NSS-SocialSec 2023

NSS 2023: 17th International Conference on Network and System Security
SocialSec 2023: 9th International Symposium on Security and Privacy in Social Networks and Big Data
University of Kent, Canterbury, UK
August 14-16, 2023

NSS 2023 Accepted Papers

Full Papers

Privacy-preserving Federated Learning with Hierarchical Clustering to Improve Training on Non-IID Data
Songwei Luo (National University of Defense Technology, China)
Shaojing Fu (National University of Defense Technology, China)
Yuchuan Luo (National University of Defense Technology, China)
Lin Liu (National University of Defense Technology, China)
Yanxiang Deng (National University of Defense Technology, China)
Shixiong Wang (Academy of Military Sciences, China)
Modular Polynomial Multiplication Using RSA/ECC coprocessor
Aurélien Greuet (IDEMIA, France)
Simon Montoya (IDEMIA, France)
Clémence Vermeersch (IDEMIA, France)
Evaluating Rule-Based Global XAI Malware Detection Methods
Rui Li (Leiden University, The Netherland)
Olga Gadyatskaya (Leiden University, The Netherland)
Resilience of Blockchain Overlay Networks
Aris Paphitis (Cyprus University of Technology, Cyprus)
Nicolas Kourtellis (Telefonica Research, Spain)
Michael Sirivianos (Cyprus University of Technology, Cyprus)
Spying on the Spy: Security Analysis of Hidden Cameras
Samuel Herodotou (University of Warwick, UK)
Feng Hao (University of Warwick, UK)
Security Analysis of Mobile Point-of-Sale Terminals
Mahshid Mehr Nezhad (University of Warwick, UK)
Elliot Laidlaw (University of Warwick, UK)
Feng Hao (University of Warwick, UK)
Group Oriented Attribute-based Encryption Scheme from Lattices with the employment of Shamir's Secret Sharing scheme
Maharage Perera (Advanced Telecommunications Research Institute International, Japan)
Nakamura Toru (KDDI Research, Inc., Saitama, Japan)
Takashi Matsunaka (Advanced Telecommunications Research Institute International, Japan)
Hiroyuki Yokoyama (Advanced Telecommunications Research Institute International, Japan)
Kouichi Sakurai (Kyushu University, Japan)
T3E: A Practical Solution to Trusted Time in Secure Enclaves
Gilang Mentari Hamidy (KU Leuven, Belgium)
Pieter Philippaerts (KU Leuven, Belgium)
Wouter Joosen (KU Leuven, Belgium)
Provably Secure Blockchain Protocols from Distributed Proof-of-Deep-Learning
Xiangyu Su (Tokyo Institute of Technology, Japan)
Mario Larangeira (Tokyo Institute of Technology/IOHK, Japan)
Keisuke Tanaka (Tokyo Institute of Technology, Japan)
On the Design of a Misinformation Widget (Ms.W) Against Cloaked Science
David Arroyo (CSIC, Spain)
Sara Degli Esposti (CSIC, Spain)
Alberto Gómez-Espés (CSIC, Spain)
Carlos González-Parada (CSIC, Spain)
Santiago Palmero-Muñoz (CSIC, Spain)
Luis Pérez-Miguel (CSIC, Spain)
RRML: Privacy Preserving Machine Learning Based on Random Response Technology
Jia Wang (Shenzhen University, China)
Shiqing He (Shenzhen University, China)
Qiuzhen Lin (Shenzhen University, China)
Whitelisting for Characterizing and Monitoring Process Control Communication
Andreas Paul (Brandenburg University of Technology Cottbus-Senftenberg, Germany)
Franka Schuster (Brandenburg University of Technology Cottbus-Senftenberg, Germany)
Hartmut Koenig (Brandenburg University of Technology Cottbus-Senftenberg, Germany)

Short Papers

Detection of malware using self-attention mechanism and strings
Satoki Kanno (National Defense Academy, Japan)
Mamoru Mimura (National Defense Academy, Japan)
Security Model for Privacy-preserving Blockchain-based Cryptocurrency Systems
Mayank Raikwar (University of Oslo, Norway)
Shuang Wu (DNV, Norway)
Kristian Gjøsteen (Norwegian University of Science and Technology, Norway)
SPoiL: Sybil-based Untargeted Data Poisoning Attacks in Federated Learning
Zhuotao Lian (University of Aizu, Japan)
Chen Zhang (University of Aizu, Japan)
Kaixi Nan (University of Aizu, Japan)
Chunhua Su (University of Aizu, Japan)
KDRM: Kernel Data Relocation Mechanism to Mitigate Privilege Escalation Attack
Hiroki Kuzuno (Kobe University, Japan)
Toshihiro Yamauchi (Okayama University, Japan)
Decentralized SGX-based Cloud Key Management
Yunusa Abdulsalam (University Mohammed VI Polytechnic, Morocco)
Jaouhara Bouamama (University Mohammed VI Polytechnic, Morocco)
Yahya Benkaouz (University Mohammed V, Morocco)
Mustapha Hedabou (University Mohammed VI Polytechnic, Morocco)
Agnostic Label Only Membership Inference Attack
Simone Rizzo (University of Pisa, Italy)
Francesca Naretto (Scuola Normale Superiore, Italy)
Anna Monreale (University of Pisa, Italy)
The Effectiveness of Transformer-based Models for BEC attack Detection
Amirah Almutairi (University of Southampton, UK)
Nawfal Fadhel (University of Southampton, UK)
Boojoong Kang (University of Southampton, UK)
ppAURORA: Privacy Preserving Area Under Receiver Operating Characteristic and Precision-Recall Curves
Ali Burak Ünal (University of Tübingen, Germany)
Nico Pfeifer (University of Tübingen, Germany)
Mete Akgün (University of Tübingen, Germany)
New LDP approach using VAE
Andres Hernandez-Matamoros (Meiji University, Japan)
Hiroaki Kikuchi (Meiji University, Japan)

