This book constitutes the refereed proceedings of the 16th International Conference on Network and System Security, NSS 2022, held in Denarau Island, Fiji, on December 9-12, 2022.
The 23 full and 18 short papers presented in this book were carefully reviewed and selected from 83 submissions. They focus on theoretical and practical aspects of network and system security, such as authentication, access control, availability, integrity, privacy, confidentiality, dependability and sustainability of computer networks and systems.
AI for Network Security.- Vulnerability Detection Using Deep Learning
Based Function Classification.- RAIDER: Reinforcement-aided Spear Phishing
Detector.- Network Intrusion Detection Adversarial Attacks for LEO
Constellation Networks Based on Deep Learning.- A Proof of Concept
Implementation of Explainable Artificial Intelligence (XAI) in Digital
Forensics.- Graph Intelligence Enhanced Bi-Channel Insider Threat
Detection.- Network Security.- Exploiting Redundancy in Network Flow
Information for Efficient Security Attack Detection.- A Learning Methodology
for Line-Rate Ransomware Mitigation with P4 Switches.- Reducing Intrusion
Alert Trees to Aid Visualization.- Attacker Attribution Through
Characteristics Inference Using Honeypot Data.- Detecting Contradictions from
CoAP RFC Based on Knowledge Graph.- Mobile Security.- A First Look at Android
Apps Third-party Resources Loading.- Comprehensive Mobile Traffic
Characterization Based on a Large-Scale Mobile Traffic Dataset.- DOT-M: A
Dual Offline Transaction Scheme of Central Bank Digital Currency for Trusted
Mobile Devices.- A Beyond-5G Authentication and Key Agreement Protocol.- IoT
Security.- A Survey on IoT Vulnerability Discovery.- Differentiated Security
Architecture for Secure and Efficient Infotainment Data Communication in IoV
Networks.- An Efficient Authenticated Group Key Agreement Protocol with
Dynamic Batch Verification for Secure Distributed Networks.- Leveraging Frame
Aggregation in Wi-Fi IoT Networks for Low-Rate DDoS Attack
Detection.- Supporting Cyber-Attacks and System Anomaly Detection Research
with an Industry 4.0 Dataset.- Privacy-Preserving Machine Learning Protocols
and Systems.- The Force of Compensation, A Multi-stage Incentive Mechanism
Model for Federated Learning.- A Privacy-Preserving Distributed Machine
Learning Protocol Based on Homomorphic Hash Authentication.- An Efficient
Clustering-Based Privacy-Preserving Recommender System.- A Differential
Privacy Mechanism for Deceiving Cyber Attacks in IoT
Networks.- Privacy-Preserving Networked Systems and
Protocols.- Privacy-Preserving Online Ride-Hailing Matching System with an
Untrusted Server.- Efficient and Fine-Grained Sharing of Signed Healthcare
Data in Smart Healthcare.- Enabling Secure Deduplication in Encrypted
Decentralized Storage.- Geometric Range Searchable Encryption with Forward
and Backward Security.- Blockchain Security.- Towards Secure and Trustworthy
Flash Loans: A Blockchain-based Trust Management Approach.- Forward
Traceability for Product Authenticity Using Ethereum Smart Contracts.- BSB:
Bringing Safe Browsing to Blockchain Platform.- Blockchain-Powered
Systems.- Practical Anonymous Multi-Hop Locks for Lightning Network
Compatible Payment Channel Networks.- Blockchain Based Regulatory Technology
Deployment for Real Estate Transaction.- CVallet: a Blockchain-Oriented
Application Development for Education and Recruitment.- Decentralized Access
Control for Secure Microservices Cooperation with
Blockchain.- Blockchain-Based Access Control for Smart Manufacturer Secure
Management System.- Attacks.- Driver Locations Harvesting Attack on
pRide.- Rebound Attacks on SKINNY Hashing with Automatic Tools.- Combination
Reduction Algorithms and its Application to Subversion Attack.- Cryptographic
Algorithms and Protocols.- Evaluating the Security of Merkle-Damgard Hash
Functions and Combiners in Quantum Settings.- An Efficient Lattice-Based
Encrypted Search Scheme with Forward Security.- Strengthening the Security of
AES Against Differential Fault Attack