Information Security Applications
25th International Conference, WISA 2024, Jeju Island, South Korea, August 21-23, 2024, Revised Selected Papers
Herausgegeben:Lee, Jong-Hyouk; Emura, Keita; Lee, Sokjoon
Information Security Applications
25th International Conference, WISA 2024, Jeju Island, South Korea, August 21-23, 2024, Revised Selected Papers
Herausgegeben:Lee, Jong-Hyouk; Emura, Keita; Lee, Sokjoon
- Broschiertes Buch
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
This book constitutes the refereed proceedings of the 25th International Conference on Information Security Applications, WISA 2024, held in Jeju Island, South Korea, during August 21-23, 2024.
The 28 full papers included in this book were carefully reviewed and selected from 87 submissions. They were organized in topical sections as follows: Cryptography; Network Security; AI Security 1; Network & Application Security; AI Security 2; CPS Security; Fuzzing; Malware; Software Security; and Emerging Topic.
Andere Kunden interessierten sich auch für
- Information Security Applications51,99 €
- Security and Privacy in Social Networks and Big Data50,99 €
- Science of Cyber Security - SciSec 2022 Workshops58,99 €
- Blockchain Technology and Application50,99 €
- Security and Privacy in Social Networks and Big Data39,99 €
- Advances in Artificial Intelligence and Security100,99 €
- Security Standardisation Research39,99 €
-
-
-
This book constitutes the refereed proceedings of the 25th International Conference on Information Security Applications, WISA 2024, held in Jeju Island, South Korea, during August 21-23, 2024.
The 28 full papers included in this book were carefully reviewed and selected from 87 submissions. They were organized in topical sections as follows: Cryptography; Network Security; AI Security 1; Network & Application Security; AI Security 2; CPS Security; Fuzzing; Malware; Software Security; and Emerging Topic.
The 28 full papers included in this book were carefully reviewed and selected from 87 submissions. They were organized in topical sections as follows: Cryptography; Network Security; AI Security 1; Network & Application Security; AI Security 2; CPS Security; Fuzzing; Malware; Software Security; and Emerging Topic.
Produktdetails
- Produktdetails
- Lecture Notes in Computer Science 15499
- Verlag: Springer / Springer Nature Singapore / Springer, Berlin
- Artikelnr. des Verlages: 978-981-96-1623-7
- Seitenzahl: 400
- Erscheinungstermin: 5. Februar 2025
- Englisch
- Abmessung: 235mm x 155mm x 22mm
- Gewicht: 604g
- ISBN-13: 9789819616237
- ISBN-10: 9819616239
- Artikelnr.: 72162187
- Herstellerkennzeichnung Die Herstellerinformationen sind derzeit nicht verfügbar.
- Lecture Notes in Computer Science 15499
- Verlag: Springer / Springer Nature Singapore / Springer, Berlin
- Artikelnr. des Verlages: 978-981-96-1623-7
- Seitenzahl: 400
- Erscheinungstermin: 5. Februar 2025
- Englisch
- Abmessung: 235mm x 155mm x 22mm
- Gewicht: 604g
- ISBN-13: 9789819616237
- ISBN-10: 9819616239
- Artikelnr.: 72162187
- Herstellerkennzeichnung Die Herstellerinformationen sind derzeit nicht verfügbar.
.- Cryptography.
.- ECPM Cryptanalysis Resource Estimation.
.- Integral Attack with Bit-based Division Property on the Lightweight Block Cipher LBC.
.- Network Security.
.- ARP Spoofing Mitigation for the E2 Interface in Open RAN: An xApp Approach.
.- Investigating the Transferability of Evasion Attacks in Network Intrusion Detection Systems Considering Domain-Specific Constraints.
.- Enhancing Robustness in NIDS via Coverage Guided Fuzzing and Adversarial Training.
.- AI Security 1.
.- VoteGAN: Generalized Membership Inference Attack Against Generative Models by Multiple Discriminators.
.- Unsupervised Contextual Anomalous Communication Detection Using VQ Tokeniza tion with Flow Data.
.- Boosting Black-Box Transferability of Weak Audio Adversarial Attacks with Random Masking.
.- Network & Application Security.
.- Security Function for 5G-Advanced and 6G: Malicious UE Detection in Network Slicing.
.- Simple Perturbations Subvert Ethereum Phishing Transactions Detection: An Emperi cal Analysis.
.- LM Guardrail Framework: A Novel Approach for Implementing Zero Trust Architecture.
.- AI Security 2.
.- ChatDEOB: An Effective Deobfuscation Method based on Large Language Model.
.- An effective ensemble algorithm for short-term load forecasting.
.- CPS Security.
.- PUF-Based Authentication and Authorization Protocol for IoT.
