Full Text Documents

Search


Table of Contents
ICT Systems Security and Privacy Protection
Lech Jan Janczewski, Mirosław Kutyłowski
Front Matter

Authentication


Design Weaknesses in Recent Ultralightweight RFID Authentication Protocols
P. D’arco, R. Prisco
3-17
CPMap: Design of Click-Points Map-Based Graphical Password Authentication
Weizhi Meng, Fei Fei, Lijun Jiang, Zhe Liu, Chunhua Su, Jinguang Han
18-32
The Influence of Native Language on Password Composition and Security: A Socioculture Theoretical View
Pardon Maoneke, Stephen Flowerday, Naomi Isabirye
33-46
A Hypergame Analysis for ErsatzPasswords
Christopher Gutierrez, Mohammed Almeshekah, Saurabh Bagchi, Eugene Spafford
47-61
Walking Through the Deep: Gait Analysis for User Authentication Through Deep Learning
Giacomo Giorgi, Fabio Martinelli, Andrea Saracino, Mina Sheikhalishahi
62-76

Failures of Security Management


Practical Cryptographic Data Integrity Protection with Full Disk Encryption
Milan Brož, Mikuláš Patočka, Vashek Matyáš
79-93
When Your Browser Becomes the Paper Boy
Juan Parra Rodriguez, Eduard Brehm, Joachim Posegga
94-107
EMPower: Detecting Malicious Power Line Networks from EM Emissions
Richard Baker, Ivan Martinovic
108-121
Attacking RO-PUFs with Enhanced Challenge-Response Pairs
Nils Wisiol, Marian Margraf
122-126
A Security Analysis of FirstCoin
Alexander Marsalek, Christian Kollmann, Thomas Zefferer
127-140
PRETT: Protocol Reverse Engineering Using Binary Tokens and Network Traces
Choongin Lee, Jeonghan Bae, Heejo Lee
141-155
Assessing Privacy Policies of Internet of Things Services
Niklas Paul, Welderufael Tesfay, Dennis-Kenji Kipker, Mattea Stelter, Sebastian Pape
156-169
JonDonym Users’ Information Privacy Concerns
David Harborth, Sebastian Pape
170-184

Secuirty Management / Forensic


Optimal Security Configuration for Cyber Insurance
Fabio Martinelli, Ganbayar Uuganbayar, Artsiom Yautsiukhin
187-200
The Tweet Advantage: An Empirical Analysis of 0-Day Vulnerability Information Shared on Twitter
Clemens Sauerwein, Christian Sillaber, Michael Huber, Andrea Mussmann, Ruth Breu
201-215
Anti-forensic = Suspicious: Detection of Stealthy Malware that Hides Its Network Traffic
Mayank Agarwal, Rami Puzis, Jawad Haj-Yahya, Polina Zilberman, Yuval Elovici
216-230
Usability Characteristics of Security and Privacy Tools: The User’s Perspective
Ioanna Topa, Maria Karyda
231-244
Efficient Identification of Applications in Co-resident VMs via a Memory Side-Channel
Jens Lindemann, Mathias Fischer
245-259

Software Security / Attacks


Follow the WhiteRabbit: Towards Consolidation of On-the-Fly Virtualization and Virtual Machine Introspection
Sergej Proskurin, Julian Kirsch, Apostolis Zarras
263-277
Hunting Password Leaks in Android Applications
Johannes Feichtner
278-292
Smashing the Stack Protector for Fun and Profit
Bruno Bierbaumer, Julian Kirsch, Thomas Kittel, Aurélien Francillon, Apostolis Zarras
293-306
Formal Analysis of Sneak-Peek: A Data Centre Attack and Its Mitigations
Wei Chen, Yuhui Lin, Vashti Galpin, Vivek Nigam, Myungjin Lee, David Aspinall
307-322
An Evaluation of Bucketing in Systems with Non-deterministic Timing Behavior
Yuri Dantas, Richard Gay, Tobias Hamann, Heiko Mantel, Johannes Schickel
323-338
Detection and Response to Data Exfiltration from Internet of Things Android Devices
Mariem Graa, Ivan Lobe Kome, Nora Cuppens-Boulahia, Frédéric Cuppens, Vincent Frey
339-354
When George Clooney Is Not George Clooney: Using GenAttack to Deceive Amazon’s and Naver’s Celebrity Recognition APIs
Keeyoung Kim, Simon Woo
355-369
Performance Improvements in Behavior Based Malware Detection Solutions
Gheorghe Hăjmăşan, Alexandra Mondoc, Radu Portase, Octavian Creţ
370-384
On the Integrity of Cross-Origin JavaScripts
Jukka Ruohonen, Joonas Salovaara, Ville Leppänen
385-398

 


Designed by Inria-IES Team : http://hal.inria.fr/    Hosted by HAL : http://hal.archives-ouvertes.fr/