


default search action
9th ICISSP 2023: Lisbon, Portugal
- Paolo Mori, Gabriele Lenzini, Steven Furnell:

Proceedings of the 9th International Conference on Information Systems Security and Privacy, ICISSP 2023, Lisbon, Portugal, February 22-24, 2023. SciTePress 2023, ISBN 978-989-758-624-8
Invited Speakers
- Melanie Volkamer:

Usable Security: Security 'Warnings' 2.0. ICISSP 2023: 5 - Luca Viganò:

Cybersecurity, Nicolas Cage and Peppa Pig. ICISSP 2023: 7 - Thorsten P. Stremlau:

Protecting IoT Ecosystems and AI Leveraging TCG Standards. ICISSP 2023: 11
Papers
- Shuji Ohira

, Araya Kibrom Desta
, Ismail Arai, Kazutoshi Fujikawa:
IVNPROTECT: Isolable and Traceable Lightweight CAN-Bus Kernel-Level Protection for Securing in-Vehicle Communication. 17-28 - Jukka Julku

, Markku Kylänpää
:
Towards a Rust SDK for Keystone Enclave Application Development. 29-37 - Kris Heid, Jens Heider, Matthias Ritscher, Jan-Peter Stotz:

Tracing Cryptographic Agility in Android and iOS Apps. 38-45 - Jonas Röckl, Adam Wagenhäuser, Tilo Müller:

Veto: Prohibit Outdated Edge System Software from Booting. 46-57 - Francisco Blas Izquierdo Riera

, Magnus Almgren, Pablo Picazo-Sanchez
, Christian Rohner:
Clipaha: A Scheme to Perform Password Stretching on the Client. 58-69 - Kento Hasegawa, Seira Hidano, Kazuhide Fukushima:

Automating XSS Vulnerability Testing Using Reinforcement Learning. 70-80 - Francesco Antognazza

, Alessandro Barenghi
, Gerardo Pelosi
, Ruggero Susella:
An Efficient Unified Architecture for Polynomial Multiplications in Lattice-Based Cryptoschemes. 81-88 - Patrik Burdiak, Emir Dervisevic, Amina Tankovic, Filip Lauterbach, Jan Rozhon, Lukas Kapicak, Libor Michalek, Dzana Pivac, Merima Fehric, Enio Kaljic

, Mirza Hamza, Miralem Mehic, Miroslav Voznák:
Use-Case Denial of Service Attack on Actual Quantum Key Distribution Nodes. 89-94 - Thanh Tran, Phu Nguyen, Gencer Erdogan:

A Systematic Review of Secure IoT Data Sharing. 95-105 - Yichao Wang

, Budi Arief
, Julio C. Hernandez-Castro:
Dark Ending: What Happens when a Dark Web Market Closes down. 106-117 - Zechariah Wolf

, Eric Larson, Mitchell A. Thornton
:
Data Leakage in Isolated Virtualized Enterprise Computing Systems. 118-123 - Ashish Neupane, Weiqing Sun:

Exploring False Demand Attacks in Power Grids with High PV Penetration. 124-134 - Tomás Rabas

, Jirí Bucek, Róbert Lórencz:
SPA Attack on NTRU Protected Implementation with Sparse Representation of Private Key. 135-143 - Mohammed M. Alani, Atefeh Mashatan, Ali Miri:

XMeDNN: An Explainable Deep Neural Network System for Intrusion Detection in Internet of Medical Things. 144-151 - Lu Li, Guanling Zhao, Kai Shi, Fengjun Zhang:

A Stochastic Game Model for Cloud Platform Security. 152-162 - Pedro A. Lohmann, Carlos Albuquerque, Raphael Machado:

Systematic Literature Review of Threat Modeling Concepts. 163-173 - Josef Kokes, Róbert Lórencz:

On the Use of Multiple Approximations in the Linear Cryptanalysis of Baby Rijndael. 174-179 - Yuri Gil Dantas, Simon Barner, Pei Ke, Vivek Nigam, Ulrich Schöpp:

Automating Vehicle SOA Threat Analysis Using a Model-Based Methodology. 180-191 - Michael Kiperberg, Aleksei Rozman, Aleksei Kuraev, Nezer Zaidenberg:

