Description |
1 online resource (250 pages) |
Series |
Lecture Notes in Computer Science ; 12835 |
|
LNCS sublibrary, SL 4, Security and cryptology |
|
Lecture notes in computer science ; 12835.
|
|
LNCS sublibrary. SL 4, Security and cryptology.
|
Contents |
Intro -- Preface -- IWSEC 2021 16th International Workshop on Security Organization -- Contents -- Lattice-Based Cryptography -- A Trace Map Attack Against Special Ring-LWE Samples -- 1 Introduction -- 2 Preliminaries from Lattices to LWE Problems -- 2.1 Mathematical and Algorithmic Background on Lattices -- 2.2 LWE and Ring-LWE Problems -- 3 A Trace Map Attack Against the Ring-LWE Problem -- 3.1 Special Pairs of Ring-LWE Samples -- 3.2 A Trace Map Attack Against Special Pairs of Ring-LWE Samples -- 3.3 Comparison with the Standard Attack |
|
4 (In)feasibility of Trace Map Attack for Random Samples -- 5 Conclusion -- References -- Shortest Vectors in Lattices of Bai-Galbraith's Embedding Attack on the LWR Problem -- 1 Introduction -- 1.1 Contribution -- 1.2 Organization -- 2 Preliminaries -- 2.1 Notation -- 2.2 Lattices -- 2.3 Search-LWE and Search-LWR Problems -- 2.4 Transformation of LWR to LWE -- 3 Embedding Attacks Against LWE -- 3.1 Kannan's Embedding Attack -- 3.2 Bai-Galbraith's Embedding Attack -- 4 Our Analysis of Shortest Vectors in BG-Lattices -- 5 Second Shortest Vectors in BG-lattices |
|
5.1 Probability Distribution of ""026B30D ec""026B30D 2 -- 5.2 Lower Bound of Probability -- 5.3 Experimental Results -- 6 Conclusion -- References -- System Security -- KPRM: Kernel Page Restriction Mechanism to Prevent Kernel Memory Corruption -- 1 Introduction -- 2 Background -- 2.1 Address Space and Page Table -- 2.2 Kernel Memory Corruption Vulnerability -- 3 Threat Model -- 4 Design and Implementation -- 4.1 Design Requirements of the KPRM -- 4.2 Design Overview -- 4.3 Kernel Page Types -- 4.4 Restricted Kernel Page Object -- 4.5 Timing of Restricted Kernel Page Management |
|
4.6 Attack Situations -- 4.7 Implementation -- 4.8 Case Study -- 5 Evaluation -- 5.1 Purpose and Environment -- 5.2 Prevention of Vulnerable Kernel Code Access and Kernel Memory Corruption -- 5.3 Measurement of System Call Overhead -- 5.4 Measurement of Application Overhead -- 6 Discussion -- 6.1 Kernel Resilience -- 6.2 Performance Evaluation -- 6.3 Limitation -- 6.4 Portability -- 7 Related Work -- 7.1 Comparison with Related Work -- 8 Conclusion -- References -- (Short Paper) Evidence Collection and Preservation System with Virtual Machine Monitoring -- 1 Introduction -- 1.1 Background |
|
1.2 Attack Model -- 1.3 Related Work -- 1.4 Our Contribution -- 2 Issues on Existing Evidence Collection Systems -- 3 Evidence Collection and Preservation System (ECoPS) -- 3.1 Requirements -- 3.2 Design Criteria for ECoPS -- 4 Evidence Collection Mechanism -- 4.1 Library File Path Names -- 4.2 Hash Values of Library Files -- 4.3 Consideration of Ways to Collect Other Information -- 5 Evaluation -- 6 Conclusion -- References -- Multiparty Computation -- Evolving Homomorphic Secret Sharing for Hierarchical Access Structures -- 1 Introduction -- 1.1 Our Contributions -- 1.2 Our Approach -- 1.3 Related Works |
Summary |
This book constitutes the refereed proceedings of the 16th International Workshop on Security, IWSEC 2021, held in Tokyo, Japan in September 2021. The conference was held virtually due to COVID-19 pandemic. The 14 regular papers and 3 short paper presented in this volume were carefully reviewed and selected from 37 submissions. They were organized in topical sections named: Lattice-Based Cryptography; System Security; Multiparty Computation; Machine Learning and Security; Post-quantum Cryptography; Symmetric-key Cryptography; Game Theory and Security |
Notes |
Includes author index |
|
Print version record |
Subject |
Computer security -- Congresses
|
|
Computer security
|
Genre/Form |
proceedings (reports)
|
|
Conference papers and proceedings
|
|
Conference papers and proceedings.
|
|
Actes de congrès.
|
Form |
Electronic book
|
Author |
Nakanishi, Tōru, editor.
|
|
Nojima, Ryo, editor
|
ISBN |
9783030859879 |
|
3030859878 |
|