International Conference on Applied Cryptography and Network Security最新文献

筛选
英文 中文
Game Theory-Based Approach for Defense Against APTs 基于博弈论的apt防御方法
International Conference on Applied Cryptography and Network Security Pub Date : 2020-10-19 DOI: 10.1007/978-3-030-57878-7_15
J. E. Rubio, Cristina Alcaraz, Javier López
{"title":"Game Theory-Based Approach for Defense Against APTs","authors":"J. E. Rubio, Cristina Alcaraz, Javier López","doi":"10.1007/978-3-030-57878-7_15","DOIUrl":"https://doi.org/10.1007/978-3-030-57878-7_15","url":null,"abstract":"","PeriodicalId":412384,"journal":{"name":"International Conference on Applied Cryptography and Network Security","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132590250","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Super Root: A New Stealthy Rooting Technique on ARM Devices 超级根:ARM设备上一种新的隐形生根技术
International Conference on Applied Cryptography and Network Security Pub Date : 2020-10-19 DOI: 10.1007/978-3-030-57878-7_17
Zhangkai Zhang, Yueqiang Cheng, Zhoujun Li
{"title":"Super Root: A New Stealthy Rooting Technique on ARM Devices","authors":"Zhangkai Zhang, Yueqiang Cheng, Zhoujun Li","doi":"10.1007/978-3-030-57878-7_17","DOIUrl":"https://doi.org/10.1007/978-3-030-57878-7_17","url":null,"abstract":"","PeriodicalId":412384,"journal":{"name":"International Conference on Applied Cryptography and Network Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117331297","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Tweaking Key-Alternating Feistel Block Ciphers 调整密钥交替费斯特尔块密码
International Conference on Applied Cryptography and Network Security Pub Date : 2020-10-19 DOI: 10.1007/978-3-030-57808-4_4
Hailun Yan, Lei Wang, Yaobin Shen, Xuejia Lai
{"title":"Tweaking Key-Alternating Feistel Block Ciphers","authors":"Hailun Yan, Lei Wang, Yaobin Shen, Xuejia Lai","doi":"10.1007/978-3-030-57808-4_4","DOIUrl":"https://doi.org/10.1007/978-3-030-57808-4_4","url":null,"abstract":"","PeriodicalId":412384,"journal":{"name":"International Conference on Applied Cryptography and Network Security","volume":"121 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124482774","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Practical System for Privacy-Preserving Video Surveillance 一种实用的保护隐私的视频监控系统
International Conference on Applied Cryptography and Network Security Pub Date : 2020-10-19 DOI: 10.1007/978-3-030-57878-7_2
Elmahdi Bentafat, M. M. Rathore, S. Bakiras
{"title":"A Practical System for Privacy-Preserving Video Surveillance","authors":"Elmahdi Bentafat, M. M. Rathore, S. Bakiras","doi":"10.1007/978-3-030-57878-7_2","DOIUrl":"https://doi.org/10.1007/978-3-030-57878-7_2","url":null,"abstract":"","PeriodicalId":412384,"journal":{"name":"International Conference on Applied Cryptography and Network Security","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115407087","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
On the Cryptographic Deniability of the Signal Protocol 论信号协议的密码可否认性
International Conference on Applied Cryptography and Network Security Pub Date : 2020-10-19 DOI: 10.1007/978-3-030-57878-7_10
Nihal Vatandas, R. Gennaro, Bertrand Ithurburn, H. Krawczyk
{"title":"On the Cryptographic Deniability of the Signal Protocol","authors":"Nihal Vatandas, R. Gennaro, Bertrand Ithurburn, H. Krawczyk","doi":"10.1007/978-3-030-57878-7_10","DOIUrl":"https://doi.org/10.1007/978-3-030-57878-7_10","url":null,"abstract":"","PeriodicalId":412384,"journal":{"name":"International Conference on Applied Cryptography and Network Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130602409","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
An Efficient Secure Division Protocol Using Approximate Multi-bit Product and New Constant-Round Building Blocks 基于近似多比特积和新的常轮构建块的高效安全除法协议
International Conference on Applied Cryptography and Network Security Pub Date : 2020-10-19 DOI: 10.1007/978-3-030-57808-4_18
Keitaro Hiwatashi, Satsuya Ohata, K. Nuida
{"title":"An Efficient Secure Division Protocol Using Approximate Multi-bit Product and New Constant-Round Building Blocks","authors":"Keitaro Hiwatashi, Satsuya Ohata, K. Nuida","doi":"10.1007/978-3-030-57808-4_18","DOIUrl":"https://doi.org/10.1007/978-3-030-57808-4_18","url":null,"abstract":"","PeriodicalId":412384,"journal":{"name":"International Conference on Applied Cryptography and Network Security","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125303625","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Trapdoor Delegation and HIBE from Middle-Product LWE in Standard Model 标准模型中中间产品LWE的活板门委托与HIBE
International Conference on Applied Cryptography and Network Security Pub Date : 2020-07-14 DOI: 10.1007/978-3-030-57808-4_7
H. Q. Le, D. Duong, W. Susilo, J. Pieprzyk
{"title":"Trapdoor Delegation and HIBE from Middle-Product LWE in Standard Model","authors":"H. Q. Le, D. Duong, W. Susilo, J. Pieprzyk","doi":"10.1007/978-3-030-57808-4_7","DOIUrl":"https://doi.org/10.1007/978-3-030-57808-4_7","url":null,"abstract":"","PeriodicalId":412384,"journal":{"name":"International Conference on Applied Cryptography and Network Security","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123824829","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
