-
Zhang, L., Yang, Z., He, Y., Li, M., Yang, S., Yang, M., ... & Qian, Z. (2019). App in the middle: Demystify application virtualization in Android and its security threats. Proceedings of the ACM on Measurement and Analysis of Computing Systems, 3(1), 1-24.
-
Luo, T., Zheng, C., Xu, Z., & Ouyang, X. (2017). Anti-plugin: Don't let your app play as an Android plugin. Proceedings of Blackhat Asia.
-
Dai, D., Li, R., Tang, J., Davanian, A., & Yin, H. (2020, June). Parallel Space Traveling: A Security Analysis of App-Level Virtualization in Android. In Proceedings of the 25th ACM Symposium on Access Control Models and Technologies (pp. 25-32).
Topic 2 (Android):
Security and Privacy Vulnerabilities Detection in Android Apps
|
|
|
Primary: |
-
Nguyen, D. C., Wermke, D., Acar, Y., Backes, M., Weir, C., & Fahl, S. (2017, October). A stitch in time: Supporting android developers in writingsecure code. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security (pp. 1065-1077).
|
|
|
Secondary: |
-
Portokalidis, G., Homburg, P., Anagnostakis, K., & Bos, H. (2010, December). Paranoid android: versatile protection for smartphones. In Proceedings of the 26th annual computer security applications conference (pp. 347-356).
-
Qian, C., Luo, X., Le, Y., & Gu, G. (2015). Vulhunter: toward discovering vulnerabilities in android applications. IEEE Micro, 35(1), 44-53.
-
Ghafari, M., Gadient, P., & Nierstrasz, O. (2017, September). Security smells in android. In 2017 IEEE 17th international working conference on source code analysis and manipulation (SCAM) (pp. 121-130). IEEE.
Topic 3 (Android):
Taint Analysis
|
|
|
Primary: |
-
Enck, W., Gilbert, P., Han, S., Tendulkar, V., Chun, B. G., Cox, L. P., ... & Sheth, A. N. (2014). Taintdroid: an information-flow tracking system for realtime privacy monitoring on smartphones. ACM Transactions on Computer Systems (TOCS), 32(2), 1-29.
|
|
|
Secondary: |
-
Wei, F., Roy, S., & Ou, X. (2014, November). Amandroid: A precise and general inter-component data flow analysis framework for security vetting of android apps. In Proceedings of the 2014 ACM SIGSAC conference on computer and communications security (pp. 1329-1341).
-
Arzt, S., Rasthofer, S., Fritz, C., Bodden, E., Bartel, A., Klein, J., ... & McDaniel, P. (2014). Flowdroid: Precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for android apps. Acm Sigplan Notices, 49(6), 259-269.
-
Sun, M., Wei, T., & Lui, J. C. (2016, October). Taintart: A practical multi-level information-flow tracking system for android runtime. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (pp. 331-342).
Topic 4 (Blockchain):
Distributed key management systems in blockchains
|
|
|
Primary: |
|
|
|
Secondary: |
-
Pal, O., Alam, B., Thakur, V., & Singh, S. (2019). Key management for blockchain technology. ICT Express.
-
Matsumoto, S., & Reischuk, R. M. (2017, May). IKP: Turning a PKI around with decentralized automated incentives. In 2017 IEEE Symposium on Security and Privacy (SP) (pp. 410-426). IEEE.
Topic 5 (Blockchain):
Isogeny-based crytography for PKI in blockchains
|
|
|
Primary: |
|
|
|
Secondary: |
-
de Kock, B., Gjøsteen, K., & Veroni, M. (2020). Practical Isogeny-Based Key-exchange with Optimal Tightness. IACR Cryptol. ePrint Arch., 2020, 1165.
Topic 6 (Blockchain):
Task offloading in mobile blockchains
|
|
|
Primary: |
-
Xiao, K., Gao, Z., Shi, W., Qiu, X., Yang, Y., & Rui, L. (2020). EdgeABC: An architecture for task offloading and resource allocation in the Internet of Things. Future Generation Computer Systems, 107, 498-508.
|
|
|
Secondary: |
-
Dou, W., Tang, W., Liu, B., Xu, X., & Ni, Q. (2020). Blockchain-based Mobility-aware Offloading mechanism for Fog computing services. Computer Communications, 164, 261-273.
Topic 7 (Blockchain):
Distributed oralce networks truth discovery
|
|
|
Primary: |
-
Adler, J., Berryhill, R., Veneris, A., Poulos, Z., Veira, N., & Kastania, A. (2018, July). Astraea: A decentralized blockchain oracle. In 2018 IEEE international conference on internet of things (IThings) and IEEE green computing and communications (GreenCom) and IEEE cyber, physical and social computing (CPSCom) and IEEE smart data (SmartData) (pp. 1145-1152). IEEE.
|
|
|
Secondary: |
-
Peterson, J., & Krug, J. (2015). Augur: a decentralized, open-source platform for prediction markets. arXiv preprint arXiv:1501.01042.
-
Nelaturu, K., Adler, J., Merlini, M., Berryhill, R., Veira, N., Poulos, Z., & Veneris, A. (2020). On public crowdsource-based mechanisms for a decentralized blockchain oracle. IEEE Transactions on Engineering Management, 67(4), 1444-1458.
Topic 8 (Blockchain):
Intergration of Federated learning and Blockchain for data sharing
|
|
|
Primary: |
-
Mothukuri, V., Khare, P., Parizi, R. M., Pouriyeh, S., Dehghantanha, A., & Srivastava, G. (2021). Federated Learning-based Anomaly Detection for IoT Security Attacks. IEEE Internet of Things Journal.
|
|
|
Secondary: |
-
Briggs, C., Fan, Z., & Andras, P. (2021). A review of privacy-preserving federated learning for the Internet-of-Things. Federated Learning Systems, 21-50.
