Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleJuly 2024
Trustworthiness and explainability of a watermarking and machine learning-based system for image modification detection to combat disinformation
- Andrea Rosales,
- Agnieszka Malanowska,
- Tanya Koohpayeh Araghi,
- Minoru Kuribayashi,
- Marcin Kowalczyk,
- Daniel Blanche-Tarragó,
- Wojciech Mazurczyk,
- David Megías
ARES '24: Proceedings of the 19th International Conference on Availability, Reliability and SecurityArticle No.: 76, Pages 1–10https://doi.org/10.1145/3664476.3670934The widespread use of digital platforms, prioritising content based on engagement metrics and rewarding content creators accordingly, has contributed to the proliferation of disinformation and its far-reaching social and political impact. In addition, ...
- research-articleJune 2024
Towards Enhanced Data Integrity and Accountability: Leveraging Blockchain Technology in Healthcare
PETRA '24: Proceedings of the 17th International Conference on PErvasive Technologies Related to Assistive EnvironmentsPages 587–592https://doi.org/10.1145/3652037.3663889The management of electronic health records in modern healthcare systems is crucial. To ensure confidentiality, integrity, and accessibility, regulations such as GDPR and HIPAA have been established in several countries. Various research studies have ...
- research-articleAugust 2024
ProtAIN: Protecting the Authenticity and Integrity Properties of NFT Images
CompSysTech '24: Proceedings of the International Conference on Computer Systems and Technologies 2024Pages 16–23https://doi.org/10.1145/3674912.3674931Non-Fungible Tokens (or, for short, NFT) establish the ownership and the authenticity of digital assets. Regardless the high security levels provided by blockchain, are not excluded the cases where the ownership of a digital object may be claimed ...
- research-articleJune 2024
Disinformation detection and source tracking using semi-fragile watermarking and blockchain
EICC '24: Proceedings of the 2024 European Interdisciplinary Cybersecurity ConferencePages 136–143https://doi.org/10.1145/3655693.3655718A blind semi-fragile watermarking scheme for disinformation detection in online social media (OSM) is presented. The proposed scheme can be used for both images and videos. We also propose a blockchain-based framework for traceability and propagation ...
- research-articleJanuary 2024
Integrity-based Explanations for Fostering Appropriate Trust in AI Agents
ACM Transactions on Interactive Intelligent Systems (TIIS), Volume 14, Issue 1Article No.: 4, Pages 1–36https://doi.org/10.1145/3610578Appropriate trust is an important component of the interaction between people and AI systems, in that “inappropriate” trust can cause disuse, misuse, or abuse of AI. To foster appropriate trust in AI, we need to understand how AI systems can elicit ...
-
- research-articleMay 2024
An Adaptive Image Watermarking based on Bellman-Ford Algorithm
ICFNDS '23: Proceedings of the 7th International Conference on Future Networks and Distributed SystemsPages 357–365https://doi.org/10.1145/3644713.3644762Ensuring the integrity and authenticity of images is a paramount task in the digital multimedia context. The emergence of digital technologies necessitates the development of robust techniques to safeguard medical images against tampering or ...
- research-articleAugust 2023
Confidential Quantum Computing
ARES '23: Proceedings of the 18th International Conference on Availability, Reliability and SecurityArticle No.: 46, Pages 1–10https://doi.org/10.1145/3600160.3604982Quantum computing is becoming more accessible with increasing numbers of quantum platforms. The confidentiality and integrity of data and algorithms running on these systems are important assets that need to be protected from untrusted parties. Previous ...
- research-articleJuly 2023
HMT: A Hardware-centric Hybrid Bonsai Merkle Tree Algorithm for High-performance Authentication
ACM Transactions on Embedded Computing Systems (TECS), Volume 22, Issue 4Article No.: 64, Pages 1–28https://doi.org/10.1145/3595179The Bonsai Merkle tree (BMT) is a widely used tree structure for authentication of metadata such as encryption counters in a secure computing system. Common BMT algorithms were designed for traditional Von Neumann architectures with a software-centric ...
- research-articleDecember 2022
MProbe: Make the code probing meaningless
ACSAC '22: Proceedings of the 38th Annual Computer Security Applications ConferencePages 214–226https://doi.org/10.1145/3564625.3567967Modern security methods use address space layout randomization (ASLR) to defend against code reuse attacks (CRAs). However, code probing can still obtain the content and address of the code through code probing. Code probing invalidates the widely used ...
