Professional Documents
Culture Documents
Full Chapter Security and Privacy in Communication Networks 16Th Eai International Conference Securecomm 2020 Washington DC Usa October 21 23 2020 Proceedings Part I Noseong Park PDF
Full Chapter Security and Privacy in Communication Networks 16Th Eai International Conference Securecomm 2020 Washington DC Usa October 21 23 2020 Proceedings Part I Noseong Park PDF
https://textbookfull.com/product/security-and-privacy-in-
communication-networks-16th-eai-international-conference-
securecomm-2020-washington-dc-usa-october-21-23-2020-proceedings-
part-ii-noseong-park/
https://textbookfull.com/product/security-and-privacy-in-
communication-networks-15th-eai-international-conference-
securecomm-2019-orlando-fl-usa-october-23-25-2019-proceedings-
part-ii-songqing-chen/
https://textbookfull.com/product/social-cultural-and-behavioral-
modeling-13th-international-conference-sbp-brims-2020-washington-
dc-usa-october-18-21-2020-proceedings-robert-thomson/
https://textbookfull.com/product/intelligent-computing-theories-
and-application-16th-international-conference-icic-2020-bari-
italy-october-2-5-2020-proceedings-part-i-de-shuang-huang/
https://textbookfull.com/product/computer-aided-
verification-32nd-international-conference-cav-2020-los-angeles-
ca-usa-july-21-24-2020-proceedings-part-i-shuvendu-k-lahiri/
https://textbookfull.com/product/applied-cryptography-and-
network-security-18th-international-conference-acns-2020-rome-
italy-october-19-22-2020-proceedings-part-i-mauro-conti/
Noseong Park · Kun Sun ·
Sara Foresti · Kevin Butler ·
Nitesh Saxena (Eds.)
335
Part 1
Lecture Notes of the Institute
for Computer Sciences, Social Informatics
and Telecommunications Engineering 335
123
Editors
Noseong Park Kun Sun
Yonsei University George Mason University
Seoul, Korea (Republic of) Fairfax, VA, USA
Sara Foresti Kevin Butler
Dipartimento di Informatica University of Florida
Universita degli Studi Gainesville, FL, USA
Milan, Milano, Italy
Nitesh Saxena
Division of Nephrology
University of Alabama
Birmingham, AL, USA
© ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2020
This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part of the
material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation,
broadcasting, reproduction on microfilms or in any other physical way, and transmission or information
storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now
known or hereafter developed.
The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication
does not imply, even in the absence of a specific statement, that such names are exempt from the relevant
protective laws and regulations and therefore free for general use.
The publisher, the authors and the editors are safe to assume that the advice and information in this book are
believed to be true and accurate at the date of publication. Neither the publisher nor the authors or the editors
give a warranty, expressed or implied, with respect to the material contained herein or for any errors or
omissions that may have been made. The publisher remains neutral with regard to jurisdictional claims in
published maps and institutional affiliations.
This Springer imprint is published by the registered company Springer Nature Switzerland AG
The registered company address is: Gewerbestrasse 11, 6330 Cham, Switzerland
Preface
We are delighted to introduce the proceedings of the 16th EAI International Conference
on Security and Privacy in Communication Networks (SecureComm 2020). This
conference has brought together researchers, developers, and practitioners from around
the world who are leveraging and developing security and privacy technology for a safe
and robust system or network.
These proceedings contain 60 papers, which were selected from 120 submissions
(an acceptance rate of 50%) from universities, national laboratories, and the private
sector from across the USA as well as other countries in Europe and Asia. All the
submissions went through an extensive review process by internationally-recognized
experts in cybersecurity.
Any successful conference requires the contributions of different stakeholder groups
and individuals, who have selflessly volunteered their time and energy in disseminating
the call for papers, submitting their research findings, participating in the peer reviews
and discussions, etc. First and foremost, we would like to offer our gratitude to the
entire Organizing Committee for guiding the entire process of the conference. We are
also deeply grateful to all the Technical Program Committee members for their time
and effort in reading, commenting, debating, and finally selecting the papers. We also
thank all the external reviewers for assisting the Technical Program Committee in their
particular areas of expertise as well as all the authors, participants, and session chairs
for their valuable contributions. Support from the Steering Committee and EAI staff
members was also crucial in ensuring the success of the conference. It was a great
privilege to work with such a large group of dedicated and talented individuals.
We hope that you found the discussions and interactions at SecureComm 2020,
which was held online, enjoyable and that the proceedings will simulate further
research.