-
Popoola, S. I., Ande, R., Adebisi, B., Gui, G., Hammoudeh, M., & Jogunola, O. (2021). Federated Deep Learning for Zero-Day Botnet Attack Detection in IoT Edge Devices. IEEE Internet of Things Journal.
Topic 9 (CPS):
Anomaly Detection in Industrial Systems
|
|
|
Primary: |
|
|
|
Secondary: |
-
Bernieri, G., Conti, M., & Turrin, F. (2019, July). Evaluation of machine learning algorithms for anomaly detection in industrial networks. In 2019 IEEE International Symposium on Measurements & Networking (M&N) (pp. 1-6). IEEE.
-
Ditzler, G., Roveri, M., Alippi, C., & Polikar, R. (2015). Learning in nonstationary environments: A survey. IEEE Computational Intelligence Magazine, 10(4), 12-25.
Topic 10 (CPS):
Security challenges in Industrial Control Systems
|
|
|
Primary: |
|
|
|
Secondary: |
-
Hemsley, K., & Fisher, R. (2018, March). A history of cyber incidents and threats involving industrial control systems. In International Conference on Critical Infrastructure Protection (pp. 215-242). Springer, Cham.
-
Adepu, S., Kang, E., & Mathur, A. P. (2019, November). Challenges in Secure Engineering of Critical Infrastructure Systems. In 2019 34th IEEE/ACM International Conference on Automated Software Engineering Workshop (ASEW) (pp. 61-64). IEEE.
Topic 11 (CPS):
Industrial Honeypot
|
|
|
Primary: |
-
López-Morales, E., Rubio-Medrano, C., Doupé, A., Shoshitaishvili, Y., Wang, R., Bao, T., & Ahn, G. J. (2020, October). HoneyPLC: A next-generation honeypot for industrial control systems. In Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security (pp. 279-291).
|
|
|
Secondary: |
-
Wilhoit, K., & Hilt, S. The GasPot Experiment: Unexamined Perils in Using.
-
You, J., Lv, S., Sun, Y., Wen, H., & Sun, L. (2021, June). HoneyVP: A Cost-Effective Hybrid Honeypot Architecture for Industrial Control Systems. In ICC 2021-IEEE International Conference on Communications (pp. 1-6). IEEE.
Topic 12 (CPS):
Air - Ground communication
|
|
|
Primary: |
|
|
|
Secondary: |
-
Olive, X., Tanner, A., Strohmeier, M., Schäfer, M., Feridun, M., Tart, A., ... & Lenders, V. (2020, October). OpenSky Report 2020: Analysing in-flight emergencies using big data. In 2020 AIAA/IEEE 39th Digital Avionics Systems Conference (DASC) (pp. 1-10). IEEE.
-
Darabseh, A., AlKhzaimi, H., & Pöpper, C. (2020, July). MAVPro: ADS-B message verification for aviation security with minimal numbers of on-ground sensors. In Proceedings of the 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks (pp. 53-64).
-
Ying, X., Mazer, J., Bernieri, G., Conti, M., Bushnell, L., & Poovendran, R. (2019, June). Detecting ADS-B spoofing attacks using deep neural networks. In 2019 IEEE conference on communications and network security (CNS) (pp. 187-195). IEEE.
Topic 13 (CPS):
NFC Security - SDR receiver-transmitter
|
|
|
Primary: |
-
Gummeson, J. J., Priyantha, B., Ganesan, D., Thrasher, D., & Zhang, P. (2013, June). EnGarde: Protecting the mobile phone from malicious NFC interactions. In Proceeding of the 11th annual international conference on Mobile systems, applications, and services (pp. 445-458).
|
|
|
Secondary: |
-
Le Roy, F., Quiniou, T., Mansour, A., Lababidi, R., & Le Jeune, D. (2016, September). RFID Eavesdropping Using SDR Platforms. In International Conference on Applications in Electronics Pervading Industry, Environment and Society (pp. 208-214). Springer, Cham.
-
Erb, M., Steger, C., Troyer, M., & Preishuber-Pfluegl, J. (2020, November). Towards Fully Interoperable NFC Devices. In 2020 IEEE International Conference on RFID (RFID) (pp. 1-8). IEEE.
-
Zhang, L., Xu, H., Dai, Y., & Min, H. (2013, October). An NFC system with high sensitivity based on SDR. In 2013 IEEE 10th International Conference on ASIC (pp. 1-4). IEEE.
Topic 14 (CPS):
IoT security
|
|
|
Primary: |
-
Ambrosin, M., Conti, M., Ibrahim, A., Neven, G., Sadeghi, A. R., & Schunter, M. (2016, October). SANA: Secure and scalable aggregate network attestation. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (pp. 731-742).
|
|
|
Secondary: |
-
Dorri, A., Kanhere, S. S., Jurdak, R., & Gauravaram, P. (2017, March). Blockchain for IoT security and privacy: The case study of a smart home. In 2017 IEEE international conference on pervasive computing and communications workshops (PerCom workshops) (pp. 618-623). IEEE.
-
Mahmoud, R., Yousuf, T., Aloul, F., & Zualkernan, I. (2015, December). Internet of things (IoT) security: Current status, challenges and prospective measures. In 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST) (pp. 336-341). IEEE.
-
Xiao, L., Wan, X., Lu, X., Zhang, Y., & Wu, D. (2018). IoT security techniques based on machine learning: How do IoT devices use AI to enhance security?. IEEE Signal Processing Magazine, 35(5), 41-49.
