Skip to main content

previous disabled Page of 58
and
  1. No Access

    Chapter and Conference Paper

    An Android Malware Detection Method Using Better API Contextual Information

    The vast popularity of the Android platform has fueled the rapid expansion of Android malware and existing detection methods are difficult to effectively detect malware. To address this issue, in this paper, w...

    Hongyu Yang, Youwei Wang, Liang Zhang, Ze Hu in Information Security and Cryptology (2024)

  2. No Access

    Chapter and Conference Paper

    A Multi-scene Webpage Fingerprinting Method Based on Multi-head Attention and Data Enhancement

    Aiming the problems of the high segmentation error of multi-tab webpage traffic and unreasonable use of mixed regions in the current Tor webpage fingerprinting methods and the poor recognition effect of webpag...

    Lixia **e, Yange Li, Hongyu Yang, Peng Wang, Ze Hu in Information Security and Cryptology (2024)

  3. No Access

    Chapter and Conference Paper

    Improving the Rectangle Attack on GIFT-64

    GIFT is a family of lightweight block ciphers based on SPN structure and composed of two versions named GIFT-64 and GIFT-128. In this paper, we reevaluate the security of GIFT-64 against the rectangle attack u...

    Yincen Chen, Nana Zhang, Xuanyu Liang in Selected Areas in Cryptography – SAC 2023 (2024)

  4. No Access

    Chapter and Conference Paper

    Hiding Your Signals: A Security Analysis of PPG-Based Biometric Authentication

    Recently, physiological signal-based biometric systems have received wide attention. Photoplethysmogram (PPG) signal is easy to measure, making it more attractive than many other physiological signals for biom...

    Lin Li, Chao Chen, Lei Pan, Yonghang Tai, Jun Zhang in Computer Security – ESORICS 2023 (2024)

  5. No Access

    Chapter and Conference Paper

    MFL-RAT: Multi-class Few-Shot Learning Method for Encrypted RAT Traffic Detection

    Remote Access Trojan (RAT) poses a significant risk in today’s network environment. These malware are commonly employed by hacking groups to monitor victims’ activities and illicitly obtain sensitive personal ...

    Yi**g Zhang, Jianhuan Zhuo, Jianjun Lin, **aoyu Liu in Information Security and Cryptology (2024)

  6. No Access

    Chapter and Conference Paper

    TIA: Token Importance Transferable Attack on Vision Transformers

    Vision transformers (ViTs) have witnessed significant progress in the past few years. Recently, the latest research revealed that ViTs are vulnerable to transfer-based attacks, in which attackers can use a loc...

    Tingchao Fu, Fanxiao Li, **hong Zhang, Liang Zhu in Information Security and Cryptology (2024)

  7. No Access

    Chapter and Conference Paper

    Best-of-Both-Worlds Multiparty Quantum Computation with Publicly Verifiable Identifiable Abort

    Alon et al. (CRYPTO 2021) introduced a multiparty quantum computation protocol that is secure with identifiable abort (MPQC-SWIA). However, their protocol allows only inside MPQC parties to know the identity o...

    Kai-Min Chung, Mi-Ying Huang, Er-Cheng Tang in Advances in Cryptology – EUROCRYPT 2024 (2024)

  8. No Access

    Chapter and Conference Paper

    Full Round Distinguishing and Key-Recovery Attacks on SAND-2

    This paper presents full round distinguishing and key recovery attacks on lightweight block cipher SAND-2 with 64-bit block size and 128-bit key size, which appears to be a mixture of the AND-Rotation-XOR (AND...

    Zhuolong Zhang, Shiyao Chen, Wei Wang, Meiqin Wang in Information Security and Cryptology (2024)

  9. No Access

    Chapter and Conference Paper

    Static Semantics Reconstruction for Enhancing JavaScript-WebAssembly Multilingual Malware Detection

    The emergence of WebAssembly allows attackers to hide the malicious functionalities of JavaScript malware in cross-language interoperations, termed JavaScript-WebAssembly multilingual malware (JWMM). However, ...

    Yifan **a, ** He, Xuhong Zhang, Peiyu Liu in Computer Security – ESORICS 2023 (2024)

  10. No Access

    Chapter and Conference Paper

    DP-Loc: A Differential Privacy-Based Indoor Localization Scheme with Bilateral Privacy Protection

    Among indoor localization services, WiFi fingerprint technology has attracted much attention because of its wide coverage area and high positioning accuracy. However, concerns arise regarding the vulnerability...

