国际信息与通信安全会议(International Conference on Information and Communications Security, ICICS)作为CCF C类、网络信息安全领域优秀国际会议。ICICS 2021年共收到202(2020:139, 2019:199, 2018:202)篇论文,录取49(2020:33, 2019:48, 2018:39)篇论文,录用率为24%(2020:23.7%, 2019:24.1%, 2018:19.3%)。小编将录用论文标题列举如下:
Malware Analysis and Detection
- Certified Malware in South Korea: A Localized Study of Breaches of Trust in Code-Signing PKI Ecosystem
Bumjun Kwon, Sanghyun Hong, Yuseok Jeon, and Doowon Kim
- GAN-based adversarial patch for malware C2 traffic to bypass DL detector
Junnan Wang, Qixu Liu, Chaoge Liu, and Jie Yin
- Analyzing the Security of OTP 2FA in the Face of Malicious Terminals
Ahmed Tanvir Mahdad, Mohammed Jubur, and Nitesh Saxena
Blockchain and Federated Learning
- The Golden Snitch: A Byzantine Fault Tolerant Protocol with Activity
Huimei Liao, Haixia Xu, and Peili Li
- Rectifying Administrated ERC20 Tokens
Nikolay Ivanov, Hanqing Guo, and Qiben Yan
- Moat: Model Agnostic Defense against Targeted Poisoning Attacks in Federated Learning
Arpan Manna, Harsh Kasyap, and Somanath Tripathy
IoT Security I
- Disappeared Face: A Physical Adversarial Attack Method on Black-Box Face Detection Models
Chuan Zhou, Huiyun Jing, Xin He, Liming Wang, Kai Chen, and Duohe Ma
- HIAWare: Speculate Handwriting on Mobile Devices with Built-in Sensors
Jing Chen, Peidong Jiang, Kun He, Cheng Zeng, and Ruiying Du
Studies of Keyboard Patterns in Passwords: Recognition, Characteristics and Strength Evolution
Kunyu Yang, Xuexian Hu, Qihui Zhang, Jianghong Wei, and Wenfen Liu
CNN-based Continuous Authentication on Smartphones with Auto Augmentation Search
Shaojiang Deng, Jiaxing Luo, and Yantao Li
Multimedia Security
- Compressive Sensing Image Steganography via Directional Lifting Wavelet Transform
Zan Chen, Chaocheng Ma, Yuanjing Feng, and Xingsong Hou
- Remote Recovery of Sound from Speckle Pattern Video based on Convolutional LSTM
Dali Zhu, Long Yang, and Hualin Zeng
- Secure Image Coding Based on Compressive Sensing with Optimized Rate-distortion
Di Xiao and Shuwen Lan
- Black-box Audio Adversarial Example Generation using Variational Autoencoder
Wei Zong, Yang-Wai Chow, and Willy Susilo
Software Security
- ACGVD: Vulnerability Detection based on Comprehensive Graph via Graph Neural Network with Attention
Min Li, Chunfang Li, Shuailou Li, Yanna Wu, Boyang Zhang, and Yu Wen
- TranFuzz: An Ensemble Black-Box Attack Framework Based on Domain Adaptation and Fuzzing
Hao Li, Shanqing Guo, Peng Tang, Chengyu Hu, and Zhenxiang Chen
- Software Obfuscation with Non-Linear Mixed Boolean-Arithmetic Expressions
Binbin Liu, Weijie Feng, Qilong Zheng, Jing Li, and Dongpeng Xu
- VIRSA: Vectorized In-Register RSA Computation with Memory Disclosure Resistance
Yu Fu, Wei Wang, Lingjia Meng, Qiongxiao Wang, Yuan Zhao, and Jingqiang Lin
- Informer: Protecting Intel SGX from Cross-core Side Channel Threats
Fan Lang, Wei Wang, Lingjia Meng, Qiongxiao Wang, Jingqiang Lin, and Li Song
Applied Cryptography
- Forward-Secure Revocable Identity-Based Encryption
Baodong Qin, Xue Bai, Dong Zheng, Hui Cui, and Yiyuan Luo
- An Optimized Inner Product Argument with More Application Scenarios
Zongyang Zhang, Zibo Zhou, Weihan Li, and Hongyu Tao
- Updatable All-But-One Dual Projective Hashing and Its Applications
Kai Zhang, Zhe Jiang, Junqing Gong, and Haifeng Qian
- On Tightly-Secure (Linkable) Ring Signatures
Guofeng Tang
- More Efficient Construction of Anonymous Signatures
Yunfeng Ji, Yang Tao, and Rui Zhang
Internet Security
- Towards Open World Traffic Classification
