NSS 2021

15th International Conference on Network and System Security
Tianjin, China
23 October 2021

Accepted Papers

Regular Papers

RLTree: Website Fingerprinting through Resource Loading Tree
Changzhi Li, Lihai Nie and Laiping Zhao
Re-check Your Certificates! Experiences and Lessons Learnt from Real-world HTTPS Certificate Deployments
Wenya Wang, Yakang Li, Chao Wang, Yuan Yan, Juanru Li and Dawu Go
ZERMIA - A Fault Injector framework for testing Byzantine Fault Tolerant protocols
João Soares, Ricardo Fernandez, Miguel Silva, Tadeu Freitas and Rolando Martins
Revocable Data Sharing Methodology Based on SGX and Blockchain
Liang Zhang, Haibin Kan, Yang Xu and Jinhao Ran
On the Analysis of the Outsourced Revocable Identity-Based Encryption from Lattices
Yanhua Zhang, Ximeng Liu, Yupu Hu and Huiwen Jia
Preventing Fake News Propagation in Social Networks using a context Trust-based security model
Nadav Voloch, Ehud Gudes and Nurit Gal-Oz
A Lightweight Android Malware Detection Framework based on Knowledge Distillation
Yongbo Zhi, Ning Xi, Yuanqing Liu and Honglei Hui
Federated learning-based intrusion detection in the context of IIoT networks: Poisoning Attack and defense
Nguyen Chi Vy, Nguyen Huu Quyen, Phan The Duy and Van-Hau Pham
A Simplified and Effective Solution for Hybrid SDN Network Deployment
Haisheng Yu, Wenyong Wang, Yan Liu, Lihong Cheng and Sai Zou
Group Key Exchange Compilers from Generic Key Exchanges
Hector B. Hougaard and Atsuko Miyaji
An architecture for processing a dynamic heterogeneous information network of security intelligence
Marios Anagnostopoulos, Egon Kidmose, Amine Laghaout, Rasmus L. Olsen, Sajad Homayoun, Christian D. Jensen and Jens M. Pedersen
The Complexity of Testing Cryptographic Devices on Input Faults
Alisher Ikramov and Gayrat Juraev
A Malware Family Classification Method Based on the Point Cloud Model DGCNN
Yuxin Ding, Zihan Zhou and Wen Qian
Collection of the main Anti-Virus detection and bypass techniques
Jérémy Donadio, Guillaume Guerard , and Soufian Ben Amor
Profiled Attacks against the Elliptic Curve Scalar Point Multiplication using Neural Networks
Alessandro Barenghi, Diego Carrera, Silvia Mella, Andrea Pace, Gerardo Pelosi and Ruggero Susella
Deep Cross-modal Supervised Hashing based on Joint Semantic Matrix
Na Chen, Yuan Cao and Chao Liu

Short Papers

Accurate Polar Harmonic Transform-based Watermarking Using Blind Statistical Detector
Yu Sang, Yilin Bei, Zhiyang Yang and Chen Zhao
Cloud Key Management Based on Verifiable Secret Sharing
Mustapha Hedabou
A Scheme for Sensor Data Reconstruction in Smart Home
Yegang Du
Privacy-preserving and Auditable Federated Deep Reinforcement Learning for Robotic Manipulation
Xudong Zhu and Hui Li
HALNet: A Hybrid Deep Learning Model for Encrypted C&C Malware Traffic Detection
Ruiyuan Li, Zehui Song, Wei Xie, Chengwei Zhang, Guohui Zhong and Xiaobing Pei
Tracing Software Exploitation
Ayman Youssef, Mohamed Abdelrazek, Chandan Karmakar and Zubair Baig
A Secure and Privacy Preserving Federated Learning Approach for IoT Intrusion Detection System
Phan The Duy, Huynh Nhat Hao, Huynh Minh Chu and Van-Hau Pham
Cryptanalysis of A Fully Anonymous Group Signature with Verifier-Local Revocation from ICICS 2018
Yanhua Zhang, Ximeng Liu, Yupu Hu and Huiwen Jia
Tianjin Key Laboratory of Advanced Networking
Tianjin University
NSCLab
Springer
People Daily
SKLCCC