{"id":"https://openalex.org/W4312853820","doi":"https://doi.org/10.1109/iscc55528.2022.9912814","title":"Making Citizens' systems more Secure: Practical Encryption Bypassing and Countermeasures","display_name":"Making Citizens' systems more Secure: Practical Encryption Bypassing and Countermeasures","publication_year":2022,"publication_date":"2022-06-30","ids":{"openalex":"https://openalex.org/W4312853820","doi":"https://doi.org/10.1109/iscc55528.2022.9912814"},"language":"en","primary_location":{"id":"doi:10.1109/iscc55528.2022.9912814","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iscc55528.2022.9912814","pdf_url":null,"source":{"id":"https://openalex.org/S4363605780","display_name":"2022 IEEE Symposium on Computers and Communications (ISCC)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 IEEE Symposium on Computers and Communications (ISCC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://doi.org/10.1109/ISCC55528.2022.9912814","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5045245971","display_name":"Marios Adam Sirgiannis","orcid":null},"institutions":[{"id":"https://openalex.org/I21370196","display_name":"Aristotle University of Thessaloniki","ror":"https://ror.org/02j61yw88","country_code":"GR","type":"education","lineage":["https://openalex.org/I21370196"]}],"countries":["GR"],"is_corresponding":true,"raw_author_name":"Marios Adam Sirgiannis","raw_affiliation_strings":["School of Electrical and Computer Engineering, Aristotle University of Thessaloniki,Thessaloniki,Greece","School of Electrical and Computer Engineering, Aristotle University of Thessaloniki, Thessaloniki, Greece"],"affiliations":[{"raw_affiliation_string":"School of Electrical and Computer Engineering, Aristotle University of Thessaloniki,Thessaloniki,Greece","institution_ids":["https://openalex.org/I21370196"]},{"raw_affiliation_string":"School of Electrical and Computer Engineering, Aristotle University of Thessaloniki, Thessaloniki, Greece","institution_ids":["https://openalex.org/I21370196"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5106083747","display_name":"Charalampos Manifavas","orcid":null},"institutions":[{"id":"https://openalex.org/I8901234","display_name":"Foundation for Research and Technology Hellas","ror":"https://ror.org/052rphn09","country_code":"GR","type":"facility","lineage":["https://openalex.org/I8901234"]}],"countries":["GR"],"is_corresponding":false,"raw_author_name":"Charalampos Manifavas","raw_affiliation_strings":["Institute of Computer Science, Foundation of Research and Technology Hellas,Herakleion,Greece","Institute of Computer Science, Foundation of Research and Technology Hellas, Herakleion, Greece"],"affiliations":[{"raw_affiliation_string":"Institute of Computer Science, Foundation of Research and Technology Hellas,Herakleion,Greece","institution_ids":["https://openalex.org/I8901234"]},{"raw_affiliation_string":"Institute of Computer Science, Foundation of Research and Technology Hellas, Herakleion, Greece","institution_ids":["https://openalex.org/I8901234"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5032739499","display_name":"Ioannis Papaefstathiou","orcid":"https://orcid.org/0000-0001-6386-5616"},"institutions":[{"id":"https://openalex.org/I21370196","display_name":"Aristotle University of Thessaloniki","ror":"https://ror.org/02j61yw88","country_code":"GR","type":"education","lineage":["https://openalex.org/I21370196"]}],"countries":["GR"],"is_corresponding":false,"raw_author_name":"Ioannis Papaefstathiou","raw_affiliation_strings":["School of Electrical and Computer Engineering, Aristotle University of Thessaloniki,Thessaloniki,Greece","School of Electrical and Computer Engineering, Aristotle University of Thessaloniki, Thessaloniki, Greece"],"affiliations":[{"raw_affiliation_string":"School of Electrical and Computer Engineering, Aristotle University of Thessaloniki,Thessaloniki,Greece","institution_ids":["https://openalex.org/I21370196"]},{"raw_affiliation_string":"School of Electrical and Computer Engineering, Aristotle University of Thessaloniki, Thessaloniki, Greece","institution_ids":["https://openalex.org/I21370196"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5045245971"],"corresponding_institution_ids":["https://openalex.org/I21370196"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.1634346,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"7"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9865000247955322,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9865000247955322,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9670000076293945,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9480999708175659,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.8605870008468628},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7583203315734863},{"id":"https://openalex.org/keywords/on-the-fly-encryption","display_name":"On-the-fly