Steering Committee
Imrich Chlamtac University of Trento, Italy
Guofei Gu Texas A&M University, USA
Peng Liu Penn State University, USA
Sencun Zhu Penn State University, USA
Organizing Committee
General Co-chairs
Kun Sun George Mason University, USA
Sara Foresti Università degli Studi di Milano, Italy
Local Chair
Hemant Purohit George Mason University, USA
Workshops Chair
Qi Li Tsinghua University, China
Publications Chair
Noseong Park Yonsei University, South Korea
Web Chair
Pengbin Feng George Mason University, USA
Panels Chair
Massimiliano Albanese George Mason University, USA
viii Organization
Tutorials Chair
Fabio Scotti Università degli Studi di Milano, Italy
The Bitcoin Hunter: Detecting Bitcoin Traffic over Encrypted Channels . . . . 152
Fatemeh Rezaei, Shahrzad Naseri, Ittay Eyal, and Amir Houmansadr
POQ: A Consensus Protocol for Private Blockchains Using Intel SGX . . . . . . 141
Golam Dastoger Bashar, Alejandro Anzola Avila, and Gaby G. Dagher
A Machine Learning Based Smartphone App for GPS Spoofing Detection . . . 235
Javier Campos, Kristen Johnson, Jonathan Neeley, Staci Roesch,
Farha Jahan, Quamar Niyaz, and Khair Al Shamaileh
1 Introduction
In recent years, email spear-phishing becomes the most effective cyber threat
against individual and business victims. It has been reported that 90% of data
c ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2020
Published by Springer Nature Switzerland AG 2020. All Rights Reserved
N. Park et al. (Eds.): SecureComm 2020, LNICST 335, pp. 1–22, 2020.
https://doi.org/10.1007/978-3-030-63086-7_1
2 M. M. Islam et al.
2 Related Work
A vast amount of research has been done to detect phishing and spear-
phishing attacks [9–15,18,27]. The majority of these works depend on email
content or headers. For instance, Ho et al. presented a learning-based classifier
to detect lateral spear-phishing by seeking malicious URLs embedded in the
phishing email [12,13]. However, these solutions will not work against motivated
adversaries trying to evade detection simply just by not adding any malicious
ULR or no URL at all in the phishing email.
Spear-phishing detectors like EmailProfiler [10] and IdentityMailer [27] also
depend on email headers and body to build behavioral profiles for each sender
based on stylometric features in the content, senders writing habits, common
recipients, usual email forwarding time, etc. New emails get compared with the
profile to measure the deviation determining whether they are spear-phishing
email or not. These solutions can not detect lateral spear-phishing emails when
the contents are carefully crafted to avoid deviation from the norm. Moreover,
they show a high false-positive rate (10%), which becomes unacceptable when it
comes to the large volume of emails in a real-world enterprise network.
Gascon et al. [11] proposed a context agnostic spear-phishing email detector
by building behavioral profiles for all senders in a given user mailbox. They
create such profiles from the common traits a sender follows while composing an
email, like attachments types, different header fields, etc. However, in the lateral
spear-phishing attack, email headers do not deviate from the usual structure as
it is coming from a legitimate account. In addition, building profiles for each
sender can induce massive overhead in large scale deployment.
Existing sender authentication protocols such as SPF [19], DKIM [8], and
DMARC [21] can not detect lateral spear-phishing emails because they are not
spoofed and composed from valid email accounts. Other solutions, such as signing
emails with PGP [6], S/MIME [24], or 2FA [3] can prevent the lateral spear-
phishing attack. Unfortunately, these techniques are not widely used because of
usability, manageability, and transparency issues [25,26,28]. Moreover, a recent
study showed that PGP signatures in the email could be spoofed as well [23].
Email Mutation 5
3 Threat Model
3.1 Attack Taxonomy
email from a compromised account, Alice, for instance, whom Bob already con-
nected with. EM can protect Bob against such an attack if both Bob and Alice
are agreed prior to use EM; therefore, they are in the VIP user list. EM also
protects VIP users from spoofing if the adversary impersonates any of the VIP
users in the phishing email.
Fig. 1. Email Mutation overview. Alice and Bob send emails using their shadow email
addresses (dashed line, single arrow).
4.1 Overview
Figure 1 depicts an overview of sender email address mutation, where two VIP
users Alice and Bob from an organization (org.com), agreed to use EM to protect
themselves against lateral spear-phishing attacks. Previously, they communicate
with each other using their real email address (double arrow solid line), called
Real channel communication (RCC). However, after EM starts, each VIP user
gets a list of shadow email accounts. For instance, Alice and Bob get n and m
number of shadow email accounts (addresses), respectively. Thus, each new email
Alice composes for Bob now uses a different shadow email address as a sender
instead of her real email address, and the modified (mutated) email is forwarded
to Bob (dashed line single arrow). This is called Shadow channel communica-
tion (SCC). Sending an email in SCC by mutating the sender email address
is known as mutation. When Bob receives such an email, the shadow email
address gets verified for lateral spear-phishing detection. This is called verifica-
tion. Similarly, when Bob composes a new email for Alice, the email is forwarded
through SCC by mutating Bob’s real email address to one of his shadow email
addresses. Although Alice and Bob use shadow email addresses as the sender to
communicate with each other through SCC, they use their real email address to
communicate with external users (non-VIP), e.g., Ron from enterprise.com.
