- ホーム
- > 洋書
- > 英文書
- > Computer / General
Full Description
This book constitutes the refereed proceedings of the 26th International Conference on Information Security Applications, WISA 2025, held in Jeju Island, South Korea, during August 20-22, 2025.
The 26 full papers included in this book were carefully reviewed and selected from 66 submissions. They were organized in topical sections as follows: System & Application Security, 5G & Network Security, Cybersecurity Education & Model Security, Security Analysis & Verification, Malware & Forensics, Quantum & Cryptography, AI/LLM for Security, Privacy & Anonymity and IoT & Traffic Analysis.
Contents
.- System & Application Security
.- Crashing or Freezing the Bot: LiDAR Spoofing Attacks on ROS 2 UGV.
.- PodBeater: Exploiting Multi-Value Affinity for Efficient Co-Location Attacks in Kubernetes.
.- GUARD-CAN: Graph-Understanding and Recurrent Architecture for CAN Anomaly Detection.
.- 5G & Network Security
.- A Real-World Dataset to Enhance Intrusion Detection in SDN-IoT Systems.
.- Toward a Stealth Mode of 5G-AKA.
.- Cybersecurity Education & Model Security
.- Real Environment Tolerance Curve (RETC): Assessing Machine Learning Model Performance Degradation Under Extreme Class Imbalance.
.- TALOS: An Empirical Approach to Building Portable Hands-On Labs for Fundamental Cybersecurity Education using Open-Source.
.- Security Analysis & Verification
.- Impossible Differential Attack on SAND-64.
.- Formal Verification of Labyrinth Encrypted Message Storage Protocol in Messenger.
.- Automated VEX Generation and Vulnerability Prioritization using Inter-Module Symbol Graphs.
.- Malware & Forensics
.- User Conversation Recovery from ChatGPT Local Artifacts in Web Browsers for Digital Forensic Investigations.
.- Interaction-Aware System Call Sequence Analysis for Android Malware Classification.
.- Quantum & Cryptography
.- Depth-Optimized Quantum Implementation of CHAM.
.- Quantum Implementation and Analysis of SHA-1.
.- PoC Hash: A Power-of-Commutators Hash over Hamiltonian Quaternions.
.- AI/LLM for Security
.- Detecting Malicious JavaScript Code by Code-Specialized LLM.
.- A Framework for Assessing Nation-State Cyber Attack Capabilities Using MITRE ATT&CK and Large Language Models.
.- Understanding Encrypted Network Anomalies with LLMs: A Post-hoc Cognitive Framework.
.- Privacy & Anonymity
.- Towards Sender Anonymity for Singleton Sets.
.- LeakGuard: Detecting and Mitigating Attribute Leakage in Fine-Tuned Diffusion Models.
.- Privacy-Preserving Logistic Regression Using Homomorphic Encryption: An Adaptive Optimization Approach.
.- IoT & Traffic Analysis
.- IoT Botnet Detection Based on the Behaviors of DNS over TLS Queries.
.- Bootstrap-based Evaluation of Clustering Suitability Across TCP Payload Dataset Structures.
.- Comparative Eval. of SSL Feature Extractors & Classifiers for DFAD.



