Information Systems Security
Information Systems Security
20th International Conference, ICISS 2024, Jaipur, India, December 16-20, 2024, Proceedings
Patil, Vishwas T.; Krishnan, Ram; Shyamasundar, Rudrapatna K.
Springer International Publishing AG
01/2025
465
Mole
9783031800191
Pré-lançamento - envio 15 a 20 dias após a sua edição
.- Microarchitectural Security of Firecracker VMM for Serverless Cloud Platforms.
.- An OS support for Tamper-resistant Software Execution Using Empty Interruptions.
.- S-RFUP: Secure Remote Firmware Update Protocol.
.- Securing Virtual Reality Apps Inter-Process Communication.
.- Network Security.
.- Securing the Web: Analysis of HTTP Security Headers in Popular Global Websites.
.- Countering Subscription Concealed Identifier (SUCI)-Catchers in Cellular Communications.
.- BP-MAP: A Secure and Convenient Mutual Authentication Protocol.
.- Effects of Soft-Domain Transfer and Named Entity Information on Deception Detection.
.- Paving the Way: Advancing V2X Safety Through Innovative Attack Generation and Analysis Framework (V2X-SAF).
.- From Traits to Threats: Learning Risk Indicators of Malicious Insider using Psychometric Data.
.- Identifying Insecure Network Configurations through Attack Modeling and Explainable AI.
.- QIris: Quantum Implementation of Rainbow Table Attacks.
.- Malware and Vulnerability Detection.
.- Insights from Running 24 Static Analysis Tools on Open Source Software Repositories.
.- REMEDII: Robust Malware Detection with Iterative and Intelligent Adversarial Training using GANs.
.- Semantics-Based Static Vulnerability Detection of Solidity Using Abstract Interpretation.
.- Privacy & Usability.
.- Web Privacy Perceptions Amongst Indian Users.
.- Enabling Privacy in IT Service Operations.
.- Privacy-Preserving Photo Sharing: An SSI Use Case.
.- Zone Recovery Attack on a Secure Privacy-Preserving Ride-Matching Protocol.
.- Making EULA Great Again: A Novel Nudge Mechanism to Improve Readability, User Attention and Awareness.
.- A Decoupling Mechanism for Transaction Privacy.
.- AI Security.
.- Protecting ownership of trained DNN models with Zero-Knowledge Proofs.
.- MALAI: ML-based Attack on Learning With Error problem.
.- Patch based backdoor attack on Deep Neural Networks.
.- Industry Demo/Practice.
.- Integrating Crypto-Based Payment Systems for Data Marketplaces: Enhancing Efficiency, Security, and User Autonomy.
.- Ontologies for WAF configurations: when knowledge-graphs help troubleshooting.
.- IntelliSOAR: Intelligent Alert Enrichment using Security Orchestration Automation and Response (SOAR).
.- InTrust: An Asset Monitoring, Analysis and Vulnerability Assessment system for Zero Trust Network.
.- Microarchitectural Security of Firecracker VMM for Serverless Cloud Platforms.
.- An OS support for Tamper-resistant Software Execution Using Empty Interruptions.
.- S-RFUP: Secure Remote Firmware Update Protocol.
.- Securing Virtual Reality Apps Inter-Process Communication.
.- Network Security.
.- Securing the Web: Analysis of HTTP Security Headers in Popular Global Websites.
.- Countering Subscription Concealed Identifier (SUCI)-Catchers in Cellular Communications.
.- BP-MAP: A Secure and Convenient Mutual Authentication Protocol.
.- Effects of Soft-Domain Transfer and Named Entity Information on Deception Detection.
.- Paving the Way: Advancing V2X Safety Through Innovative Attack Generation and Analysis Framework (V2X-SAF).
.- From Traits to Threats: Learning Risk Indicators of Malicious Insider using Psychometric Data.
.- Identifying Insecure Network Configurations through Attack Modeling and Explainable AI.
.- QIris: Quantum Implementation of Rainbow Table Attacks.
.- Malware and Vulnerability Detection.
.- Insights from Running 24 Static Analysis Tools on Open Source Software Repositories.
.- REMEDII: Robust Malware Detection with Iterative and Intelligent Adversarial Training using GANs.
.- Semantics-Based Static Vulnerability Detection of Solidity Using Abstract Interpretation.
.- Privacy & Usability.
.- Web Privacy Perceptions Amongst Indian Users.
.- Enabling Privacy in IT Service Operations.
.- Privacy-Preserving Photo Sharing: An SSI Use Case.
.- Zone Recovery Attack on a Secure Privacy-Preserving Ride-Matching Protocol.
.- Making EULA Great Again: A Novel Nudge Mechanism to Improve Readability, User Attention and Awareness.
.- A Decoupling Mechanism for Transaction Privacy.
.- AI Security.
.- Protecting ownership of trained DNN models with Zero-Knowledge Proofs.
.- MALAI: ML-based Attack on Learning With Error problem.
.- Patch based backdoor attack on Deep Neural Networks.
.- Industry Demo/Practice.
.- Integrating Crypto-Based Payment Systems for Data Marketplaces: Enhancing Efficiency, Security, and User Autonomy.
.- Ontologies for WAF configurations: when knowledge-graphs help troubleshooting.
.- IntelliSOAR: Intelligent Alert Enrichment using Security Orchestration Automation and Response (SOAR).
.- InTrust: An Asset Monitoring, Analysis and Vulnerability Assessment system for Zero Trust Network.