This book constitutes the proceedings of the satellite workshops held around the 21st International Conference on Applied Cryptography and Network Security, ACNS 2023, held in Kyoto, Japan, in June 2023.
The 34 full papers and 13 poster papers presented in this volume were carefully reviewed and selected from 76 submissions. They stem from the following workshops:
· 1st ACNS Workshop on Automated Methods and Data-driven Techniques in Symmetric-key Cryptanalysis (ADSC 2023)
· 5th ACNS Workshop on Application Intelligence and Blockchain Security (AIBlock 2023)
· 4th ACNS Workshop on Artificial Intelligence in Hardware Security (AIHWS 2023)
· 5th ACNS Workshop on Artificial Intelligence and Industrial IoT Security (AIoTS 2023)
· 3rd ACNS Workshop on Critical Infrastructure and Manufacturing System Security (CIMSS 2023)
· 5th ACNS Workshop on Cloud Security and Privacy (Cloud S&P 2023)
· 4th ACNS Workshop on Secure Cryptographic Implementation (SCI 2023)
· 4th ACNS Workshop on Security in Mobile Technologies (SecMT 2023)
· 5th ACNS Workshop on Security in Machine Learning and its Applications (SiMLA 2023)
Author(s): Jianying Zhou, Lejla Batina, Zengpeng Li, Jingqiang Lin, Eleonora Losiouk, Suryadipta Majumdar, Daisuke Mashima, Weizhi Meng, Stjepan Picek, Mohammad Ashiqur Rahman, Jun Shao, Masaki Shimaoka, Ezekiel Soremekun, Chunhua Su, Je Sen Teh, Aleksei Udovenko, Cong Wang, Leo Zhang, Yury Zhauniarovich
Publisher: Springer Cham
Year: 2023
Preface
Contents
ADSC – Automated Methods and Data-Driven Techniques in Symmetric-Key Cryptanalysis
ADSC 2023
First Workshop on Automated Methods and Data-Driven Techniques in Symmetric-Key Cryptanalysis
Program Chairs
Program Committee
Automatic Search Model for Related-Tweakey Impossible Differential Cryptanalysis
1 Introduction
2 Preliminaries
2.1 Notations
2.2 Related-Tweakey Impossible Differential
2.3 Boolean Satisfiability Problem
3 The Optimized Automatic Search Model
3.1 Application of LCA in Impossible Differential Cryptanalysis
3.2 The Optimized Automatic Search Model for Related-Tweakey Impossible Differentials
4 Applications from Cryptanalysis Aspect
4.1 Application to Joltik-BC
4.2 Application to SKINNY
4.3 Application to QARMA
4.4 Application to CRAFT
5 Evaluation of the Automatic Search Models
6 Conclusion
References
Comprehensive Preimage Security Evaluations on Rijndael-Based Hashing
1 Introduction
1.1 The Meet-In-The-Middle (MITM) Technique
1.2 Contributions
2 Preliminaries
2.1 The Rijndael Block Cipher
2.2 Preimage and Pseudo-preimage Attacks
2.3 The MITM Pseudo-preimage Attack
2.4 Pseudo-preimage to Preimage Conversion
3 MILP Modeling for Automated Search
3.1 Automated Search Framework
3.2 The Superposition State Structure
3.3 Simplified Encoding Scheme
4 Application to Rijndael
4.1 Example: Pseudo-preimage Attack on 10-Round Rijndael 256-256
5 Conclusions
References
Conditional Cube Key Recovery Attack on Round-Reduced Xoodyak
1 Introduction
2 Preliminaries
2.1 Notations
2.2 Description of Xoodyak
3 Review of Cube Attacks and Related Techniques
3.1 Cube Attack
3.2 Conditional Cube Attack
4 Conditional Cube Attacks on Round-Reduced Xoodyak
4.1 Finding Kernel Quadratic Term
4.2 MILP Model for Li et al. Technique
5 Key Recovery on 6 and 7 Rounds Xoodyak
5.1 6 Rounds Conditional Cube Attack on Xoodyak
5.2 7 Rounds Conditional Cube Attack on Xoodyak
6 Conclusion
References
AIBlock – Application Intelligence and Blockchain Security