PDIFT: A Practical Dynamic Information-Flow Tracker. 192-198 - Philip Raschke, Patrick Herbke

, Henry Schwerdtner:
t.ex-Graph: Automated Web Tracker Detection Using Centrality Metrics and Data Flow Characteristics. 199-209 - Nouf Al-Juaid

, Alexei Lisitsa, Sven Schewe:
Secure Joint Querying Over Federated Graph Databases Utilising SMPC Protocols. 210-217 - Ahmed Khoumsi:

Automata-Based Study of Dynamic Access Control Policies. 218-227 - Jace Kline, Prasad Kulkarni:

A Framework for Assessing Decompiler Inference Accuracy of Source-Level Program Constructs. 228-239 - Shaojie Chen

, Bo Lang, Chong Xie:
Fast-Flux Malicious Domain Name Detection Method Based on Domain Resolution Spatial Features. 240-251 - Filippo Galli, Sayan Biswas

, Kangsoo Jung, Tommaso Cucinotta, Catuscia Palamidessi:
Group Privacy for Personalized Federated Learning. 252-263 - Yuri Gil Dantas, Ulrich Schöpp:

SeCloud: Computer-Aided Support for Selecting Security Measures for Cloud Architectures. 264-275 - Philipp Hofer, Michael Roland

, Philipp Schwarz, René Mayrhofer:
Efficient Aggregation of Face Embeddings for Decentralized Face Recognition Deployments. 279-286 - Saida Farhat

, Manel Abdelkader, Amel Meddeb-Makhlouf, Faouzi Zarai:
Evaluation of DoS/DDoS Attack Detection with ML Techniques on CIC-IDS2017 Dataset. 287-295 - Gencer Erdogan, Ragnhild Halvorsrud

, Costas Boletsis
, Simeon Tverdal, John Brian Pickering:
Cybersecurity Awareness and Capacities of SMEs. 296-304 - Francesco Mercaldo, Fabio Martinelli, Antonella Santone:

An Explainable Convolutional Neural Network for Dynamic Android Malware Detection. 305-312 - Ryu Watanabe, Takashi Matsunaka, Ayumu Kubota, Jumpei Urakawa:

Machine Learning Based Prediction of Vulnerability Information Subject to a Security Alert. 313-320 - Keita Emura, Masato Yoshimi:

An End-to-End Encrypted Cache System with Time-Dependent Access Control. 321-328 - Shintaro Narisada, Shohei Beppu, Kazuhide Fukushima, Shinsaku Kiyomoto:

Concrete Quantum Circuits to Prepare Generalized Dicke States on a Quantum Machine. 329-338 - Devi Padmavathi Alagarswamy, Christian Berghoff, Vasilios Danos, Fabian Langer, Thora Markert, Georg Schneider, Arndt von Twickel, Fabian Woitschek:

Towards Audit Requirements for AI-Based Systems in Mobility Applications. 339-348 - António Marques, Bruno Sousa:

CHARRA-PM: An Attestation Approach Relying on the Passport Model. 349-356 - Anastasia Dimaratos, Daniela Pöhn

:
Evaluation Scheme to Analyze Keystroke Dynamics Methods. 357-365 - Hiroki Okada

, Kazuhide Fukushima:
Revisiting the DFT Test in the NIST SP 800-22 Randomness Test Suite. 366-372 - Frédéric Ruellé, Quentin Guellaën, Arnaud Rosay

:
SHOID: A Secure Herd of IoT Devices Firmware Update Protocol. 373-380 - Ciarán Bryce:

An Analysis of Cybersecurity Awareness Efforts for Swiss SMEs. 381-388 - Jennifer Bellizzi, Mark Vella, Christian Colombo, Julio C. Hernandez-Castro:

Using Infrastructure-Based Agents to Enhance Forensic Logging of Third-Party Applications. 389-401 - Marcus Walkow, Daniela Pöhn

:
Systematically Searching for Identity-Related Information in the Internet with OSINT Tools. 402-409 - George Teseleanu:

Security Analysis of a Color Image Encryption Scheme Based on Dynamic Substitution and Diffusion Operations. 410-417 - Filip Lauterbach, Libor Michalek, Piotr Rydlichowski

