Default Cover Image

2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)

Dec. 29 2020 to Jan. 1 2021

Guangzhou, China

ISBN: 978-0-7381-4380-4

Table of Contents

[Title page i]Freely available from IEEE.pp. 1-1
Title Page iiiFreely available from IEEE.pp. 3-3
Copyright PageFreely available from IEEE.pp. 4-4
Table of ContentsFreely available from IEEE.pp. 5-42
IEEE TrustCom 2020 Organizing and Program CommitteesFreely available from IEEE.pp. 45-54
C4W 2020 Organizing and Program CommitteesFreely available from IEEE.pp. 55-57
AEIT 2020 Organizing and Program CommitteesFreely available from IEEE.pp. 58-59
PASS4IoT 2020 Organizing and Program CommitteesFreely available from IEEE.pp. 60-60
IWCSS 2020 Organizing and Program CommitteesFreely available from IEEE.pp. 61-63
BlockchainSys 2020 Organizing and Program CommitteesFreely available from IEEE.pp. 64-65
MLTrustCom 2020 Organizing and Program CommitteesFreely available from IEEE.pp. 66-66
SmartITC 2020 Organizing and Program CommitteesFreely available from IEEE.pp. 67-68
Enhancing Randomization Entropy of x86-64 Code while Preserving Semantic ConsistencyFull-text access may be available. Sign in or learn about subscription options.pp. 1-12
Reversible Data Hiding Based on Improved Rhombus Predictor and Prediction Error ExpansionFull-text access may be available. Sign in or learn about subscription options.pp. 13-21
SeRoT: A Secure Runtime System on Trusted Execution EnvironmentsFull-text access may be available. Sign in or learn about subscription options.pp. 30-37
Robust Scheduling for Large-Scale Distributed SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 38-45
Adaptive Random Test Case Generation Based on Multi-objective Evolutionary SearchFull-text access may be available. Sign in or learn about subscription options.pp. 46-53
Improving Efficiency of Key Enumeration Based on Side-Channel AnalysisFull-text access may be available. Sign in or learn about subscription options.pp. 54-61
Robust Spatial-Spread Deep Neural Image WatermarkingFull-text access may be available. Sign in or learn about subscription options.pp. 62-70
DeM-CoD: Novel Access-Control-Based Cash on Delivery Mechanism for Decentralized MarketplaceFull-text access may be available. Sign in or learn about subscription options.pp. 71-78
Modeling and Analysis of RabbitMQ Using UPPAALFull-text access may be available. Sign in or learn about subscription options.pp. 79-86
A Unified Host-based Intrusion Detection Framework using Spark in CloudFull-text access may be available. Sign in or learn about subscription options.pp. 97-103
TA-HRT: A Temperature-Aware Scheduler for Heterogeneous Real-Time Multicore SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 104-111
Reducing the Price of Protection: Identifying and Migrating Non-sensitive Code in TEEFull-text access may be available. Sign in or learn about subscription options.pp. 112-120
Fairness Testing of Machine Learning Models Using Deep Reinforcement LearningFull-text access may be available. Sign in or learn about subscription options.pp. 121-128
Cyclic Bayesian Attack Graphs: A Systematic Computational ApproachFull-text access may be available. Sign in or learn about subscription options.pp. 129-136
Password Policies vs. Usability: When Do Users Go "Bananas"?Full-text access may be available. Sign in or learn about subscription options.pp. 148-153
Malware Classification on Imbalanced Data through Self-AttentionFull-text access may be available. Sign in or learn about subscription options.pp. 154-161
TRUVIN: Lightweight Detection of Data Oriented Attacks Through Trusted Value IntegrityFull-text access may be available. Sign in or learn about subscription options.pp. 174-181
LURK: Server-Controlled TLS DelegationFull-text access may be available. Sign in or learn about subscription options.pp. 182-193
Malware Detection Based on Term Frequency Analysis of GPRs FeaturesFull-text access may be available. Sign in or learn about subscription options.pp. 194-201
Secure Outsourcing of Multi-armed BanditsFull-text access may be available. Sign in or learn about subscription options.pp. 202-209
NLabel: An Accurate Familial Clustering Framework for Large-Scale Weakly-Labeled MalwareFull-text access may be available. Sign in or learn about subscription options.pp. 210-216
