This book constitutes the proceedings of the 19th International Workshop on Security on Advances in Information and Computer Security, IWSEC 2024, held in Kyoto, Japan, in September 17-19, 2024.
The 14 full papers and 3 short papers were carefully reviewed and selected from 47 submissions. These papers were categorized into the following sections: authenticated encryption; symmetric-key cryptanalysis; protocols; analysis of public-key cryptosystems; vulnerability; malware countermeasure; network security and privacy.
Edited by:
Kazuhiko Minematsu, Mamoru Mimura Imprint: Springer Nature Country of Publication: Singapore Edition: 2024 ed. Volume: 14977 Dimensions:
Height: 235mm,
Width: 155mm,
ISBN:9789819777365 ISBN 10: 9819777364 Series:Lecture Notes in Computer Science Pages: 308 Publication Date:14 September 2024 Audience:
Professional and scholarly
,
Undergraduate
Format:Paperback Publisher's Status: Active
.- Authenticated Encryption. .- Bit-wise Analysis for Forgery Attacks on AES-based AEAD Schemes. .- Cryptanalysis of Authenticated Encryption Modes for Wireless and Real-Time Systems. .- Symmetric-key Cryptanalysis. .- Higher-order Mixture Differentials for AES-based Block Ciphers and Applications to TweAES. .- Weak Keys of the Full MISTY1 Recovered in Practical Time. .- Protocols. .- Efficient Card-Based Protocols with a Standard Deck of Playing Cards Using Partial Opening. .- Attribute-Based Inner Product Functional Encryption in Key-Policy Setting from Pairing. .- Analysis of Public-key Cryptosystems. .- Formal Verification of Emulated Floating-Point Arithmetic in Falcon. .- Experimental Analysis of Integer Factorization Methods Using Lattices. .- Sieving Method for SDP with the Zero Window: An Improvement in Low Memory Environments. .- Vulnerability. .- Race condition vulnerabilities in WordPress plug-ins. .- Finding (and exploiting) vulnerabilities on IP Cameras: the Tenda CP3 case study. .- Malware Countermeasure. .- File System Shield (FSS): A Pass-Through Strategy Against Unwanted Encryption in Network File Systems. .- Implementation for Malicious Software using ChatGPT-4. .- A Markov Game Model for Evaluating Cybersecurity Attacks on Cloud. .- Network Security and Privacy. .- Few Edges Are Enough: Few-Shot Network Attack Detection with Graph Neural Networks. .- Information Leakage through Packet Lengths in RTC Traffic. .- A Study on Anonymization through Participation in iPWS Cup 2023.