Accepted Papers (Main Track)

A Comprehensive Survey on Basic Safety Message Attacks and Their Detection

Author:

Mohamed, Ahmed (University of Tennessee at Chattanooga); Xie, Mengjun (University of Tennessee at Chattanooga)

A Digital Profiling Triage Model for Industrial Espionage

Author: Dokko, Jieun (Texas Tech University); Shin, Michael (Texas Tech University)

An IP Anti-Geolocation Method Based on Fake Landmarks

Author: Lu, Enshang (Information Engineering University); Ding, Shichang (Henan Key Laboratory of Cyberspace Situation Awareness); Yang, Chunfang (Information Engineering University); Gong, Daofu (Information Engineering University); Li, Ruixiang (Henan Key Laboratory of Cyberspace Situation Awareness); Zhu, Kaijie (Zhongguancun Laboratory); Luo, Xiangyang (Information Engineering University)

AnGSL: Graph-Based Android Malware Detection Method

Author: Zhao, Guodong (Xinjiang University); Luktarhan, Nurbol (Xinjiang University); Mei, Yihe (Xinjiang University); Meng, Yi (Xinjiang University); Yang, Xiaotong (Xinjiang University)

APTChaser: Cyber Threat Attribution via Attack Technique Modeling

Author: Yiming, Zhang (Institute of Information Engineering, Chinese Academy of Sciences); Peian, Yang (Institute of Information Engineering Chinese Academy of Sciences); Zhengwei, Jiang (Institute of Information Engineering Chinese Academy of Sciences); Chunyan, Ma (Institute of Information Engineering Chinese Academy of Sciences); Mengjiao, Cui (Institute of Information Engineering Chinese Academy of Sciences); Yizhe, You (Institute of Information Engineering Chinese Academy of Sciences)

Assessing Threats: Security Boundary and Side-channel Attack Detection in the Metaverse

Author: Yang, Ruiyuan (Xidian University); Li, Guohao (Xidian University); Yang, Li (Xidian University); Zhang, Hao (Xidian University); Wang, Jiangyu (Xidian University); Sang, Anyuan (Xidian University)

ATKHunter: Towards Automated Attack Detection by Behavior Pattern Learning

Author: Pan, Yuedong (Institute of Information Engineering, Chinese Academy of Sciences); Zhao, Lixin (Institute of Information Engineering, Chinese Academy of Sciences); Li, Chaofei (Institute of Information Engineering, Chinese Academy of Sciences); Leng, Tao (Institute of Information Engineering, Chinese Academy of Sciences); Yu, Aimin (Institute of Information Engineering, Chinese Academy of Sciences); Cai, Lijun (Institute of Information Engineering, Chinese Academy of Sciences); Meng, Dan (Institute of Information Engineering, Chinese Academy of Sciences)

Attention-Guided Contrastive Masked Autoencoders for Self-supervised Cross-modal Biometric Matching

Author: Zhang, Haichuan (Anhui University); Wang, Jiaxiang (Anhui University); Shi, Hanqin (Xuzhou Institute of Technology); Yu, Zhengda (Anhui University)

Autonomous Driving System Configuration Defect Detection Method Based on Fuzzing

Author: Liu, Jinzhao (Shandong University of Technology); Yu, Xiao (Shandong University of Technology); Zhang, Li (Communication University of Zhejiang); Zhang, Yanqiu (Shandong University of Technology); Li, YuanZhang (Beijing Institute of Technology); Tan, Kun (Shandong Institute of Information Technology Industry Development); Tan, Yuan (Beijing Institute of Technology)

Auto-TFCE: Automatic Traffic Feature Code Extraction Method and Its Application in Cyber Security

Author: He, Junjiang (Sichuan University); Wang, Jiayan (Sichuan University); Chen, Jiangchuan (Sichuan University); Fang, Wenbo (Sichuan University); Zhang, Lei (Sichuan University); Li, Tao (Sichuan University)

BGETC: An Encrypted Traffic Classification Method Based on BERT and GRU

Author: Yang, Xiaotong (Xinjiang University); Luktarhan, Nurbol (Xinjiang University); Meng, Yi (Xinjiang University); Mei, Yihe (Xinjiang University); Zhao, Guodong (xinjiang university)

Burst Sequence Based Graph Neural Network for Video Traffic Identification

Author: xiong, jian (university of jinan/Shandong Provincial Key Laboratory of Network Based Intelligent Computing); bao, yingshuo (University of Jinan/ Shandong Provincial Key Laboratory of Network Based Intelligent Computing); peng, lizhi (Quancheng Laboratory/University of Jinan)

CTIMiner: Cyber Threat Intelligence Mining Using Adaptive Multi-Task Adversarial Active Learning

Author: Ma, Chunyan (Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China); Jiang, Zhengwei (Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China); Zhang, Kai (Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China); Jiang, Jun (Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China); Yang, Peian (Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China); Xu, Bo (People’s Public Security University of China, Beijing, China); Feng, Huamin (Beijing Electronic Science and Technology Institute, Beijing, China)

