NSS B

22 papers

YearTitle / Authors
2025Network and System Security - 18th International Conference, NSS 2024, Abu Dhabi, United Arab Emirates, November 20-22, 2024, Proceedings
Houbing Herbert Song, Roberto Di Pietro, Saed Alrabaee, Mohammad Tubishat, Mousa Al-Kfairy, Omar Alfandi
2024AndroPROTECT: Hardening the Android API Against Fingerprinting.
Gerald Palfinger
2024Auditing and Attributing Behaviours of Suspicious Android Health Applications.
Muhammad Salman, I Wayan Budi Sentana, Muhammad Ikram, Mohamed Ali Kâafar
2024Credential Issuance Transparency: A Privacy-Preserving Audit Log of Credential Issuance.
Edona Fasllija, Jakob Heher, Stefan More
2024Decentralized Data Usage Control with Confidential Data Processing on Trusted Execution Environment and Distributed Ledger Technology.
Shota Tokuda, Shohei Kakei, Yoshiaki Shiraishi, Shoichi Saito
2024Decoding Android Malware with a Fraction of Features: An Attention-Enhanced MLP-SVM Approach.
Safayat Bin Hakim, Muhammad Adil, Kamal Acharya, Houbing Herbert Song
2024Enhancing Network Security Through Vulnerability Monitoring.
Ryan Williams, Anthony Gavazzi, Engin Kirda
2024Every Sherlock Needs a Watson: Practical Semi-realtime Attack Elaboration System.
Zeya Umayya, Arpit Nandi, Amartyo Roy, Sambuddho Chakravarty
2024How to Accomplish Key and Communication Compression Over Authentication Channels - Proxy Re-authentication and Its Instantiations.
Yoshiro Matsuoka, Sohto Chiku, Keisuke Hara, Junji Shikata
2024Identifying the Origins of Business Data Breaches Through CTC Detection.
Gayle Frisbie, Omar A. Darwish, Anas M. R. Alsobeh, Abdallah Al-shorman
2024Optimizing Privacy-Preserving Continuous Authentication of Mobile Devices.
David Monschein, Oliver P. Waldhorst
2024PPDL: Efficient Dropout-Resilient Aggregation for Privacy-Preserving Decentralized Learning.
Ali Reza Ghavamipour, Benjamin Zi Hao Zhao, Fatih Turkmen
2024PQS-BC: Comparative Analysis of NIST Post-quantum Signatures for Blockchain.
Wan Kai Wong, Naipeng Dong, Cong Minh Dinh
2024Perceived Privacy Conflicts and Monitoring: A Study of Their Effects on Trust and Data Sharing in Social Networks.
Yazan Alahmed, Reema Abadla, Mahmoud Khasawneh
2024RKPM: Restricted Kernel Page Mechanism to Mitigate Privilege Escalation Attacks.
Hiroki Kuzuno, Toshihiro Yamauchi
2024Revisiting Binary Code Authorship Analysis.
Saed Alrabaee, Mousa Al-Kfairy, Mohammad Bany Taha, Omar Alfandi, Fatma Taher, Jie Tang
2024SPVPC: Smart Contract Based Publicly Verifiable Polynomial Computations.
Partha Sarathi Chakraborty, Somanath Tripathy
2024Sharing Is (S)caring: Security and Privacy Issues in Decentralized Physical Infrastructure Networks (DePIN).
Maurantonio Caprolu, Simone Raponi, Roberto Di Pietro
2024Towards a Malware Family Classification Model Using Static Call Graph Instruction Visualization.
Attila Mester, Zalán Bodó, P. Vinod, Mauro Conti
2024VoIP Vanguard: A Practical Front Line Defense Against VoIP Identification Attacks in Tor.
S. Jithin, Richa Gupta, Reeshabh Kumar Ranjan, Shreyansh Nagpal, Mukulika Maity, Sambuddho Chakravarty
2024VulMatch: Binary-Level Vulnerability Detection Through Signature.
Zian Liu, Shigang Liu, Lei Pan, Chao Chen, Ejaz Ahmed, Jun Zhang, Dongxi Liu
2024You Can't Touch This: Detecting Typosquatting Packages for Enhanced Malware Prevention in Software Supply Chains.
Minh Tien Truong, Nils Gruschka, Luigi Lo Iacono