![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
1,143 Result(s)
-
Chapter and Conference Paper
An Android Malware Detection Method Using Better API Contextual Information
The vast popularity of the Android platform has fueled the rapid expansion of Android malware and existing detection methods are difficult to effectively detect malware. To address this issue, in this paper, w...
-
Chapter and Conference Paper
A Multi-scene Webpage Fingerprinting Method Based on Multi-head Attention and Data Enhancement
Aiming the problems of the high segmentation error of multi-tab webpage traffic and unreasonable use of mixed regions in the current Tor webpage fingerprinting methods and the poor recognition effect of webpag...
-
Chapter and Conference Paper
Improving the Rectangle Attack on GIFT-64
GIFT is a family of lightweight block ciphers based on SPN structure and composed of two versions named GIFT-64 and GIFT-128. In this paper, we reevaluate the security of GIFT-64 against the rectangle attack u...
-
Chapter and Conference Paper
Hiding Your Signals: A Security Analysis of PPG-Based Biometric Authentication
Recently, physiological signal-based biometric systems have received wide attention. Photoplethysmogram (PPG) signal is easy to measure, making it more attractive than many other physiological signals for biom...
-
Chapter and Conference Paper
MFL-RAT: Multi-class Few-Shot Learning Method for Encrypted RAT Traffic Detection
Remote Access Trojan (RAT) poses a significant risk in today’s network environment. These malware are commonly employed by hacking groups to monitor victims’ activities and illicitly obtain sensitive personal ...
-
Chapter and Conference Paper
TIA: Token Importance Transferable Attack on Vision Transformers
Vision transformers (ViTs) have witnessed significant progress in the past few years. Recently, the latest research revealed that ViTs are vulnerable to transfer-based attacks, in which attackers can use a loc...
-
Chapter and Conference Paper
Best-of-Both-Worlds Multiparty Quantum Computation with Publicly Verifiable Identifiable Abort
Alon et al. (CRYPTO 2021) introduced a multiparty quantum computation protocol that is secure with identifiable abort (MPQC-SWIA). However, their protocol allows only inside MPQC parties to know the identity o...
-
Chapter and Conference Paper
Full Round Distinguishing and Key-Recovery Attacks on SAND-2
This paper presents full round distinguishing and key recovery attacks on lightweight block cipher SAND-2 with 64-bit block size and 128-bit key size, which appears to be a mixture of the AND-Rotation-XOR (AND...
-
Chapter and Conference Paper
Static Semantics Reconstruction for Enhancing JavaScript-WebAssembly Multilingual Malware Detection
The emergence of WebAssembly allows attackers to hide the malicious functionalities of JavaScript malware in cross-language interoperations, termed JavaScript-WebAssembly multilingual malware (JWMM). However, ...
-
Chapter and Conference Paper
DP-Loc: A Differential Privacy-Based Indoor Localization Scheme with Bilateral Privacy Protection
Among indoor localization services, WiFi fingerprint technology has attracted much attention because of its wide coverage area and high positioning accuracy. However, concerns arise regarding the vulnerability...
-
Chapter and Conference Paper
Bijack: Breaking Bitcoin Network with TCP Vulnerabilities
Recent studies have shown that compromising Bitcoin’s peer-to-peer network is an effective way to disrupt the Bitcoin service. While many attack vectors have been uncovered such as BGP hijacking in the networ...
-
Chapter and Conference Paper
Automatic Search of Linear Structure: Applications to Keccak and Ascon
The linear structure technique was developed by Guo et al. at ASIACRYPT 2016, notably boosting the preimage attacks on Keccak. This technique transforming the preimage attack into solving algebraic systems allows...
-
Chapter and Conference Paper
Item-Oriented Personalized LDP for Discrete Distribution Estimation
Discrete distribution estimation is a fundamental statistical tool, which is widely used to perform data analysis tasks in various applications involving sensitive personal information. Due to privacy concerns...
-
Chapter and Conference Paper
Epoch: Enabling Path Concealing Payment Channel Hubs with Optimal Path Encryption
Payment channel path information includes node identity and balance. With this public information, an attacker can initiate a recurring transaction against the victim node, resulting in the victim node’s avail...
-
Chapter and Conference Paper
Bit Security Analysis of Lattice-Based KEMs Under Plaintext-Checking Attacks
Plaintext-checking attack (PCA) is a type of attack where an adversary recovers the secret key with the help of a plaintext-checking (PC) oracle that decides if a given ciphertext decrypts to a given plaintext...
-
Chapter and Conference Paper
Intelligent Zigbee Protocol Fuzzing via Constraint-Field Dependency Inference
Zigbee is one of the global most popular IoT standards widely deployed by millions of devices and customers. Its fast market growth also incentivizes cybercriminals. Inference-guided fuzzing has shown promisin...
-
Chapter and Conference Paper
Indirect Meltdown: Building Novel Side-Channel Attacks from Transient-Execution Attacks
The transient-execution attack Meltdown leaks sensitive information by transiently accessing inaccessible data during out-of-order execution. Although Meltdown is fixed in hardware for recent CPU generations, ...
-
Chapter and Conference Paper
Deniable Cryptosystems: Simpler Constructions and Achieving Leakage Resilience
Deniable encryption (Canetti et al. in CRYPTO ’97) is an intriguing primitive, which provides security guarantee against coercion by allowing a sender to convincingly open the ciphertext into a fake message. D...
-
Chapter and Conference Paper
When is Slower Block Propagation More Profitable for Large Miners?
For years, Bitcoin miners put little effort into adopting several widely-acclaimed block acceleration techniques, which, as some argued, would secure their revenues. Their indifference inspires a theory that s...
-
Chapter and Conference Paper
Dual-Domain Learning Network for Polyp Segmentation
Automatic polyp segmentation is a crucial application of artificial intelligence in the medical field. However, this task is challenging due to uneven brightness, variable colors, and blurry boundaries. Most c...