Zhu Liu, Lijun Cai, Lixin Zhao, Aimin Yu, and Dan Meng
- Comprehensive Degree Based Key Node Recognition Method in Complex Networks
Lixia Xie, Honghong Sun, Hongyu Yang, and Liang Zhang
- Improving Convolutional Neural Network-based Webshell Detection through Reinforcement Learning
Yalun Wu, Minglu Song, Yike Li, Yunzhe Tian, Endong Tong, Wenjia Niu, Bowei Jia, Haixiang Huang, Qiong Li, and Jiqiang Liu
- Exploring the Security Issues of Trusted CA Certificate Management
Yanduo Fu, Qiongxiao Wang, Jingqiang Lin, Aozhuo Sun, and Linli Lu
Data-Driven Cybersecurity
- CySecAlert: An Alert Generation System for Cyber Security Events Using Open Source Intelligence Data
Thea Riebe, Tristan Wirth, Markus Bayer, Philipp Kühn, Marc-André Kaufhold, Volker Knauthe, Stefan Guthe, and Christian Reuter
- CyberRel: Joint Entity and Relation Extraction for Cybersecurity Concepts
Yongyan Guo, Zhengyu Liu, Cheng Huang, Jiayong Liu, Wangyuan Jing, Ziwang Wang, and Yanghao Wang
- Microblog User Location Inference Based on POI and Query Likelihood Model
Yimin Liu, Xiangyang Luo, and Han Li
- Effective Anomaly Detection Model Training with Only Unlabeled Data by Weakly Supervised Learning Techniques
Wenzhuo Yang and Kwok-Yan Lam
Machine Learning Security
- Exposing DeepFakes via Localizing the Manipulated Artifacts
Wenxin Li, Qi Wang, Run Wang, Lei Zhao, and Lina Wang
- Improved Differential-ML Distinguisher: Machine Learning based Generic Extension For Differential Analysis
Gao Wang and Gaoli Wang
- Black-Box Buster: A Robust Zero-Shot Transfer-Based Adversarial Attack Method
Yuxuan Zhang, Zhaoyang Wang, Boyang Zhang, Yu Wen, and Dan Meng
- A Lightweight Metric Defence Strategy for Graph Neural Networks Against Poisoning Attacks
Yang Xiao, Jie Li , and Wengui Su
- Rethinking Adversarial Examples Exploiting Frequency-Based Analysis
Sicong Han, Chenhao Lin, Chao Shen, and Qian Wang
Post-Quantum Cryptography
- Lattice-Based Secret Handshakes with Reusable Credentials
Zhiyuan An, Zhuoran Zhang, Yamin Wen, and Fangguo Zhang
- When NTT Meets Karatsuba: Preprocess-then-NTT Technique Revisited
Yiming Zhu, Zhen Liu, and Yanbin Pan
- Predicting the Concrete Security of LWE Against the Dual Attack Using Binary Search
Shuaigang Li, Xianhui Lu, Jiang Zhang, Bao Li, and Lei Bi
- Small Leaks Sink a Great Ship: An Evaluation of Key Reuse Resilience of PQC Third Round Finalist NTRU-HRSS
Xiaohan Zhang, Chi Cheng, and Ruoyu Ding
- Efficient and Fully Secure Lattice-based IBE with Equality Test
Zhenghao Wu, Jian Weng, Anjia Yang, Lisha Yao, Xiaojian Liang, Zike Jiang, and Jinghang Wen
IOT Security II
- Generating Adversarial Point Clouds on Multi-modal Fusion Based 3D Object Detection Model
Huiying Wang, Huixin Shen, Boyang Zhang, Yu Wen, and Dan Meng
- Source Identification from In-Vehicle CAN-FD Signaling: What Can We Expect?
Yucheng Liu and Xiangxue Li
- EmuIoTNet: An Emulated IoT Network for Dynamic Analysis
Qin Si, Lei Cui, Lun Li, Zhenquan Ding, Yongji Liu, and Zhiyu Hao
Security Analysis
- Security Analysis of Even-Mansour Structure Hash Functions
Shiwei Chen, Ting Cui, and Chenhui Jin
- Rare Variants Analysis in Genetic Association Studies with Privacy Protection via Hybrid System
Mohammed Shujaa Aldeen and Chuan Zhao
- Rotational-Linear Attack: A New Framework of Cryptanalysis on ARX ciphers with Applications to Chaskey
Yaqi Xu, Baofeng Wu, and Dongdai Lin
- A Novel Approach for Supervisor Synthesis To Enforce Opacity of Discrete Event Systems
Nour Elhouda Souid and Kais Klai
线上会议
明天还在进行时,大家可以通过官网查看日程.
https://www.icics.cn/Program.html