VIP users group can comprise people from different organizations having differ-
ent domains. For instance, John (not shown in the figure) from gov.com can be
a VIP member with Alice and Bob from org.com.
Email Mutation 7
Shadow Email Accounts. The shadow emails are a list of pre-created email
accounts assigned to all VIP users but being kept hidden from them. These
accounts are only used in email transmission as a sender address. Only EMG
conducts with these email accounts. Depending on the impacts, the number of
shadow email addresses assigned to a VIP user varies. EM is flexible to the
creation of shadow email accounts as long as the shadow email domain is the
same as the real email domain. However, in our experiment, we used a pre-
fix “sid” (shadow ID) in the shadow email address to make a clear difference
with the real email address. A possible shadow email address may look like:
real.email.address.x@domain, where x is at least 16 byte long random alphanu-
meric sequence. For instance, alice.sid8aiy5vgia0ta4uec@org.com can be one of
the shadow email addresses for Alice’s real email address alice@org.com, where
x = sid8aiy5vgia0ta4uec.
4.2 Architecture
The mutation and verification hap-
pens in the cloud by mutation gate-
ways (EMG). Figure 2 illustrates the
architecture of EM. Clients can use
multiple devices such as laptops,
desktop, or cell phones for access-
ing emails; therefore, EM provides
Fig. 2. Email mutation architecture.
an EM agent (EMA) for each of the
devices. While sending an email, the
agent delivers the email to the EMG for mutation. After mutation, the EMG
forwards the mutated email to corresponding mail servers (SMTP/MTA). Sim-
ilarly, while fetching a new email, the agent receives it from the EMG. The
EMG first gets the email from the mail server and then verifies it to detect a
lateral spear-phishing attack before responding to the agent. In large enterprise
networks, multiple EMGs can be used for load balancing.
4.3 Algorithm
The VIP users supposedly send emails to each other, which use as ground truth
G next time they send any new emails. For instance, when a VIP user i sends
an email to another VIP user j, the last l emails between them will be used
as ground truth Gi,j to generate a mutation ID, mID. By indexing the mID, a
shadow email address gets selected from a secret arrangement of shadow email
addresses Si assigned for the sender i. The shadow email address then used to
forward the email. Similarly, as the receiver j has the identical ground truth, j
can generate the exact mID to find the same shadow email address from Si for
verification.
8 M. M. Islam et al.
4.4 Protocol
Communication Between VIP Users. Figure 3 explains the EM protocol
through email communication between VIP users Alice and Bob. (1) Alice com-
poses an email to Bob {from: alice@org.com, to: bob@org.com}. (2) Alice’s EMA
delivers the email to EMG, where EMG uses the ground truth between them
in Algorithm 1, to select a shadow email address for Alice. Assume that the
selected address is alice.x@org.com. Therefore, the EMG forwards the email to
the mail server as {from: alice.x@org.com, to: bob@org.com}. (3) When Bob’s
EMA fetches for a new email, EMG receives the email from the mail server and
deduce that the sender address is one of Alice’s shadow email addresses. There-
fore, EMG uses the ground truth between Bob and Alice in Algorithm 1 to select
the current shadow email address for Alice. If the retrieved address matches
alice.x@org.com, the email is benign. Otherwise, it is phishing. EMG delivers
the benign email to Bob’s EMA as {from: alice@org.com, to: bob@org.com}.
Bob receives the email as how Alice composed it, making the whole EM mech-
anisms transparent to end-users. The replies from Bob to Alice is similar to the
above three steps. The only secret in the protocol is the arrangement of the
sender shadow emails.
In EM, the legitimate email communication between VIP users happens through
SCC, where the sender address is always a valid shadow email address. Therefore,
EMG detects an incoming email as phishing while fetching new emails that
have a real email address of a VIP member as the sender’s address. However,
the adversary may send phishing emails by guessing or randomly generating a
shadow email address to bypass EM. We call such phishing attempts as EM
engineering attack. To formalize the detection process, let’s assume that R is
the real email address list, and S is the set of shadow email address lists of all
VIP users.
That means both the sender and receiver email address is enlisted in the VIP
user list. EMG immediately detects such an email as a phishing email.
Handling Multiple Shadow Email Accounts. In EM, each VIP user has a
set of shadow email accounts for sending emails to another VIP user. However,
VIP users only discern about their real email account. Therefore, sending emails
from multiple shadow accounts and keeping track of all sent emails into one real
email account is challenging. EM overcome this challenge by following means.
