Normal view MARC view ISBD view

Foundations and Practice of Security [electronic resource] : 16th International Symposium, FPS 2023, Bordeaux, France, December 11-13, 2023, Revised Selected Papers, Part I / edited by Mohamed Mosbah, Florence Sèdes, Nadia Tawbi, Toufik Ahmed, Nora Boulahia-Cuppens, Joaquin Garcia-Alfaro.

Contributor(s): Mosbah, Mohamed [editor.] | Sèdes, Florence [editor.] | Tawbi, Nadia [editor.] | Ahmed, Toufik [editor.] | Boulahia-Cuppens, Nora [editor.] | Garcia-Alfaro, Joaquin [editor.] | SpringerLink (Online service).
Material type: materialTypeLabelBookSeries: Lecture Notes in Computer Science: 14551Publisher: Cham : Springer Nature Switzerland : Imprint: Springer, 2024Edition: 1st ed. 2024.Description: XIX, 460 p. 120 illus., 94 illus. in color. online resource.Content type: text Media type: computer Carrier type: online resourceISBN: 9783031575372.Subject(s): Data protection | Computer engineering | Computer networks  | Data and Information Security | Computer Engineering and Networks | Computer Communication NetworksAdditional physical formats: Printed edition:: No title; Printed edition:: No titleDDC classification: 005.8 Online resources: Click here to access online
Contents:
AI and Cybersecurity -- An Adversarial Robustness Benchmark for Enterprise Network Intrusion Detection -- Securing Smart Vehicles through Federated Learning -- Using Reed-Muller Codes for Classification with Rejection and Recovery -- Unsupervised Clustering of Honeypot Attacks by Deep HTTP Packet Inspection -- Security Analysis -- Practices for Assessing the Security Level of Solidity Smart Contracts -- Effectiveness of Binary-Level CFI Techniques -- A Small World-Privacy Preserving IoT Device-type Fingerprinting with Small Datasets -- URSID: Automatically Refining a Single Attack Scenario into Multiple Cyber -- Phishing and Social Network -- Does the Anchoring Effect Influence Individuals' Anti-Phishing Behavior? -- IntelliTweet: a Multifaceted Feature Approach to Detect Malicious Tweets -- Web Scams Detection System -- Vulnerabilities and Exploits -- VulMAE: Graph Masked Autoencoders for VulnerabilityDetection from Source and Binary Codes -- Analysis of Cryptographic CVEs: Lessons Learned and Perspectives -- A BERT-Based Framework for Automated Extraction of Indicators of Compromise from Security Incident Reports -- Enhancing Code Security Through Open-source Large Language Models: A Comparative Study -- Network and System Threat -- Green-Fuzz: Efficient Fuzzing for Network Protocol Implementations -- Unmasking of Maskware: Detection and Prevention of Next-Generation Mobile Crypto-Ransomware -- Automated Attacker Behaviour Classification Using Threat Intelligence Insights -- UDP state manipulation: description of a Packet Filtering vulnerability in Stateful firewalls -- Malware Analysis -- Following the Obfuscation Trail: Identifying and Exploiting Obfuscation Signatures in Malicious Code -- On Exploiting Symbolic Execution to Improve the Analysis of RAT Samples with angr -- Original Entry Pointdetection based on graph similarity -- Attacking and Securing the Clock Randomization and Duplication Side-Channel Attack Countermeasure -- Security Design -- Hardening Systems Against Data Corruption Attacks at Design Time -- Design of an Efficient Distributed Delivery Service for Group Key Agreement Protocols -- A shared key recovery attack on a masked implementation of CRYSTALS-Kyber's encapsulation algorithm -- Tight Differential Privacy Guarantees for the Shuffle Model with k-Randomized Response.
In: Springer Nature eBookSummary: This book constitutes the refereed proceedings of the 16th International Symposium on Foundations and Practice of Security, FPS 2023, held in Bordeaux, France, during December 11-13, 2023. The 27 regular and 8 short papers presented in this book were carefully reviewed and selected from 80 submissions. The papers have been organized in the following topical sections: Part I: AI and cybersecurity, security analysis, phishing and social network, vulnerabilities and exploits, network and system threat, malware analysis. Part II : security design, short papers. .
    average rating: 0.0 (0 votes)
No physical items for this record

AI and Cybersecurity -- An Adversarial Robustness Benchmark for Enterprise Network Intrusion Detection -- Securing Smart Vehicles through Federated Learning -- Using Reed-Muller Codes for Classification with Rejection and Recovery -- Unsupervised Clustering of Honeypot Attacks by Deep HTTP Packet Inspection -- Security Analysis -- Practices for Assessing the Security Level of Solidity Smart Contracts -- Effectiveness of Binary-Level CFI Techniques -- A Small World-Privacy Preserving IoT Device-type Fingerprinting with Small Datasets -- URSID: Automatically Refining a Single Attack Scenario into Multiple Cyber -- Phishing and Social Network -- Does the Anchoring Effect Influence Individuals' Anti-Phishing Behavior? -- IntelliTweet: a Multifaceted Feature Approach to Detect Malicious Tweets -- Web Scams Detection System -- Vulnerabilities and Exploits -- VulMAE: Graph Masked Autoencoders for VulnerabilityDetection from Source and Binary Codes -- Analysis of Cryptographic CVEs: Lessons Learned and Perspectives -- A BERT-Based Framework for Automated Extraction of Indicators of Compromise from Security Incident Reports -- Enhancing Code Security Through Open-source Large Language Models: A Comparative Study -- Network and System Threat -- Green-Fuzz: Efficient Fuzzing for Network Protocol Implementations -- Unmasking of Maskware: Detection and Prevention of Next-Generation Mobile Crypto-Ransomware -- Automated Attacker Behaviour Classification Using Threat Intelligence Insights -- UDP state manipulation: description of a Packet Filtering vulnerability in Stateful firewalls -- Malware Analysis -- Following the Obfuscation Trail: Identifying and Exploiting Obfuscation Signatures in Malicious Code -- On Exploiting Symbolic Execution to Improve the Analysis of RAT Samples with angr -- Original Entry Pointdetection based on graph similarity -- Attacking and Securing the Clock Randomization and Duplication Side-Channel Attack Countermeasure -- Security Design -- Hardening Systems Against Data Corruption Attacks at Design Time -- Design of an Efficient Distributed Delivery Service for Group Key Agreement Protocols -- A shared key recovery attack on a masked implementation of CRYSTALS-Kyber's encapsulation algorithm -- Tight Differential Privacy Guarantees for the Shuffle Model with k-Randomized Response.

This book constitutes the refereed proceedings of the 16th International Symposium on Foundations and Practice of Security, FPS 2023, held in Bordeaux, France, during December 11-13, 2023. The 27 regular and 8 short papers presented in this book were carefully reviewed and selected from 80 submissions. The papers have been organized in the following topical sections: Part I: AI and cybersecurity, security analysis, phishing and social network, vulnerabilities and exploits, network and system threat, malware analysis. Part II : security design, short papers. .

There are no comments for this item.

Log in to your account to post a comment.