Topic 15 (CPS):
Identity of Things
|
|
|
Primary: |
-
Mahalle, P., Babar, S., Prasad, N. R., & Prasad, R. (2010, July). Identity management framework towards internet of things (IoT): Roadmap and key challenges. In International Conference on Network Security and Applications (pp. 430-439). Springer, Berlin, Heidelberg.
|
|
|
Secondary: |
-
Salman, O., Abdallah, S., Elhajj, I. H., Chehab, A., & Kayssi, A. (2016, June). Identity-based authentication scheme for the Internet of Things. In 2016 IEEE Symposium on Computers and Communication (ISCC) (pp. 1109-1111). IEEE.
-
Lam, K. Y., & Chi, C. H. (2016, November). Identity in the Internet-of-Things (IoT): New challenges and opportunities. In International Conference on Information and Communications Security (pp. 18-26). Springer, Cham.
-
Zhu, X., & Badr, Y. (2018). Identity management systems for the internet of things: a survey towards blockchain solutions. Sensors, 18(12), 4215.
Topic 16 (CPS):
Cyber-Physical Anomaly Detection
|
|
|
Primary: |
|
|
|
Secondary: |
-
Luo, Y., Xiao, Y., Cheng, L., Peng, G., & Yao, D. (2021). Deep learning-based anomaly detection in cyber-physical systems: Progress and opportunities. ACM Computing Surveys (CSUR), 54(5), 1-36.
-
Xu, Q., Ali, S., & Yue, T. (2021, April). Digital Twin-based Anomaly Detection in Cyber-physical Systems. In 2021 14th IEEE Conference on Software Testing, Verification and Validation (ICST) (pp. 205-216). IEEE.
Topic 17 (CPS):
Advanced security on Industrial Control System
|
|
|
Primary: |
|
|
|
Secondary: |
-
Sarkar, E., Benkraouda, H., & Maniatakos, M. (2020, October). I came, I saw, I hacked: Automated Generation of Process-independent Attacks for Industrial Control Systems. In Proceedings of the 15th ACM Asia Conference on Computer and Communications Security (pp. 744-758).
-
Wang, X., Konstantinou, C., Maniatakos, M., Karri, R., Lee, S., Robison, P., ... & Kim, S. (2016). Malicious firmware detection with hardware performance counters. IEEE Transactions on Multi-Scale Computing Systems, 2(3), 160-173.
Topic 18 (CPS):
Private Information Retrieval (PIR) for healthcare
|
|
|
Primary: |
-
Lai, J., Mu, Y., Guo, F., Jiang, P., & Susilo, W. (2018). Privacy-enhanced attribute-based private information retrieval. Information sciences, 454, 275-291.
|
|
|
Secondary: |
-
Domingo-Ferrer, J., Bras-Amorós, M., Wu, Q., & Manjón, J. (2009). User-private information retrieval based on a peer-to-peer community. Data & Knowledge Engineering, 68(11), 1237-1252.
Topic 19 (CPS):
Privacy for Vehicular Networks - Ride-Hailing Service
|
|
|
Primary: |
-
Pham, A., Dacosta, I., Endignoux, G., Pastoriza, J. R. T., Huguenin, K., & Hubaux, J. P. (2017). ORide: A privacy-preserving yet accountable ride-hailing service. In 26th {USENIX} Security Symposium ({USENIX} Security 17) (pp. 1235-1252).
|
|
|
Secondary: |
-
Luo, Y., Jia, X., Fu, S., & Xu, M. (2018). pRide: Privacy-preserving ride matching over road networks for online ride-hailing service. IEEE Transactions on Information Forensics and Security, 14(7), 1791-1802.
-
Xie, H., Guo, Y., & Jia, X. (2021). A Privacy-Preserving Online Ride-Hailing System Without Involving a Third Trusted Server. IEEE Transactions on Information Forensics and Security, 16, 3068-3081.
Topic 20 (CPS):
Privacy for Vehicular Networks - Traffic Monitoring
|
|
|
Primary: |
-
Hoh, B., Gruteser, M., Herring, R., Ban, J., Work, D., Herrera, J. C., ... & Jacobson, Q. (2008, June). Virtual trip lines for distributed privacy-preserving traffic monitoring. In Proceedings of the 6th international conference on Mobile systems, applications, and services (pp. 15-28).
|
|
|
Secondary: |
-
Li, M., Zhu, L., & Lin, X. (2019). Privacy-preserving traffic monitoring with false report filtering via fog-assisted vehicular crowdsensing. IEEE Transactions on Services Computing.
-
Li, M., Zhu, L., & Lin, X. (2019). Privacy-preserving traffic monitoring with false report filtering via fog-assisted vehicular crowdsensing. IEEE Transactions on Services Computing.
Topic 21 (CPS):
Privacy for Vehicular Networks - Smart Parking
|
|
|
Primary: |
|
|
|
Secondary: |
-
Zhu, L., Li, M., Zhang, Z., & Qin, Z. (2018). ASAP: An anonymous smart-parking and payment scheme in vehicular networks. IEEE Transactions on Dependable and Secure Computing, 17(4), 703-715.
-
Ni, J., Lin, X., & Shen, X. (2019). Toward privacy-preserving valet parking in autonomous driving era. IEEE Transactions on Vehicular Technology, 68(3), 2893-2905.
Topic 22 (CPS):
Vehicular Security - Automotive Keyless Entry
|
|
|
Primary: |
|
|
|
Secondary: |
-
Benadjila, R., Renard, M., Lopes-Esteves, J., & Kasmi, C. (2017). One car, two frames: attacks on hitag-2 remote keyless entry systems revisited. In 11th {USENIX} Workshop on Offensive Technologies ({WOOT} 17).
-
Glocker, T., Mantere, T., & Elmusrati, M. (2017, April). A protocol for a secure remote keyless entry system applicable in vehicles using symmetric-key cryptography. In 2017 8th International Conference on Information and Communication Systems (ICICS) (pp. 310-315). IEEE.