First, shadow email accounts only used for sending emails while the receiver
email address will always be the real email address. Therefore, each VIP user
10 M. M. Islam et al.
receives all emails into their real email account inbox. Second, while forwarding
an email from a shadow account, the EMG uses an IMAP APPEND command to
populate that email into the real email sent-box after a successful email delivery
to the recipient. Thus, the real account gets a trace of email delivery. If an email
gets bounced, the EMG sends the bounce email back to the real email account.
Fig. 4. EMA in Google Chrome Browser and Thunderbird, (a) “Send email with muta-
tion” button in mail.google.com, (b) EMA in Thunderbird, (c) EMA icon at Chrome
Menu Bar, and (d) EMA in Chrome Extension Panel.
and opening new security loopholes into the detection system. Finally, moti-
vated adversaries can craft such fields by carefully observing historical emails.
To overcome these challenges, EM uses a random selection of the sender email
address (shadow address) for each new email delivery without adding anything
into the email. This makes the solution transparent to both end-users and mail
servers, but hard for adversaries to guess a correct shadow email address.
increase any inbound email traffic. Besides, these accounts do not impose any
memory overhead. Therefore, they create negligible overhead on the service
provider. The shadow email addresses can be selected from a 16-byte long (at
least) sequence. This ensures no collision between shadow email with real email
accounts. Additionally, unique keywords such as “sid” (Sect. 4.1) can be used in
shadow accounts creation to make a fine difference from real email accounts
Security Measures. EMA operates alongside with regular Mail user agent [20]
or email clients only to deliver or receive new emails from EMGs. It does not
communicate with the mail or SMTP server. Therefore, EMAs neither have any
storage to collect emails nor requires the user email account credential. The
communication between EMA and EMGs happens through a secure channel
(SSL/TLS) to protect data breaches during the transaction.
Distribution of EMA. A VIP user can get an EMA from their system admin
or download it from the web. The admin gives a unique authentication token to
each VIP user for their first use of EMA to subscribe with the EMGs. Later on,
using that token, they can connect with their corresponding EMG from different
EMAs. This ensures users’ flexibility to use EMA from different devices and
different locations (e.g., public networks). Users can reset the token anytime.
Email Mutation 13
EMG. As a response, the client receives a new email from EMG by the receiv-
ing signal Receive(i, j)?, where i is the sender address, and j is the receiver
address. Figure 5b shows the basic functionality of a mail server. The channels
Send T o Server(i, j)?, F etch F rom Server(j)?, and Response F rom Server
(i, j)! represent the transitions for receiving a new email, receiving fetching
request for new emails, and responding new emails respectively.
I.
I also was an Arcadian. See Arcadian and painter.
I am afraid, my friend, this letter will never, etc., i. 94.
I am not as this poor Hottentot, iv. 44 n.
I am, on the contrary, persuaded, etc., vi. 126.
I apprehend you, viii. 10.
I cannot, seeing she’s woven of such bad stuff, etc., v. 238.
I cannot marry Crout, xii. 122.
I care not, Fortune, what you me deny, etc., vii. 371.
I’d sooner be a dog, xii. 202.
I hate ye, iv. 272.
I have secur’d my brother, viii. 86.
I hope none living, sir, And, viii. 201.
I knew you could not bear it, viii. 228.
I know he is not dead; I know proud death, etc., v. 208.
I know that all beneath the moon decays, etc., v. 299.
I’ll have a frisk with you, viii. 103.
I’ll walk, to get me an appetite, etc., v. 268 n.
I’m feeble; some widow’s curse, etc., viii. 274.
I never saw you look so like your mother, In all my life, viii. 456.
I never valued fortune but as it was subservient to my pleasure, viii.
72.
I observe, as a fundamental ground common to all the arts, etc., vi.
32.
I pr’ythee, look thou giv’st my little boy some syrup for his cold,
etc., v. 245.
I prythee, spare me, gentle boy; press me no more for that slight
toy, etc., viii. 55.
I rode one evening with Count Maddalo, etc., x. 261.
I see before me the gladiator lie, xi. 425.
I see him sweeter than the nosegay in his hand, etc., i. 65; v. 107.
I set out upon this adventurous journey, etc., xi., 249.
I stood in Venice, on the bridge of sighs, xi. 423.
I, that might have married the famous Mr Bickerstoff, etc., i. 7; viii.
96.
I think not so; her infelicity seem’d to have years too many, etc., v.
246; x. 260.
I think poets are Tories by nature, xii. 241.
I thought of Chatterton, the marvellous boy, etc., v. 122.
I too, whose voice no claims but truth’s e’er moved, etc., i. 379 n.
I’ve heard of hearts unkind, etc., iii. 172; xi. 515.
I was invited yesternight to a solemn supper, etc., viii. 41.
I was not train’d in academic bowers, etc., v. 283.
I will touch it, iii. 127.
I wish I was where Anna lies, iv. 305.
I wish my old hobbling mother, etc., viii. 80.
I wish you would follow Dr Cantwell’s precepts, vii. 189 n.
I would borrow a simile from Burke, etc., iii. 419.
