ISC C

29 papers

YearTitle / Authors
2026Information Security - 28th International Conference, ISC 2025, Seoul, South Korea, October 20-22, 2025, Proceedings
Sang Kil Cha, Jeongeun Park
2025A Graph-Based Approach to Alert Contextualisation in Security Operations Centres.
Magnus Wiik Eckhoff, Peter Marius Flydal, Siem Peters, Martin Eian, Jonas Halvorsen, Vasileios Mavroeidis, Gudmund Grov
2025A Lot of Data and Added Complexity. How Does PQC Affect the Performance of My TLS Connection?
Johanna Henrich, Nicolai Schmitt, Nouri Alnahawi, Andreas Heinemann
2025A New Code-Based Formulation of the Fuzzy Vault Scheme.
Sara Majbour, Morgan Barbier, Jean-Marie Le Bars
2025Ali2Vul: Binary Vulnerability Dataset Expansion via Cross-Modal Alignment.
Xinyu Bai, Yisen Wang, Jiajun Du, Chen Liang, Siyuan Liang, Zirui Jiang
2025BlockLens: Detecting Malicious Transactions in Ethereum Using LLM Techniques.
Chi Feng, Lei Fan
2025BootMarker: UEFI Bootkit Defense via Control-Flow Verification.
Jihoon Kwon, Junho Lee, Myeongyeol Lee, Hyuna Seo, Jinho Jung
2025Comparative Evaluation of Lattices for Fuzzy Extractors and Fuzzy Signatures.
Wataru Nakamura, Yusei Suzuki, Masakazu Fujio, Kenta Takahashi
2025Conditional Attribute-Based PRE: Definition and Construction from LWE.
Lisha Yao, Jian Weng, Pengfei Wu, Guofeng Tang, Guomin Yang, Haiyang Xue, Robert H. Deng
2025CryptNyx: Password-Hardened Encryption with Strong Anonymity Guarantees.
Tassos Dimitriou, Shahad Alshaher
2025Efficient Dynamic Group Signatures with Forward Security.
Amin Mohammadali, Riham AlTawy
2025EvoFuzz: Enhancing State Space Exploration and Seed Prioritization in Stateful Protocol Fuzzing Using Evolutionary Game Theory.
Chengdong Wang, Bo Yu, Lin Yang
2025Exploring Backdoor Attacks in Federated Learning Under Parameter-Efficient Fine-Tuning.
Xiaofei Huang, Xiaojie Zhu, Chi Chen
2025GIR-Cache: Mitigating Conflict-Based Cache Side-Channel Attacks via Global Indirect Replacement.
Hao Ma, Zhidong Wang, Da Xie, Ciyan Ouyang, Wei Song
2025HGANN-Mal: A Hypergraph Attention Neural Network Approach for Android Malware Detection.
Mohammad Reza Norouzian, Claudia M. Eckert
2025HYPERSEC: An Extensible Hypervisor-Assisted Framework for Kernel Rootkit Detection.
Lionel Hemmerlé, Guillaume Hiet, Frédéric Tronel, Pierre Wilke, Jean-Christophe Prévotet
2025HoneySentry: A High-Fidelity Interactive IoT Honeypot for Advanced Threat Detection.
Yanbing Shen, Hao Sun, Jiacheng Wang, Haitao Xu, Gang Liu, Fan Zhang
2025Improving the Differential-Linear Attack with Applications to GIFT-COFB, GIFT-64 and HyENA.
Zhongxin Zhang, Yincen Chen, Ling Song, Yin Lv
2025Inference Attacks on Encrypted Online Voting via Traffic Analysis.
Anastasiia Belousova, Francesco Marchiori, Mauro Conti
2025Jakiro: A Cross-Modal Contrastive Learning Framework for Detecting Vulnerabilities in Smart Contracts.
Zixuan Niu, Xiaofeng Li, He Zhao, Tong Zhou, Haotian Cheng
2025Keyless Physical-Layer Cryptography.
Senlin Liu, Dongshu Cai, Dongchi Han, Hongbo Liu, Xianhui Lu
2025LastRings: Lattice-Based Scalable Threshold Ring Signatures.
Sohyun Jeon, Calvin Abou Haidar, Mehdi Tibouchi
2025MSPP-Net: Fine-Grained Image Privacy Identification via Multi-stage Semantic Perception.
Yinglong Li, Bingyuan Chen, Qingyan Jiang, Tieming Chen
2025SimSeq: A Robust TLS Traffic Classification Method.
Jinghui Cheng, Fanping Zeng
2025Simulation-Based Software Leakage Evaluation for the RISC-V Platform.
Nicolai Schmitt, Jannik Zeitschner, Andreas Heinemann
2025Spoofing Camera Source Attribution via PRNU Transfer Attacks on Physical and AI Generated Images.
Shahriar Rahman Khan, Tariqul Islam, Raiful Hasan
2025The Multi-user Security of GCM-SST and Further Enhancements.
Yusuke Naito, Yu Sasaki, Takeshi Sugawara
2025Towards Architecture-Independent Function Call Analysis for IoT Malware.
Kensei Ma, Chansu Han, Akira Tanaka, Takeshi Takahashi, Jun'ichi Takeuchi
2025Zero Trust Continuous Authentication Models and Automated Policy Formulation.
Nikhill Vombatkere, Philip W. L. Fong