Driven to Evidence: The Digital Forensic Trail of Vehicles

Author: McKay, Catherine (University College Dublin)

EG-SAN: Evolving Graph Self-Attention Networks for Detecting Illicit Activities in Cryptocurrency

Author: Cui, bo (Inner Mongolia University); Zhang, Jia (Inner Mongolia University)

Heaker: Exfiltrating Data from Air-Gapped Computers via Thermal Signals

Author: Jin, Jifang (Beijing Electronic Science and Technology Institute); su, yonghua (beijing electronic science and technology institute); Wang, Zunyang (Beijing Electronic Science and Technology Institude); li, Pengyu (Beijing Electronic Science and Technology Institute); Huang, Zhan (Beijing Electronic Science and Technology Institute); duan, xiaoyi (Beijing Electronic Science and Technology Institute)

Improved Federated Learning Model Against Poisoning Attacks by Using Iterative Blockchain Validators

Author: Ding, Song (Nanjing University of Information Science and Technology); Xu, Fuya (Nanjing University of Information Science and Technology); Zhang, Peiyun (Nanjing University of Information Science and Technology); Fu, Zhangjie (Nanjing University of Information Science and Technology); Lu, Kezhong (Chizhou University)

KP-WF: Cross-domain Few-shot Website Fingerprinting

Author: Liu, Lin (College of Computer, National University of Defense Technology, Changsha, China); Wei, Ziling (College of Computer, National University of Defense Technology, Changsha, China); Chen, Shuhui (College of Computer, National University of Defense Technology, Changsha, China); su, jinshu (College of Computer, National University of Defense Technology, Changsha, China); Yuan, Yong (College of Computer, National University of Defense Technology, Changsha, China)

MSP: A Zero-latency Lightweight Website Fingerprinting Defense for Tor Network

Author: Lu, Tianbo (Beijing University of Posts and Telecommunications); Tao, Xiaohan (Beijing University of Posts and Telecommunications); Li, Yanfang (Beijing University of Posts and Telecommunications); Shang, Jiaze (Beijing University of Posts and Telecommunications)

Multi-tool Approach for Advanced Quantum Key Distribution Network Modeling

Author: Cvitic, Ivan (Faculty of Transport and Traffic Sciences, University of Zagreb); Peraković, Dragan (University of Zagreb, Faculty of Traffic and Transport Sciences, Croatia); Vladava, Josip (University of Zagreb, Faculty of Transport and Traffic Sciences); Gavrilović, Karlo (University of Zagreb, Faculty of Transport and Traffic Sciences)

Pixel-level Face Correction Task for More Generalized Deepfake Detection

Author: Li, Xiang (Beijing University of Posts and Telecommunications); You, Weike (Beijing University of Posts and Telecommunications); Lin, Qingran (Beijing University of Posts and Telecommunications); Zhou, Linna (Beijing University of Posts and Telecommunications)

SecureSem: Sensitive Text Classification based on Semantic Feature Optimization

Author: qin, kangyuan (Institute of Information Engineering, Chinese Academy of Sciences); Liu, Ran (Institute of Information Engineering, Chinese Academy of Sciences); Yu, Min (Institute of Information Engineering, Chinese Academy of Sciences); Li, Gang (School of Information Technology, Deakin University); Liu, Mingqi (Institute of Information Engineering, Chinese Academy of Sciences); Li, Jiangyuan (Department of Computer Science, Beijing Technology and Business University); Huang, Weiqing (Institute of Information Engineering, Chinese Academy of Sciences); Jiang, Jianguo (Institute of Information Engineering, Chinese Academy of Sciences)

Securing Social Relationships: An Algorithm for Privacy Preservation Targeting Vulnerable Nodes of Social Networks

Author: Shen, Jiawei (Hebei University); Tian, Junfeng (Hebei University); Wang, Ziyuan (Hebei University)

Sky-Eye: Detect Multi-Stage Cyber Attacks at the Bigger Picture

Author: Bi, Pengcheng (University of Chinese Academy of Sciences); Wang, Qi (National Computer Network Emergency Response Technical Team Coordination Center of China); Lv, Zhuohang (National Computer Network Emergency Response Technical Team Coordination Center of China, Beijing); Yun, Xiaochun (Zhongguancun National Laboratory); Zang, Tianning (Institute of Information Engineering, Chinese Academy of Sciences)

The Hidden Realms of Router Apps: Forensic Analysis of TP-Link Tether and ASUS Router

Author: Ozer, Akif (Purdue University); Karabiyik, Umit (Purdue University)

Vehicle Forensics: Analysis of Forensic Tools, Mobile Device Extractions, and Live Network Capture Artifacts

Author: McKay, Catherine (University College Dublin); Le Khac, Nhien An (University College Dublin)