I would not wish to have your eyes, vi. 19.
I would take the Ghost’s word, xii. 88 n.
Ici rugit Cain les cheveux hérissés, etc., xi. 234.
Idea can be like nothing but an idea, an, etc., xi. 109.
Idea, It is true we can form a tolerably distinct, etc., xi. 57.
Idea which in itself is particular becomes general, an, etc., xi. 23.
Ideas, If in having our, in the memory ready at hand, etc., xi. 45 n.
Ideas, operations, and faculties of the mind may be traced, all the,
etc., xi. 167.
Ideas seemed to lie like substances in the brain, iii. 397.
ideas seem to elude the senses, moral, etc., xi. 88.
ideas and operations of the mind proceed? Whence do all the, xi.
171.
idiot and embryo, iii. 270.
Idleness, with light-winged toys of feathered, xii. 58.
If a man lies on his back, etc., x. 341.
If a thousand pardons about your necks were tied, etc., v. 276.
If any author deserved the name of an original, etc., i. 171.
If aught of oaten stop or pastoral song May hope, chaste Eve, to
soothe thy modest ear, etc., v. 116.
If ever chance two wandering lovers brings, etc., v. 76.
If Florence be i’ th’ Court he would not kill me, etc., v. 241.
If his hand were full of truths, etc., ii. 393.
If o’er the cruel tyrant love, vi. 293; viii. 248, 320; xi. 304.
if the poor were to cut the throats of the rich, etc., iii. 132.
If these things are done in the green tree, etc., vii. 140.
If they cannot succeed in what is trifling, etc., vii. 168.
If this man Had but a mind allied unto his words, etc., v. 264.
If to her share, viii. 525.
If to their share some splendid virtues fall, etc., vii. 83.
If we fly into the uttermost parts of the earth, etc., v. 16.
If ye kill’d a thousand in an hour’s space, etc., v. 276.
If you cannot find in your heart to tell him you love him, I’ll sigh it
out of you, etc., v. 290.
If you were to write a fable for little fishes, vii. 163.
If you yield, I die To all affection, etc., v. 255.
ignorance was bliss, vii. 222.
Il avoit une grande puissance de raison, etc., i. 88 n.
Il y a aujourd’hui, jour des Paques Fleuris ... Madame Warens, vi.
24.
Il y a des impressions, etc., iii. 152; xii. 261.
Il y a donc des esprits de deux sortes, etc., xi. 287.
Ils ne pouvoient croire qu’un corps de cette beauté, etc., vi. 200 n.
ils se rejouissoient tristement, xii. 16.
Iliad of woes, iii. 10; iv. 41.
Ille igitur qui protrusit cylindrum, etc., xi. 73.
illustrious obscure, x. 143.
illustrious personages were introduced, These three, etc., vi. 209.
Illustrious predecessors, i. 380.
image and superscription, ix. 330.
image of his mind, the, iv. 372.
imagination étoit la première de ses facultés, etc., i. 88 n.
impeachment, We own the soft, x. 142.
impediments, the first of these, etc., x. 258.
impenetrable whiskers have confronted flames, Those, i. 422; xi.
273 n.
imperium in imperio, vi. 265.
implicité, it is without the copula, etc., x. 121, 129.
imposition of names, some of larger, some of stricter signification,
by this, etc., xi. 129.
Imposture, organised into a comprehensive and self-consistent
whole, etc., iii. 147.
imprisoned wranglers free, set the, iii. 390.
in all things a regular and moderate indulgence, etc., xi. 518.
in corpore vili, iv. 3.
in dallying with interdicted subjects; v. 207.
In doleful dumps, etc., xii. 12 n.
in each hard instance tried, oh soul supreme, x. 375.
In green vine leaves he was right fitly clad, v. 35; x. 74.
In happy hour doth he receive, etc., iii. 49.
in his habit as he lived, xii. 27.
in medio tutissimus ibis, viii. 473.
In my former days of bliss, etc., xi. 284.
In one of Mr Locke’s most noted remarks, etc., xi. 286.
In peace, there’s nothing so becomes a man, xii. 71.
In poetry the same effect is produced by a few abrupt and rapid
gleams of description, etc., v. 33.
in Pyrrho’s maze, iii. 226.
In search of wit these lose their common sense, etc., v. 74.
In spite of these swine-eating Christians, etc., v. 210 n.
in their eyes, in their hands, etc., i. 45; xi. 373.
in their untroubled element shall shine when we are laid in dust,
etc., v. 52.
In vain I haunt the cold and silver springs, etc., v. 302.
Incredulous odi, vii. 102.
independently of his conduct or merits, etc., xi. 417.
Indignatio facit versus, iii. 257, 317; v. 112.
Individual nature produces little beauty, xi. 212.
incapable of its own distress, viii. 450.
inconstant stage, the, viii. 383.
indolence is the source of all mischief, iv. 70.
