Limit search to available items
Book Cover
E-book
Author International Workshop on Security (16th : 2021 : Online)

Title Advances in Information and Computer Security : 16th International Workshop on Security, IWSEC 2021, Virtual Event, September 8-10, 2021, Proceedings / Toru Nakanishi, Ryo Nojima (Eds.)
Published Cham : Springer, 2021

Copies

Description 1 online resource (250 pages)
Series Lecture Notes in Computer Science ; 12835
LNCS sublibrary, SL 4, Security and cryptology
Lecture notes in computer science ; 12835.
LNCS sublibrary. SL 4, Security and cryptology.
Contents Intro -- Preface -- IWSEC 2021 16th International Workshop on Security Organization -- Contents -- Lattice-Based Cryptography -- A Trace Map Attack Against Special Ring-LWE Samples -- 1 Introduction -- 2 Preliminaries from Lattices to LWE Problems -- 2.1 Mathematical and Algorithmic Background on Lattices -- 2.2 LWE and Ring-LWE Problems -- 3 A Trace Map Attack Against the Ring-LWE Problem -- 3.1 Special Pairs of Ring-LWE Samples -- 3.2 A Trace Map Attack Against Special Pairs of Ring-LWE Samples -- 3.3 Comparison with the Standard Attack
4 (In)feasibility of Trace Map Attack for Random Samples -- 5 Conclusion -- References -- Shortest Vectors in Lattices of Bai-Galbraith's Embedding Attack on the LWR Problem -- 1 Introduction -- 1.1 Contribution -- 1.2 Organization -- 2 Preliminaries -- 2.1 Notation -- 2.2 Lattices -- 2.3 Search-LWE and Search-LWR Problems -- 2.4 Transformation of LWR to LWE -- 3 Embedding Attacks Against LWE -- 3.1 Kannan's Embedding Attack -- 3.2 Bai-Galbraith's Embedding Attack -- 4 Our Analysis of Shortest Vectors in BG-Lattices -- 5 Second Shortest Vectors in BG-lattices
5.1 Probability Distribution of ""026B30D ec""026B30D 2 -- 5.2 Lower Bound of Probability -- 5.3 Experimental Results -- 6 Conclusion -- References -- System Security -- KPRM: Kernel Page Restriction Mechanism to Prevent Kernel Memory Corruption -- 1 Introduction -- 2 Background -- 2.1 Address Space and Page Table -- 2.2 Kernel Memory Corruption Vulnerability -- 3 Threat Model -- 4 Design and Implementation -- 4.1 Design Requirements of the KPRM -- 4.2 Design Overview -- 4.3 Kernel Page Types -- 4.4 Restricted Kernel Page Object -- 4.5 Timing of Restricted Kernel Page Management
4.6 Attack Situations -- 4.7 Implementation -- 4.8 Case Study -- 5 Evaluation -- 5.1 Purpose and Environment -- 5.2 Prevention of Vulnerable Kernel Code Access and Kernel Memory Corruption -- 5.3 Measurement of System Call Overhead -- 5.4 Measurement of Application Overhead -- 6 Discussion -- 6.1 Kernel Resilience -- 6.2 Performance Evaluation -- 6.3 Limitation -- 6.4 Portability -- 7 Related Work -- 7.1 Comparison with Related Work -- 8 Conclusion -- References -- (Short Paper) Evidence Collection and Preservation System with Virtual Machine Monitoring -- 1 Introduction -- 1.1 Background
1.2 Attack Model -- 1.3 Related Work -- 1.4 Our Contribution -- 2 Issues on Existing Evidence Collection Systems -- 3 Evidence Collection and Preservation System (ECoPS) -- 3.1 Requirements -- 3.2 Design Criteria for ECoPS -- 4 Evidence Collection Mechanism -- 4.1 Library File Path Names -- 4.2 Hash Values of Library Files -- 4.3 Consideration of Ways to Collect Other Information -- 5 Evaluation -- 6 Conclusion -- References -- Multiparty Computation -- Evolving Homomorphic Secret Sharing for Hierarchical Access Structures -- 1 Introduction -- 1.1 Our Contributions -- 1.2 Our Approach -- 1.3 Related Works
Summary This book constitutes the refereed proceedings of the 16th International Workshop on Security, IWSEC 2021, held in Tokyo, Japan in September 2021. The conference was held virtually due to COVID-19 pandemic. The 14 regular papers and 3 short paper presented in this volume were carefully reviewed and selected from 37 submissions. They were organized in topical sections named: Lattice-Based Cryptography; System Security; Multiparty Computation; Machine Learning and Security; Post-quantum Cryptography; Symmetric-key Cryptography; Game Theory and Security
Notes Includes author index
Print version record
Subject Computer security -- Congresses
Computer security
Genre/Form proceedings (reports)
Conference papers and proceedings
Conference papers and proceedings.
Actes de congrès.
Form Electronic book
Author Nakanishi, Tōru, editor.
Nojima, Ryo, editor
ISBN 9783030859879
3030859878
Other Titles IWSEC 2021