Active Link Obfuscation to Thwart Link-flooding Attacks for Internet of ThingsFull-text access may be available. Sign in or learn about subscription options.pp. 217-224
VALID: Voltage-Based Lightweight Intrusion Detection for the Controller Area NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 225-232
Densely Connected Residual Network for Attack RecognitionFull-text access may be available. Sign in or learn about subscription options.pp. 233-242
Optimized FPGA Implementation of Elliptic Curve Cryptosystem over Prime FieldsFull-text access may be available. Sign in or learn about subscription options.pp. 243-249
FTPB: A Three-Stage DNS Tunnel Detection Method Based on Character Feature ExtractionFull-text access may be available. Sign in or learn about subscription options.pp. 250-258
De-Randomizing the Code Segment with Timing Function AttackFull-text access may be available. Sign in or learn about subscription options.pp. 259-267
Unmasking Windows Advanced Persistent Threat ExecutionFull-text access may be available. Sign in or learn about subscription options.pp. 268-276
Ciphertext-Policy Attribute-Based Encryption with Multi-keyword Search over Medical Cloud DataFull-text access may be available. Sign in or learn about subscription options.pp. 277-284
VCKSCF: Efficient Verifiable Conjunctive Keyword Search Based on Cuckoo Filter for Cloud StorageFull-text access may be available. Sign in or learn about subscription options.pp. 285-292
Program Slice Based Vulnerable Code Clone DetectionFull-text access may be available. Sign in or learn about subscription options.pp. 293-300
Doc2vec-Based Insider Threat Detection through Behaviour Analysis of Multi-source Security LogsFull-text access may be available. Sign in or learn about subscription options.pp. 301-309
C2BID: Cluster Change-Based Intrusion DetectionFull-text access may be available. Sign in or learn about subscription options.pp. 310-319
TEADS: A Defense-Aware Framework for Synthesizing Transient Execution AttacksFull-text access may be available. Sign in or learn about subscription options.pp. 320-327
ReDex: Unpacking Android Packed Apps by Executing Every MethodFull-text access may be available. Sign in or learn about subscription options.pp. 337-344
IoT Attacks: Features Identification and ClusteringFull-text access may be available. Sign in or learn about subscription options.pp. 353-360
Estimating Loss Due to Cyber-Attack in the Presence of UncertaintyFull-text access may be available. Sign in or learn about subscription options.pp. 361-369
STIDM: A Spatial and Temporal Aware Intrusion Detection ModelFull-text access may be available. Sign in or learn about subscription options.pp. 370-377
Partial-SMT: Core-Scheduling Protection Against SMT Contention-Based AttacksFull-text access may be available. Sign in or learn about subscription options.pp. 378-385
Family Identification of AGE-Generated Android Malware Using Tree-Based FeatureFull-text access may be available. Sign in or learn about subscription options.pp. 386-393
Towards a Theory of Special-Purpose Program ObfuscationFull-text access may be available. Sign in or learn about subscription options.pp. 394-401
Uncovering the Hidden Dangers: Finding Unsafe Go Code in the WildFull-text access may be available. Sign in or learn about subscription options.pp. 410-417
Traffic Classification of User Behaviors in Tor, I2P, ZeroNet, FreenetFull-text access may be available. Sign in or learn about subscription options.pp. 418-424
MAUSPAD: Mouse-Based Authentication Using Segmentation-Based, Progress-Adjusted DTWFull-text access may be available. Sign in or learn about subscription options.pp. 425-433
Improving the Effectiveness of Grey-box Fuzzing By Extracting Program InformationFull-text access may be available. Sign in or learn about subscription options.pp. 434-441
Evaluating the Soundness of Security Metrics from Vulnerability Scoring FrameworksFull-text access may be available. Sign in or learn about subscription options.pp. 442-449
SpeedNeuzz: Speed Up Neural Program Approximation with Neighbor Edge KnowledgeFull-text access may be available. Sign in or learn about subscription options.pp. 450-457
Far from Classification Algorithm: Dive into the Preprocessing Stage in DGA DetectionFull-text access may be available. Sign in or learn about subscription options.pp. 468-474