.- Field Testing and Detection of Camera Interference for Autonomous Driving
.- One-class Classification-based Position Falsification Detection System in C-ITS Communication Network.
.- Fuzzing.
.- Reverse Engineering-Guided Fuzzing for CAN Bus Vulnerability Detection.
.- Air-Fuzz: Feasibility analysis of fuzzing-based side-channel information leakage attack in air-gapped networks.
.- Fuzzing JavaScript Engines with Diversified Mutation Strategies.
.- Malware.
.- Detecting Phishing-targeted Web Push Notifications through Image Similarity Analysis.
.- Dissecting the Infrastructure Used in Web-based Cryptojacking: A Measurement Perspective.
.- A Survey on Attack Cases with VBS Malware in Windows.
.- Software Security.
.- Adversarial Manhole: Challenging Monocular Depth Estimation and Semantic Seg mentation Models with Patch Attack.
.- Plotting OSS-based Supply Chain attack strategies and the defense failure.
.- A Proposal of a Supply Chain Security Model for Generative AI.
.- Emerging Topic.
.- Privacy Enhanced P2P Power Trading Using DID-based Identity Verification in a Microgrid.
.- Quantum Implementation of LSH.
.- Who ruins the game?: unveiling cheating users in the "Battlefield" game.
.- ECPM Cryptanalysis Resource Estimation.
.- Integral Attack with Bit-based Division Property on the Lightweight Block Cipher LBC.
.- Network Security.
.- ARP Spoofing Mitigation for the E2 Interface in Open RAN: An xApp Approach.
.- Investigating the Transferability of Evasion Attacks in Network Intrusion Detection Systems Considering Domain-Specific Constraints.
.- Enhancing Robustness in NIDS via Coverage Guided Fuzzing and Adversarial Training.
.- AI Security 1.
.- VoteGAN: Generalized Membership Inference Attack Against Generative Models by Multiple Discriminators.
.- Unsupervised Contextual Anomalous Communication Detection Using VQ Tokeniza tion with Flow Data.
.- Boosting Black-Box Transferability of Weak Audio Adversarial Attacks with Random Masking.
.- Network & Application Security.
.- Security Function for 5G-Advanced and 6G: Malicious UE Detection in Network Slicing.
.- Simple Perturbations Subvert Ethereum Phishing Transactions Detection: An Emperi cal Analysis.
.- LM Guardrail Framework: A Novel Approach for Implementing Zero Trust Architecture.
.- AI Security 2.
.- ChatDEOB: An Effective Deobfuscation Method based on Large Language Model.
.- An effective ensemble algorithm for short-term load forecasting.
.- CPS Security.
.- PUF-Based Authentication and Authorization Protocol for IoT.
.- Field Testing and Detection of Camera Interference for Autonomous Driving
.- One-class Classification-based Position Falsification Detection System in C-ITS Communication Network.
.- Fuzzing.
.- Reverse Engineering-Guided Fuzzing for CAN Bus Vulnerability Detection.
.- Air-Fuzz: Feasibility analysis of fuzzing-based side-channel information leakage attack in air-gapped networks.
.- Fuzzing JavaScript Engines with Diversified Mutation Strategies.
.- Malware.
.- Detecting Phishing-targeted Web Push Notifications through Image Similarity Analysis.
.- Dissecting the Infrastructure Used in Web-based Cryptojacking: A Measurement Perspective.
.- A Survey on Attack Cases with VBS Malware in Windows.
.- Software Security.
.- Adversarial Manhole: Challenging Monocular Depth Estimation and Semantic Seg mentation Models with Patch Attack.
.- Plotting OSS-based Supply Chain attack strategies and the defense failure.
.- A Proposal of a Supply Chain Security Model for Generative AI.
.- Emerging Topic.
.- Privacy Enhanced P2P Power Trading Using DID-based Identity Verification in a Microgrid.
.- Quantum Implementation of LSH.
.- Who ruins the game?: unveiling cheating users in the "Battlefield" game.
.- Cryptography.
.- ECPM Cryptanalysis Resource Estimation.
.- Integral Attack with Bit-based Division Property on the Lightweight Block Cipher LBC.
.- Network Security.
.- ARP Spoofing Mitigation for the E2 Interface in Open RAN: An xApp Approach.
.- Investigating the Transferability of Evasion Attacks in Network Intrusion Detection Systems Considering Domain-Specific Constraints.
.- Enhancing Robustness in NIDS via Coverage Guided Fuzzing and Adversarial Training.
.- AI Security 1.
.- VoteGAN: Generalized Membership Inference Attack Against Generative Models by Multiple Discriminators.
.- Unsupervised Contextual Anomalous Communication Detection Using VQ Tokeniza tion with Flow Data.
