Accepted papers

TitleAuthors
Child Sexual Abuse and Sexually Explicit Material Online During COVID-19: Trends and Prevention MethodsAnillo, Isabelle (Nova Southeastern University); Feldman, David (nova southeastern university); Kennedy, Tom (Nova Southeastern University); Caggiano, Claire (Nova Southeastern University)
Retruth Reconnaissance: A Digital Forensic Analysis of Truth SocialBrown, Joseph (Louisiana State University); Baggili, Ibrahim (Louisiana State University)
Learning framework for guessing alphanumeric passwords on mobile phones based on user context and fragment semanticsNassif, Lilian Noronha (Public Ministry of Minas Gerais), Jonny Silva de Oliveira (Public Ministry of Minas Gerais)
IoT Malicious Traffic Detection based on Federated LearningShen, Yi (National University of Defense Technology); Zhang, Yuhan (School of Cyber Science and Engineering, Sichuan University); Ding, Wanmeng (National University of Defense Technology); Hu, Miao (National University of Defense Technology); Li, Yang (National University of Defense Technology); Huang, Cheng (School of Cyber Science and Engineering Sichuan University,); Li, Yuwei (National University of Defense Technology
Power Analysis Attack Based on GA-based Ensemble LearningDuan, Xiaoyi (Beijing Electronic Science and Technology Institute); Huang, Ye (Beijing Electronic Science and Technology Institute); Wang, Yuting (Beijing Electronic Science and Technology Institute); Tong, Jianmin (Beijing Electronic Science and Technology Institute); Hu, Ronglei (Beijing Electronic Science and Technology Institute)
A Multi-Carrier Information Hiding Algorithm Based on Dual 3D Model Spectrum AnalysisRen, Shuai (Chang’anUniversity); Ma, Liming (Chang’an University); Feng, Qiuyu (Chang’an University)
Optir-SBERT: Cross-architecture binary code similarity detection based on optimized LLVM IRYan, Yintong (College of Electronic Engineering, National University of Defense Technology); Yu, Lu (College of Electronic Engineering, National University of Defense Technology); Wang, Taiyan (College of Electronic Engineering, National University of Defense Technology); Li, Yuwei (College of Electronic Engineering, National University of Defense Technology); Pan, Zulie (College of Electronic Engineering, National University of Defense Technology)
Detection of Targeted Attacks using Medium-Interaction Honeypot for Unmanned Aerial VehicleJamil, Abdul Majid (Wuhan University); Cao, Yue (Wuhan University); Hadi, Hassan Jalil (Wuhan University)
Security Analysis of Google Authenticator, Microsoft Authenticator, and AuthyNash, Aleck (University of Texas at San Antonio); Studiawan, Hudan (Institut Teknologi Sepuluh Nopember); Grispos, George (University of Nebraska-Omaha); Choo, Kim-Kwang Raymond (University of Texas at San Antonio)
Lattice-based Secret Sharing Scheme (Chinese Remainder Theorem)Songshou, Dong (beihang university); Yanqing, Yao (beihang university); Yihua, Zhou (Beijing University of Technology); Yang, Yang (Beijing University of Technology)
Improvement of An Identity-Based Aggregate Signature Protocol From LatticeSongshou, Dong (beihang university); Yanqing, Yao (beihang university); Yihua, Zhou (Beijing University of Technology); Yuguang, Yang (Beijing University of Technology)
A lightweight and high-precision approach for bulky JavaScript engines fuzzinglianpei, Zhou (Tsinghua universities)
Identify Users on Dating Applications: A Forensic PerspectiveLe Khac, Nhien An (University College Dublin); Stenzel, Paul (University College Dublin)
Multi-task Learning Based Physical Backdoor Attack on Siamese NetworksPang, Zeshan (National University of Defense Technology); Sun, Yuyuan (National University of Defense Technology); Guo, Shasha (National University of Defense Technology); Lu, Yuliang (National University of Defense Technology)
Catch Me if You Can: Analysis of Digital Devices & Artifacts Used in Murder CasesJankura, John (University of New Haven); Catallo-Stooks, Hannah (University of New Haven); Baggili, Ibrahim (Louisiana State University); Richard III, Golden G (Louisiana State University)
DynVMDroid: Android App Protection via Code Disorder and Dynamic RecoveryFeng, Weimiao (Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China); Hu, Rui (Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China); Zhou, Cong (Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China); Yu, Lei (Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China)
