{"id":"https://openalex.org/W2746818215","doi":"https://doi.org/10.1145/3133956.3133981","title":"Algorithm Substitution Attacks from a Steganographic Perspective","display_name":"Algorithm Substitution Attacks from a Steganographic Perspective","publication_year":2017,"publication_date":"2017-10-27","ids":{"openalex":"https://openalex.org/W2746818215","doi":"https://doi.org/10.1145/3133956.3133981","mag":"2746818215"},"language":"en","primary_location":{"id":"doi:10.1145/3133956.3133981","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3133956.3133981","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"preprint","indexed_in":["arxiv","crossref","datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://arxiv.org/pdf/1708.06199","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5017991461","display_name":"Sebastian Berndt","orcid":"https://orcid.org/0000-0003-4177-8081"},"institutions":[{"id":"https://openalex.org/I9341345","display_name":"University of L\u00fcbeck","ror":"https://ror.org/00t3r8h32","country_code":"DE","type":"education","lineage":["https://openalex.org/I9341345"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Sebastian Berndt","raw_affiliation_strings":["University of L\u00fcbeck, L\u00fcbeck, Germany"],"affiliations":[{"raw_affiliation_string":"University of L\u00fcbeck, L\u00fcbeck, Germany","institution_ids":["https://openalex.org/I9341345"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5001544783","display_name":"Maciej Li\u015bkiewicz","orcid":"https://orcid.org/0000-0003-0059-5086"},"institutions":[{"id":"https://openalex.org/I9341345","display_name":"University of L\u00fcbeck","ror":"https://ror.org/00t3r8h32","country_code":"DE","type":"education","lineage":["https://openalex.org/I9341345"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Maciej Li\u015bkiewicz","raw_affiliation_strings":["University of L\u00fcbeck, L\u00fcbeck, Germany"],"affiliations":[{"raw_affiliation_string":"University of L\u00fcbeck, L\u00fcbeck, Germany","institution_ids":["https://openalex.org/I9341345"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5017991461"],"corresponding_institution_ids":["https://openalex.org/I9341345"],"apc_list":null,"apc_paid":null,"fwci":1.37507783,"has_fulltext":true,"cited_by_count":10,"citation_normalized_percentile":{"value":0.8423409,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"1649","last_page":"1660"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6959318518638611},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6476147770881653},{"id":"https://openalex.org/keywords/steganography","display_name":"Steganography","score":0.6334941983222961},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5830693244934082},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5274363160133362},{"id":"https://openalex.org/keywords/authenticated-encryption","display_name":"Authenticated encryption","score":0.5164802074432373},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4946136176586151},{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.14047905802726746},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.13651242852210999}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6959318518638611},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6476147770881653},{"id":"https://openalex.org/C108801101","wikidata":"https://www.wikidata.org/wiki/Q15032","display_name":"Steganography","level":3,"score":0.6334941983222961},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5830693244934082},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5274363160133362},{"id":"https://openalex.org/C128619300","wikidata":"https://www.wikidata.org/wiki/Q15263584","display_name":"Authenticated encryption","level":3,"score":0.5164802074432373},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4946136176586151},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.14047905802726746},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.13651242852210999}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.1145/3133956.3133981","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3133956.3133981","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},{"id":"pmh:oai:arXiv.org:1708.06199","is_oa":true,"landing_page_url":"http://arxiv.org/abs/1708.06199","pdf_url":"https://arxiv.org/pdf/1708.06199","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":null},{"id":"mag:2746818215","is_oa":true,"landing_page_url":"https://arxiv.org/pdf/1708.06199.pdf","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"arXiv (Cornell University)","raw_type":null},{"id":"doi:10.48550/arxiv.1708.06199","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.1708.06199","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"pmh:oai:arXiv.org:1708.06199","is_oa":true,"landing_page_url":"http://arxiv.org/abs/1708.06199","pdf_url":"https://arxiv.org/pdf/1708.06199","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":null},"sustainable_development_goals":[{"score":0.7799999713897705,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320314997","display_name":"Strong","ror":"https://ror.org/041vyzr56"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2746818215.pdf","grobid_xml":"https://content.openalex.org/works/W2746818215.grobid-xml"},"referenced_works_count":18,"referenced_works":["https://openalex.org/W1479681406","https://openalex.org/W1499713421","https://openalex.org/W1594271205","https://openalex.org/W1595409123","https://openalex.org/W1835586838","https://openalex.org/W2017779503","https://openalex.org/W2052267638","https://openalex.org/W2105209441","https://openalex.org/W2112139527","https://openalex.org/W2116050022","https://openalex.org/W2139172211","https://openalex.org/W2149145634","https://openalex.org/W2161439181","https://openalex.org/W2577517899","https://openalex.org/W2789208004","https://openalex.org/W2949224125","https://openalex.org/W6639476995","https://openalex.org/W6732507142"],"related_works":["https://openalex.org/W2962928921","https://openalex.org/W180983570","https://openalex.org/W2017779503","https://openalex.org/W1479681406","https://openalex.org/W1966284004","https://openalex.org/W2406153758","https://openalex.org/W35692677","https://openalex.org/W2138669153","https://openalex.org/W2033838428","https://openalex.org/W1531355872","https://openalex.org/W1507808221","https://openalex.org/W376710638","https://openalex.org/W3191234075","https://openalex.org/W2949621765","https://openalex.org/W2571290829","https://openalex.org/W2157044047","https://openalex.org/W2354379805","https://openalex.org/W1497817432","https://openalex.org/W1499756206","https://openalex.org/W2084191607"],"abstract_inverted_index":{"The":[0],"goal":[1],"of":[2,20,57,68,107,147,154,158],"an":[3,17],"algorithm":[4],"substitution":[5],"attack":[6,12],"(ASA),":[7],"also":[8,103],"called":[9],"a":[10,21,25,49,65,88,130,165,176],"subversion":[11,95],"(SA),":[13],"is":[14,172],"to":[15,30,53,81,85,194,208,215],"replace":[16],"honest":[18,40],"implementation":[19],"cryptographic":[22,113],"tool":[23],"by":[24],"subverted":[26],"one":[27],"which":[28],"allows":[29,206],"leak":[31],"private":[32],"information":[33],"while":[34],"generating":[35],"output":[36],"indistinguishable":[37],"from":[38,144],"the":[39,83,105,112,125,145,150,156,181,223],"output.":[41],"Bellare,":[42,120],"Paterson,":[43],"and":[44,59,76,90,93,122,128,170,188,200,214],"Rogaway":[45],"provided":[46],"at":[47,118],"CRYPTO'14":[48],"formal":[50,204],"security":[51],"model":[52,80,127,184],"capture":[54],"this":[55,79,139,174],"kind":[56],"attacks":[58,96],"constructed":[60],"practically":[61],"implementable":[62],"ASAs":[63,108,143,169,192,211,220],"against":[64,97,133],"large":[66],"class":[67],"symmetric":[69],"encryption":[70,136],"schemes.":[71,100,137],"At":[72],"CCS'15,":[73,119],"Ateniese,":[74],"Magri,":[75],"Venturi":[77],"extended":[78],"allow":[82],"attackers":[84],"work":[86],"in":[87,109,161,222],"fully-adaptive":[89],"continuous":[91],"fashion":[92],"proposed":[94,129],"digital":[98],"signature":[99],"Both":[101],"papers":[102],"showed":[104],"impossibility":[106],"cases":[110],"where":[111],"tools":[114],"are":[115,212],"deterministic.":[116],"Also":[117],"Jaeger,":[121],"Kane":[123],"strengthened":[124],"original":[126],"universal":[131],"ASA":[132],"sufficiently":[134],"random":[135],"In":[138],"paper":[140],"we":[141],"analyze":[142],"perspective":[146],"steganography":[148,171,187],"-":[149],"well":[151],"known":[152,221],"concept":[153],"hiding":[155],"presence":[157],"secret":[159],"messages":[160],"legal":[162],"communications.":[163],"While":[164],"close":[166],"connection":[167],"between":[168],"known,":[173],"lacks":[175],"rigorous":[177],"treatment.":[178],"We":[179],"consider":[180],"common":[182],"computational":[183],"for":[185],"secret-key":[186],"prove":[189],"that":[190,210],"successful":[191],"correspond":[193],"secure":[195],"stegosystems":[196,213],"on":[197],"certain":[198],"channels":[199],"vice":[201],"versa.":[202],"This":[203],"proof":[205],"us":[207],"conclude":[209],"\"rediscover\"":[216],"several":[217],"results":[218],"concerning":[219],"steganographic":[224],"literature.":[225]},"counts_by_year":[{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":3},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":2},{"year":2018,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