Indus to the Pole, from, xii. 185, 278.
inexpressive she; The fair, the chaste, the, xii. 205.
inexpressive three, viii. 454.
infidels and fugitives, as, etc., xi. 443.
infants’ skulls, Hell was paved with, vii. 243.
infinite agitation of men’s wit, iv. 314; vi. 312; xi. 323; xii. 441.
infirmity, of our, viii. 402.
informed with music, sentiment, and thought, never to die, v. 274.
inhuman rout, the, v. 89.
inimitable on earth, etc., viii. 55.
innocence and simplicity of poor Charity Boys, ix. 18.
inscribed the cross of Christ, etc., iii. 152.
Insipid levelling morality to which the modern stage is tied down,
etc., xi. 298.
insolent piece of paper, an, xii. 168.
Insensés qui vous plaignez, etc., iv. 100.
instance might be painful; The, but the principle would please, viii.
21.
instinct with fire, viii. 423.
insulted the slavery of Europe, etc., iii. 13.
interlocutions between Lucius and Caius, viii. 417.
interminable babble, vii. 198.
Into a lower world, to theirs obscure And wild—To breathe in other
air, etc., v. 262.
intoxicating, whatever is most, in the odour of a Southern spring,
etc., i. 248.
Intus et in cute, vii. 24, 226; viii., 116; x. 34.
invariable principles, xi. 486.
invention of the enemy, A weak, etc., viii. 355.
inventory of all he said, viii. 103.
invincible knights of old, the, etc., i. 273; viii. 442.
invita Minervâ, vii. 8, 56, 119; viii. 379.
Irish People and the Irish Parliament, xi. 472.
Irishman in a row, like an, etc., xi. 494.
Iron has not entered his soul, The, xii. 277.
Iron mask, the Man in the, iv. 93.
iron rod, the torturing hour, the, xii. 215.
irritabile genus vatum, iii. 221.
island in the watery waste, lone, iv. 190.
Islands of the Blest, ix. 253.
It is a very good office, etc., viii. 2.
it is better to marry than burn, iii. 272.
It is by this and this alone, etc., vi. 135.
It is easier for a camel to go through the eye of a needle, etc., i. 376
n.
It is he who gives the second blow, etc., vi. 396.
It is my father, v. 237.
It is not easy to define in what this great style consists, etc., vi. 123.
It is not with me you are in love ... Sophia Western, etc., i. 44.
It is observable, I know not for what cause, etc., i. 318.
It is the keystone, vi. 36; xi. 581.
It is the same harmless thing that a poor shepherd, etc., v. 343.
it only is when he is out he is acting, vi. 296.
It’s well they’ve got me a husband, viii. 82.
It was even twilight, etc., i. 218.
It was my wish like him to live, etc., v. 362.
It was reserved for Shakespeare to unite purity of heart, i. 253.
it was very good of God, etc., xi. 352.
It will never do, iii. 361; vii. 367.
Italiam, Italiam! ii. 329.
Ithuriel’s spear, ix. 369.
J.
jackdaw just caught in a snare, And looks like a, etc., viii. 238.
Jacobin, Once a, etc., i. 430; iii. 110, 159.
Jacobin who writes in the Chronicle, the true, iii. 175.
Jacques, The melancholy, etc., xii. 285.
Jactet se in aulis, etc., iv. 71 n.
Je suis peintre, non pas teinturier, ix. 435.
jealous God, at sight of human ties, The, etc., xi. 147.
Jew that Shakespeare drew, the, i. 158.
jewels in his crisped hair, Like, xii. 450.
Job’s comforters, vii. 179.
John de Bologna, after he had finished, Thus, etc., vi. 140.
Johnny Keats, vii. 208.
jolly god in triumph comes, etc., the, v. 81.
jovial thigh, the, etc., xii. 196.
joys are lodged beyond the reach of fate, Those, vi. 23.
Joy, joy for ever, my task is done! etc., iv. 357.
judgment, after it has been long passive, the, etc., vi. 128.
judgment is really nothing but a sensation, xi. 86.
Juger est sentir, xi. 87.
Juno’s swans, link’d and inseparable, Like, xi. 472 n.
Jupiter tonans, xi. 308.
Justice is preferable to mercy, xi. 86, 88.
justify before his sovereign, he would not, etc., vi. 100.
justly called the Silent, viii. 13.
justly decried author, a, xi. 167.
K.
Kais is fled, and our tents are forlorn, for, etc., vi. 196.
Kean’s Othello is, we suppose, the finest piece of acting, viii. 414.
keeping his state, viii. 402.
kept in ponderous vases, are, x. 161.
kept like an apple, etc., xii. 171.
kept the even tenor of their way, have, vi. 44; viii. 123; x. 41.
kept under, or himself held up to derision, i. 147, 149.
key-stone that makes up the arch, ’Tis the last, etc., vi. 36; xi. 581.
kill at a blow, the two to, xii. 194.
killing langour, relieve the, etc., iii. 132; v. 357.
