- ホーム
- > 洋書
- > 英文書
- > Computer / General
Full Description
This book constitutes the refereed proceedings of the 25th International Conference on Information Security Applications, WISA 2024, held in Jeju Island, South Korea, during August 21-23, 2024.
The 28 full papers included in this book were carefully reviewed and selected from 87 submissions. They were organized in topical sections as follows: Cryptography; Network Security; AI Security 1; Network & Application Security; AI Security 2; CPS Security; Fuzzing; Malware; Software Security; and Emerging Topic.
Contents
.- Cryptography.
.- ECPM Cryptanalysis Resource Estimation.
.- Integral Attack with Bit-based Division Property on the Lightweight Block Cipher LBC.
.- Network Security.
.- ARP Spoofing Mitigation for the E2 Interface in Open RAN: An xApp Approach.
.- Investigating the Transferability of Evasion Attacks in Network Intrusion Detection Systems Considering Domain-Specific Constraints.
.- Enhancing Robustness in NIDS via Coverage Guided Fuzzing and Adversarial Training.
.- AI Security 1.
.- VoteGAN: Generalized Membership Inference Attack Against Generative Models by Multiple Discriminators.
.- Unsupervised Contextual Anomalous Communication Detection Using VQ Tokeniza tion with Flow Data.
.- Boosting Black-Box Transferability of Weak Audio Adversarial Attacks with Random Masking.
.- Network & Application Security.
.- Security Function for 5G-Advanced and 6G: Malicious UE Detection in Network Slicing.
.- Simple Perturbations Subvert Ethereum Phishing Transactions Detection: An Emperi cal Analysis.
.- LM Guardrail Framework: A Novel Approach for Implementing Zero Trust Architecture.
.- AI Security 2.
.- ChatDEOB: An Effective Deobfuscation Method based on Large Language Model.
.- An effective ensemble algorithm for short-term load forecasting.
.- CPS Security.
.- PUF-Based Authentication and Authorization Protocol for IoT.
.- Field Testing and Detection of Camera Interference for Autonomous Driving
.- One-class Classification-based Position Falsification Detection System in C-ITS Communication Network.
.- Fuzzing.
.- Reverse Engineering-Guided Fuzzing for CAN Bus Vulnerability Detection.
.- Air-Fuzz: Feasibility analysis of fuzzing-based side-channel information leakage attack in air-gapped networks.
.- Fuzzing JavaScript Engines with Diversified Mutation Strategies.
.- Malware.
.- Detecting Phishing-targeted Web Push Notifications through Image Similarity Analysis.
.- Dissecting the Infrastructure Used in Web-based Cryptojacking: A Measurement Perspective.
.- A Survey on Attack Cases with VBS Malware in Windows.
.- Software Security.
.- Adversarial Manhole: Challenging Monocular Depth Estimation and Semantic Seg mentation Models with Patch Attack.
.- Plotting OSS-based Supply Chain attack strategies and the defense failure.
.- A Proposal of a Supply Chain Security Model for Generative AI.
.- Emerging Topic.
.- Privacy Enhanced P2P Power Trading Using DID-based Identity Verification in a Microgrid.
.- Quantum Implementation of LSH.
.- Who ruins the game?: unveiling cheating users in the "Battlefield" game.