NSS 2020

14th International Conference on Network and System Security
Melbourne, Australia
25-27 November 2020

Accepted Papers

Regular Papers

A Weighted Voting Framework for Android App’s Vetting based on Multiple Machine Learning Models
Honglei Hui, Yongbo Zhi, Ning Xi and Yuanqing Liu
Evaluation of Anomaly-based Intrusion Detection with Combined Imbalance Correction and Feature Selection
Andreas Heidelbach Engly, Anton Ruby Larsen and Weizhi Meng
A Framework of Blockchain-based Collaborative Intrusion Detection in Software Defined Networking
Wenjuan Li, Jiao Tan and Yu Wang
Defending Against Package Typosquatting
Matthew Taylor, Ruturaj Vaidya, Drew Davidson, Lorenzo De Carli and Vaibhav Rastogi
Data Analytics of Crowdsourced Resources for Cybersecurity Intelligence
Nan Sun, Jun Zhang, Shang Gao, Leo Yu Zhang, Seyit Camtepe and Yang Xiang
Security Evaluation of Smart Contract-based On-chain Ethereum Wallets
Purathani Praitheeshan, Lei Pan and Robin Doss
EnCoD: Distinguishing Compressed and Encrypted File Fragments
Fabio De Gaspari, Dorjan Hitaj, Giulio Pagnotta, Lorenzo De Carli and Luigi V. Mancini
Sequential Anomaly Detection using Feedback and Prioritized Experience Replay
Anish Reddy Ellore, Sanket Mishra and Chittaranjan Hota
HyperWall: A Hypervisor for Detection and Prevention of Malicious Communication
Michael Kiperberg, Raz Ben Yehuda and Nezer Jacob Zaidenberg
AC0 constructions of secret sharing schemes – Accommodating new parties
Shion Samadder Chaudhury, Sabyasachi Dutta and Kouichi Sakurai
Graph Deep Learning Based Anomaly Detection in Ethereum Blockchain Network
Vatsal Patel, Lei Pan and Sutharshan Rajasegarar
Safety analysis of high-dimensional anonymized data from multiple perspectives
Yamazoe Takaya and Omote Kazumasa
Compactly Committing Authenticated Encryption Using Tweakable Block Cipher
Shoichi Hirose
Game Theoretic Analysis of Reputation Approach on Block Withholding Attack
Lianyang Yu, Jiangshan Yu and Yevhen Zolotavkin
Model Poisoning Defense on Federated Learning: A Validation Based Approach
Yuao Wang, Tianqing Zhu, Wenhan Chang, Sheng Shen and Wei Ren
Fixing Vulnerabilities Automatically with Linters
Willard Rafnsson, Rosario Giustolisi, Mark Kragerup and Mathias Høyrup
Identity-based Outsider Anonymous Broadcast Encryption with Simultaneous Individual Messaging
Mriganka Mandal and Koji Nuida

Short Papers

Privacy and Utility trade-off for textual Analysis via Calibrated Multivariate Perturbations
Jingye Tang, Tianqing Zhu, Yu Wang, Ping Xiong and Wei Ren
On the Vulnerability of Hyperdimensional Computing-Based Classifiers to Adversarial Attacks
Fangfang Yang and Shaolei Ren
The Impact of Differential Privacy on Model Fairness in Federated learning
Xiuting Gu, Tianqing Zhu and Jie Li
ESCAPADE: Encryption-type-ransomware: System Call based Pattern Detection
Christopher Chew, Vimal Kumar, Panos Patros and Robi Malik
A Model Specification Implementation for Trust Negotiations
Martin Kolar, Carmen Fernández-Gago and Javier Lopez
Evading stepping-stone detection by using enough chaff perturbations
Henry Clausen, David Aspinall and Michael Gibson
PowerKey: Generating Secret Keys from Power Line Electromagnetic Interferences
Fangfang Yang, Mohammad Atiqul Islam and Shaolei Ren
A Privacy Preserving Aggregation Scheme for Fog-Based Recommender System
Xiaodong Wang, Bruce Gu, Youyang Qu, Yongli Ren, Yong Xiang and Longxiang Gao
Multiply, Divide, and Conquer – Making Fully Decentralised Access Control a Reality
Bernd Prünster, Dominik Ziegler and Gerald Palfinger
Swinburne Univesity of Technology
Deakin University
NSCLab
Springer