Kind and affable to me, etc., xii. 267.
King could live near such a man, no, i. 305.
King is but a king, a, etc., xi. 324.
king of good fellows and wale of old men, the, viii. 103.
kings, As kind as, etc., xii. 140.
Kings are naturally lovers of low company, vi. 159; xi. 442.
kings, if there were no more, etc., i. 387.
King’s Old Courtier, The, etc., iv. 232.
kings, the best of, i. 305; iii. 41.
Kingly Kensington, xii. 275.
Kiuprili, Had’st thou believ’d, etc., xi. 412.
kirk is gude, and the gallows is gude, The, etc., viii. 269.
knaves do work with, called a fool, which, xi. 415.
knavish but keen, iii. 60.
knight had ridden down from Wensley moor, etc., v. 157.
knight himself did after ride, The, etc., viii. 66.
know another well, were to know one’s self, vi. 316.
know my cue without a prompter, vii. 226.
know that I shall become that being, But I, vii. 395.
Know that which made him gracious in your eyes, etc., v. 290.
Know the return of Spring, xi. 317.
know to know no more, v. 67.
Know, virtue were not virtue if the joys, etc., ix. 431.
Know ye that lust of kingdoms hath no law, etc., v. 195.
knoweth whence it cometh, no man, etc., xii. 312.
knowledge, that had I all, etc., vi. 225.
knowledge, Though he should have all, etc., vii. 199; x. 208.
Koran and sugar! the, ix. 56 n.
L.
La ci darem, viii. 364.
La nuit envellopait les champs et les ramparts, etc., xi. 236.
la téte me tourne, etc., xi. 125.
laborious foolery, with, iv. 239; ix. 121, 332; xi. 289.
labour of love, ix. 223.
ladder of life, the, xi. 388.
lady of fashion would admire a star, etc., xi. 499.
lady of a manor, A certain, etc., i. 422; xi. 273 n.
laggard age, xii. 208.
Laid waste the borders and o’erthrew the bowers, iv. 282, 334; vi.
50; viii. 36.
Lancelot of the Lake, a bright romance, ’Twas etc., viii. 441.
landlady, the, and Tam grew gracious, etc., v. 129.
languages a man can speak, for the more, etc., vi. 70.
lapped in luxury, ix. 284.
large heart enclosed, in, xii. 303.
last objection, In regard to the, etc., vi. 141.
last of those bright clouds, the, ix. 477.
last of those fair clouds, the, that on the bosom of bright honour,
etc., v. 345. 369.
lasting woe, vii. 429.
latter end of this system of law, the, xi. 89.
laudator temporis acti, iv. 241.
laugh now who never laugh’d before; Let those, etc., viii. 469; xi.
316.
Laugh to-day and cry to-morrow, viii. 536.
laughed with Rabelais, etc., iv. 217.
Launched on the bosom of the silver Thames, xi. 505.
Law by which mankind suffers, etc., iii. 203.
law of laws, the, etc., iv. 203.
Laws are not, like women, the worse for being old, viii. 22; xii. 161
n.
laws of nature which are the laws of God, etc., iv. 295.
lawful monarch’s bleeding head, his, etc., viii. 309.
lay heavy burthens on the poor and needy, They, iv. 150.
lay the flattering unction, etc., xii. 230.
lay waste a country gentleman, viii. 36.
See Laid.
lay’d a body in the sun, Say I had, etc., vi. 315.
La père des humains voit sa nombreuse race, etc., xi. 233.
Le son des cloches, xii. 58 n.
lean pensioners, vii. 401.
Leaping like wanton kids in pleasant spring, vi. 172.
leaps at once to its effect, xii. 185.
learn her manner, To, etc., ix. 326.
learned the trick of imposing, iii. 16.
leave, oh, leave me to my repose! i. 84; vi. 71, 182, 249; viii. 313; xii.
121.
leave others poor indeed, xii. 219.
leave our country and ourselves, etc., xi. 353.
leave stings, vii. 287; ix. 72.
leave the will puzzled, etc., xi. 446.
Leave then the luggage of your fate behind, etc., v. 357.
leaving the things that are behind, etc., x. 195.
leaving the world no copy, viii. 272.
leaves in October, like, viii. 142.
leaves our passions, afloat, etc., iii. 92.
leer malign, with jealous, xii. 43, 287, 387.
left its little life in air, it, xii. 322.
left the sitting part, he, of the man behind him, viii. 17.
leg? Can it set a, etc., i. 6.
lend it both an understanding, etc., xii. 55.
Lend us a knee, etc., v. 257.
Les Francs à chaque instant voient de nouveaux guerriers, xi. 232.
lest it should be hurried over the precipice, etc., vi. 156.
lest the courtiers offended should be, iii. 45; viii. 457.