-
Wouters, L., Gierlichs, B., & Preneel, B. (2021). My other car is your car: compromising the Tesla Model X keyless entry system. IACR Transactions on Cryptographic Hardware and Embedded Systems, 149-172.
Topic 23 (CPS):
Vehicular Security - Charging-While-Driving
|
|
|
Primary: |
|
|
|
Secondary: |
-
Li, H., Dán, G., & Nahrstedt, K. (2013, October). FADEC: Fast authentication for dynamic electric vehicle charging. In 2013 IEEE Conference on Communications and Network Security (CNS) (pp. 369-370). IEEE.
-
Li, H., Dán, G., & Nahrstedt, K. (2016). Portunes+: Privacy-preserving fast authentication for dynamic electric vehicle charging. IEEE Transactions on Smart Grid, 8(5), 2305-2313.
Topic 24 (CPS):
Vehicular Security - CAN Security
|
|
|
Primary: |
|
|
|
Secondary: |
-
Humayed, A., & Luo, B. (2017, April). Using ID-hopping to defend against targeted DoS on CAN. In Proceedings of the 1st International Workshop on Safe Control of Connected and Autonomous Vehicles (pp. 19-26).
-
Checkoway, S., McCoy, D., Kantor, B., Anderson, D., Shacham, H., Savage, S., ... & Kohno, T. (2011, August). Comprehensive experimental analyses of automotive attack surfaces. In USENIX Security Symposium (Vol. 4, No. 447-462, p. 2021).
-
Islam, R., & Refat, R. U. D. (2020). Improving CAN bus security by assigning dynamic arbitration IDs. Journal of Transportation Security, 13(1), 19-31.
Topic 25 (CPS):
Privacy protection of Electric Vehicles Owners
|
|
|
Primary: |
|
|
|
Secondary: |
-
Leukam Lako, F., Lajoie-Mazenc, P., & Laurent, M. (2021). Privacy-Preserving Publication of Time-Series Data in Smart Grid. Security and Communication Networks, 2021.
-
Saxena, N., Grijalva, S., Chukwuka, V., & Vasilakos, A. V. (2017). Network security and privacy challenges in smart vehicle-to-grid. IEEE Wireless Communications, 24(4), 88-98.
Topic 26 (CPS):
Machine learning techniques for lightweight continuous authentication
|
|
|
Primary: |
|
|
|
Secondary: |
-
Brighente, A., Formaggio, F., Di Nunzio, G. M., & Tomasin, S. (2019). Machine learning for in-region location verification in wireless networks. IEEE Journal on Selected Areas in Communications, 37(11), 2490-2502.
-
Ihsan, U., Malaney, R., & Yan, S. (2019, August). Machine learning and location verification in vehicular networks. In 2019 IEEE/CIC International Conference on Communications in China (ICCC) (pp. 91-95). IEEE.
Topic 27 (CPS):
Vehicular Security - CAN Attacks to error handling
|
|
|
Primary: |
|
|
|
Secondary: |
-
Cho, K. T., & Shin, K. G. (2016, October). Error handling of in-vehicle networks makes them vulnerable. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (pp. 1044-1055).
-
Kulandaivel, S., Jain, S., Guajardo, J., & Sekar, V. (2021, May). CANNON: Reliable and Stealthy Remote Shutdown Attacks via Unaltered Automotive Microcontrollers. In 2021 IEEE Symposium on Security and Privacy (SP) (pp. 195-210). IEEE.
Topic 28 (ICN):
Cache Privacy Attacks
|
|
|
Primary: |
-
Acs, G., Conti, M., Gasti, P., Ghali, C., Tsudik, G., & Wood, C. A. (2017). Privacy-aware caching in information-centric networking. IEEE Transactions on Dependable and Secure Computing, 16(2), 313-328.
|
|
|
Secondary: |
-
Mohaisen, A., Mekky, H., Zhang, X., Xie, H., & Kim, Y. (2014). Timing attacks on access privacy in information centric networks and countermeasures. IEEE Transactions on Dependable and Secure Computing, 12(6), 675-687.
-
Acs, G., Conti, M., Gasti, P., Ghali, C., & Tsudik, G. (2013, July). Cache privacy in named-data networking. In 2013 IEEE 33rd International Conference on Distributed Computing Systems (pp. 41-51). IEEE.
-
Compagno, A., Conti, M., Losiouk, E., Tsudik, G., & Valle, S. (2020, April). A proactive cache privacy attack on ndn. In NOMS 2020-2020 IEEE/IFIP Network Operations and Management Symposium (pp. 1-7). IEEE.
Topic 29 (ICN):
Content Popularity Prediction
|
|
|
Primary: |
|
|
|
Secondary: |
-
Li, J., Wu, H., Liu, B., Lu, J., Wang, Y., Wang, X., ... & Dong, L. (2012, October). Popularity-driven coordinated caching in named data networking. In 2012 ACM/IEEE Symposium on Architectures for Networking and Communications Systems (ANCS) (pp. 15-26). IEEE.
-
Cho, K., Lee, M., Park, K., Kwon, T. T., Choi, Y., & Pack, S. (2012, March). WAVE: Popularity-based and collaborative in-network caching for content-oriented networks. In 2012 Proceedings IEEE INFOCOM Workshops (pp. 316-321). IEEE.
-
Zhang, R., Liu, J., Huang, T., & Xie, R. (2017, May). Popularity based probabilistic caching strategy design for named data networking. In 2017 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) (pp. 476-481). IEEE.
Topic 30 (ICN):
Interest Flooding Attacks
|
|
|
Primary: |
|
|
|
Secondary: |
-
Afanasyev, A., Mahadevan, P., Moiseenko, I., Uzun, E., & Zhang, L. (2013, May). Interest flooding attack and countermeasures in named data networking. In 2013 IFIP Networking Conference (pp. 1-9). IEEE.
