Cha / Park Information Security
Erscheinungsjahr 2025
ISBN: 978-3-032-08124-7
Verlag: Springer International Publishing
Format: PDF
Kopierschutz: 1 - PDF Watermark
28th International Conference, ISC 2025, Seoul, South Korea, October 20–22, 2025, Proceedings
E-Book, Englisch, 604 Seiten
Reihe: Computer Science (R0)
ISBN: 978-3-032-08124-7
Verlag: Springer International Publishing
Format: PDF
Kopierschutz: 1 - PDF Watermark
The book constitutes the proceedings of the 28th International Conference on Information Security, ISC 2025, held in Seoul, South Korea, during October 20–22, 2025.
The 28 full papers presented in these proceedings were carefully reviewed and selected from 77 submissions. The papers are organized in the following topical sections: Cryptanalysis and Cipher Security; Network Security; Post-quantum Cryptography; Side-Channel Attacks and Countermeasures; AI Security; Biometric Security; Malware Analysis; Systems Security; Access Control & Privacy; Smart Contracts and Blockchain Security.
Zielgruppe
Research
Autoren/Hrsg.
Weitere Infos & Material
.-Cryptanalysis and Cipher Security.-Improving the Differential-Linear Attack with Applications to GIFT-COFB, GIFT-64 and HyENA.-Keyless Physical-Layer Cryptography.-The Multi-User Security of GCM-SST and Further Enhancements.-Network Security.- SimSeq: A Robust TLS Traffic Classification Method.-EvoFuzz: Enhancing State Space Exploration and Seed Prioritization in Stateful Protocol Fuzzing using Evolutionary Game Theory.-A Lot of Data and Added Complexity. How Does PQC Affect the Performance of My TLS Connection? .-Post-quantum Cryptography.-Conditional Attribute-Based PRE: Definition and Construction from LWE.-LastRings: Lattice-based Scalable Threshold Ring Signatures.-Side-Channel Attacks and Countermeasures.-Simulation-based Software Leakage Evaluation for the RISC-V Platform.-GIR-Cache: Mitigating Conflict-Based Cache Side-Channel Attacks Via Global Indirect Replacement.-Inference Attacks on Encrypted Online Voting via Traffic Analysis.-Towards Cross-Device Side-Channel Analysis via Domain-Level Attention Mechanisms.-Tighter Bounds for Guessing Entropy in Side-channel Template Attacks.-Collision Spanning Tree: Quick Key Recovery in Side-Channel Collision Attacks.-AI Security.-MSPP-Net: Fine-grained image privacy identification via multi-stage semantic perception.-Exploring Backdoor Attacks in Federated Learning Under Parameter-Efficient Fine-Tuning.-Spoofing Camera Source Attribution via PRNU Transfer Attacks on Physical and AI Generated Images.-Biometric Security.-Comparative Evaluation of Lattices for Fuzzy Extractors and Fuzzy Signatures.-A New Code-Based Formulation of the Fuzzy Vault Scheme.-Malware Analysis.-HoneySentry: A High-Fidelity Interactive IoT Honeypot for Advanced Threat Detection.-Towards Architecture-Independent Function Call Analysis for IoT Malware.-A Study on Malicious Browser Extensions in 2025.-HGANN-Mal: A Hypergraph Attention Neural Network Approach for Android Malware Detection.-Systems Security
.-A Graph-Based Approach to Alert Contextualisation in Security Operations Centres.-HyperSec: An Extensible Hypervisor-Assisted Framework for Kernel Rootkit Detection.-BootMarker: UEFI Bootkit Defense via Control-Flow Verification.-Ali2Vul: Binary Vulnerability Dataset Expansion via Cross-Modal Alignment.-Access Control & Privacy.-CryptNyx: Password-hardened encryption with strong anonymity guarantees.-Efficient Dynamic Group Signatures with Forward Security.-Zero Trust Continuous Authentication Models and Automated Policy Formulation.-Smart Contracts and Blockchain Security.-Jakiro: A Cross-modal Contrastive Learning Framework for Detecting Vulnerabilities in Smart Contracts
.-BlockLens: Detecting Malicious Transactions in Ethereum Using LLM Techniques.