ELPPS: An Enhanced Location Privacy Preserving Scheme in Mobile Crowd-Sensing Network Based on Edge ComputingFull-text access may be available. Sign in or learn about subscription options.pp. 475-482
Phishing Web Page Detection Using Optimised Machine LearningFull-text access may be available. Sign in or learn about subscription options.pp. 483-490
Asset-Oriented Threat ModelingFull-text access may be available. Sign in or learn about subscription options.pp. 491-501
All Your PLCs Belong to Me: ICS Ransomware Is RealisticFull-text access may be available. Sign in or learn about subscription options.pp. 502-509
Automated Enforcement of the Principle of Least Privilege over Data Source AccessFull-text access may be available. Sign in or learn about subscription options.pp. 510-517
Extending Registration and Authentication Processes of FIDO2 External Authenticator with QR CodesFull-text access may be available. Sign in or learn about subscription options.pp. 518-529
BHDA - A Blockchain-Based Hierarchical Data Access Model for Financial ServicesFull-text access may be available. Sign in or learn about subscription options.pp. 530-538
FTCLNet: Convolutional LSTM with Fourier Transform for Vulnerability DetectionFull-text access may be available. Sign in or learn about subscription options.pp. 539-546
Secure Coded Matrix Multiplication Against Cooperative Attack in Edge ComputingFull-text access may be available. Sign in or learn about subscription options.pp. 547-556
A Measurement Study of IoT-Based Attacks Using IoT Kill ChainFull-text access may be available. Sign in or learn about subscription options.pp. 557-567
Modeling and Verification of Spatio-Temporal Intelligent Transportation SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 568-575
Secure Outsourcing Algorithms of Modular Exponentiations in Edge ComputingFull-text access may be available. Sign in or learn about subscription options.pp. 576-583
Anomaly Detection on MIL-STD-1553 Dataset using Machine Learning AlgorithmsFull-text access may be available. Sign in or learn about subscription options.pp. 592-598
Privacy-Preserving Ride-Hailing with Verifiable Order-Linking in Vehicular NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 599-606
Prihook: Differentiated Context-Aware Hook Placement for Different Owners' SmartphonesFull-text access may be available. Sign in or learn about subscription options.pp. 615-622
Improving Laplace Mechanism of Differential Privacy by Personalized SamplingFull-text access may be available. Sign in or learn about subscription options.pp. 623-630
Differential Privacy Preservation in Interpretable Feedforward-Designed Convolutional Neural NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 631-638
Practical and Secure Circular Range Search on Private Spatial DataFull-text access may be available. Sign in or learn about subscription options.pp. 639-645
Dataset Construction and Analysis of Screenshot MalwareFull-text access may be available. Sign in or learn about subscription options.pp. 646-655
On the Role of Data Anonymization in Machine Learning PrivacyFull-text access may be available. Sign in or learn about subscription options.pp. 664-675
Heimdall: Illuminating the Hidden Depths of Third-Party Tracking in Android ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 676-682
A Privacy-Preserving Data Collection and Processing Framework for Third-Party UAV ServicesFull-text access may be available. Sign in or learn about subscription options.pp. 683-690
On the Comparison of Classifiers' Construction over Private InputsFull-text access may be available. Sign in or learn about subscription options.pp. 691-698
Napping Guard: Deanonymizing Tor Hidden Service in a Stealthy WayFull-text access may be available. Sign in or learn about subscription options.pp. 699-706
Multi-party Private Set Intersection in Vertical Federated LearningFull-text access may be available. Sign in or learn about subscription options.pp. 707-714
MLTracer: Malicious Logins Detection System via Graph Neural NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 715-726
Data Analytics-Enabled Intrusion Detection: Evaluations of ToN_IoT Linux DatasetsFull-text access may be available. Sign in or learn about subscription options.pp. 727-735
Showing 100 out of 279