MemShield: GPU-assisted software memory encryption MemShield: gpu辅助的软件内存加密
International Conference on Applied Cryptography and Network Security Pub Date : 2020-04-20 DOI: 10.1007/978-3-030-57878-7_16
Pierpaolo Santucci, Emiliano Ingrassia, Giulio Picierro, M. Cesati
{"title":"MemShield: GPU-assisted software memory encryption","authors":"Pierpaolo Santucci, Emiliano Ingrassia, Giulio Picierro, M. Cesati","doi":"10.1007/978-3-030-57878-7_16","DOIUrl":"https://doi.org/10.1007/978-3-030-57878-7_16","url":null,"abstract":"","PeriodicalId":412384,"journal":{"name":"International Conference on Applied Cryptography and Network Security","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116550771","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Breach into the Authentication with Built-in Camera (ABC) Protocol 违反内置摄像头认证(ABC)协议
International Conference on Applied Cryptography and Network Security Pub Date : 2020-03-25 DOI: 10.36227/techrxiv.12018507.v1
Cezara Benegui, Radu Tudor Ionescu
{"title":"A Breach into the Authentication with Built-in Camera (ABC) Protocol","authors":"Cezara Benegui, Radu Tudor Ionescu","doi":"10.36227/techrxiv.12018507.v1","DOIUrl":"https://doi.org/10.36227/techrxiv.12018507.v1","url":null,"abstract":"[Paper accepted at ACNS 2020]In this paper, we propose a simple and effective attack on the recently introduced Smartphone Authentication with Built-in Camera Protocol, called ABC. The ABC protocol uses the photo-response non-uniformity (PRNU) as the main authentication factor in combination with anti-forgery detection systems. The ABC protocol interprets the PRNU as a fingerprint of the camera sensor built-in a smartphone device. The protocol works as follows: during the authentication process, the user is challenged with two QR codes (sent by the server) that need to be photographed with a pre-registered device. In each QR code, the server embeds a unique pattern noise (not visible to the naked eye), called probe signal, that is used to identify potential forgeries. The inserted probe signal is very similar to a genuine fingerprint. The photos of QR codes taken by the user are then sent to the server for verification. The server checks (i) if the photos contain the user's camera fingerprint (used to authenticate the pre-registered device) and (ii) if the photos contain the embedded probe signal. If an adversary tries to remove (subtract) his own camera fingerprint and replace it with the victim's camera fingerprint (computed from photos shared on social media), then he will implicitly remove the embedded probe signal and the attack will fail. The ABC protocol is able to detect these attacks with a false acceptance rate (FAR) of 0.5%. However, the ABC protocol wrongly assumes that the attacker can only determine his own camera fingerprint from the photos of the presented QR codes. The attack proposed in our work is able to get past the anti-forgery detection system with a FAR of 54.1%, simply by estimating the attacker's camera fingerprint from a different set of photos (e.g. five photos) owned by the attacker. This set of photos can be trivially obtained before the attack, allowing the adversary to compute his camera fingerprint independently of the attack. The key to the success of our attack is that the independently computed adversary's camera fingerprint does not contain the probe signal embedded in the QR codes. Therefore, when we subtract the adversary's camera fingerprint and add the victim's camera fingerprint, the embedded probe signal will remain in place. For this reason, the proposed attack can successfully pass through the anti-forgery detection system of the ABC protocol. In this paper, we also propose a potential fix based on analyzing signals from built-in motion sensors, which are not typically shared on social media.","PeriodicalId":412384,"journal":{"name":"International Conference on Applied Cryptography and Network Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130938818","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Strong Leakage and Tamper-Resilient PKE from Refined Hash Proof System 来自精炼哈希证明系统的强泄漏和抗篡改PKE
International Conference on Applied Cryptography and Network Security Pub Date : 2019-06-05 DOI: 10.1007/978-3-030-21568-2_24
Shifeng Sun, Dawu Gu, M. Au, Shuai Han, Yu Yu, Joseph K. Liu
{"title":"Strong Leakage and Tamper-Resilient PKE from Refined Hash Proof System","authors":"Shifeng Sun, Dawu Gu, M. Au, Shuai Han, Yu Yu, Joseph K. Liu","doi":"10.1007/978-3-030-21568-2_24","DOIUrl":"https://doi.org/10.1007/978-3-030-21568-2_24","url":null,"abstract":"","PeriodicalId":412384,"journal":{"name":"International Conference on Applied Cryptography and Network Security","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117202948","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信