AIBlock 2023
Fifth Workshop on Application Intelligence and Blockchain Security
General Chair
Program Chairs
Program Committee
Steering Committee
Additional Reviewer
Smart Contract-Based E-Voting System Using Homomorphic Encryption and Zero-Knowledge Proof
1 Introduction
2 Related Work
2.1 Blockchain-Based E-Voting System
2.2 E-Voting System Using Blockchain
3 Preliminaries
3.1 Smart Contract
3.2 Homomorphic Encryption
3.3 Zero-Knowledge Proof
4 Proposed System
4.1 System Components
4.2 System Model
4.3 System Features
5 Performance Evaluation
5.1 Experiment Environment
5.2 Execution Time Performance
5.3 Gas Fee
6 Conclusion
References
Preventing Content Cloning in NFT Collections
1 Introduction
1.1 New Forms of Digital Collections
1.2 The Rise of NFT Clones
1.3 Our Contribution
1.4 Related Works
1.5 Structure of This Work
2 Issues in NFT Collections
2.1 A Single Point of Failure in ERC-721 and Blockchains with Native NFT Designs
2.2 Main Approach Mitigating NFT Cloning Attacks
2.3 Vulnerability Analysis of Existing NFT Collections
3 A Robust NFT Collection Functionality
3.1 FCollNFT and ERC-721 NFTs
3.2 FCollNFT and Blockchains with Native Support of NFTs
3.3 Discussion on the Implementation of FCollNFT
4 Conclusions and Future Work
References
NFT Trades in Bitcoin with Off-Chain Receipts
1 Introduction
2 Preliminaries
2.1 Bitcoin Transactions
2.2 Recursive SNARKs – Proof Carrying Data
3 Transaction Chains
4 Succinct Proofs for Transaction Chains
4.1 Proving Existence of Primary Chains Recursively
4.2 Implementation Details and Benchmarks
5 An Application: NFTs with Atomic and Fully-Fair Swaps
5.1 Description of the Scheme
5.2 Fairness for the Buyer and Seller
5.3 Further Remarks
References
AIHWS – Artificial Intelligence in Hardware Security
AIHWS 2023
Fourth Workshop on Artificial Intelligence in Hardware Security
Program Chairs
Program Committee
Web Chair
A Comparison of Multi-task Learning and Single-Task Learning Approaches
1 Introduction
1.1 Summary of Contributions and Outline
1.2 Relevant Related Works
2 Preliminaries
2.1 Profiling Based on Deep Learning
2.2 Training Methodology
2.3 Comparison Methodology
2.4 Computing Resources
2.5 ASCADv1-r
2.6 ASCADv2
2.7 Custom Layers
2.8 Multi-task Learning
3 Utilising Experts to Improve Single-Task Architectures
4 ASCADv1-r: Comparing Multi-task and Single-Task Architectures
4.1 Assumptions, Contributions and State of the Art
4.2 Architectures
4.3 Training Many Models
4.4 Results of the Experiments
5 ASCADv2
5.1 Assumptions and State of the Art
5.2 Input Scenarios
5.3 Architectures
5.4 Training Many Models
5.5 Results of the Experiments
6 Conclusion
References
Hide and Seek: Using Occlusion Techniques for Side-Channel Leakage Attribution in CNNs
1 Introduction
2 Preliminaries
2.1 Notation
2.2 Deep Learning-Based sca
2.3 Datasets and Used Architectures
3 Revisiting Gradient-Based Attribution Methods
4 Using Occlusion for Leakage Attribution
4.1 n-Occlusion: Hide and Seek
4.2 Exploring Different Occlusion Methods
4.3 Experimental Results
4.4 Higher-Order Occlusion: Hiding Multiple Parts at once
5 Occlusion Results of Other ASCAD Key Bytes
6 Conclusion
References
Secret Key Recovery Attack on Masked and Shuffled Implementations of CRYSTALS-Kyber and Saber
1 Introduction
2 Previous Work
2.1 Implementations
2.2 Attacks
3 Saber and CRYSTALS-Kyber Algorithms
4 Attack Scenario
5 Experimental Setup
5.1 Equipment