encryption","score":0.7324625253677368},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.689490020275116},{"id":"https://openalex.org/keywords/plaintext","display_name":"Plaintext","score":0.6775890588760376},{"id":"https://openalex.org/keywords/40-bit-encryption","display_name":"40-bit encryption","score":0.560035765171051},{"id":"https://openalex.org/keywords/disk-encryption","display_name":"Disk encryption","score":0.5524015426635742},{"id":"https://openalex.org/keywords/attribute-based-encryption","display_name":"Attribute-based encryption","score":0.5448174476623535},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5026617050170898},{"id":"https://openalex.org/keywords/client-side-encryption","display_name":"Client-side encryption","score":0.48935121297836304},{"id":"https://openalex.org/keywords/filesystem-level-encryption","display_name":"Filesystem-level encryption","score":0.48892298340797424},{"id":"https://openalex.org/keywords/probabilistic-encryption","display_name":"Probabilistic encryption","score":0.4828117787837982},{"id":"https://openalex.org/keywords/multiple-encryption","display_name":"Multiple encryption","score":0.46223172545433044},{"id":"https://openalex.org/keywords/56-bit-encryption","display_name":"56-bit encryption","score":0.4595232903957367},{"id":"https://openalex.org/keywords/password","display_name":"Password","score":0.43399155139923096},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.231742262840271}],"concepts":[{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.8605870008468628},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7583203315734863},{"id":"https://openalex.org/C147977885","wikidata":"https://www.wikidata.org/wiki/Q117010","display_name":"On-the-fly encryption","level":3,"score":0.7324625253677368},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.689490020275116},{"id":"https://openalex.org/C92717368","wikidata":"https://www.wikidata.org/wiki/Q1162538","display_name":"Plaintext","level":3,"score":0.6775890588760376},{"id":"https://openalex.org/C158215988","wikidata":"https://www.wikidata.org/wiki/Q4637271","display_name":"40-bit encryption","level":3,"score":0.560035765171051},{"id":"https://openalex.org/C9368797","wikidata":"https://www.wikidata.org/wiki/Q117010","display_name":"Disk encryption","level":4,"score":0.5524015426635742},{"id":"https://openalex.org/C7646194","wikidata":"https://www.wikidata.org/wiki/Q4818713","display_name":"Attribute-based encryption","level":4,"score":0.5448174476623535},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5026617050170898},{"id":"https://openalex.org/C166501710","wikidata":"https://www.wikidata.org/wiki/Q5132476","display_name":"Client-side encryption","level":4,"score":0.48935121297836304},{"id":"https://openalex.org/C18319499","wikidata":"https://www.wikidata.org/wiki/Q5448402","display_name":"Filesystem-level encryption","level":4,"score":0.48892298340797424},{"id":"https://openalex.org/C54569210","wikidata":"https://www.wikidata.org/wiki/Q7246854","display_name":"Probabilistic encryption","level":3,"score":0.4828117787837982},{"id":"https://openalex.org/C184685986","wikidata":"https://www.wikidata.org/wiki/Q3505167","display_name":"Multiple encryption","level":3,"score":0.46223172545433044},{"id":"https://openalex.org/C46905813","wikidata":"https://www.wikidata.org/wiki/Q4640678","display_name":"56-bit encryption","level":4,"score":0.4595232903957367},{"id":"https://openalex.org/C109297577","wikidata":"https://www.wikidata.org/wiki/Q161157","display_name":"Password","level":2,"score":0.43399155139923096},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.231742262840271}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/iscc55528.2022.9912814","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iscc55528.2022.9912814","pdf_url":null,"source":{"id":"https://openalex.org/S4363605780","display_name":"2022 IEEE Symposium on Computers and Communications (ISCC)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 IEEE Symposium on Computers and Communications (ISCC)","raw_type":"proceedings-article"},{"id":"pmh:oai:zenodo.org:17414248","is_oa":true,"landing_page_url":"https://doi.org/10.1109/ISCC55528.2022.9912814","pdf_url":null,"source":{"id":"https://openalex.org/S4306400562","display_name":"Zenodo (CERN European Organization for Nuclear Research)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I67311998","host_organization_name":"European Organization for Nuclear Research","host_organization_lineage":["https://openalex.org/I67311998"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"info:eu-repo/semantics/conferencePaper"}],"best_oa_location":{"id":"pmh:oai:zenodo.org:17414248","is_oa":true,"landing_page_url":"https://doi.org/10.1109/ISCC55528.2022.9912814","pdf_url":null,"source":{"id":"https://openalex.org/S4306400562","display_name":"Zenodo (CERN European Organization for Nuclear Research)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I67311998","host_organization_name":"European Organization for Nuclear Research","host_organization_lineage":["https://openalex.org/I67311998"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"info:eu-repo/semantics/conferencePaper"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/1","display_name":"No poverty","score":0.6899999976158142}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2381892741","https://openalex.org/W1025240641","https://openalex.org/W2354820549","https://openalex.org/W2765754337","https://openalex.org/W4283388250","https://openalex.org/W2370942914","https://openalex.org/W4375867818","https://openalex.org/W222001389","https://openalex.org/W4360994575","https://openalex.org/W2776971952"],"abstract_inverted_index":{"Cryptography":[0],"is":[1,110,159,203,233],"used":[2,24,54],"to":[3,25,55,74,129,172,186,190,204,229,243],"protect":[4,26],"the":[5,49,57,65,78,89,92,95,101,108,119,138,173,191],"confidentiality,":[6],"integrity,":[7],"and":[8,113,141,177,211],"authenticity":[9],"of":[10,64,118,137,182,200,261],"information":[11],"by":[12,47],"preventing":[13],"unauthorized":[14],"users":[15],"from":[16,252],"accessing":[17,70],"or":[18,28,60],"modifying":[19],"them.":[20],"Encryption":[21],"techniques":[22,193],"are":[23,82,165],"personal":[27],"company":[29],"data.":[30],"This":[31,232],"work":[32],"demonstrates":[33],"practical":[34],"scenarios":[35,132],"where,":[36],"under":[37],"certain":[38,163,253],"conditions,":[39],"encryption":[40,50,58,102,148,158,195,207],"may":[41,149,239],"be":[42,75,150,209,226,230],"bypassed.":[43,152],"Bypassing":[44],"encryption,":[45],"either":[46],"recovering":[48],"key,":[51,59,90,93,96],"a":[52,61,98,221],"password":[53],"generate":[56],"plaintext":[62],"copy":[63,117],"encrypted":[66],"data,":[67],"allows":[68],"for":[69,85,194,236,249],"data":[71],"which":[72],"appear":[73],"inaccessible":[76],"in":[77,100,111,144,219],"first":[79],"place.":[80],"There":[81],"six":[83],"categories":[84,140],"bypassing":[86,157],"encryption:":[87],"find":[88],"guess":[91],"compel":[94],"exploit":[97],"flaw":[99],"scheme,":[103],"access":[104,171],"unencrypted":[105,116],"message":[106],"when":[107,162],"device":[109],"use":[112],"locate":[114],"an":[115],"message.":[120],"In":[121],"this":[122,201],"study":[123],"we":[124,154,178],"utilize":[125],"publicly":[126],"available":[127],"software":[128,168],"demonstrate":[130],"real-world":[131],"that":[133,156,223,238],"fall":[134],"into":[135],"most":[136],"aforementioned":[139],"show":[142],"how,":[143],"those":[145],"specific":[146],"cases,":[147],"successfully":[151],"Moreover,":[153],"underline":[155],"possible":[160],"only":[161],"conditions":[164],"met":[166],"(e.g.,":[167],"misconfiguration,":[169],"physical":[170],"target":[174],"device,":[175],"etc.)":[176],"highlight":[179,205],"each":[180],"one":[181],"them":[183],"so":[184],"as":[185,245,257],"effectively":[187],"suggest":[188],"countermeasures":[189],"demonstrated":[192],"bypassing.":[196],"The":[197],"main":[198],"aim":[199],"paper":[202],"how":[206],"can":[208,247],"bypassed":[210],"thus":[212],"make":[213],"citizens":[214,237],"set":[215],"up":[216],"their":[217],"system":[218],"such":[220,256],"way":[222],"it":[224],"would":[225],"more":[227],"difficult":[228],"hacked.":[231],"especially":[234],"important":[235],"have":[240],"limited":[241],"knowledge/exposure":[242],"technology":[244],"they":[246],"be,":[248],"example.":[250],"people":[251,260],"diversity":[254],"groups":[255],"elderly":[258],"and/or":[259],"very":[262],"low":[263],"income.":[264]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