    Yinghui Zhang, Haorui Du, ** Cao, Gang Han in Information Security and Cryptology (2024)

  11. No Access

    Chapter and Conference Paper

    Bijack: Breaking Bitcoin Network with TCP Vulnerabilities

    Recent studies have shown that compromising Bitcoin’s peer-to-peer network is an effective way to disrupt the Bitcoin service. While many attack vectors have been uncovered such as BGP hijacking in the networ...

    Shaoyu Li, Shanghao Shi, Yang **ao, Chaoyu Zhang in Computer Security – ESORICS 2023 (2024)

  12. No Access

    Chapter and Conference Paper

    Automatic Search of Linear Structure: Applications to Keccak and Ascon

    The linear structure technique was developed by Guo et al. at ASIACRYPT 2016, notably boosting the preimage attacks on Keccak. This technique transforming the preimage attack into solving algebraic systems allows...

    Huina Li, Guozhen Liu, Haochen Zhang, Peng Tang in Information Security and Cryptology (2024)

  13. No Access

    Chapter and Conference Paper

    Item-Oriented Personalized LDP for Discrete Distribution Estimation

    Discrete distribution estimation is a fundamental statistical tool, which is widely used to perform data analysis tasks in various applications involving sensitive personal information. Due to privacy concerns...

    **n Li, Hong Zhu, Zhiqiang Zhang, Meiyi **e in Computer Security – ESORICS 2023 (2024)

  14. No Access

    Chapter and Conference Paper

    Epoch: Enabling Path Concealing Payment Channel Hubs with Optimal Path Encryption

    Payment channel path information includes node identity and balance. With this public information, an attacker can initiate a recurring transaction against the victim node, resulting in the victim node’s avail...

    Ming Liu, Mingyue Zhang, Guangshun Li, Yuemei Hu in Information Security and Cryptology (2024)

  15. No Access

    Chapter and Conference Paper

    Bit Security Analysis of Lattice-Based KEMs Under Plaintext-Checking Attacks

    Plaintext-checking attack (PCA) is a type of attack where an adversary recovers the secret key with the help of a plaintext-checking (PC) oracle that decides if a given ciphertext decrypts to a given plaintext...

    Ruiqi Mi, Haodong Jiang, Zhenfeng Zhang in Selected Areas in Cryptography – SAC 2023 (2024)

  16. No Access

    Chapter and Conference Paper

    Intelligent Zigbee Protocol Fuzzing via Constraint-Field Dependency Inference

    Zigbee is one of the global most popular IoT standards widely deployed by millions of devices and customers. Its fast market growth also incentivizes cybercriminals. Inference-guided fuzzing has shown promisin...

    Mengfei Ren, Haotian Zhang, **aolei Ren, Jiang Ming in Computer Security – ESORICS 2023 (2024)

  17. No Access

    Chapter and Conference Paper

    Indirect Meltdown: Building Novel Side-Channel Attacks from Transient-Execution Attacks

    The transient-execution attack Meltdown leaks sensitive information by transiently accessing inaccessible data during out-of-order execution. Although Meltdown is fixed in hardware for recent CPU generations, ...

    Daniel Weber, Fabian Thomas, Lukas Gerlach, Ruiyi Zhang in Computer Security – ESORICS 2023 (2024)

  18. No Access

    Chapter and Conference Paper

    Deniable Cryptosystems: Simpler Constructions and Achieving Leakage Resilience

    Deniable encryption (Canetti et al. in CRYPTO ’97) is an intriguing primitive, which provides security guarantee against coercion by allowing a sender to convincingly open the ciphertext into a fake message. D...

    Zhiyuan An, Haibo Tian, Chao Chen, Fangguo Zhang in Computer Security – ESORICS 2023 (2024)

  19. No Access

    Chapter and Conference Paper

    When is Slower Block Propagation More Profitable for Large Miners?

    For years, Bitcoin miners put little effort into adopting several widely-acclaimed block acceleration techniques, which, as some argued, would secure their revenues. Their indifference inspires a theory that s...

    Zhichun Lu, Ren Zhang in Computer Security – ESORICS 2023 (2024)

  20. No Access

    Chapter and Conference Paper

    Dual-Domain Learning Network for Polyp Segmentation

    Automatic polyp segmentation is a crucial application of artificial intelligence in the medical field. However, this task is challenging due to uneven brightness, variable colors, and blurry boundaries. Most c...

    Yan Li, Zhuoran Zheng, Wenqi Ren, Yunfeng Nie in Digital Forensics and Watermarking (2024)

previous disabled Page of 58