5.2 Target Implementations
6 Profiling Stage
7 Attack Stage
7.1 Message Recovery Using 0 and 255 FY Indexes and Rotation
7.2 Cyclic Rotation of CCTs
7.3 Incremental CCT Construction Method
8 Experimental Results
9 Countermeasures
10 Conclusion
References
SoK: Assisted Fault Simulation
1 Introduction
2 Background
3 A Taxonomy of Fault Models
4 Criteria for Evaluating the Fault Simulators
5 Experimental Setup
5.1 FiSim
5.2 Zero Overhead Fault Injector
5.3 ARMORY
5.4 ARCHitecture-Independent Evaluation
5.5 Experimental Results
6 Limitations of Existing Fault Simulators
7 Opportunities of Using AI Techniques
8 Conclusion
References
Using Model Optimization as Countermeasure against Model Recovery Attacks
1 Introduction
2 Background
2.1 Model Extraction Attack
2.2 OpenVINO ToolKit
2.3 Previous Work: Cold-Boot Model Recovery Attack on Intel NCS 2
2.4 Model Optimization
3 Experiments
3.1 Investigation on Different Models
4 Discussions
5 Conclusion
References
AIoTS – Artificial Intelligence and Industrial IoT Security
AIoTS 2023
Fifth Workshop on Artificial Intelligence and Industrial IoT Security
Program Chairs
Web Chair
Publicity Chairs
Program Committee
Blockchain-Enabled Data Sharing in Connected Autonomous Vehicles for Heterogeneous Networks
1 Introduction
2 Blockchain Based CAV Application Scenario
2.1 System Model
2.2 Trust Model
2.3 Blockchain-Based Data Sharing CAV Scenario
3 Latency and Security Analysis for CAV Data Sharing
3.1 Latency Analysis for Homogeneous Networks
3.2 Latency Analysis for Heterogeneous Network
3.3 Threat Model and Security Analysis
4 Numerical Case Study
4.1 Simulation Setup
4.2 Simulation Results
5 Conclusion
References
A Security Policy Engine for Building Energy Management Systems
1 Introduction
2 Background and Known Attacks
3 Policy Engine
3.1 Deployment Modes
3.2 Example Policies
3.3 Provenance Verification Policy
4 Testbed
4.1 Testbed Implementation
5 Evaluation
6 Related Work
7 Conclusion
References
EARIC: Exploiting ADC Registers in IoT and Control Systems
1 Introduction
2 Background
2.1 Overview of ADC
2.2 Overview of CPS
3 Threat Model
4 EARIC: The Proposed Attacks
4.1 Overview
4.2 The Proposed Attacks
5 Experimental Design
6 Evaluation and Discussion
6.1 Attack Accuracy
6.2 Attack Efficiency
6.3 Attack Impact
6.4 Proposed Countermeasures
7 Related Work
8 Conclusion
References
CIMSS – Critical Infrastructure and Manufacturing System Security
CIMSS 2023
Third Workshop on Critical Infrastructure and Manufacturing System Security
Program Chairs
Publicity Chair
Program Committee
Round-Efficient Security Authentication Protocol for 5G Network
1 Introduction
2 Relation Work
3 Preliminary
3.1 5G AKA Authentication Protocol
3.2 Assumed Attack Models and Security Requirements
3.3 5G-AKA Weaknesses
3.4 Weil Pairing
3.5 ECDH Key Agreement
3.6 Schnorr Signature Algorithm
4 Protocol Proposition
4.1 Assumptions
4.2 Preparation Phase
4.3 Authentication Procedure
5 Validation
5.1 Formal Verification
5.2 Security Analysis
5.3 Security Comparison
5.4 Efficiency Analysis
6 Conclusion
References
A Framework for TLS Implementation Vulnerability Testing in 5G
1 Introduction
2 Preliminaries and Related Work
2.1 5G Slicing and Security
2.2 Transport Layer Security
2.3 Port Scanning Technology
2.4 Related Work
3 The Framework
4 Conclusion
References
Safety Watermark: A Defense Tool for Real-Time Digital Forensic Incident Response in Industrial Control Systems
1 Introduction
