NSS 2024: 18th International Conference on Network and System Security
SocialSec 2024: 10th International Symposium on Security and Privacy in Social Networks and Big Data
Zayed University, Abu Dhabi, UAE | November 20-22, 2024
How to Accomplish Key and Communication Compression Over Authentication Channels: Proxy Re-Authentication and its instantiations
Yoshiro Matsuoka, Sohto Chiku, Keisuke Hara and Junji Shikata |
You Can't Touch This: Detecting Typosquatting Packages for Enhanced Malware Prevention in Software Supply Chains
Minh Tien Truong, Nils Gruschka and Luigi Lo Iacono |
Enhancing Network Security through Vulnerability Monitoring
Ryan Williams, Anthony Gavazzi and Engin Kirda |
Optimizing Privacy-Preserving Continuous Authentication of Mobile Devices
David Monschein and Oliver Waldhorst |
PPDL: Efficient Dropout-Resilient Aggregation for Privacy-Preserving Decentralized Learning
Ali Reza Ghavamipour, Benjamin Zi Hao Zhao and Fatih Turkmen |
AndroPROTECT: Hardening the Android API against Fingerprinting
Gerald Palfinger |
PQS-BC: Comparative Analysis of NIST Post-Quantum Signatures for Blockchain
Wan Kai Wong, Naipeng Dong and Cong Minh Dinh |
SPVPC: Smart Contract based Publicly Verifiable Polynomial Computations
Partha Sarathi Chakraborty and Somanath Tripathy |
Towards a malware family classification model using static call graph instruction visualization
Attila Mester, Zalan Bodo, Vinod P. and Mauro Conti |
RKPM: Restricted Kernel Page Mechanism to Mitigate Privilege Escalation Attacks
Hiroki Kuzuno and Toshihiro Yamauchi |
Auditing and Attributing Suspicious Behaviours of Android Health Applications
Muhammad Salman, I Wayan Budi Sentana, Muhammad Ikram and Mohamed Ali Kaafar |
Credential Issuance Transparency: A Privacy-preserving Audit Log of Credential Issuance
Edona Fasllija, Jakob Heher and Stefan More |
Every Sherlock Needs a Watson: Practical Semi-Realtime Attack Elaboration System
Zeya Umayya, Arpit Nandi, Amartyo Roy and Sambuddho Chakravarty |
The Link between Bit-oriented and Word-oriented Stream Ciphers from a Cryptanalytic Perspective
Zhengting Li, Lin Ding, Xinhai Wang and Zheng Wu |
Decoding Android Malware with a Fraction of Features: An Attention-Enhanced MLP-SVM Approach
Safayat Bin Hakim, Muhammad Adil, Kamal Acharya and Houbing Song |
VulMatch: Binary-level Vulnerability Detection Through Signature
Zian Liu, Shigang Liu, Lei Pan, Chao Chen, Ejaz Ahmed, Jun Zhang and Dongxi Liu |
Sharing is (S)caring: Security and Privacy Issues in Decentralized Physical Infrastructure Networks (DePIN)
Maurantonio Caprolu, Simone Raponi and Roberto Di Pietro |
VoIP Vanguard: A Practical FrontLine Defense Against VoIP Identification Attacks in Tor
Jithin S, Richa Gupta, Reeshabh Kumar Ranjan, Shreyansh Nagpal, Mukulika Maity and Sambuddho Chakravarty |
Perceived Privacy Conflicts and Monitoring: A Study of Their Effects on Trust and Data Sharing in Social Networks
Yazan Alahmed, Reema Abadla and Mahmoud Khasawneh |
Decentralized Data Usage Control with Confidential Data Processing on Trusted Execution Environment and Distributed Ledger Technology
Shota Tokuda, Shohei Kakei, Yoshiaki Shiraishi and Shoichi Saito |
Revisiting Authorship Analysis for Binary Code
Saed Alrabaee, Mousa Al-Kfairy, Mohammad Bany Taha, Omar Alfandi, Fatma Taher, and Jie Tang |
Identifying the Origins of Business Data Breaches through CTC Detection
Gayle L. Frisbier, Omar Darwish, Anas Alsobeh and Abdallah Al-Shorman |
Investigating Influential COVID-19 Perspectives: A Multifaceted Analysis of Twitter Discourse
Shadaab Kawnain Bashir, Hossein Shirazi, Noushin Salek Faramarzi, Thomas Harris, Ashmita Shishodia, Hajar Homayouni and Indrakshi Ray |
ChatGPT Through the Users' Eyes: Sentiment Analysis of Privacy and Security Issues
Mousa Al-Kfairy, Ahmed Al-Adaileh and Obsa Abate |
Influence Detection in Agetech on Social Platforms using Machine Learning and Classifier Calibration
Noel Khaemba, Issa Traore and Mohammad Mamun |
Extended Abstract: Evaluating Cross-Chain Platforms for EV Charging Payment Systems
Bang Le, Trung Phan, Khiem Huynh Gia, Vinh Nguyen Thanh, Kha Nguy?n, Minh Nguyen Van, Le Khanh Tung, Nam Tran Ba and Son Ha Xuan |
Using M5Stack Core 2 ESP32 to Raise Children's Awareness about Cyber Security
Yeslam Al-Saggaf and Alan Ibbett |
ELITE: Efficient and Secure Machine Learning for Intelligent Perception in Smart Road Infrastructure
Swathi Kumar, Trupil Limbasiya and Anupam Chattopadhyay |
Gamma Sampling for Intrusion Detection with Imbalanced Data
Firuz Kamalov, Rohan Mitra and Hana Sulieman |
SmartAudit: Smart Contract Vulnerability Detection using Transfer learning
Ankur Jain and Somanath Tripathy |
FLAIR: A Federated Learning Approach Against Inference Attacks and Risks
Mouad Bouharoun and Mohammed Erradi |
Secure Aggregation of Smartwatch Health Data with LDP
Andres Hernandez-Matamoros and Hiroaki Kikuchi |