Information Security Applications
Information Security Applications
25th International Conference, WISA 2024, Jeju Island, South Korea, August 21-23, 2024, Revised Selected Papers
Emura, Keita; Lee, Jong-Hyouk; Lee, Sokjoon
Springer Nature Switzerland AG
01/2025
340
Mole
9789819616237
Pré-lançamento - envio 15 a 20 dias após a sua edição
.- ECPM Cryptanalysis Resource Estimation.
.- Integral Attack with Bit-based Division Property on the Lightweight Block Cipher LBC.
.- Network Security.
.- ARP Spoofing Mitigation for the E2 Interface in Open RAN: An xApp Approach.
.- Investigating the Transferability of Evasion Attacks in Network Intrusion Detection Systems Considering Domain-Specific Constraints.
.- Enhancing Robustness in NIDS via Coverage Guided Fuzzing and Adversarial Training.
.- AI Security 1.
.- VoteGAN: Generalized Membership Inference Attack Against Generative Models by Multiple Discriminators.
.- Unsupervised Contextual Anomalous Communication Detection Using VQ Tokeniza tion with Flow Data.
.- Boosting Black-Box Transferability of Weak Audio Adversarial Attacks with Random Masking.
.- Network & Application Security.
.- Security Function for 5G-Advanced and 6G: Malicious UE Detection in Network Slicing.
.- Simple Perturbations Subvert Ethereum Phishing Transactions Detection: An Emperi cal Analysis.
.- LM Guardrail Framework: A Novel Approach for Implementing Zero Trust Architecture.
.- AI Security 2.
.- ChatDEOB: An Effective Deobfuscation Method based on Large Language Model.
.- An effective ensemble algorithm for short-term load forecasting.
.- CPS Security.
.- PUF-Based Authentication and Authorization Protocol for IoT.
.- Field Testing and Detection of Camera Interference for Autonomous Driving
.- One-class Classification-based Position Falsification Detection System in C-ITS Communication Network.
.- Fuzzing.
.- Reverse Engineering-Guided Fuzzing for CAN Bus Vulnerability Detection.
.- Air-Fuzz: Feasibility analysis of fuzzing-based side-channel information leakage attack in air-gapped networks.
.- Fuzzing JavaScript Engines with Diversified Mutation Strategies.
.- Malware.
.- Detecting Phishing-targeted Web Push Notifications through Image Similarity Analysis.
.- Dissecting the Infrastructure Used in Web-based Cryptojacking: A Measurement Perspective.
.- A Survey on Attack Cases with VBS Malware in Windows.
.- Software Security.
.- Adversarial Manhole: Challenging Monocular Depth Estimation and Semantic Seg mentation Models with Patch Attack.
.- Plotting OSS-based Supply Chain attack strategies and the defense failure.
.- A Proposal of a Supply Chain Security Model for Generative AI.
.- Emerging Topic.
.- Privacy Enhanced P2P Power Trading Using DID-based Identity Verification in a Microgrid.
.- Quantum Implementation of LSH.
.- Who ruins the game?: unveiling cheating users in the "Battlefield" game.
.- ECPM Cryptanalysis Resource Estimation.
.- Integral Attack with Bit-based Division Property on the Lightweight Block Cipher LBC.
.- Network Security.
.- ARP Spoofing Mitigation for the E2 Interface in Open RAN: An xApp Approach.
.- Investigating the Transferability of Evasion Attacks in Network Intrusion Detection Systems Considering Domain-Specific Constraints.
.- Enhancing Robustness in NIDS via Coverage Guided Fuzzing and Adversarial Training.
.- AI Security 1.
.- VoteGAN: Generalized Membership Inference Attack Against Generative Models by Multiple Discriminators.
.- Unsupervised Contextual Anomalous Communication Detection Using VQ Tokeniza tion with Flow Data.
.- Boosting Black-Box Transferability of Weak Audio Adversarial Attacks with Random Masking.
.- Network & Application Security.
.- Security Function for 5G-Advanced and 6G: Malicious UE Detection in Network Slicing.
.- Simple Perturbations Subvert Ethereum Phishing Transactions Detection: An Emperi cal Analysis.
.- LM Guardrail Framework: A Novel Approach for Implementing Zero Trust Architecture.
.- AI Security 2.
.- ChatDEOB: An Effective Deobfuscation Method based on Large Language Model.
.- An effective ensemble algorithm for short-term load forecasting.
.- CPS Security.
.- PUF-Based Authentication and Authorization Protocol for IoT.
.- Field Testing and Detection of Camera Interference for Autonomous Driving
.- One-class Classification-based Position Falsification Detection System in C-ITS Communication Network.
.- Fuzzing.
.- Reverse Engineering-Guided Fuzzing for CAN Bus Vulnerability Detection.
.- Air-Fuzz: Feasibility analysis of fuzzing-based side-channel information leakage attack in air-gapped networks.
.- Fuzzing JavaScript Engines with Diversified Mutation Strategies.
.- Malware.
.- Detecting Phishing-targeted Web Push Notifications through Image Similarity Analysis.
.- Dissecting the Infrastructure Used in Web-based Cryptojacking: A Measurement Perspective.
.- A Survey on Attack Cases with VBS Malware in Windows.
.- Software Security.
.- Adversarial Manhole: Challenging Monocular Depth Estimation and Semantic Seg mentation Models with Patch Attack.
.- Plotting OSS-based Supply Chain attack strategies and the defense failure.
.- A Proposal of a Supply Chain Security Model for Generative AI.
.- Emerging Topic.
.- Privacy Enhanced P2P Power Trading Using DID-based Identity Verification in a Microgrid.
.- Quantum Implementation of LSH.
.- Who ruins the game?: unveiling cheating users in the "Battlefield" game.