2 ICS – A Cyber-Physical System
3 Safety Watermark Concept
3.1 SWaT Testbed
3.2 Safety Watermark Active Defense Philosophy
3.3 Related Work
4 Chosen Scenario – Deliberate Overdosing of Sodium Hypochlorite
5 Safety Watermark Detection
5.1 SWaT HMI and Safety Watermark (Normal Operation)
5.2 Attack Case 1 (Administrative Control)
5.3 Attack Case 2 (Elimination Control)
5.4 Attack Case 3 (Engineering Control)
5.5 Attack Case 4 (Multiple Controls)
6 Consequence-Driven Cyber-Informed Engineering (CCE)
6.1 CCE Methodology
7 Conclusions
References
Leveraging Semantic Relationships to Prioritise Indicators of Compromise in Additive Manufacturing Systems
1 Introduction
2 Related Work
3 Conceptual Background
3.1 Cyber Threat Intelligence
3.2 Indicators of Compromise
3.3 Heterogeneous Information Network
3.4 Overview
4 Methodology
4.1 Data Collection and Preprocessing
4.2 Relation Extraction and Threat Intelligence Modelling
4.3 Domain Recognition and Tag Generation
4.4 Domain-Specific Threat Identification and Tagging
4.5 Severity Measure and Threat Prioritisation
5 Conclusion and Future Scope
References
WiP: Towards Zero Trust Authentication in Critical Industrial Infrastructures with PRISM
1 Introduction
2 Preliminaries
2.1 Threshold Secret Sharing
2.2 Oblivious Pseudorandom Function
3 PRISM Scheme and Its Properties
3.1 Construct Overview
3.2 Registration Safeguard
3.3 Password Authentication
3.4 Security Properties
4 Security Proof of PRISM Scheme
4.1 Hard Problems
4.2 Security Proof for Registration
4.3 Security Proof for Authentication
5 Conclusion
References
Cloud S&P – Cloud Security and Privacy
Cloud S&P 2023
Fifth Workshop on Cloud Security and Privacy
Program Chairs
Program Committee
Web Chair
Steering Committee
Additional Reviewers
slytHErin: An Agile Framework for Encrypted Deep Neural Network Inference
1 Introduction
2 Related Work
3 Background
3.1 Homomorphic Encryption
3.2 Deep Neural Networks
4 slytHErin Overview
4.1 Scenario 1: Encrypted Client Data - Cleartext Model
4.2 Scenario 2: Cleartext Client Data - Encrypted Model
4.3 Scenario 3: Encrypted Client Data - Encrypted Model
5 Cryptographic Building Blocks
5.1 Input Data Packing
5.2 Matrix Multiplication
5.3 Convolutional and Pooling Layers
5.4 Optimizations
5.5 Non-Linear Operations
5.6 Multiparty Computation Protocols
6 Experimental Evaluation
6.1 Implementation and Experimental Setup
6.2 Empirical Results
7 Conclusion
References
Trust Management Framework for Containerized Workloads Applications to 5G Networks
1 Introduction
2 Related Work
3 Trust Model Framework
3.1 Context
3.2 Hierarchies for the Target System
3.3 Use-Case: Communication Between Two Containers in the Same Node
3.4 Generalization of the Use Case to n-Layer Variants
4 Adversary Model
5 Implementation
6 Evaluation
6.1 Threat Assessment
6.2 Analysis of the Threat Assessment Results
6.3 Verification of the Threat Assessment
7 Discussion
8 Conclusion
References
SCI – Secure Cryptographic Implementation
SCI 2023
Fourth Workshop on Secure Cryptographic Implementation
Program Chairs
Publication Chair
Publicity Chairs
Program Committee
cPSIR: Circuit-Based Private Stateful Information Retrieval for Private Media Consumption
1 Introduction
2 Background and Preliminary
2.1 Minimal Binary Tree
2.2 Fully Homomorphic Encryption
3 Technical Overview and Definitions
3.1 Setting
3.2 Baseline CPIR
4 Our Protocol: cPSIR
4.1 PSIR by Keywords