SocialSec 2023 Accepted Papers

Full Papers

People Still Care About Facts: Twitter Users Engage More with Factual Discourse than Misinformation
Luiz Giovanini (University of Florida, USA)
Shlok Gilda (University of Florida, USA)
Mirela Silva (University of Florida, USA)
Fabrício Ceschin (Federal University of Paraná, Brazil)
Prakash Shrestha (University of Florida, USA)
Christopher Brant (University of Florida, USA)
Juliana Fernandes (University of Florida, USA)
Catia Silva (University of Florida, USA)
André Grégio (Federal University of Paraná, Brazil)
Daniela Oliveira (University of Florida, USA)
Data Reconstruction Attack Against Principal Component Analysis
Saloni Kwatra (Umeå University, Sweden)
Vicenc Torra (Umeå University, Sweden)
Twitter Bots Influence on the Russo-Ukrainian War During the 2022 Italian General Elections
Francesco Luigi De Faveri (University of Padova, Italy)
Luca Cosuti (University of Padova, Italy)
Pier Paolo Tricomi (University of Padova, Italy)
Mauro Conti (University of Padova, Italy)
Graph Analysis of Blockchain P2P Overlays and their Security Implications
Aris Paphitis (Cyprus University of Technology, Cyprus)
Nicolas Kourtellis (Telefonica Research, Spain)
Michael Sirivianos (Cyprus University of Technology, Cyprus)
The Impact of Synthetic Data on Membership Inference Attacks
Md Sakib Nizam Khan (KTH Royal Institute of Technology, Sweden)
Sonja Buchegger (KTH Royal Institute of Technology, Sweden)
Detection of Privacy-harming Social Media Posts in Italian
Federico Peiretti (University of Torino, Italy)
Ruggero G. Pensa (University of Torino, Italy)
Time Is On My Side: Forward-Replay Attacks to TOTP Authentication
Giuseppe Bianchi (University of Rome Tor Vergata / CNIT, Italy)
Lorenzo Valeriani (University of Rome Tor Vergata / CNIT, Italy)
Cyber Security Researchers on Online Social Networks: From the Lens of the UK's ACEs-CSR on Twitter
Mohamad Imad Mahaini (University of Kent, UK)
Shujun Li (University of Kent, UK)
Did State-sponsored Trolls Shape the 2016 US Presidential Election Discourse? Quantifying Influence on Twitter
Nikos Salamanos (Cyprus University of Technology, Cyprus)
Michael J. Jensen (University of Canberra, Australia)
Costas Iordanou (Cyprus University of Technology, Cyprus)
Michael Sirivianos (Cyprus University of Technology, Cyprus)
Secure and Efficient Data Processing for Cloud Computing with Fine-Grained Access Control
Jingjing Wang (State Grid Hubei Electric Power Co., Ltd. Information Communication Company, China)
Hao Feng (State Grid Hubei Electric Power Co., Ltd. Information Communication Company, China)
Zheng Yu (State Grid Hubei Electric Power Co., Ltd. Information Communication Company, China)
Rongtao Liao (State Grid Hubei Electric Power Co., Ltd. Information Communication Company, China)
Shi Chen (State Grid Hubei Electric Power Co., Ltd. Information Communication Company, China)
Ting Liang (Wuhan University of Technology, China)

Short Papers

Edge Local Differential Privacy for Dynamic Graphs
Sudipta Paul (Umeå University, Sweden)
Julián Salas (Universitat Oberta de Catalunya, Spain)
Vicenç Torra (Umeå University, Sweden)
Temporal Analysis of Privacy Enhancing Technology Traffic using Deep Learning
Monika Kumari (Goldman Sachs, India)
Mohona Ghosh (Indira Gandhi Delhi Technical University for Women, India)
Niyati Baliyan (National Institute of Technology, Kurukshetra, India)
The Social and Technological Incentives for Cybercriminals to Engage in Ransomware Activities
Yichao Wang (University of Kent, UK)
Sophia Roscoe (University of Kent, UK)
Budi Arief (University of Kent, UK)
Lena Connolly (Zayed University, UAE)
Hervé Borrion (University College London, UK)
Sanaa Kaddoura (Zayed University, UAE)
Extracting common features of fake news by Multi-Head-Attention
Takayuki Ishimaru (National Defense Academy of Japan, Japan)
Mamoru Mimura (National Defense Academy of Japan, Japan)
Institute of Cyber Security for Society (iCSS), University of Kent
NSCLab
Singapore Management University
University of Insubria, Italy
Universität der Bundeswehr München, Germany
Osaka University, Japan
University of Pisa (Università di Pisa), Italy
Cyprus University of Technology