.- Boosting Black-Box Transferability of Weak Audio Adversarial Attacks with Random Masking.
.- Network & Application Security.
.- Security Function for 5G-Advanced and 6G: Malicious UE Detection in Network Slicing.
.- Simple Perturbations Subvert Ethereum Phishing Transactions Detection: An Emperi cal Analysis.
.- LM Guardrail Framework: A Novel Approach for Implementing Zero Trust Architecture.
.- AI Security 2.
.- ChatDEOB: An Effective Deobfuscation Method based on Large Language Model.
.- An effective ensemble algorithm for short-term load forecasting.
.- CPS Security.
.- PUF-Based Authentication and Authorization Protocol for IoT.
.- Field Testing and Detection of Camera Interference for Autonomous Driving
.- One-class Classification-based Position Falsification Detection System in C-ITS Communication Network.
.- Fuzzing.
.- Reverse Engineering-Guided Fuzzing for CAN Bus Vulnerability Detection.
.- Air-Fuzz: Feasibility analysis of fuzzing-based side-channel information leakage attack in air-gapped networks.
.- Fuzzing JavaScript Engines with Diversified Mutation Strategies.
.- Malware.
.- Detecting Phishing-targeted Web Push Notifications through Image Similarity Analysis.
.- Dissecting the Infrastructure Used in Web-based Cryptojacking: A Measurement Perspective.
.- A Survey on Attack Cases with VBS Malware in Windows.
.- Software Security.
.- Adversarial Manhole: Challenging Monocular Depth Estimation and Semantic Seg mentation Models with Patch Attack.
.- Plotting OSS-based Supply Chain attack strategies and the defense failure.
.- A Proposal of a Supply Chain Security Model for Generative AI.
.- Emerging Topic.
.- Privacy Enhanced P2P Power Trading Using DID-based Identity Verification in a Microgrid.
.- Quantum Implementation of LSH.
.- Who ruins the game?: unveiling cheating users in the "Battlefield" game.
.- ECPM Cryptanalysis Resource Estimation.
.- Integral Attack with Bit-based Division Property on the Lightweight Block Cipher LBC.
.- Network Security.
.- ARP Spoofing Mitigation for the E2 Interface in Open RAN: An xApp Approach.
.- Investigating the Transferability of Evasion Attacks in Network Intrusion Detection Systems Considering Domain-Specific Constraints.
.- Enhancing Robustness in NIDS via Coverage Guided Fuzzing and Adversarial Training.
.- AI Security 1.
.- VoteGAN: Generalized Membership Inference Attack Against Generative Models by Multiple Discriminators.
.- Unsupervised Contextual Anomalous Communication Detection Using VQ Tokeniza tion with Flow Data.
.- Boosting Black-Box Transferability of Weak Audio Adversarial Attacks with Random Masking.
.- Network & Application Security.
.- Security Function for 5G-Advanced and 6G: Malicious UE Detection in Network Slicing.
.- Simple Perturbations Subvert Ethereum Phishing Transactions Detection: An Emperi cal Analysis.
.- LM Guardrail Framework: A Novel Approach for Implementing Zero Trust Architecture.
.- AI Security 2.
.- ChatDEOB: An Effective Deobfuscation Method based on Large Language Model.
.- An effective ensemble algorithm for short-term load forecasting.
.- CPS Security.
.- PUF-Based Authentication and Authorization Protocol for IoT.
.- Field Testing and Detection of Camera Interference for Autonomous Driving
.- One-class Classification-based Position Falsification Detection System in C-ITS Communication Network.
.- Fuzzing.
.- Reverse Engineering-Guided Fuzzing for CAN Bus Vulnerability Detection.
.- Air-Fuzz: Feasibility analysis of fuzzing-based side-channel information leakage attack in air-gapped networks.
.- Fuzzing JavaScript Engines with Diversified Mutation Strategies.
.- Malware.
.- Detecting Phishing-targeted Web Push Notifications through Image Similarity Analysis.
.- Dissecting the Infrastructure Used in Web-based Cryptojacking: A Measurement Perspective.
.- A Survey on Attack Cases with VBS Malware in Windows.
.- Software Security.
.- Adversarial Manhole: Challenging Monocular Depth Estimation and Semantic Seg mentation Models with Patch Attack.
.- Plotting OSS-based Supply Chain attack strategies and the defense failure.
.- A Proposal of a Supply Chain Security Model for Generative AI.
.- Emerging Topic.
.- Privacy Enhanced P2P Power Trading Using DID-based Identity Verification in a Microgrid.
.- Quantum Implementation of LSH.
.- Who ruins the game?: unveiling cheating users in the "Battlefield" game.