4.2 Private Batched File Retrieval
5 Optimization for Bootstrapping
5.1 Programmable Bootstrapping
5.2 Hardware-Accelerated Bootstrapping
6 Analysis and Evaluation
6.1 Performance Analysis
6.2 Evaluation
6.3 Application: Private Media Consumption
7 Conclusion
References
A Deep-Learning Approach for Predicting Round Obfuscation in White-Box Block Ciphers
1 Introduction
2 Preliminaries
2.1 White-Box AES/SM4 with the CEJO Framework
2.2 Dummy/Noisy Rounds Obfuscation Techniques
2.3 Deep Neural Networks
3 Detection of Noisy Rounds
3.1 Data Generation with Noisy Rounds
3.2 CNN for Predicting Noisy Rounds
3.3 RNN for Predicting Noisy Rounds
3.4 CRNN for Predicting Noisy Rounds
3.5 Evaluation Methodology
4 Experimental Results
4.1 The Comparison of Various Neural Networks
4.2 Analysis of the Security and Performance with the Round Obfuscation Techniques
5 Conclusion
References
Efficient Arithmetic for Polynomial Multiplication in Post-quantum Lattice-Based Cryptosystem on RISC-V Platform
1 Introduction
2 Preliminaries
2.1 Saber
2.2 Polynomial and Polynomial Multiplication
2.3 Karatsuba and Toom-Cook Multiplication
2.4 Number Theoretic Transform and Its Variants
2.5 Low Complexity NTT
2.6 Barrett Modular Multiplication
3 NTT-Based and Non-NTT-Based Polynomial Multiplication Algorithm on RISC-V
3.1 NTT in Saber
3.2 Non-NTT-Based Polynomial Multiplication Algorithm in Saber
3.3 Modular Multiplication on RISC-V
4 Implementation and Experiment
4.1 Experiment Platform and Environment Setting
4.2 Algorithm Implementation and Benchmark
5 Experiment Result
5.1 Non-NTT-Based PMAs on T-Core
5.2 Non-NTT-Based and NTT-Based PMAs on T-Core and HiFive1 Rev B
5.3 Discussion on the Gap Between Theory and Practice
6 Conclusion
References
Generic Constructions of Server-Aided Revocable ABE with Verifiable Transformation
1 Introduction
1.1 Motivation
1.2 Our Contribution
1.3 Related Work
2 Preliminaries and Definitions
2.1 Bilinear Groups
2.2 Access Structures and Linear Secret Sharing
2.3 Public-Key Encryption
2.4 Revocable Attribute-Based Encryption
2.5 Non-interactive Commitment
3 Framework and Security Model
3.1 Framework
3.2 Security Model
4 Generic Construction
4.1 Security Proofs for Generic Construction
5 Instantiation
5.1 Proposed SR-ABE with Verifiable Transformation
5.2 Security Analysis
5.3 Performance Analysis
6 Conclusion
References
Hybrid Post-quantum Signatures in Hardware Security Keys
1 Introduction
1.1 Related Work
2 Background
2.1 Digital Signatures
2.2 Post-quantum Cryptography
2.3 Security Keys
3 Attacker Model
4 Hybrid Signatures
5 A SK-Friendly Implementation
5.1 CTAP Requirements
5.2 Dilithium Optimizations
5.3 CTAP Implementation
5.4 Side-Channel Resilience
6 Experiments
6.1 Dilithium Reference Implementation
6.2 Dilithium Embedded
6.3 Register and Authenticate Speed
7 Conclusion
A Appendix
References
Multi-armed SPHINCS+
1 Introduction
2 SPHINCS+
2.1 FORS
2.2 Winternitz One Time Signature+
2.3 XMSSMT
2.4 SPHINCS+
3 Our Test Platform: Snapdragon 865
4 SIMD Improvements on Our Test Platforms
4.1 Using SIMD to Speed-Up SPHINCS+
4.2 Using SIMD to Mitigate Side-Channel Attacks
5 Parallelization Strategies
5.1 When Multithreading Goes Wrong
5.2 Multithreading on FORS
5.3 Multithreading on XMSSMT
5.4 Merging in Best Case Scenarios
6 Conclusion
References
SpanL: Creating Algorithms for Automatic API Misuse Detection with Program Analysis Compositions
1 Introduction
2 Need for Domain-Specific Security Screening