- research-articleOctober 2021
A Comparative Analysis Between Information Flow Control Tools for Java-written systems
SBCARS '21: Proceedings of the 15th Brazilian Symposium on Software Components, Architectures, and ReusePages 80–89https://doi.org/10.1145/3483899.3483901Information Flow Control (IFC) tools are a common way to analyze source code with the goal to find confidentiality or integrity violations for sensitive information. Therefore, to correctly protect such information (e.g., passwords), it is important to ...
- research-articleFebruary 2021
Information Integrity: Are We There Yet?
ACM Computing Surveys (CSUR), Volume 54, Issue 2Article No.: 33, Pages 1–35https://doi.org/10.1145/3436817The understanding and promotion of integrity in information security has traditionally been underemphasized or even ignored. From implantable medical devices and electronic voting to vehicle control, the critical importance of information integrity to ...
- research-articleMay 2020
Verification of Integrity in Vehicle Architectures
NISS '20: Proceedings of the 3rd International Conference on Networking, Information Systems & SecurityArticle No.: 64, Pages 1–7https://doi.org/10.1145/3386723.3387883The draft version of ISO 21434 demands, among others, the verification of the car architecture with respect to the enforcement of the security goals. We present a distinct definition of integrity as a system property as well as a formal modeling and ...
- research-articleMarch 2020
ACIDroid: a practical app cache integrity protection system on Android Runtime
SAC '20: Proceedings of the 35th Annual ACM Symposium on Applied ComputingPages 376–383https://doi.org/10.1145/3341105.3374037To improve the execution performance of applications, Android introduced a new optimization technique using app cache. This new feature not only improves the performance of Android applications but exposes a new attack surface to be compromised. ...
- research-articleMay 2020
A Model-driven Collaborative Modeling Method for Software
ICMSS 2020: Proceedings of the 2020 4th International Conference on Management Engineering, Software Engineering and Service SciencesPages 11–15https://doi.org/10.1145/3380625.3380643In this paper, a model-driven software collaborative modeling method is proposed, and a software collaborative modeling framework on model assembly and model updating is established. The composability of models, the integrity of model assembly and the ...
- research-articleJuly 2019
Solar Energy Distribution Using Blockchain and IoT Integration
IECC '19: Proceedings of the 1st International Electronics Communication ConferencePages 118–123https://doi.org/10.1145/3343147.3343163This research focuses on the decentralised distribution of solar energy between networks using IoT (Internet of Things) enabled devices and Blockchain technology. IoT provides a medium for software part to interact with the physical part which is energy ...
- research-articleDecember 2018
Cloud technology based Information System for testing and certification centers
ICSENT 2018: Proceedings of the 7th International Conference on Software Engineering and New TechnologiesArticle No.: 31, Pages 1–3https://doi.org/10.1145/3330089.3330131Nowadays, the vehicles authorization which circulates on the Moroccan roads is delivered by local centers of technical visits which are approved by the Moroccan transport ministry. After investigation, we have raised a crucial problem concerning the ...
- research-articleOctober 2018
Homomorphic Encryption for Compressed Sensing in Wireless Sensor Networks
SCA '18: Proceedings of the 3rd International Conference on Smart City ApplicationsArticle No.: 80, Pages 1–6https://doi.org/10.1145/3286606.3286857Sensors are tiny devices with limited power (generally a battery for the full sensor lifetime) and reduced computing resources and memory. WSN are deployed for many applications like environment monitoring and health monitoring. In order to reduce the ...
- research-articleMarch 2018
A Method of Docker Container Forensics Based on API
ICCSP 2018: Proceedings of the 2nd International Conference on Cryptography, Security and PrivacyPages 159–164https://doi.org/10.1145/3199478.3199506As one of the main technologies supporting cloud computing virtualization, Docker is featured in its fast and lightweight virtualization which has been adopted by numerous platform-as-a-service (PaaS) systems, but forensics research for Docker has not ...
- research-articleFebruary 2018
Securing the Integrity of Workflows in IoT
EWSN ’18: Proceedings of the 2018 International Conference on Embedded Wireless Systems and NetworksPages 252–257In a multi-tenant, self-configuring IoT system, entities -- devices, services or "things" -- might know each other or might be complete strangers. The different owners will probably have different security goals and will want to impose their own ...
- research-articleFebruary 2017
A Dual Watermarking Scheme for Ownership Verification and Pixel Level Authentication
ICCAE '17: Proceedings of the 9th International Conference on Computer and Automation EngineeringPages 131–135https://doi.org/10.1145/3057039.3057042Breaches of multimedia security are increasing day by day as advancement in technologies have tightly coupled the globe and promoted easy sharing of multimedia content in no loss of time. A dual watermarking scheme ascertaining the rightful ownership ...