Full Text Documents

Search


Table of Contents
ICT Systems Security and Privacy Protection
Sabrina De Capitani Di Vimercati, Fabio Martinelli
Front Matter

Network Security and Cyber Attacks


Turning Active TLS Scanning to Eleven
Wilfried Mayer, Martin Schmiedecker
3-16
Slow TCAM Exhaustion DDoS Attack
Túlio Pascoal, Yuri Dantas, Iguatemi Fonseca, Vivek Nigam
17-31
Evasive Malware Detection Using Groups of Processes
Gheorghe Hăjmăşan, Alexandra Mondoc, Radu Portase, Octavian Creţ
32-45
A Malware-Tolerant, Self-Healing Industrial Control System Framework
Michael Denzel, Mark Ryan, Eike Ritter
46-60
Process Discovery for Industrial Control System Cyber Attack Detection
David Myers, Kenneth Radke, Suriadi Suriadi, Ernest Foo
61-75

Security and Privacy in Social Applications and Cyber Attacks Defense


Secure Photo Sharing in Social Networks
Pablo Picazo-Sanchez, Raúl Pardo, Gerardo Schneider
79-92
Context-Dependent Privacy-Aware Photo Sharing Based on Machine Learning
Lin Yuan, Joël Theytaz, Touradj Ebrahimi
93-107
3LP: Three Layers of Protection for Individual Privacy in Facebook
Khondker Reza, Md Islam, Vladimir Estivill-Castro
108-123
A Framework for Moving Target Defense Quantification
Warren Connell, Massimiliano Albanese, Sridhar Venkatesan
124-138

Private Queries and Aggregations


Query Privacy in Sensing-as-a-Service Platforms
Ruben Rios, David Nuñez, Javier Lopez
141-154
Secure and Efficient k-NN Queries
Hafiz Asif, Jaideep Vaidya, Basit Shafiq, Nabil Adam
155-170
Secure and Trustable Distributed Aggregation Based on Kademlia
Stéphane Grumbach, Robert Riemann
171-185

Operating System and Firmware Security


HyBIS: Advanced Introspection for Effective Windows Guest Protection
Roberto Di Pietro, Federico Franzoni, Flavio Lombardi
189-204
Detection of Side Channel Attacks Based on Data Tainting in Android Systems
Mariem Graa, Nora Cuppens-Boulahia, Frédéric Cuppens, Jean-Louis Lanet, Routa Moussaileb
205-218
The Fuzzing Awakens: File Format-Aware Mutational Fuzzing on Smartphone Media Server Daemons
Minsik Shin, Jungbeen Yu, Youngjin Yoon, Taekyoung Kwon
219-232
Towards Automated Classification of Firmware Images and Identification of Embedded Devices
Andrei Costin, Apostolis Zarras, Aurélien Francillon
233-247
Runtime Firmware Product Lines Using TPM2.0
Andreas Fuchs, Christoph Krauß, Jürgen Repp
248-261

User Authentication and Policies


On the Use of Emojis in Mobile Authentication
Lydia Kraus, Robert Schmidt, Marcel Walch, Florian Schaub, Sebastian Möller
265-280
EmojiTCHA: Using Emotion Recognition to Tell Computers and Humans Apart
David Lorenzi, Jaideep Vaidya, Achyuta Aich, Shamik Sural, Vijayalakshmi Atluri, Joseph Calca
281-295
Assisted Authoring, Analysis and Enforcement of Access Control Policies in the Cloud
Umberto Morelli, Silvio Ranise
296-309
Capturing Policies for BYOD
Joseph Hallett, David Aspinall
310-323

Applied Cryptography and Voting Schemes


Improving Blind Steganalysis in Spatial Domain Using a Criterion to Choose the Appropriate Steganalyzer Between CNN and SRM+EC
Jean-François Couchot, Raphaël Couturier, Michel Salomon
327-340
BinSign: Fingerprinting Binary Functions to Support Automated Analysis of Code Executables
Lina Nouh, Ashkan Rahimian, Djedjiga Mouheb, Mourad Debbabi, Aiman Hanna
341-355
Decoy Password Vaults: At Least as Hard as Steganography?
Cecilia Pasquini, Pascal Schöttle, Rainer Böhme
356-370
Election-Dependent Security Evaluation of Internet Voting Schemes
Stephan Neumann, Manuel Noll, Melanie Volkamer
371-382

Software Security and Privacy


Combating Control Flow Linearization
Julian Kirsch, Clemens Jonischkeit, Thomas Kittel, Apostolis Zarras, Claudia Eckert
385-398
Ghost Patches: Fake Patches for Fake Vulnerabilities
Jeffrey Avery, Eugene Spafford
399-412
SIMBER: Eliminating Redundant Memory Bound Checks via Statistical Inference
Hongfa Xue, Yurong Chen, Fan Yao, Yongbo Li, Tian Lan, Guru Venkataramani
413-426
Towards Systematic Privacy and Operability (PRIOP) Studies
Rene Meis, Maritta Heisel
427-441
Data Minimisation: A Language-Based Approach
Thibaud Antignac, David Sands, Gerardo Schneider
442-456

Privacy


Differentially Private Neighborhood-Based Recommender Systems
Jun Wang, Qiang Tang
459-473
Privacy-Enhanced Profile-Based Authentication Using Sparse Random Projection
Somayeh Taheri, Md Islam, Reihaneh Safavi-Naini
474-490
Supporting Privacy by Design Using Privacy Process Patterns
Vasiliki Diamantopoulou, Christos Kalloniatis, Stefanos Gritzalis, Haralambos Mouratidis
491-505
Evaluating the Privacy Implications of Frequent Itemset Disclosure
Edoardo Serra, Jaideep Vaidya, Haritha Akella, Ashish Sharma
506-519

Digital Signature, Risk Management, and Code Reuse Attacks


Forward-Secure Digital Signature Schemes with Optimal Computation and Storage of Signers
Jihye Kim, Hyunok Oh
523-537
RiskInDroid: Machine Learning-Based Risk Analysis on Android
Alessio Merlo, Gabriel Georgiu
538-552
Using Fraud Patterns for Fraud Risk Assessment of E-services
Ahmed Yesuf, Jetzabel Serna-Olvera, Kai Rannenberg
553-567
Gadget Weighted Tagging: A Flexible Framework to Protect Against Code Reuse Attacks
Liwei Chen, Mengyu Ma, Wenhao Zhang, Gang Shi, Dan Meng
568-584

 

 


Designed by Inria-IES Team : http://hal.inria.fr/    Hosted by HAL : http://hal.archives-ouvertes.fr/