- ホーム
- > 洋書
- > 英文書
- > Computer / General
Full Description
The book constitutes the proceedings of the 28th International Conference on Information Security, ISC 2025, held in Seoul, South Korea, during October 20-22, 2025.
The 32 full papers presented in these proceedings were carefully reviewed and selected from 77 submissions. The papers are organized in the following topical sections: Cryptanalysis and Cipher Security; Network Security; Post-quantum Cryptography; Side-Channel Attacks and Countermeasures; AI Security; Biometric Security; Malware Analysis; Systems Security; Access Control & Privacy; Smart Contracts and Blockchain Security.
Contents
.-Cryptanalysis and Cipher Security.-Improving the Differential-Linear Attack with Applications to GIFT-COFB, GIFT-64 and HyENA.-Keyless Physical-Layer Cryptography.-The Multi-User Security of GCM-SST and Further Enhancements.-Network Security.- SimSeq: A Robust TLS Traffic Classification Method.-EvoFuzz: Enhancing State Space Exploration and Seed Prioritization in Stateful Protocol Fuzzing using Evolutionary Game Theory.-A Lot of Data and Added Complexity. How Does PQC Affect the Performance of My TLS Connection? .-Post-quantum Cryptography.-Conditional Attribute-Based PRE: Definition and Construction from LWE.-LastRings: Lattice-based Scalable Threshold Ring Signatures.-Side-Channel Attacks and Countermeasures.-Simulation-based Software Leakage Evaluation for the RISC-V Platform.-GIR-Cache: Mitigating Conflict-Based Cache Side-Channel Attacks Via Global Indirect Replacement.-Inference Attacks on Encrypted Online Voting via Traffic Analysis.-Towards Cross-Device Side-Channel Analysis via Domain-Level Attention Mechanisms.-Tighter Bounds for Guessing Entropy in Side-channel Template Attacks.-Collision Spanning Tree: Quick Key Recovery in Side-Channel Collision Attacks.-AI Security.-MSPP-Net: Fine-grained image privacy identification via multi-stage semantic perception.-Exploring Backdoor Attacks in Federated Learning Under Parameter-Efficient Fine-Tuning.-Spoofing Camera Source Attribution via PRNU Transfer Attacks on Physical and AI Generated Images.-Biometric Security.-Comparative Evaluation of Lattices for Fuzzy Extractors and Fuzzy Signatures.-A New Code-Based Formulation of the Fuzzy Vault Scheme.-Malware Analysis.-HoneySentry: A High-Fidelity Interactive IoT Honeypot for Advanced Threat Detection.-Towards Architecture-Independent Function Call Analysis for IoT Malware.-A Study on Malicious Browser Extensions in 2025.-HGANN-Mal: A Hypergraph Attention Neural Network Approach for Android Malware Detection.-Systems Security
.-A Graph-Based Approach to Alert Contextualisation in Security Operations Centres.-HyperSec: An Extensible Hypervisor-Assisted Framework for Kernel Rootkit Detection.-BootMarker: UEFI Bootkit Defense via Control-Flow Verification.-Ali2Vul: Binary Vulnerability Dataset Expansion via Cross-Modal Alignment.-Access Control & Privacy.-CryptNyx: Password-hardened encryption with strong anonymity guarantees.-Efficient Dynamic Group Signatures with Forward Security.-Zero Trust Continuous Authentication Models and Automated Policy Formulation.-Smart Contracts and Blockchain Security.-Jakiro: A Cross-modal Contrastive Learning Framework for Detecting Vulnerabilities in Smart Contracts
.-BlockLens: Detecting Malicious Transactions in Ethereum Using LLM Techniques.