Let Europe and her pallid sons go weep, etc., v. 115.
Let go thy hold, etc., iii, 192.
Let honour and preferment go, etc., xii. 323.
Let loose the greyhound, and lock up Hoyden, vi. 414; viii. 82.
Let me not like a worm go by the way, v. 30; xi. 506.
let me light my pipe at her eyes, xii. 455.
Let modest Foster if he will, excel, etc., vi. 367.
Let no rude hand deface it, etc., vi. 89; viii. 91.
Let not rage thy bosom firing, viii. 248, 320.
Let the event, that never-erring arbitrator, tell us, v. 258.
let there be light, viii. 298.
Let those laugh now who never laugh’d before, etc., viii. 469; xi.
316.
letting contemplation have its fill, iv. 215.
leurre de dupe, iv. 5; vii. 225.
Leviathan among all the creatures, the, etc., vii. 276; viii. 32.
Leviathan, the, tumbling about his unwieldy bulk, vii. 13.
liar of the first magnitude, v. 279.
liberalism—lovely liberalism, ix. 233.
liberty was merely a custom of England, xii. 215.
Liceat, quæso, populo, etc., iii. 299.
license of the time, viii. 186.
lie is most unfruitful, The, etc., viii. 456.
lies about us in our infancy, that, i. 250; x. 358.
life, a thing of, ix. 177, 225; xi. 504.
life an exact piece would make, Who to the, etc., ix, 326.
life and death in disproportion met, Like, vi. 96; xii. 127.
life, From the last dregs of, etc., xii. 159.
life is best, This, etc., xii. 321.
Life is a pure flame, etc., xii. 150.
Life knows no return of spring, vi. 292.
life of life was flown, when all the, vi. 24; xii. 159.
Life! thou strange thing, etc., xii. 152.
ligament, fine as it was, that, etc., vii. 227; xi. 306.
light as a bird, as, etc., iii. 313.
light, But once put out their, etc., xi. 197.
light, her glorious, ix. 316.
like a surgeon’s skeleton in a glass case, viii. 350.
Like a tall bully, ix. 482.
Like a worm goes by the way, xi. 514.
Like angel’s visits, few, and far between, iv. 346 and n.; v. 150 and
n.; vii. 38.
Like as the sun-burnt Indians do array, etc., xi. 334.
like Cato, gave his little senate laws, iv. 202.
like importunate Guinea fowls, one note day and night, iii. 60; xi.
338.
like it because it is not vulgar, I, vi. 160.
Like kings who lose the conquest gain’d before, etc., viii. 425.
like master like man, xii. 132.
like morning brought by night, v. 150.
Like old importment’s bastard, v. 258.
Like proud seas under him, iv. 260; vii. 274.
Like Samson his green wythes, xii. 128.
Like some celestial sweetness, the treasure of soft love, v. 253.
Like strength reposing on his own right arm, v. 189.
Like the high leaves upon the holly tree, iii. 232; iv. 268.
Like the swift Alpine torrent, etc., x. 73.
Like to the falling of a star, etc., v. 296.
liked a comedy, better than a tragedy, He, etc., viii. 25.
lily on its stalk green, the, v. 296.
limited fertility and a limited earth, iv. 294.
limner’s art may trace the absent feature, Yes, the, viii. 305.
Linden, when the sun was low, On, etc., iv. 347.
line too labours and the thoughts move slow, The, etc., viii. 313,
331.
line upon line, and precept upon precept, x. 314.
lines are equally good, All his, etc., viii. 287.
Linked each to each by natural piety, xi. 520.
link of peaceful commerce ’twixt dividable shores, i. 144.
liquid texture, mortal wound, And in its, etc., iii. 350.
lisped in numbers, iv. 215; v. 79; xii. 29.
little leaven leaveneth the whole lump, iv. 267.
little man and he had a little soul, There was a, iv. 358 n.
little man, but of high fancy, A, etc., vii. 203.
little sneering sophistries of a collegian, the, xi. 123.
little spot of green, i. 18; v. 100.
little things are great to little man, These, etc., vi. 226.
Little think’st thou, poor flower, etc., viii. 51.
Little think’st thou, poor heart, viii. 52.
Little Will, the scourge of France, etc., v. 106.
live and move and have their being, they, vi. 190.
live, if this may life be called, Yea, thus they, etc., viii. 307.
live in his description, iv. 337; vi. 53.
live to please, he must, etc., viii. 433.
live to think, etc., xii. 147.
lively, audible, etc., xii. 130.
lively sense of future favours, a, viii. 17.
lives and fortunes men, vii. 364; xi. 437.
living with them, There is no, etc., vii. 300.
Lo, here be pardons half a dozen, etc., v. 277.
lobster, like the lady in the, viii. 430.
Lochiel, a far cry to, viii. 425.