-
Salah, H., Wulfheide, J., & Strufe, T. (2015, October). Coordination supports security: A new defence mechanism against interest flooding in NDN. In 2015 IEEE 40th Conference on Local Computer Networks (LCN) (pp. 73-81). IEEE.
-
Benarfa, A., Hassan, M., Compagno, A., Losiouk, E., Yagoubi, M. B., & Conti, M. (2019, June). Chokifa: A new detection and mitigation approach against interest flooding attacks in ndn. In International Conference on Wired/Wireless Internet Communication (pp. 53-65). Springer, Cham.
Topic 31 (ICN):
Coexistence of TCP/IP and ICN/NDN
|
|
|
Primary: |
-
Conti, M., Gangwal, A., Hassan, M., Lal, C., & Losiouk, E. (2020). The road ahead for networking: A survey on icn-ip coexistence solutions. IEEE Communications Surveys & Tutorials, 22(3), 2104-2129.
|
|
|
Secondary: |
-
Rahman, A., Trossen, D., Kutscher, D., & Ravindran, R. (2018). Deployment considerations for information-centric networking (ICN). Internet Engineering Task Force, Internet-Draft draft-irtf-icnrg-deployment-guidelines-03.
Topic 32 (Malware Detection):
Malware Analysis and Detection Methods
|
|
|
Primary: |
-
Alazab, M., Alazab, M., Shalaginov, A., Mesleh, A., & Awajan, A. (2020). Intelligent mobile malware detection using permission requests and API calls. Future Generation Computer Systems, 107, 509-521.
|
|
|
Secondary: |
-
Zhao, Y., Li, L., Wang, H., Cai, H., Bissyandé, T. F., Klein, J., & Grundy, J. (2021). On the Impact of Sample Duplication in Machine-Learning-Based Android Malware Detection. ACM Transactions on Software Engineering and Methodology (TOSEM), 30(3), 1-38.
-
Surendran, R., Thomas, T., & Emmanuel, S. (2020). A TAN based hybrid model for android malware detection. Journal of Information Security and Applications, 54, 102483.
Topic 33 (Malware Detection):
Ransomware Detection using Deception Models
|
|
|
Primary: |
|
|
|
Secondary: |
-
Moussaileb, R., Cuppens, N., Lanet, J. L., & Bouder, H. L. (2021). A Survey on Windows-based Ransomware Taxonomy and Detection Mechanisms. ACM Computing Surveys (CSUR), 54(6), 1-36.
-
Min, D., Ko, Y., Walker, R., Lee, J., & Kim, Y. (2021). A Content-based Ransomware Detection and Backup Solid-State Drive for Ransomware Defense. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.
-
Faghihi, F., & Zulkernine, M. (2021). RansomCare: Data-centric detection and mitigation against smartphone crypto-ransomware. Computer Networks, 191, 108011.
Topic 34 (Malware Detection):
Adversarial Machine Learning on Malaware
|
|
|
Primary: |
-
Maiorca, D., Demontis, A., Biggio, B., Roli, F., & Giacinto, G. (2020). Adversarial detection of flash malware: Limitations and open issues. Computers & Security, 96, 101901.
|
|
|
Secondary: |
-
Demetrio, L., Coull, S. E., Biggio, B., Lagorio, G., Armando, A., & Roli, F. (2020). Adversarial EXEmples: A survey and experimental evaluation of practical attacks on machine learning for windows malware detection. arXiv preprint arXiv:2008.07125.
-
Demetrio, L., & Biggio, B. (2021). Secml-malware: A Python library for adversarial robustness evaluation of windows malware classifiers. arXiv preprint arXiv:2104.12848.
Topic 35 (MLS):
Behavioural Biometrics
|
|
|
Primary: |
|
|
|
Secondary: |
-
Bhatt, S., & Santhanam, T. (2013, February). Keystroke dynamics for biometric authentication—A survey. In 2013 international conference on pattern recognition, informatics and mobile engineering (pp. 17-23). IEEE.
-
Alzubaidi, A., & Kalita, J. (2016). Authentication of smartphone users using behavioral biometrics. IEEE Communications Surveys & Tutorials, 18(3), 1998-2026.
Topic 36 (MLS):
Deauthentication
|
|
|
Primary: |
|
|
|
Secondary: |
-
Conti, M., Lovisotto, G., Martinovic, I., & Tsudik, G. (2017, June). Fadewich: fast deauthentication over the wireless channel. In 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS) (pp. 2294-2301). IEEE.
-
Mare, S., Markham, A. M., Cornelius, C., Peterson, R., & Kotz, D. (2014, May). Zebra: Zero-effort bilateral recurring authentication. In 2014 IEEE Symposium on Security and Privacy (pp. 705-720). IEEE.
Topic 37 (MLS):
Security of Machine Learning Implementations
|
|
|
Primary: |
|
|
|
Secondary: |
-
Xiao, Q., Chen, Y., Shen, C., Chen, Y., & Li, K. (2019). Seeing is not believing: Camouflage attacks on image scaling algorithms. In 28th {USENIX} Security Symposium ({USENIX} Security 19) (pp. 443-460).
-
Pajola, L., & Conti, M. (2021). Fall of Giants: How popular text-based MLaaS fall against a simple evasion attack. arXiv preprint arXiv:2104.05996.
Topic 38 (MLS):
Hate Speech Detection on Online Platforms
|
|
|
Primary: |
-
Gröndahl, T., Pajola, L., Juuti, M., Conti, M., & Asokan, N. (2018, January). All you need is" love" evading hate speech detection. In Proceedings of the 11th ACM workshop on artificial intelligence and security (pp. 2-12).
|
|
|
Secondary: |
-
Kiela, D., Firooz, H., Mohan, A., Goswami, V., Singh, A., Ringshia, P., & Testuggine, D. (2020). The hateful memes challenge: Detecting hate speech in multimodal memes. arXiv preprint arXiv:2005.04790.
