Applied Cryptography and Network Security Workshops: ACNS 2020 Satellite Workshops, AIBlock, AIHWS, AIoTS, Cloud S&P, SCI, SecMT, and SiMLA, Rome, Italy, October 19–22, 2020, Proceedings [1st ed.]
9783030616373, 9783030616380
This book constitutes the proceedings of the satellite workshops held around the 18th International Conference on Applie
218
23
21MB
English
Pages XVII, 584
[592]
Year 2020
Report DMCA / Copyright
DOWNLOAD PDF FILE
Table of contents :
Front Matter ....Pages i-xvii
Front Matter ....Pages 1-1
Towards a Formally Verified Implementation of the MimbleWimble Cryptocurrency Protocol (Gustavo Betarte, Maximiliano Cristiá, Carlos Luna, Adrián Silveira, Dante Zanarini)....Pages 3-23
Secure Management of IoT Devices Based on Blockchain Non-fungible Tokens and Physical Unclonable Functions (Javier Arcenegui, Rosario Arjona, Iluminada Baturone)....Pages 24-40
Bitcoin Blockchain Steganographic Analysis (Alexandre Augusto Giron, Jean Everson Martina, Ricardo Custódio)....Pages 41-57
Dynamic Group Key Agreement for Resource-constrained Devices Using Blockchains (Yaşar Berkay Taçyıldız, Orhan Ermiş, Gürkan Gür, Fatih Alagöz)....Pages 58-76
Tokenization of Real Estate Using Blockchain Technology (Ashutosh Gupta, Jash Rathod, Dhiren Patel, Jay Bothra, Sanket Shanbhag, Tanmay Bhalerao)....Pages 77-90
Front Matter ....Pages 91-91
Practical Side-Channel Based Model Extraction Attack on Tree-Based Machine Learning Algorithm (Dirmanto Jap, Ville Yli-Mäyry, Akira Ito, Rei Ueno, Shivam Bhasin, Naofumi Homma)....Pages 93-105
Controlling the Deep Learning-Based Side-Channel Analysis: A Way to Leverage from Heuristics (Servio Paguada, Unai Rioja, Igor Armendariz)....Pages 106-125
A Comparison of Weight Initializers in Deep Learning-Based Side-Channel Analysis (Huimin Li, Marina Krček, Guilherme Perin)....Pages 126-143
Leakage Assessment Through Neural Estimation of the Mutual Information (Valence Cristiani, Maxime Lecomte, Philippe Maurine)....Pages 144-162
Evolvable Hardware Architectures on FPGA for Side-Channel Security (Mansoureh Labafniya, Shahram Etemadi Borujeni, Nele Mentens)....Pages 163-180
Simple Electromagnetic Analysis Against Activation Functions of Deep Neural Networks (Go Takatoi, Takeshi Sugawara, Kazuo Sakiyama, Yang Li)....Pages 181-197
Performance Analysis of Multilayer Perceptron in Profiling Side-Channel Analysis (Léo Weissbart)....Pages 198-216
The Forgotten Hyperparameter: (Servio Paguada, Igor Armendariz)....Pages 217-236
Front Matter ....Pages 237-237
ARM-AFL: Coverage-Guided Fuzzing Framework for ARM-Based IoT Devices (Rong Fan, Jianfeng Pan, Shaomang Huang)....Pages 239-254
Post-exploitation and Persistence Techniques Against Programmable Logic Controller (Andrei Bytes, Jianying Zhou)....Pages 255-273
Investigation of Cyber Attacks on a Water Distribution System (Sridhar Adepu, Venkata Reddy Palleti, Gyanendra Mishra, Aditya Mathur)....Pages 274-291
Front Matter ....Pages 293-293
Computing Neural Networks with Homomorphic Encryption and Verifiable Computing (Abbass Madi, Renaud Sirdey, Oana Stan)....Pages 295-317
Attribute-Based Symmetric Searchable Encryption (Hai-Van Dang, Amjad Ullah, Alexandros Bakas, Antonis Michalas)....Pages 318-336
Towards Inclusive Privacy Protections in the Cloud (Tanusree Sharma, Tian Wang, Carlo Di Giulio, Masooda Bashir)....Pages 337-359
A Study on Microarchitectural Covert Channel Vulnerabilities in Infrastructure-as-a-Service (Benjamin Semal, Konstantinos Markantonakis, Raja Naeem Akram, Jan Kalbantner)....Pages 360-377
Front Matter ....Pages 379-379
On New Zero-Knowledge Proofs for Fully Anonymous Lattice-Based Group Signature Scheme with Verifier-Local Revocation (Yanhua Zhang, Ximeng Liu, Yifeng Yin, Qikun Zhang, Huiwen Jia)....Pages 381-399
Proofs of Ownership on Encrypted Cloud Data via Intel SGX (Weijing You, Bo Chen)....Pages 400-416
On the Verification of Signed Messages (Bowen Xu, Xin Xu, Quanwei Cai, Wei Wang, QiongXiao Wang)....Pages 417-434
Applications and Developments of the Lattice Attack in Side Channel Attacks (Ziqiang Ma, Bingyu Li, Quanwei Cai, Jun Yang)....Pages 435-452
Exploring the Security of Certificate Transparency in the Wild (Bingyu Li, Fengjun Li, Ziqiang Ma, Qianhong Wu)....Pages 453-470
Front Matter ....Pages 471-471
DaVinci: Android App Analysis Beyond Frida via Dynamic System Call Instrumentation (Alexander Druffel, Kris Heid)....Pages 473-489
MobHide: App-Level Runtime Data Anonymization on Mobile (Davide Caputo, Luca Verderame, Alessio Merlo)....Pages 490-507
Evaluation of the Adoption and Privacy Risks of Google Prompts (Christos Avraam, Elias Athanasopoulos)....Pages 508-522
On the Evolution of Security Issues in Android App Versions (Anatoli Kalysch, Joschua Schilling, Tilo Müller)....Pages 523-541
Front Matter ....Pages 543-543
Unsupervised Labelling of Stolen Handwritten Digit Embeddings with Density Matching (Thomas Thebaud, Gaël Le Lan, Anthony Larcher)....Pages 545-563
Minority Reports Defense: Defending Against Adversarial Patches (Michael McCoyd, Won Park, Steven Chen, Neil Shah, Ryan Roggenkemper, Minjune Hwang et al.)....Pages 564-582
Back Matter ....Pages 583-584