Availability, Reliability and Security
Springer International Publishing (Verlag)
978-3-032-00626-4 (ISBN)
This two-volume set LNCS 15992-15993 constitutes the proceedings of the 20th International Conference on Availability, Reliability and Security, ARES 2025, in Ghent, Belgium, during August 11-14, 2025.
The 34 full papers presented in this book together with 8 short papers were carefully reviewed and selected from 186 submissions.
They cover topics such as: Privacy-Enhancing Technologies and Legal Compliance; Network and Communication Security; IoT and Embedded Systems Security; Machine Learning and Privacy; Usable Security and Awareness; System Security; Supply Chain Security, Malware and Forensics; and Machine Learning and Security.
Usable Security and Awareness: QRisk: Think Before You Scan QR codes.- Evaluating Argon2 Adoption and Effectiveness in Real-World Software.- AdvisoryHub: Design and Evaluation of a Cross-Platform Security Advisory System for Cyber Situational Awareness.- Service-aware password risk meter Helping users to choose suitable passwords in services. System Security: TEE-Assisted Recovery and Upgrades for Long-Running BFT Services.- Fast and Efficient Secure L1 Caches for SMT.- FatPTE - Expanding Page Table Entries for Security.- CHERI UNCHAINED: Generic Instruction and Register Control for CHERI Capabilities.- Exploring speculation barriers for RISC-V selective speculation.- Do we still need canaries in the coal mine? Measuring shadow stack effectiveness in countering stack smashing. Supply Chain Security, Malware and Forensics: SoK: Towards Reproducibility for Software Packages in Scripting Language Ecosystems.- Clustering Malware at Scale: A First Full-Benchmark Study.- Advances in Automotive Digital Forensics: Recent Trends and Future Directions.- Exploring the Susceptibility to Fraud of Monetary Incentive Mechanisms for Strengthening FOSS Projects. Machine Learning and Security: Multi-Agent Simulation and Reinforcement Learning to Optimize Moving Target Defense.- LeaX: Class-Focused Explanations for Locating Leakage in Learning-based Profiling Attacks.- Large Language Models are Unreliable for Cyber Threat Intelligence.- Augmented Tabular Adversarial Evasion Attacks with Constraint Satisfaction Guarantees.- TTP Classification with Minimal Labeled Data: A Retrieval-Based Few-Shot Learning Approach.- C2 Beaconing Detection via AI-based Time-Series Analysis.- Fooling Rate and Perceptual Similarity: A Study on the Effectiveness and Quality of DCGAN-based Adversarial Attacks.
| Erscheinungsdatum | 24.07.2025 |
|---|---|
| Reihe/Serie | Lecture Notes in Computer Science |
| Zusatzinfo | XXI, 433 p. 96 illus., 86 illus. in color. |
| Verlagsort | Cham |
| Sprache | englisch |
| Maße | 155 x 235 mm |
| Themenwelt | Informatik ► Netzwerke ► Sicherheit / Firewall |
| Schlagworte | Communication Security • Dependability • embedded systems security • Forensics • IoT security • Malware • Network Security • privacy • Privacy-Enhancing Technologies • Reliability • security • Security Awareness • System Security |
| ISBN-10 | 3-032-00626-0 / 3032006260 |
| ISBN-13 | 978-3-032-00626-4 / 9783032006264 |
| Zustand | Neuware |
| Informationen gemäß Produktsicherheitsverordnung (GPSR) | |
| Haben Sie eine Frage zum Produkt? |
aus dem Bereich