-
Schmidt, A., & Wiegand, M. (2017, April). A survey on hate speech detection using natural language processing. In Proceedings of the fifth international workshop on natural language processing for social media (pp. 1-10).
Topic 39 (MLS):
The role of generative models in Cybersecurity
|
|
|
Primary: |
|
|
|
Secondary: |
-
Zhang, X., Karaman, S., & Chang, S. F. (2019, December). Detecting and simulating artifacts in gan fake images. In 2019 IEEE International Workshop on Information Forensics and Security (WIFS) (pp. 1-6). IEEE.
-
Ye, G., Tang, Z., Fang, D., Zhu, Z., Feng, Y., Xu, P., ... & Wang, Z. (2018, October). Yet another text captcha solver: A generative adversarial network based approach. In Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security (pp. 332-348).
Topic 40 (MLS):
Continuous Authentication
|
|
|
Primary: |
|
|
|
Secondary: |
-
Camara, C., Peris-Lopez, P., Gonzalez-Manzano, L., & Tapiador, J. (2018). Real-time electrocardiogram streams for continuous authentication. Applied Soft Computing, 68, 784-794.
-
Liang, Y., Samtani, S., Guo, B., & Yu, Z. (2020). Behavioral biometrics for continuous authentication in the internet-of-things era: An artificial intelligence perspective. IEEE Internet of Things Journal, 7(9), 9128-9143.
Topic 41 (MLS):
Evaluation of Adversarial Attacks on Privacy Preserving Machine Learning Models
|
|
|
Primary: |
-
Zhao, C., Wen, Y., Li, S., Liu, F., & Meng, D. (2021, June). FederatedReverse: A Detection and Defense Method Against Backdoor Attacks in Federated Learning. In Proceedings of the 2021 ACM Workshop on Information Hiding and Multimedia Security (pp. 51-62).
|
|
|
Secondary: |
-
Liu, X., Li, H., Xu, G., Chen, Z., Huang, X., & Lu, R. (2021). Privacy-Enhanced Federated Learning against Poisoning Adversaries. IEEE Transactions on Information Forensics and Security.
-
Costa, G., Pinelli, F., Soderi, S., & Tolomei, G. (2021). Covert Channel Attack to Federated Learning Systems. arXiv preprint arXiv:2104.10561.
Topic 42 (MLS):
Adversarial Machine Learning: Evasion Attacks
|
|
|
Primary: |
-
Biggio, B., Corona, I., Maiorca, D., Nelson, B., Šrndić, N., Laskov, P., ... & Roli, F. (2013, September). Evasion attacks against machine learning at test time. In Joint European conference on machine learning and knowledge discovery in databases (pp. 387-402). Springer, Berlin, Heidelberg.
|
|
|
Secondary: |
-
Su, J., Vargas, D. V., & Sakurai, K. (2019). One pixel attack for fooling deep neural networks. IEEE Transactions on Evolutionary Computation, 23(5), 828-841.
-
Gao, J., Lanchantin, J., Soffa, M. L., & Qi, Y. (2018, May). Black-box generation of adversarial text sequences to evade deep learning classifiers. In 2018 IEEE Security and Privacy Workshops (SPW) (pp. 50-56). IEEE.
-
Demontis, A., Melis, M., Pintor, M., Jagielski, M., Biggio, B., Oprea, A., ... & Roli, F. (2019). Why do adversarial attacks transfer? explaining transferability of evasion and poisoning attacks. In 28th {USENIX} Security Symposium ({USENIX} Security 19) (pp. 321-338).
Topic 43 (Multimedia Forensics):
Adversarial Multimedia Forensics
|
|
|
Primary: |
|
|
|
Secondary: |
-
Nowroozi, E., Dehghantanha, A., Parizi, R. M., & Choo, K. K. R. (2020). A survey of machine learning techniques in adversarial image forensics. Computers & Security, 102092.
-
Nowroozi, E., & Zakerolhosseini, A. (2015). Double JPEG compression detection using statistical analysis. Adv. Comput. Sci.: Int. J, 4(3), 70-76.
Topic 44 (Multimedia Forensics):
Adversarial Multimedia Forensics - Security
|
|
|
Primary: |
|
|
|
Secondary: |
-
Barni, M., Nowroozi, E., Tondi, B., & Zhang, B. (2020, May). Effectiveness of random deep feature selection for securing image manipulation detectors against adversarial examples. In ICASSP 2020-2020 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) (pp. 2977-2981). IEEE.
-
Barni, M., Nowroozi, E., & Tondi, B. (2020). Improving the security of image manipulation detection through one-and-a-half-class multiple classification. Multimedia Tools and Applications, 79(3), 2383-2408.
Topic 45 (Multimedia Forensics):
Video forensics
|
|
|
Primary: |
|
|
|
Secondary: |
-
Chen, M., Fridrich, J., Goljan, M., & Lukás, J. (2008). Determining image origin and integrity using sensor noise. IEEE Transactions on information forensics and security, 3(1), 74-90.
-
Milani, S., Fontani, M., Bestagini, P., Barni, M., Piva, A., Tagliasacchi, M., & Tubaro, S. (2012). An overview on video forensics. APSIPA Transactions on Signal and Information Processing, 1.
-
Ling, C., Balcı, U., Blackburn, J., & Stringhini, G. (2021, May). A first look at zoombombing. In 2021 IEEE Symposium on Security and Privacy (SP) (pp. 1452-1467). IEEE.
