Skip to main content
  • Conference proceedings
  • © 2021

Information Security

24th International Conference, ISC 2021, Virtual Event, November 10–12, 2021, Proceedings

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 13118)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): ISC: International Conference on Information Security

Conference proceedings info: ISC 2021.

Buy it now

Buying options

eBook USD 64.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 84.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, access via your institution.

Table of contents (21 papers)

  1. Front Matter

    Pages i-xiii
  2. Cryptology

    1. Front Matter

      Pages 1-1
    2. Integer LWE with Non-subgaussian Error and Related Attacks

      • Tianyu Wang, Yuejun Liu, Jun Xu, Lei Hu, Yang Tao, Yongbin Zhou
      Pages 3-25
    3. Cryptanalysis of RSA Variants with Primes Sharing Most Significant Bits

      • Meryem Cherkaoui-Semmouni, Abderrahmane Nitaj, Willy Susilo, Joseph Tonien
      Pages 42-53
    4. A Non-interactive Multi-user Protocol for Private Authorised Query Processing on Genomic Data

      • Sara Jafarbeiki, Amin Sakzad, Shabnam Kasra Kermanshahi, Ron Steinfeld, Raj Gaire, Shangqi Lai
      Pages 70-94
    5. Bigdata-Facilitated Two-Party Authenticated Key Exchange for IoT

      • Bowen Liu, Qiang Tang, Jianying Zhou
      Pages 95-116
    6. Transparency Order of (n, m)-Functions—Its Further Characterization and Applications

      • Yu Zhou, Yongzhuang Wei, Hailong Zhang, Luyang Li, Enes Pasalic, Wenling Wu
      Pages 139-157
  3. Web and OS Security

    1. Front Matter

      Pages 159-159
    2. Browserprint: an Analysis of the Impact of Browser Features on Fingerprintability and Web Privacy

      • Seyed Ali Akhavani, Jordan Jueckstock, Junhua Su, Alexandros Kapravelos, Engin Kirda, Long Lu
      Pages 161-176
    3. TridentShell: a Covert and Scalable Backdoor Injection Attack on Web Applications

      • Xiaobo Yu, Weizhi Meng, Lei Zhao, Yining Liu
      Pages 177-194
    4. Andromeda: Enabling Secure Enclaves for the Android Ecosystem

      • Dimitris Deyannis, Dimitris Karnikis, Giorgos Vasiliadis, Sotiris Ioannidis
      Pages 195-217
  4. Network Security

    1. Front Matter

      Pages 219-219
    2. FEX – A Feature Extractor for Real-Time IDS

      • Andreas Schaad, Dominik Binder
      Pages 221-237
    3. Identifying Malicious DNS Tunnel Tools from DoH Traffic Using Hierarchical Machine Learning Classification

      • Rikima Mitsuhashi, Akihiro Satoh, Yong Jin, Katsuyoshi Iida, Takahiro Shinagawa, Yoshiaki Takai
      Pages 238-256
  5. Detection of Malware, Attacks and Vulnerabilities

    1. Front Matter

      Pages 257-257
    2. Hybroid: Toward Android Malware Detection and Categorization with Program Code and Network Traffic

      • Mohammad Reza Norouzian, Peng Xu, Claudia Eckert, Apostolis Zarras
      Pages 259-278
    3. A Novel Behavioural Screenlogger Detection System

      • Hugo Sbai, Jassim Happa, Michael Goldsmith
      Pages 279-295

Other Volumes

  1. Information Security

About this book

This book constitutes the proceedings of the 24rd International Conference on Information Security, ISC 2021, held virtually, in November 2021.

The 21 full papers presented in this volume were carefully reviewed and selected from 87 submissions. The papers categorized into the following topical subheadings: cryptology; web and OS security; network security; detection of malware, attacks and vulnerabilities; and machine learning for security.  

Keywords

  • artificial intelligence
  • authentication
  • communication channels (information theory)
  • communication systems
  • computer crime
  • computer networks
  • computer science
  • computer security
  • computer systems
  • cryptography
  • data security
  • engineering
  • internet
  • machine learning
  • mathematics
  • network protocols
  • network security
  • public key cryptography
  • signal processing
  • telecommunication systems

Editors and Affiliations

  • Monash University, Clayton, Australia

    Joseph K. Liu

  • Norwegian University of Science and Technology, Gjøvik, Norway

    Sokratis Katsikas

  • Technical University of Denmark, Kongens Lyngby, Denmark

    Weizhi Meng

  • University of Wollongong, Wollongong, Australia

    Willy Susilo

  • Petra Christian University, Surabaya, Indonesia

    Rolly Intan

Bibliographic Information

  • Book Title: Information Security

  • Book Subtitle: 24th International Conference, ISC 2021, Virtual Event, November 10–12, 2021, Proceedings

  • Editors: Joseph K. Liu, Sokratis Katsikas, Weizhi Meng, Willy Susilo, Rolly Intan

  • Series Title: Lecture Notes in Computer Science

  • DOI: https://doi.org/10.1007/978-3-030-91356-4

  • Publisher: Springer Cham

  • eBook Packages: Computer Science, Computer Science (R0)

  • Copyright Information: Springer Nature Switzerland AG 2021

  • Softcover ISBN: 978-3-030-91355-7Published: 27 November 2021

  • eBook ISBN: 978-3-030-91356-4Published: 26 November 2021

  • Series ISSN: 0302-9743

  • Series E-ISSN: 1611-3349

  • Edition Number: 1

  • Number of Pages: XIII, 416

  • Number of Illustrations: 25 b/w illustrations, 77 illustrations in colour

  • Topics: Systems and Data Security

Buy it now

Buying options

eBook USD 64.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 84.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access