Accepted Papers

ICISS 2024: List of accepted papers.
18 full papers
06 short papers
03 industry papers (short papers)
08 PhD Forum papers

Paper IDPaper TitleAuthors
REGULAR FULL PAPERS
010REMEDII: Robust Malware Detection with Iterative and Intelligent Adversarial Training using GANsGupta, Kumar
027Microarchitectural Security of Firecracker VMM for Serverless Cloud PlatformsWeissman, Tiemann, Eisenbarth, Sunar
034Insights from Running 24 Static Analysis Tools on Open Source Software RepositoriesHashmat, Alwaleed Aljaali, Shen, Machiry
035Protecting ownership of trained DNN models with Zero-Knowledge ProofsSato, Tanaka
038Securing the Web: Analysis of HTTP Security Headers in Popular Global WebsitesKishnani, Das
041Web Privacy Perceptions Amongst Indian UsersKancherla, Dey, Saxena, Saroj, Bichhawat
050Semantics-Based Static Vulnerability Detection of Solidity Using Abstract InterpretationKushwaha, Pandey, Halder, Mukherjee
051Paving the Way: Advancing V2X Safety Through Innovative Attack Generation and Analysis Framework (V2X-SAF)Tomar, Tripathi, Yadav, Singh
053From Traits to Threats: Learning Risk Indicators of Malicious Insider using Psychometric DataNanamou, Neal, Boulahia-Cuppens, Cuppens, Bkakria
054Countering Subscription Concealed Identifier (SUCI)-Catchers in Cellular CommunicationsParkin, Tripunitara
056An OS support for Tamper-resistant Software Execution Using Empty InterruptionsKato, Koyanagi, Ukezono
060BP-MAP: A Secure and Convenient Mutual Authentication ProtocolNarumanchi, Maddali, N
063S-RFUP: Secure Remote Firmware Update ProtocolPodder, Rios, Ray, Raman
065Patch based backdoor attack on Deep Neural Networksmanna, Tripathy
072MALAI: ML-based Attack on Learning With Error problemSuma Sri, Yadav, Sanyashi, Singh
076Making EULA Great Again: A Novel Nudge Mechanism to Improve Readability, User Attention and AwarenessBin Zahid , Ghosh Bristy, Hasan Oli, Fahim, Ahmed Rumee, Zaber
078Securing Virtual Reality Apps Inter-Process CommunicationFalebita, Ray, Abdelgawad, Anspach
081A Decoupling Mechanism for Transaction PrivacyPatil, Shyamasundar
SHORT PAPERS
036Effects of Soft-Domain Transfer and Named Entity Information on Deception DetectionTriplett, Verma, Minami, Minami
043Zone Recovery Attack on a Secure Privacy-Preserving Ride-Matching ProtocolMurthy, Upadhyaya, Vivek
055QIris: Quantum Implementation of Rainbow Table AttacksJun Quan , Jia Ye, GEOK LING, Balachandran
058Enabling Privacy in IT Service OperationsGupta, Kumar, Mondal, Gharote, Lodha
059Privacy-Preserving Photo Sharing: An SSI Use CaseShehu, Fraser, Frymann, Haynes, Schneider
080Identifying Insecure Network Configurations through Attack Modeling and Explainable AIThomas, M Thampi, Mukherjee
SHORT PAPERS (INDUSTRY/DEMO PAPERS)
083Intelligent Alert Enrichment using Security Orchestration Automation and Response (SOAR)Dwivedi, Rajendran, Ampatt, Sudarsan, P V, Akshaya
087Integrating Crypto-Based Payment Systems for Data Marketplaces: Enhancing Efficiency, Security, and User AutonomyWalunj, Dutta, Rajaraman, Sharma
092InTrust: An Asset Monitoring, Analysis and Vulnerability Assessment system for Zero Trust Networkmuraleedharan, Rajendra Neve, Sarkar, Rajendran

PhD Forum Papers

95 – Detecting Hate Memes Against Women on Social Media: A Multimodal and Contextual Perspective
96 – Tackling the DDoS using separation and load balancing
110 – Combining Formal Semantics and Deep Learning for Solidity Vulnerability Detection
111 – Cryptanalysis of Secure Protocols and Implementation of a Zero Trust Framework for Securing Container Ecosystems
114 – Triggerless Untargeted Model Poisoning Attack
120 – Incompressible Cryptography: A New Frontier in Secure Data Protection Against Key Exposure
121 – Establishing Comprehensive Security framework for 5G Core Infrastructure
112 – The Trade-Offs of Selfish Mining Mitigation: Effects on Miners Revenue