Topic 46 (Multimedia Forensics):
DeepFake Detection
|
|
|
Primary: |
|
|
|
Secondary: |
-
Barni, M., Kallas, K., Nowroozi, E., & Tondi, B. (2020, December). CNN detection of GAN-generated face images based on cross-band co-occurrences analysis. In 2020 IEEE International Workshop on Information Forensics and Security (WIFS) (pp. 1-6). IEEE.
-
Ferreira, A., Nowroozi, E., & Barni, M. (2021). VIPPrint: Validating Synthetic Image Detection and Source Linking Methods on a Large Scale Dataset of Printed Documents. Journal of Imaging, 7(3), 50.
Topic 47 (Social Networks):
Fake Account Detection on Instagram
|
|
|
Primary: |
|
|
|
Secondary: |
-
Akyon, F. C., & Kalfaoglu, M. E. (2019). Instagram fake and automated account detection. In 2019 Innovations in Intelligent Systems and Applications Conference (ASYU) (pp. 1-7). IEEE.
-
Purba, K. R., Asirvatham, D., & Murugesan, R. K. (2020). Classification of instagram fake users using supervised machine learning algorithms. International Journal of Electrical and Computer Engineering, 10(3), 2763.
Topic 48 (Social Networks):
Social Network Analysis
|
|
|
Primary: |
|
|
|
Secondary: |
-
Can, U., & Alatas, B. (2019). A new direction in social network analysis: Online social network analysis problems and applications. Physica A: Statistical Mechanics and its Applications, 535, 122372.
-
Colladon, A. F., & Remondi, E. (2017). Using social network analysis to prevent money laundering. Expert Systems with Applications, 67, 49-58.
-
Vosecky, J., Hong, D., & Shen, V. Y. (2009, July). User identification across multiple social networks. In 2009 first international conference on networked digital technologies (pp. 360-365). IEEE.
Topic 49 (Social Networks):
Fake Engagement on Instagram
|
|
|
Primary: |
-
Thejas, G. S., Soni, J., Chandna, K., Iyengar, S. S., Sunitha, N. R., & Prabakar, N. (2019, April). Learning-based model to fight against fake like clicks on instagram posts. In 2019 SoutheastCon (pp. 1-8). IEEE.
|
|
|
Secondary: |
-
Zarei, K., Farahbakhsh, R., & Crespi, N. (2020, June). How impersonators exploit Instagram to generate fake engagement?. In ICC 2020-2020 IEEE International Conference on Communications (ICC) (pp. 1-6). IEEE.
Topic 50 (Social Networks):
Private data inference from Social Networks
|
|
|
Primary: |
|
|
|
Secondary: |
-
Han, X., Huang, H., & Wang, L. (2019). F-PAD: Private attribute disclosure risk estimation in online social networks. IEEE Transactions on Dependable and Secure Computing, 16(6), 1054-1069.
-
Mao, J., Tian, W., Yang, Y., & Liu, J. (2019). An efficient social attribute inference scheme based on social links and attribute relevance. IEEE Access, 7, 153074-153085.
Topic 51 (MISC):
Security in Logic-Locking (Logic-Obfuscation)
|
|
|
Primary: |
|
|
|
Secondary: |
-
Yasin, M., Sengupta, A., Nabeel, M. T., Ashraf, M., Rajendran, J., & Sinanoglu, O. (2017, October). Provably-secure logic locking: From theory to practice. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security (pp. 1601-1618).
-
Xie, Y., & Srivastava, A. (2018). Anti-sat: Mitigating sat attack on logic locking. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 38(2), 199-207.
Topic 52 (MISC):
Secure key generation in PUF-based Logic-Locking
|
|
|
Primary: |
|
|
|
Secondary: |
-
Suh, G. E., & Devadas, S. (2007, June). Physical unclonable functions for device authentication and secret key generation. In 2007 44th ACM/IEEE Design Automation Conference (pp. 9-14). IEEE.
-
Kareem, H., & Dunaev, D. (2021, June). Physical Unclonable Functions based Hardware Obfuscation Techniques: A State of the Art. In 2021 16th Iberian Conference on Information Systems and Technologies (CISTI) (pp. 1-6). IEEE.
Topic 53 (MISC):
Misuses in Wearable Devices
|
|
|
Primary: |
-
Naveed, M., Zhou, X. Y., Demetriou, S., Wang, X., & Gunter, C. A. (2014, February). Inside Job: Understanding and Mitigating the Threat of External Device Mis-Binding on Android. In NDSS.
|
|
|
Secondary: |
-
Fereidooni, H., Frassetto, T., Miettinen, M., Sadeghi, A. R., & Conti, M. (2017, July). Fitness trackers: fit for health but unfit for security and privacy. In 2017 IEEE/ACM International Conference on Connected Health: Applications, Systems and Engineering Technologies (CHASE) (pp. 19-24). IEEE.
-
Rahman, M., Carbunar, B., & Topkara, U. (2015). Secure management of low power fitness trackers. IEEE Transactions on Mobile Computing, 15(2), 447-459.
-
Classen, J., Wegemer, D., Patras, P., Spink, T., & Hollick, M. (2018). Anatomy of a vulnerable fitness tracking system: Dissecting the fitbit cloud, app, and firmware. Proceedings of the ACM on interactive, mobile, wearable and ubiquitous technologies, 2(1), 1-24.
Topic 54 (MISC):
Cyber-Threat Intelligence
|
|
|
Primary: |
|
|
|
Secondary: |
-
Cabana, O., Youssef, A. M., Debbabi, M., Lebel, B., Kassouf, M., Atallah, R., & Agba, B. L. (2021). Threat Intelligence Generation Using Network Telescope Data for Industrial Control Systems. IEEE Transactions on Information Forensics and Security, 16, 3355-3370.
