Foundations and Practice of Security -

Foundations and Practice of Security

16th International Symposium, FPS 2023, Bordeaux, France, December 11–13, 2023, Revised Selected Papers, Part I
Buch | Softcover
XIX, 460 Seiten
2024 | 2024
Springer International Publishing (Verlag)
978-3-031-57536-5 (ISBN)
79,17 inkl. MwSt

This book constitutes the refereed proceedings of the 16th International Symposium on Foundations and Practice of Security, FPS 2023, held in Bordeaux, France, during December 11-13, 2023.

The 27 regular and 8 short papers presented in this book were carefully reviewed and selected from 80 submissions. The papers have been organized in the following topical sections:
Part I: AI and cybersecurity, security analysis, phishing and social network, vulnerabilities and exploits, network and system threat, malware analysis.
Part II : security design, short papers. 
 

AI and Cybersecurity.- An Adversarial Robustness Benchmark for Enterprise Network Intrusion Detection.- Securing Smart Vehicles through Federated Learning.- Using Reed-Muller Codes for Classification with Rejection and Recovery.- Unsupervised Clustering of Honeypot Attacks by Deep HTTP Packet Inspection.- Security Analysis.- Practices for Assessing the Security Level of Solidity Smart Contracts.- Effectiveness of Binary-Level CFI Techniques.- A Small World-Privacy Preserving IoT Device-type Fingerprinting with Small Datasets.- URSID: Automatically Refining a Single Attack Scenario into Multiple Cyber.- Phishing and Social Network.- Does the Anchoring Effect Influence Individuals' Anti-Phishing Behavior?.- IntelliTweet: a Multifaceted Feature Approach to Detect Malicious Tweets.- Web Scams Detection System.- Vulnerabilities and Exploits.- VulMAE: Graph Masked Autoencoders for VulnerabilityDetection from Source and Binary Codes.- Analysis of Cryptographic CVEs: Lessons Learned and Perspectives.- A BERT-Based Framework for Automated Extraction of Indicators of Compromise from Security  Incident Reports.- Enhancing Code Security Through Open-source Large Language Models: A Comparative Study.- Network and System Threat.- Green-Fuzz: Efficient Fuzzing for Network Protocol Implementations.- Unmasking of Maskware: Detection and Prevention of Next-Generation Mobile Crypto-Ransomware.- Automated Attacker Behaviour Classification Using Threat Intelligence Insights.- UDP state manipulation: description of a Packet Filtering vulnerability in Stateful firewalls.- Malware Analysis.- Following the Obfuscation Trail: Identifying and Exploiting Obfuscation Signatures in Malicious Code.- On Exploiting Symbolic Execution to Improve the Analysis of RAT Samples with angr.- Original Entry Pointdetection based on graph similarity.- Attacking and Securing the Clock Randomization and Duplication Side-Channel Attack Countermeasure.- Security Design.- Hardening Systems Against Data Corruption Attacks at Design Time.- Design of an Efficient Distributed Delivery Service for Group Key Agreement Protocols.- A shared key recovery attack on a masked implementation of CRYSTALS-Kyber's encapsulation algorithm.- Tight Differential Privacy Guarantees for the Shuffle Model with k-Randomized Response.

Erscheinungsdatum
Reihe/Serie Lecture Notes in Computer Science
Zusatzinfo XIX, 460 p. 120 illus., 94 illus. in color.
Verlagsort Cham
Sprache englisch
Maße 155 x 235 mm
Themenwelt Informatik Netzwerke Sicherheit / Firewall
Schlagworte Access Control • Artificial Intelligence • computer crime • Computer Hardware • Computer Networks • Computer Security • Computer systems • cryptography • Data Security • infomations security • Networks • Network Security • Signal Processing • Software Design • Software engineering • Telecommunication Systems
ISBN-10 3-031-57536-9 / 3031575369
ISBN-13 978-3-031-57536-5 / 9783031575365
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich

von Chaos Computer Club

Buch | Softcover (2024)
KATAPULT Verlag
28,00