Mobile super apps are revolutionizing mobile computing by offering diverse services through integrated "miniapps", creating comprehensive ecosystems akin to app stores like Google Play and Apple's App St...
详细信息
ISBN:
(纸本)9798400706363
Mobile super apps are revolutionizing mobile computing by offering diverse services through integrated "miniapps", creating comprehensive ecosystems akin to app stores like Google Play and Apple's App Store. While these platforms, such as WeChat, Alipay, and TikTok, enhance user convenience and functionality, they also raise significant security and privacy concerns due to the vast amounts of user data they handle. In response, the Workshop on Secure and Trustworthy Superapps (SaTS 2024) aims to address these critical issues by fostering collaboration among researchers and practitioners to explore solutions that protect users and enhance security within the super app landscape.
Industrial Control System (ICS) and its software touches every aspect of the critical infrastructure used by our industry, academia, and government. Back in the days, these systems and software were not designed with ...
详细信息
ISBN:
(纸本)9798400706363
Industrial Control System (ICS) and its software touches every aspect of the critical infrastructure used by our industry, academia, and government. Back in the days, these systems and software were not designed with security in mind. With the ever expanding inter-connectivity of ICS environments and new threats, practitioners are stuck on a patchwork of security. While certain proprietary ICS software manufacturers have started to provide security solutions, free and open source ICS software is often less known. The goal of the workshop is twofold: we want to collect ideas on redesigning (parts of) the ICS ecosystem so that security is built-in by design;we also invite contributions on designing, incorporating, and maintaining secure open-source ICS software.
Packet analysis is a decisive process in the field of networks and cybersecurity. It is indispensable to maintain the reliability, security and performance of computer networks. Packet sniffers, also known as network ...
详细信息
These proceedings contain the papers selected for inclusion in the technical program for the 22st acm Workshop on Privacy in the Electronic Society (acm WPES 2023), held in conjunction with the 30th acmconference on ...
详细信息
ISBN:
(纸本)9798400700507
These proceedings contain the papers selected for inclusion in the technical program for the 22st acm Workshop on Privacy in the Electronic Society (acm WPES 2023), held in conjunction with the 30th acmconference on computer and Communication security (acm CCS 2023) at the Tivoli Congress Center in Copenhagen, Denmark, on November 26, 2023. In response to the workshop's call for papers, 31 valid submissions were received, including 21 full paper submissions and 10 short paper submissions. They were evaluated by a technical program committee consisting of 54 researchers whose backgrounds include a diverse set of topics related to privacy. Each paper was reviewed by at least 3 members of the program committee. Papers were evaluated based on their importance, novelty, and technical quality. After the rigorous review process, 9 submissions were accepted as full papers (acceptance rate: 29.0%) and an additional 8 submissions were accepted as short papers.
The increasing attack surface of modern cars and the new regulatory requirements for cybersecurity (like UNECE R155) made cybersecurity an important part of car design. The "CSCS'24 Cyber security in Cars Wor...
详细信息
ISBN:
(纸本)9798400706363
The increasing attack surface of modern cars and the new regulatory requirements for cybersecurity (like UNECE R155) made cybersecurity an important part of car design. The "CSCS'24 Cyber security in Cars Workshop" is designed to address current topics in the rapidly evolving automotive cybersecurity domain. The goal is to bring together academia and industry to find novel solutions for cybersecurity problems in the automotive domain. CSCS'24 is the first CSCS workshop co-located with acm CCS. Nonetheless, it is founded on a series of events known as the "acm Cyber security in Cars Symposium (CSCS symposium)" that lasted from 2017 until 2023. CSCS'24 welcomes any theoretical or practical contributions to the rich field of automotive cybersecurity, including secure automotive communication, ECU system security, and aspects of Cyber security Management Systems (CSMS).
The Internet of Vehicles (IoV) has become one challenging communication technology in the current internet world. IoV enables real-time data exchange between vehicles, road infrastructures, and mobile communication de...
详细信息
Quantum computers are set to revolutionize multiple application domains, including financial portfolio optimization, drug discovery, supply chain optimization, and cryptography, by offering algorithmic speed-up over t...
详细信息
ISBN:
(纸本)9798400704826
Quantum computers are set to revolutionize multiple application domains, including financial portfolio optimization, drug discovery, supply chain optimization, and cryptography, by offering algorithmic speed-up over the best-known classical algorithms. This large-scale adoption will also make quantum computers a lucrative target for cyber-criminals. However, to date, there has been minimal experimental study on the possible attack surfaces and the severity of attacks on a real quantum computer. In this work, we introduce MalaQ, a malware specifically developed for quantum computers. MalaQ exploits the classical-computer frontend of a quantum system and causes extensive damages like performance degradation and even complete failure of the quantum circuits. In this paper, we discuss the design, implementation, and experiments using MalaQ in great detail, including drawing parallels with prior works on both classical and quantum cyber-attacks.
Blockchain technology, the backbone of popular cryptocurrencies like Bitcoin, has garnered massive interest in recent years for its capability to revolutionize traditional economic structures. However, Blockchain appl...
详细信息
The rapid advancement of technology has undoubtedly brought comfort to humanity, but it also necessitates robust authentication measures to ensure security in the ever-expanding e-world. This research aims to address ...
详细信息
DNS cache poisoning, also known as DNS spoofing, remains a significant cybersecurity threat, allowing attackers to manipulate DNS caches to redirect users to malicious websites. This paper delves into the mechanisms o...
详细信息
暂无评论