, Patrik Burdiak, Jaroslav Zdralek, Miroslav Voznák:
Measurements of Cross-Border Quantum Key Distribution Link. 418-423 - Marcello Maugeri, Cristian Daniele, Giampaolo Bella, Erik Poll:

Evaluating the Fork-Awareness of Coverage-Guided Fuzzers. 424-429 - Anne Borcherding

, Nikolay Penkov
, Mark Giraud, Jürgen Beyerer:
SWaTEval: An Evaluation Framework for Stateful Web Application Testing. 430-441 - Ahmad Akmal Aminuddin Mohd Kamal, Keiichi Iwamura:

TTP-Aided Searchable Encryption of Documents Using Threshold Secret Sharing. 442-449 - Shukun Tokas, Gencer Erdogan, Ketil Stølen:

Privacy-Aware IoT: State-of-the-Art and Challenges. 450-461 - Pia Bauspieß, Lasse Vad, Håvard Myrekrok, Anamaria Costache, Jascha Kolberg, Christian Rathgeb:

On the Feasibility of Fully Homomorphic Encryption of Minutiae-Based Fingerprint Representations. 462-470 - Alexandra Rocha, Rui Alves, Tiago Pedrosa

:
Query Log Analysis for SQL Injection Detection. 471-476 - Andreas Eipper, Daniela Pöhn

:
How to Design a Blue Team Scenario for Beginners on the Example of Brute-Force Attacks on Authentications. 477-484 - Daniel Reti, Karina Elzer, Hans Dieter Schotten:

SCANTRAP: Protecting Content Management Systems from Vulnerability Scanners with Cyber Deception and Obfuscation. 485-492 - Risa Sugai, Yuichi Sei

, Yasuyuki Tahara, Akihiko Ohsuga:
A k-Anonymization Method for Social Network Data with Link Prediction. 493-500 - Mathew Nicho, Ibrahim Sabry

:
Bypassing Multiple Security Layers Using Malicious USB Human Interface Device. 501-508 - Kaiying Luan, Ragnhild Halvorsrud

, Costas Boletsis
:
Evaluation of a Tool to Increase Cybersecurity Awareness Among Non-experts (SME Employees). 509-518 - Günther R. Drevin, Dirk P. Snyman, Lynette Drevin

, Hennie A. Kruger, Johann Allers:
The Story of Safety Snail and Her e-Mail: A Digital Wellness and Cybersecurity Serious Game for Pre-School Children. 519-527 - Ilias Belalis, Georgios P. Spathoulas, Ioannis Anagnostopoulos:

Evading Detection During Network Reconnaissance. 528-534 - Harrison Bullock, Matthew Edwards

:
Temporal Constraints in Online Dating Fraud Classification. 535-542 - Michael Diener, Thomas Bolz:

Cloud Inspector: A Tool-Based Approach for Public Administrations to Establish Information Security Processes Towards Public Clouds. 543-551 - Amélie Dieterich, Matthias Schopp, Lars Stiemert, Christoph Steininger

, Daniela Pöhn
:
Evaluation of Persistence Methods Used by Malware on Microsoft Windows Systems. 552-559 - Vitomir Pavlov, Florian Hahn

, Mohammad El-Hajj:
Security Aspects of Digital Twins in IoT. 560-567 - Feiyang Tang

, Bjarte M. Østvold, Magiel Bruntink:
Identifying Personal Data Processing for Code Review. 568-575 - Yinzheng Zhong, Alexei Lisitsa:

Online Transition-Based Feature Generation for Anomaly Detection in Concurrent Data Streams. 576-582 - Witali Bartsch, Prosanta Gope, Elif Bilge Kavun, Owen Millwood

, Andriy Panchenko, Aryan Mohammadi Pasikhani
, Ilia Polian:
Design Rationale for Symbiotically Secure Key Management Systems in IoT and Beyond. 583-591 - Samiah Alghamdi, Steven Furnell:

Assessing Security and Privacy Insights for Smart Home Users. 592-599 - Alexandros Karakasidis, Vassilios Vassalos:

On the Design of GDPR Compliant Workflows for Responsible Neuroimage Data Sharing. 600-607 - César Vásquez Flores, José Gonzales, Miranda Kajtazi, Joseph Bugeja