3 System Design
3.1 Overview
3.2 Algorithms in SpanL
3.3 Components of SpanL Language
4 Expressiveness of the Language
4.1 Expressiveness Analysis
4.2 Case Studies
5 Experimental Evaluation
6 Conclusion
References
ZKBdf: A ZKBoo-Based Quantum-Secure Verifiable Delay Function with Prover-Secret
1 Introduction
2 Background
2.1 Hash-Chain
2.2 Verifiable Delay Function
2.3 ZKBoo
2.4 Computationally Sound Probabilistic Checkable Proof (PCP)
3 A Quantum-Secure VDF
3.1 Prover-Secret Feature
3.2 Serializing ZKBoo
3.3 ZKBdf Construction
3.4 Completeness and Soundness
3.5 Execution Asymmetry
3.6 Uniqueness
3.7 Quantum-Secure
4 Implementation
4.1 Execution
4.2 Proof Size
5 Conclusion
References
SecMT – Security in Mobile Technologies
SecMT 2023
Fourth Workshop on Security in Mobile Technologies
Program Chairs
Web Chair
Program Committee
If You're Scanning This, It's Too Late! A QR Code-Based Fuzzing Methodology to Identify Input Vulnerabilities in Mobile Apps
1 Background
1.1 QR Code Technology
1.2 Fuzzing
1.3 Related Works
2 A Fuzzing-Based Methodology with QRFuzz
2.1 Methodology Design
2.2 QRFuzz Implementation
3 Experiments
3.1 Experiment Setup
3.2 Tested Apps
3.3 Malicious Dictionaries
4 Results
4.1 Reliability Results
4.2 Instagram Case
4.3 VerificaC19 Case
5 Conclusions and Future Works
References
Enabling Lightweight Privilege Separation in Applications with MicroGuards
1 Introduction
2 Background
2.1 ARM VMSA
3 MicroGuards
3.1 Design Principles
3.2 Threat Model and Assumptions
3.3 MicroGuards Access Control Mechanism
3.4 MicroGuards Threads
4 Implementation
5 Evaluation
5.1 Microbenchmarks
5.2 OpenSSL
5.3 LevelDB
6 Discussion and Conclusion
6.1 Address Space Protection Limitations
6.2 Compatibility Limitations
7 Related Work
References
SiMLA – Security in Machine Learning and its Applications
SiMLA 2023
Fifth Workshop on Security in Machine Learning and its Applications
Program Chair
Web Chair
Publicity Chair
Program Committee
Eliminating Adversarial Perturbations Using Image-to-Image Translation Method
1 Introduction
2 Related Work
2.1 Adversarial Attacks on Image Recognition
2.2 Defense Approaches to Adversarial Attacks
3 Method Proposed by This Study
3.1 An Improved Pix2pix Method
3.2 Training Progress
4 Results and Evaluation
4.1 Experiment Results
4.2 Accuracy
4.3 Peak Signal-to-Noise Ratio
4.4 Time Consumption
5 Conclusion and Future Directions
References
Federated Learning Approach for Distributed Ransomware Analysis
1 Introduction
2 Literature Review
2.1 Ransomware Detection
2.2 Federated Learning (FL) in Cybersecurity
3 Distributed Ransomware Analysis (DRA)
3.1 Client Sites
3.2 Central Server
4 Ransomware Dataset Repository
4.1 Empirical Data Collection
4.2 Feature Selection/Extraction
5 Performance Evaluation
6 Conclusions and Future Work
References
Forensic Identification of Android Trojans Using Stacked Ensemble of Deep Neural Networks
1 Introduction
2 Related Works
3 Proposed System
4 Methodology
4.1 Implementation Environment
4.2 The Dataset
4.3 Preprocessing
4.4 Experimental Design
5 Results
5.1 Performance Metrics
5.2 Testing Results
5.3 10-Fold Cross-Validation Results
6 Discussions
7 Conclusions and Future Work
References
Posters
POSTER: Ransomware Detection Mechanism – Project Status at the Beginning of 2023
1 Introduction
2 Current State
2.1 Implementation of the Detection Primitives
2.2 Process Monitoring and Termination Mechanisms
