ICISS 2024: List of accepted papers.
18 full papers
06 short papers
04 industry papers (short papers)
Paper ID | Paper Title | Authors |
REGULAR FULL PAPERS | ||
010 | REMEDII: Robust Malware Detection with Iterative and Intelligent Adversarial Training using GANs | Gupta, Kumar |
027 | Microarchitectural Security of Firecracker VMM for Serverless Cloud Platforms | Weissman, Tiemann, Eisenbarth, Sunar |
034 | Insights from Running 24 Static Analysis Tools on Open Source Software Repositories | Hashmat, Alwaleed Aljaali, Shen, Machiry |
035 | Protecting ownership of trained DNN models with Zero-Knowledge Proofs | Sato, Tanaka |
038 | Securing the Web: Analysis of HTTP Security Headers in Popular Global Websites | Kishnani, Das |
041 | Web Privacy Perceptions Amongst Indian Users | Kancherla, Dey, Saxena, Saroj, Bichhawat |
050 | Semantics-Based Static Vulnerability Detection of Solidity Using Abstract Interpretation | Kushwaha, Pandey, Halder, Mukherjee |
051 | Paving the Way: Advancing V2X Safety Through Innovative Attack Generation and Analysis Framework (V2X-SAF) | Tomar, Tripathi, Yadav, Singh |
053 | From Traits to Threats: Learning Risk Indicators of Malicious Insider using Psychometric Data | Nanamou, Neal, Boulahia-Cuppens, Cuppens, Bkakria |
054 | Countering Subscription Concealed Identifier (SUCI)-Catchers in Cellular Communications | Parkin, Tripunitara |
056 | An OS support for Tamper-resistant Software Execution Using Empty Interruptions | Kato, Koyanagi, Ukezono |
060 | BP-MAP: A Secure and Convenient Mutual Authentication Protocol | Narumanchi, Maddali, N |
063 | S-RFUP: Secure Remote Firmware Update Protocol | Podder, Rios, Ray, Raman |
065 | Patch based backdoor attack on Deep Neural Networks | manna, Tripathy |
072 | MALAI: ML-based Attack on Learning With Error problem | Suma Sri, Yadav, Sanyashi, Singh |
076 | Making EULA Great Again: A Novel Nudge Mechanism to Improve Readability, User Attention and Awareness | Bin Zahid , Ghosh Bristy, Hasan Oli, Fahim, Ahmed Rumee, Zaber |
078 | Securing Virtual Reality Apps Inter-Process Communication | Falebita, Ray, Abdelgawad, Anspach |
081 | A Decoupling Mechanism for Transaction Privacy | Patil, Shyamasundar |
SHORT PAPERS | ||
036 | Effects of Soft-Domain Transfer and Named Entity Information on Deception Detection | Triplett, Verma, Minami, Minami |
043 | Zone Recovery Attack on a Secure Privacy-Preserving Ride-Matching Protocol | Murthy, Upadhyaya, Vivek |
055 | QIris: Quantum Implementation of Rainbow Table Attacks | Jun Quan , Jia Ye, GEOK LING, Balachandran |
058 | Enabling Privacy in IT Service Operations | Gupta, Kumar, Mondal, Gharote, Lodha |
059 | Privacy-Preserving Photo Sharing: An SSI Use Case | Shehu, Fraser, Frymann, Haynes, Schneider |
080 | Identifying Insecure Network Configurations through Attack Modeling and Explainable AI | Thomas, M Thampi, Mukherjee |
SHORT PAPERS (INDUSTRY/DEMO PAPERS) | ||
083 | Intelligent Alert Enrichment using Security Orchestration Automation and Response (SOAR) | Dwivedi, Rajendran, Ampatt, Sudarsan, P V, Akshaya |
087 | Integrating Crypto-Based Payment Systems for Data Marketplaces: Enhancing Efficiency, Security, and User Autonomy | Walunj, Dutta, Rajaraman, Sharma |
088 | Ontologies for WAF configurations: when knowledge-graphs help troubleshooting | Wiaux, Bertrand Van Ouytsel, Legay, Stern |
092 | InTrust: An Asset Monitoring, Analysis and Vulnerability Assessment system for Zero Trust Network | muraleedharan, Rajendra Neve, Sarkar, Rajendran |
PhD Forum Papers
95 – Detecting Hate Memes Against Women on Social Media: A Multimodal and Contextual Perspective
96 – Tackling the DDoS using separation and load balancing
110 – Combining Formal Semantics and Deep Learning for Solidity Vulnerability Detection
111 – Cryptanalysis of Secure Protocols and Implementation of a Zero Trust Framework for Securing Container Ecosystems
114 – Triggerless Untargeted Model Poisoning Attack
120 – Incompressible Cryptography: A New Frontier in Secure Data Protection Against Key Exposure
121 – Establishing Comprehensive Security framework for 5G Core Infrastructure