-
Torabi, S., Bou-Harb, E., Assi, C., Karbab, E. B., Boukhtouta, A., & Debbabi, M. (2020). Inferring and investigating IoT-generated scanning campaigns targeting a large network telescope. IEEE Transactions on Dependable and Secure Computing.
Topic 55 (MISC):
Lie Detection
|
|
|
Primary: |
-
Monaro, M., Galante, C., Spolaor, R., Li, Q. Q., Gamberini, L., Conti, M., & Sartori, G. (2018). Covert lie detection using keyboard dynamics. Scientific reports, 8(1), 1-10.
|
|
|
Secondary: |
-
Monaro, M., Gamberini, L., & Sartori, G. (2017). The detection of faked identity using unexpected questions and mouse dynamics. PloS one, 12(5), e0177851.
Topic 56 (MISC):
Security and Privacy in Online Video Games
|
|
|
Primary: |
|
|
|
Secondary: |
-
Martinovic, D., Ralevich, V., McDougall, J., & Perklin, M. (2014, July). “You are what you play”: Breaching privacy and identifying users in online gaming. In 2014 Twelfth Annual International Conference on Privacy, Security and Trust (pp. 31-39). IEEE.
-
Moon, S., Reidenberg, J. R., & Russell, N. C. (2017). Privacy in Gaming and Virtual Reality Technologies: Review of Academic Literature.
Topic 57 (MISC):
5G new radio Handover Security
|
|
|
Primary: |
-
Giordani, M., Polese, M., Roy, A., Castor, D., & Zorzi, M. (2018). A tutorial on beam management for 3GPP NR at mmWave frequencies. IEEE Communications Surveys & Tutorials, 21(1), 173-196.
|
|
|
Secondary: |
-
Zhao, D., Yan, Z., Wang, M., Zhang, P., & Song, B. (2021). Is 5G Handover Secure and Private? A Survey. IEEE Internet of Things Journal.
-
Peltonen, A., Sasse, R., & Basin, D. (2021, May). A Comprehensive Formal Analysis of 5G Handover. In 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks. ACM.
Topic 58 (MISC):
Securing microservices architectures during SDLC
|
|
|
Primary: |
|
|
|
Secondary: |
-
Mohammed, N. M., Niazi, M., Alshayeb, M., & Mahmood, S. (2017). Exploring software security approaches in software development lifecycle: A systematic mapping study. Computer Standards & Interfaces, 50, 107-115.
-
Combe, T., Martin, A., & Di Pietro, R. (2016). To docker or not to docker: A security perspective. IEEE Cloud Computing, 3(5), 54-62.
Topic 59 (MISC):
Detecting Wireless Sensors
|
|
|
Primary: |
|
|
|
Secondary: |
-
Wu, K., & Lagesse, B. (2019, March). Do you see what i see?< subtitle> detecting hidden streaming cameras through similarity of simultaneous observation. In 2019 IEEE International Conference on Pervasive Computing and Communications (PerCom (pp. 1-10). IEEE.
-
Cheng, Y., Ji, X., Lu, T., & Xu, W. (2018, May). Dewicam: Detecting hidden wireless cameras via smartphones. In Proceedings of the 2018 on Asia Conference on Computer and Communications Security (pp. 1-13).
Topic 60 (MISC):
Textual Captchas
|
|
|
Primary: |
-
Von Ahn, L., Blum, M., Hopper, N. J., & Langford, J. (2003, May). CAPTCHA: Using hard AI problems for security. In International conference on the theory and applications of cryptographic techniques (pp. 294-311). Springer, Berlin, Heidelberg.
|
|
|
Secondary: |
-
Bursztein, E., Aigrain, J., Moscicki, A., & Mitchell, J. C. (2014). The end is nigh: Generic solving of text-based CAPTCHAs. In 8th {USENIX} Workshop on Offensive Technologies ({WOOT} 14).
-
Chellapilla, K., Larson, K., Simard, P. Y., & Czerwinski, M. (2005, July). Computers beat Humans at Single Character Recognition in Reading based Human Interaction Proofs (HIPs). In CEAS.
Topic 61 (MISC):
Covert channel for security and privacy
|
|
|
Primary: |
|
|
|
Secondary: |
-
Ying, X., Bernieri, G., Conti, M., & Poovendran, R. (2019, April). TACAN: Transmitter authentication through covert channels in controller area networks. In Proceedings of the 10th ACM/IEEE International Conference on Cyber-Physical Systems (pp. 23-34).
-
Taylor, J. M., & Sharif, H. R. (2017, December). Enhancing integrity of modbus TCP through covert channels. In 2017 11th International Conference on Signal Processing and Communication Systems (ICSPCS) (pp. 1-6). IEEE.
Topic 62 (MISC):
PIN and Password security
|
|
|
Primary: |
|
|
|
Secondary: |
-
Balagani, K., Cardaioli, M., Conti, M., Gasti, P., Georgiev, M., Gurtler, T., ... & Wu, L. (2019). Pilot: Password and pin information leakage from obfuscated typing videos. Journal of Computer Security, 27(4), 405-425.
-
Kim, H., & Huh, J. H. (2012). PIN selection policies: Are they really effective?. computers & security, 31(4), 484-496.
Topic 63 (MISC):
Security and privacy of keyboard
|
|
|
Primary: |
|
|
|
Secondary: |
-
Cecconello, S., Compagno, A., Conti, M., Lain, D., & Tsudik, G. (2019). Skype & type: Keyboard eavesdropping in voice-over-IP. ACM Transactions on Privacy and Security (TOPS), 22(4), 1-34.
-
Anand, S. A., & Saxena, N. (2018, March). Keyboard emanations in remote voice calls: Password leakage and noise (less) masking defenses. In Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy (pp. 103-110).
Last update: 29-09-2021
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | |