{"id":"https://openalex.org/W4384030645","doi":"https://doi.org/10.5220/0012079300003555","title":"Defeating MageCart Attacks in a NAISS Way","display_name":"Defeating MageCart Attacks in a NAISS Way","publication_year":2023,"publication_date":"2023-01-01","ids":{"openalex":"https://openalex.org/W4384030645","doi":"https://doi.org/10.5220/0012079300003555"},"language":"en","primary_location":{"id":"doi:10.5220/0012079300003555","is_oa":true,"landing_page_url":"https://doi.org/10.5220/0012079300003555","pdf_url":null,"source":null,"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 20th International Conference on Security and Cryptography","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.5220/0012079300003555","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5092452893","display_name":"C\u0103t\u0103lin Rus","orcid":null},"institutions":[{"id":"https://openalex.org/I94624287","display_name":"University of Twente","ror":"https://ror.org/006hf6230","country_code":"NL","type":"education","lineage":["https://openalex.org/I94624287"]}],"countries":["NL"],"is_corresponding":true,"raw_author_name":"C\u0103t\u0103lin Rus","raw_affiliation_strings":["EEMCS/SCS, University of Twente, Drienerlolaan 5, Enschede, Netherlands, --- Select a Country ---"],"affiliations":[{"raw_affiliation_string":"EEMCS/SCS, University of Twente, Drienerlolaan 5, Enschede, Netherlands, --- Select a Country ---","institution_ids":["https://openalex.org/I94624287"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5065751714","display_name":"Dipti Kapoor Sarmah","orcid":"https://orcid.org/0000-0002-0802-4280"},"institutions":[{"id":"https://openalex.org/I94624287","display_name":"University of Twente","ror":"https://ror.org/006hf6230","country_code":"NL","type":"education","lineage":["https://openalex.org/I94624287"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Dipti Sarmah","raw_affiliation_strings":["EEMCS/SCS, University of Twente, Drienerlolaan 5, Enschede, Netherlands, --- Select a Country ---"],"affiliations":[{"raw_affiliation_string":"EEMCS/SCS, University of Twente, Drienerlolaan 5, Enschede, Netherlands, --- Select a Country ---","institution_ids":["https://openalex.org/I94624287"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5055409973","display_name":"Mohammed El\u2010Hajj","orcid":"https://orcid.org/0000-0002-4022-9999"},"institutions":[{"id":"https://openalex.org/I94624287","display_name":"University of Twente","ror":"https://ror.org/006hf6230","country_code":"NL","type":"education","lineage":["https://openalex.org/I94624287"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Mohammed El-Hajj","raw_affiliation_strings":["EEMCS/SCS, University of Twente, Drienerlolaan 5, Enschede, Netherlands, --- Select a Country ---"],"affiliations":[{"raw_affiliation_string":"EEMCS/SCS, University of Twente, Drienerlolaan 5, Enschede, Netherlands, --- Select a Country ---","institution_ids":["https://openalex.org/I94624287"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5092452893"],"corresponding_institution_ids":["https://openalex.org/I94624287"],"apc_list":null,"apc_paid":null,"fwci":0.7314,"has_fulltext":true,"cited_by_count":6,"citation_normalized_percentile":{"value":0.72368455,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"691","last_page":"697"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9969000220298767,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9955000281333923,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7270506024360657},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7108874917030334},{"id":"https://openalex.org/keywords/payment","display_name":"Payment","score":0.6003506183624268},{"id":"https://openalex.org/keywords/server-side","display_name":"Server-side","score":0.5791349411010742},{"id":"https://openalex.org/keywords/steganography","display_name":"Steganography","score":0.48330095410346985},{"id":"https://openalex.org/keywords/client-side","display_name":"Client-side","score":0.4727552533149719},{"id":"https://openalex.org/keywords/state","display_name":"State (computer science)","score":0.44600051641464233},{"id":"https://openalex.org/keywords/proof-of-concept","display_name":"Proof of concept","score":0.4449041485786438},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.258522093296051},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.238386869430542},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.11549556255340576},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.1132357120513916}],"concepts":[{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7270506024360657},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7108874917030334},{"id":"https://openalex.org/C145097563","wikidata":"https://www.wikidata.org/wiki/Q1148747","display_name":"Payment","level":2,"score":0.6003506183624268},{"id":"https://openalex.org/C14414571","wikidata":"https://www.wikidata.org/wiki/Q519081","display_name":"Server-side","level":2,"score":0.5791349411010742},{"id":"https://openalex.org/C108801101","wikidata":"https://www.wikidata.org/wiki/Q15032","display_name":"Steganography","level":3,"score":0.48330095410346985},{"id":"https://openalex.org/C202477664","wikidata":"https://www.wikidata.org/wiki/Q1352449","display_name":"Client-side","level":2,"score":0.4727552533149719},{"id":"https://openalex.org/C48103436","wikidata":"https://www.wikidata.org/wiki/Q599031","display_name":"State (computer science)","level":2,"score":0.44600051641464233},{"id":"https://openalex.org/C124978682","wikidata":"https://www.wikidata.org/wiki/Q1201019","display_name":"Proof of concept","level":2,"score":0.4449041485786438},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.258522093296051},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.238386869430542},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.11549556255340576},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.1132357120513916},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.5220/0012079300003555","is_oa":true,"landing_page_url":"https://doi.org/10.5220/0012079300003555","pdf_url":null,"source":null,"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 20th International Conference on Security and Cryptography","raw_type":"proceedings-article"},{"id":"pmh:oai:ris.utwente.nl:publications/ceb02b4b-4a8a-4c38-8659-e21252fe1e7e","is_oa":true,"landing_page_url":"https://research.utwente.nl/en/publications/ceb02b4b-4a8a-4c38-8659-e21252fe1e7e","pdf_url":"https://ris.utwente.nl/ws/files/312508814/120793.pdf","source":{"id":"https://openalex.org/S4406922991","display_name":"University of Twente Research Information","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Rus, C, Sarmah, D K & El-hajj, M 2023, Defeating MageCart Attacks in a NAISS Way. in S De Capitani di Vimercati & P Samarati (eds), Proceedings of the 20th International Conference on Security and Cryptography (SECRYPT 2023). vol. 1, SCITEPRESS, Set\u00fabal, Portugal, pp. 691-697, 20th International Conference on Security and Cryptography, SECRYPT 2023, Rome, Italy, 10/07/23. https://doi.org/10.5220/0012079300003555","raw_type":"info:eu-repo/semantics/publishedVersion"}],"best_oa_location":{"id":"doi:10.5220/0012079300003555","is_oa":true,"landing_page_url":"https://doi.org/10.5220/0012079300003555","pdf_url":null,"source":null,"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 20th International Conference on Security and Cryptography","raw_type":"proceedings-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/5","display_name":"Gender equality","score":0.5699999928474426}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":11,"referenced_works":["https://openalex.org/W178376221","https://openalex.org/W1551852676","https://openalex.org/W2074196621","https://openalex.org/W2145536509","https://openalex.org/W2288209052","https://openalex.org/W2518442919","https://openalex.org/W2773981827","https://openalex.org/W4281483860","https://openalex.org/W4285101324","https://openalex.org/W4288070087","https://openalex.org/W4288636824"],"related_works":["https://openalex.org/W4302890120","https://openalex.org/W3005688497","https://openalex.org/W4322735059","https://openalex.org/W4301042531","https://openalex.org/W4319448716","https://openalex.org/W2993438822","https://openalex.org/W3003811204","https://openalex.org/W3014448854","https://openalex.org/W4387881033","https://openalex.org/W4299870243"],"abstract_inverted_index":{"MageCart":[0],"attacks":[1],"pose":[2],"a":[3,42],"security":[4],"threat":[5],"to":[6,12,22,50],"E-commerce":[7],"platforms":[8],"by":[9,20],"using":[10],"e-skimmers":[11],"steal":[13],"payment":[14],"details.":[15],"Image":[16],"steganography":[17],"is":[18],"used":[19],"attackers":[21],"conceal":[23],"e-skimmers,":[24],"making":[25],"detection":[26],"challenging.":[27],"Existing":[28],"solutions":[29],"have":[30],"limitations,":[31],"such":[32],"as":[33],"incompatibility":[34],"or":[35],"insufficient":[36],"functionality.":[37],"This":[38],"research":[39],"proposes":[40],"NAISS,":[41,65],"server-side":[43],"middlebox":[44],"solution":[45],"that":[46],"leverages":[47],"digital":[48],"signatures":[49],"filter":[51],"unauthorized":[52],"images":[53],"without":[54],"requiring":[55],"client-side":[56],"modifications.":[57],"The":[58],"proof-of-concept":[59],"implementation":[60],"demonstrates":[61],"the":[62,71],"efficacy":[63],"of":[64,68,70],"filtering":[66],"100%":[67],"state":[69],"art":[72],"stegoimages,":[73],"while":[74],"indicating":[75],"areas":[76],"for":[77],"further":[78],"improvement.":[79]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":1}],"updated_date":"2026-03-17T17:19:04.345684","created_date":"2025-10-10T00:00:00"}