An Android Malware Detection Method Based on Optimized Feature Extraction Using Graph Convolutional Network志强 王, (北京电子科技学院) Ying Zhang (北京电子科技学院) 卓越 王 (北京电子科技学院)
SdShield: Effectively Ensuring Heap Security via Shadow Page Tableshi, linong (zhengzhou university); hu, chuanping (zhengzhou university); zhuang, yan (zhengzhou university); lu, yan (zhengzhou university)
Persistent Clean-label Backdoor on Graph-based Semi-supervised Cybercrime DetectionYang, Xiao (Shanghai Jiao Tong University); Li, Gaolei (Shanghai Jiao Tong university); Han, Meng (Kennesaw State University)
Power Analysis Attack Based on BS-XGboost SchemeLi, Yiran (Inner Mongolia University)
DEML: Data-enhanced Meta-Learning Method for IoT APT Traffic DetectionHu, Jia (University of Electronic Science and Technology of China); Niu, Weina (University of Electronic Science and Technology of China); Yuan, Qingjun (PLA Strategic Support Force Information Engineering University); Yao, Lingfeng (University of Electronic Science and Technology of China); He, Junpeng (University of Electronic Science and Technology of China); Zhang, Yanfeng (Sichuan Police College); Zhang, Xiaosong (University of Electronic Science and Technology of China)
APTBert: Abstract Generation and Event Extraction from APT ReportsZhou, Chenxin (Sichuan University); Huang, Cheng (Sichuan University)
Password Managers and Vault Application Security and Forensics: Research Challenges and Future OpportunitiesNash, Aleck (University of Texas at San Antonio); Choo, Kim-Kwang Raymond (University of Texas at San Antonio)
CCBA: Code Poisoning-based Clean-Label Covert Backdoor Attack against DNNsYang, Xubo (Shanghai Jiao Tong University); Li, Linsen (Shanghai Jiao Tong University); Hua, Cunqing (Shanghai Jiao Tong University); Yao, Changhao (Shanghai Jiao Tong University)
SHIELD: a Specialized Dataset for Hybrid Blind Forensics of World LeadersLin, Qingran (Beijing University of Posts and Telecommunications); Li, Xiang (Beijing University of Posts and Telecommunications); Chu, Beilin (Beijing University of Posts and Telecommunications); Wang, Renying (Beijing University of Posts and Telecommunications); Chen, Xianhao (Beijing University of Posts and Telecommunications); Mao, Yuzhe (Beijing University of Posts and Telecommunications); Yang, Zhen (Beijing University of Posts and Telecommunications); Zhou, Linna (Beijing University of Posts and Telecommunications); You, Weike (Beijing University of Posts and Telecommunications)
A PUF based Audio Fingerprint Based for Device Authentication and Tamper LocationLu, Zhi (Huazhong University Of Science And Technology); Dou, Haochen (Huazhong University of Science and Technology); Lu, Songfeng (Huazhong University of Science and Technology); Tang, Xueming (Huazhong University of Science and Technology); Wu, JunJun (Huazhong University of Science and Technology); Umran, Samir Mohammed (Huazhong University of Science and Technology)
Research on Feature Selection Algorithm of Energy Curvefan, xiaohong (Beijing Electronic Science and Technology Institute); huang, ye (Beijing Electronic Science and Technology Institute); yu, zhenyang (Beijing Electronic Science and Technology Institute); Cheng, Xuhui (Beijing Electronic Science and Technology Institute); duan, xiaoyi (Beijing Electronic Science and Technology Institute)
Deep CNN and Character Level Embedding for DGA DetectionGregĂłrio, JoĂŁo Rafael (Department of Computing and Statistics, SĂŁo Paulo State University – SĂŁo JosĂ© do Rio Preto – SP – Brazil); Salvadeo, Denis Henrique Pinheiro (Department of Statistics, Applied Mathematics and Computing, SĂŁo Paulo State University – Rio Claro – SP – Brazil); Cansian, Adriano Mauro (Department of Computing and Statistics, SĂŁo Paulo State University, SĂŁo JosĂ© do Rio Preto – SP, Brazil)
Deep Autoencoder Model for Detecting Malicious URLs in CybersecurityFigueiredo, InaĂŞ Soares de (Department of Computing, SĂŁo Paulo State University, Bauru – SP, Brazil); GregĂłrio, JoĂŁo Rafael (Department of Computing and Statistics, SĂŁo Paulo State University, SĂŁo JosĂ© do Rio Preto – SP, Brazil); Souza, Henrique Cesar Marinho de (Department of Computing, SĂŁo Paulo State University, Bauru – SP, Brazil); Costa, Kelton Augusto Pontara da (Department of Computing, SĂŁo Paulo State University, Bauru – SP, Brazil); Cansian, Adriano Mauro (Department of Computing and Statistics, SĂŁo Paulo State University, SĂŁo JosĂ© do Rio Preto – SP, Brazil)