, Bahtijar Vogel:
Human Factors for Cybersecurity Awareness in a Remote Work Environment. 608-616 - Chansu Han, Akira Tanaka, Jun'ichi Takeuchi, Takeshi Takahashi, Tomohiro Morikawa, Tsung-Nan Lin:

Towards Long-Term Continuous Tracing of Internet-Wide Scanning Campaigns Based on Darknet Analysis. 617-625 - Chiara Bodei, Gianpiero Costantino, Marco De Vincenzi

, Ilaria Matteucci
, Anna Monreale:
Vehicle Data Collection: A Privacy Policy Analysis and Comparison. 626-633 - Maria Leitner

:
A Scenario-Driven Cyber Security Awareness Exercise Utilizing Dynamic Polling: Methodology and Lessons Learned. 634-642 - James R. Elste, David T. Croasdell:

Cyber Teaching Hospitals: Developing Cyber Workforce Competence. 643-650 - Hanwen Zhang, Wenyong Wang, Lisheng Huang, Junrui Wu, Fengjun Zhang, Kai Shi:

Correlating Intrusion Detection with Attack Graph on Virtual Computer Networkings. 651-658 - Rauli Kaksonen, Kimmo Halunen, Juha Röning:

Vulnerabilities in IoT Devices, Backends, Applications, and Components. 659-668 - Vanessa Bracamonte, Sebastian Pape, Sascha Löbner:

Comparing the Effect of Privacy and Non-Privacy Social Media Photo Tools on Factors of Privacy Concern. 669-676 - Yevhen Zolotavkin, Yurii Baryshev

, Vitalii Lukichov
, Jannik Mähn, Stefan Köpsell
:
Improving Unlinkability in C-ITS: A Methodology For Optimal Obfuscation. 677-685 - Jens Leicht

, Maritta Heisel:
P2BAC: Privacy Policy Based Access Control Using P-LPL. 686-697 - Ludwig Seitz, Marco Tiloca, Martin Gunnarsson, Rikard Höglund:

Secure Software Updates for IoT Based on Industry Requirements. 698-705 - Paul Tavolato, Robert Luh, Sebastian Eresheim

:
A Game Theoretic Analysis of Cyber Threats. 706-713 - Michele Guerra

, Roberto Milanese
, Rocco Oliveto, Fausto Fasano
:
RPCDroid: Runtime Identification of Permission Usage Contexts in Android Applications. 714-721 - Elias Seid, Oliver Popov, Fredrik Blix:

Towards Security Attack Event Monitoring for Cyber Physical-Systems. 722-732 - Mohammad Reza Heidari Iman, Pavel Chikul

, Gert Jervan, Hayretdin Bahsi, Tara Ghasempouri
:
Anomalous File System Activity Detection Through Temporal Association Rule Mining. 733-740 - Daniele Albanese, Rosangela Casolare, Giovanni Ciaramella, Giacomo Iadarola, Fabio Martinelli, Francesco Mercaldo, Marco Russodivito

, Antonella Santone:
StegWare: A Novel Malware Model Exploiting Payload Steganography and Dynamic Compilation. 741-748 - Hervé Chabanne:

A Biometric Self Authentication Scheme. 749-756 - Kostas Loumponias, Sotiris Raptis

, Eleni Darra, Theodora Tsikrika, Stefanos Vrochidis, Ioannis Kompatsiaris:
Forecasting Cyber-Attacks to Destination Ports Using Machine Learning. 757-764 - Areeg Samir

, Håvard Dagenborg Johansen:
A Self-Configuration Controller To Detect, Identify, and Recover Misconfiguration at IoT Edge Devices and Containerized Cluster System. 765-773 - Kaushik Krishnan Balaji, Dimah Almani, Steven Furnell:

Assessing the Impact of Attacks on Connected and Autonomous Vehicles in Vehicular Ad Hoc Networks. 774-782 - Mahboobeh Dorafshanian, Mohamed Mejri:

Differential Privacy: Toward a Better Tuning of the Privacy Budget (ε) Based on Risk. 783-792 - Erika A. Leal, Cimone Wright-Hamor

, Joseph B. Manzano, Nicholas J. Multari, Kevin J. Barker
, David O. Manz, Jiang Ming:
Assessing Risk in High Performance Computing Attacks. 793-803

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














