NSS-SocialSec 2024

NSS 2024: 18th International Conference on Network and System Security
SocialSec 2024: 10th International Symposium on Security and Privacy in Social Networks and Big Data
Zayed University, Abu Dhabi, UAE | November 20-22, 2024

Accepted Papers

NSS - First Cycle

How to Accomplish Key and Communication Compression Over Authentication Channels: Proxy Re-Authentication and its instantiations
Yoshiro Matsuoka, Sohto Chiku, Keisuke Hara and Junji Shikata
You Can't Touch This: Detecting Typosquatting Packages for Enhanced Malware Prevention in Software Supply Chains
Minh Tien Truong, Nils Gruschka and Luigi Lo Iacono
Enhancing Network Security through Vulnerability Monitoring
Ryan Williams, Anthony Gavazzi and Engin Kirda
Optimizing Privacy-Preserving Continuous Authentication of Mobile Devices
David Monschein and Oliver Waldhorst
PPDL: Efficient Dropout-Resilient Aggregation for Privacy-Preserving Decentralized Learning
Ali Reza Ghavamipour, Benjamin Zi Hao Zhao and Fatih Turkmen
AndroPROTECT: Hardening the Android API against Fingerprinting
Gerald Palfinger
PQS-BC: Comparative Analysis of NIST Post-Quantum Signatures for Blockchain
Wan Kai Wong, Naipeng Dong and Cong Minh Dinh
SPVPC: Smart Contract based Publicly Verifiable Polynomial Computations
Partha Sarathi Chakraborty and Somanath Tripathy
Towards a malware family classification model using static call graph instruction visualization
Attila Mester, Zalan Bodo, Vinod P. and Mauro Conti
RKPM: Restricted Kernel Page Mechanism to Mitigate Privilege Escalation Attacks
Hiroki Kuzuno and Toshihiro Yamauchi
Auditing and Attributing Suspicious Behaviours of Android Health Applications
Muhammad Salman, I Wayan Budi Sentana, Muhammad Ikram and Mohamed Ali Kaafar
Credential Issuance Transparency: A Privacy-preserving Audit Log of Credential Issuance
Edona Fasllija, Jakob Heher and Stefan More
Every Sherlock Needs a Watson: Practical Semi-Realtime Attack Elaboration System
Zeya Umayya, Arpit Nandi, Amartyo Roy and Sambuddho Chakravarty
The Link between Bit-oriented and Word-oriented Stream Ciphers from a Cryptanalytic Perspective
Zhengting Li, Lin Ding, Xinhai Wang and Zheng Wu
Decoding Android Malware with a Fraction of Features: An Attention-Enhanced MLP-SVM Approach
Safayat Bin Hakim, Muhammad Adil, Kamal Acharya and Houbing Song

NSS - Second Cycle

VulMatch: Binary-level Vulnerability Detection Through Signature
Zian Liu, Shigang Liu, Lei Pan, Chao Chen, Ejaz Ahmed, Jun Zhang and Dongxi Liu
Sharing is (S)caring: Security and Privacy Issues in Decentralized Physical Infrastructure Networks (DePIN)
Maurantonio Caprolu, Simone Raponi and Roberto Di Pietro
VoIP Vanguard: A Practical FrontLine Defense Against VoIP Identification Attacks in Tor
Jithin S, Richa Gupta, Reeshabh Kumar Ranjan, Shreyansh Nagpal, Mukulika Maity and Sambuddho Chakravarty
Perceived Privacy Conflicts and Monitoring: A Study of Their Effects on Trust and Data Sharing in Social Networks
Yazan Alahmed, Reema Abadla and Mahmoud Khasawneh
Decentralized Data Usage Control with Confidential Data Processing on Trusted Execution Environment and Distributed Ledger Technology
Shota Tokuda, Shohei Kakei, Yoshiaki Shiraishi and Shoichi Saito
Revisiting Authorship Analysis for Binary Code
Saed Alrabaee, Mousa Al-Kfairy, Mohammad Bany Taha, Omar Alfandi, Fatma Taher, and Jie Tang
Identifying the Origins of Business Data Breaches through CTC Detection
Gayle L. Frisbier, Omar Darwish, Anas Alsobeh and Abdallah Al-Shorman

SocialSec

Investigating Influential COVID-19 Perspectives: A Multifaceted Analysis of Twitter Discourse
Shadaab Kawnain Bashir, Hossein Shirazi, Noushin Salek Faramarzi, Thomas Harris, Ashmita Shishodia, Hajar Homayouni and Indrakshi Ray
ChatGPT Through the Users' Eyes: Sentiment Analysis of Privacy and Security Issues
Mousa Al-Kfairy, Ahmed Al-Adaileh and Obsa Abate
Influence Detection in Agetech on Social Platforms using Machine Learning and Classifier Calibration
Noel Khaemba, Issa Traore and Mohammad Mamun
Extended Abstract: Evaluating Cross-Chain Platforms for EV Charging Payment Systems
Bang Le, Trung Phan, Khiem Huynh Gia, Vinh Nguyen Thanh, Kha Nguy?n, Minh Nguyen Van, Le Khanh Tung, Nam Tran Ba and Son Ha Xuan
Using M5Stack Core 2 ESP32 to Raise Children's Awareness about Cyber Security
Yeslam Al-Saggaf and Alan Ibbett
ELITE: Efficient and Secure Machine Learning for Intelligent Perception in Smart Road Infrastructure
Swathi Kumar, Trupil Limbasiya and Anupam Chattopadhyay
Gamma Sampling for Intrusion Detection with Imbalanced Data
Firuz Kamalov, Rohan Mitra and Hana Sulieman
SmartAudit: Smart Contract Vulnerability Detection using Transfer learning
Ankur Jain and Somanath Tripathy
FLAIR: A Federated Learning Approach Against Inference Attacks and Risks
Mouad Bouharoun and Mohammed Erradi
Secure Aggregation of Smartwatch Health Data with LDP
Andres Hernandez-Matamoros and Hiroaki Kikuchi