classifier for side-channel attack.- AIoTS - Artificial Intelligence and Industrial IoT Security.- Framework for Calculating Residual Cybersecurity Risk of Threats to Road Vehicles in Alignment with ISO/SAE 21434.- Output Prediction Attacks on Block Ciphers using Deep Learning.- HolA: Holistic and Autonomous Attestation for IoT Networks.- CIMSS - Critical Infrastructure and Manufacturing System Security.- The Etiology of Cybersecurity.- Outsider Key Compromise Impersonation Attack on a Multi-Factor Authenticated Key Exchange Protocol.- Toward Safe Integration of Legacy SCADA Systems in the Smart Grid.- Cloud S&P - Cloud Security and Privacy.- RATLS: Integrating Transport Layer Security with Remote Attestation.- DLPFS: The Data Leakage Prevention FileSystem.- Privacy-preserving record linkage using local sensitive hash and private set intersection.- SCI - Secure Cryptographic Implementation.- UniqueChain: Achieving (Near) Optimal Transaction Settlement Time via Single Leader Election.- PEPEC: Precomputed ECC Points Embedded in Certificates and Verified by CT Log Servers.- Efficient Software Implementation of GMT-672 and GMT8-542 PairingFriendly Curves for a 128-bit Security Level.- SecMT - Security in Mobile Technologies.- Leaky Blinders: Information Leakage in Mobile VPNs.- Instrumentation Blueprints: Towards Combining Several Android Instrumentation Tools.- SiMLA - Security in Machine Learning and its Applications.- A Siamese Neural Network for scalable Behavioral Biometrics Authentication.- A methodology for training homomorphic encryption friendly neural networks.- Scalable and Secure HTML5 Canvas-Based User Authentication.- Android Malware Detection Using BERT.- POSTERS.- POSTER: A Transparent Remote Quantum Random Number Generator Over a Quantum-Safe Link.- POSTER: Enabling User-Accountable Mechanisms in Decision Systems.- POSTER: Key Generation Scheme Basedon Physical Layer.- POSTER: ODABE: Outsourced Decentralized CP-ABE in Internet of Things.- POSTER: Ransomware detection mechanism - current state of the project.
artificial intelligence;authentication;computer crime;computer hardware;computer networks;computer security;cryptography;data security;encryption;mathematics;network protocols;network security;public key cryptography;signal processing;telecommunication systems