2.3 Self-Protection Mechanisms
2.4 Custom Communication Mechanism
2.5 Design of the Detection System
2.6 Test Environment and Procedures
2.7 Early Test Results
2.8 Improvements and Changes in the Core Detection Ideas
3 Upcoming Challenges
References
POSTER: AuthZit: Multi-modal Authentication with Visual-Spatial and Text Secrets
1 Introduction
2 System Design
3 User Study
4 Conclusion and Future Work
References
POSTER: Integration of End-to-End Security and Lightweight-SSL for Enhancing Security and Efficiency of MQTT
1 Introduction
2 Preliminaries
3 New Approach of Integrating E2E-MQTT and the Lightweight TLS/SSL
3.1 The Lightweight TLS/SSL Record Protocol
3.2 The Publisher-Subscriber E2E Channel
4 Preliminary Security Analysis and Performance Evaluation
5 Conclusions and Future Work
References
POSTER: Stopping Run-Time Countermeasures in Cryptographic Primitives
1 Introduction
2 Current Work
2.1 Key Idea Behind
2.2 Disabling Random Sources with Injected Code
3 Conclusion and Upcoming Challenges
References
POSTER: Swarm-Based IoT Network Penetration Testing by IoT Devices
1 Extensions to Prior Work
2 Introduction
3 Methodology
4 Preliminary Results
5 Benefits for Research and Society
References
POSTER: Advancing Federated Edge Computing with Continual Learning for Secure and Efficient Performance
1 Introduction
2 Methodology
2.1 Our Framework
2.2 Knowledge Preservation and Security
3 Conclusion
References
POSTER: A Fine-Grained Metric for Evaluating the Performance of Adversarial Attacks and Defenses
1 Introduction
1.1 Accuracy Rate
1.2 Confidence Gap
2 Methodology and Results
2.1 Experimental Design
2.2 Results
3 Conclusion
References
POSTER: Integrating Quantum Key Distribution into Hybrid Quantum-Classical Networks
1 Motivation and Conceptual Network Structure
2 Quantum Keys as a Service
3 Key Management and Authentication
4 Conclusion
References
POSTER: Adaptive Moving Target Defense: Enhancing Dynamic Perturbation Through Voltage Sensitivity Analysis in Power Systems
1 Introduction
1.1 Contributions
2 Methodology
2.1 Sensitivity Analysis Approach
2.2 Algorithm for Dynamic Parameter Perturbations
3 Simulation and Results
3.1 Simulation Setup
3.2 Individual and Combined Parameter Perturbations
3.3 Impact of Perturbations on Power System Stability and Performance
4 Discussion and Conclusion
4.1 Discussion
4.2 Conclusion
References
POSTER: PriAuct: Privacy Preserving Auction Mechanism
1 Introduction
2 PriAuct Overview
2.1 Preliminaries
3 Privacy-Preserving Auction Mechanism
References
POSTER: Using Verifiable Credentials for Authentication of UAVs in Logistics
1 Introduction
2 A Scenario for Confirming the Applicability of VC
2.1 Players and Purpose
2.2 Procedures in the Scenario
3 Our System
3.1 Types of Verifiable Credential
3.2 Issuing the Contract
3.3 Relaying the Packages
3.4 Implementation
4 Conclusion
References
POSTER: A Card-Based Protocol that Lets You Know How Close Two Parties are in their Opinions (agree/disagree) by Using a Four-Point Likert Scale
1 Backgrounds and Contributions
1.1 Contributions of This Paper
2 Previous Non-committed Card Protocols
2.1 Original Five-Card Trick with 2-Color Cards
2.2 Three Card Trick with Same Pattern Cards
3 A Proposal Method
References
POSTER: Collaborative Authority-Based Searchable Encryption Using Access Control Encryption
1 Introduction
2 Problem Statement
2.1 System Model
2.2 The Detailed Construction
References
Author Index