index - Information Security and Privacy Research
   


Full Text Documents

Chargement de la page

Search

Chargement de la page

Table of Contents
Information Security and Privacy Research
Dimitris Gritzalis, Steven Furnell, Marianthi Theoharidou (Eds.)
Front Matter

Attacks and Malicious Code


Relay Attacks on Secure Element-Enabled Mobile Devices
Michael Roland, Josef Langer, Josef Scharinger
1-12
Would You Mind Forking This Process? A Denial of Service Attack on Android (and Some Countermeasures)
Alessandro Armando, Alessio Merlo, Mauro Migliardi, Luca Verderame
13-24
An Approach to Detecting Inter-Session Data Flow Induced by Object Pooling
Bernhard Berger, Karsten Sohr
25-36
Embedded Eavesdropping on Java Card
Guillaume Barbu, Christophe Giraud, Vincent Guerin
37-48

Security Architectures


Authenticated Key Exchange (AKE) in Delay Tolerant Networks
Sofia Menesidou, Vasilios Katos
49-60
OFELIA – A Secure Mobile Attribute Aggregation Infrastructure for User-Centric Identity Management
Alexandre Augusto, Manuel Correia
61-74
Smart OpenID: A Smart Card Based OpenID Protocol
Andreas Leicher, Andreas Schmidt, Yogendra Shah
75-86
Peer to Peer Botnet Detection Based on Flow Intervals
David Zhao, Issa Traore, Ali Ghorbani, Bassam Sayed, Sherif Saad, Wei Lu
87-102

System Security


Towards a Universal Data Provenance Framework Using Dynamic Instrumentation
Eleni Gessiou, Vasilis Pappas, Elias Athanasopoulos, Angelos Keromytis, Sotiris Ioannidis
103-114
Improving Flask Implementation Using Hardware Assisted In-VM Isolation
Baozeng Ding, Fufeng Yao, Yanjun Wu, Yeping He
115-125
HyperForce: Hypervisor-enForced Execution of Security-Critical Code
Francesco Gadaleta, Nick Nikiforakis, Jan Mühlberg, Wouter Joosen
126-137
RandHyp: Preventing Attacks via Xen Hypercall Interface
Feifei Wang, Ping Chen, Bing Mao, Li Xie
138-149

Access Control


Role Mining under Role-Usage Cardinality Constraint
John John, Shamik Sural, Vijayalakshmi Atluri, Jaideep Vaidya
150-161
HIDE_DHCP: Covert Communications through Network Configuration Messages
Ruben Rios, Jose Onieva, Javier Lopez
162-173
Handling Stateful Firewall Anomalies
Frédéric Cuppens, Nora Cuppens-Boulahia, Joaquin Garcia Alfaro, Tarik Moataz, Xavier Rimasson
174-186
A Framework for Threat Assessment in Access Control Systems
Hemanth Khambhammettu, Sofiene Boulares, Kamel Adi, Luigi Logrippo
187-198

Database Security


Support for Write Privileges on Outsourced Data
Sabrina Capitani Di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati
199-210
Malicious Users’ Transactions: Tackling Insider Threat
Weihan Li, Brajendra Panda, Qussai Yaseen
211-222

Privacy Attitudes and Properties


Privacy-Preserving Television Audience Measurement Using Smart TVs
George Drosatos, Aimilia Tasidou, Pavlos Efraimidis
223-234
Tracking Users on the Internet with Behavioral Patterns: Evaluation of Its Practical Feasibility
Christian Banse, Dominik Herrmann, Hannes Federrath
235-248
Smartphone Forensics: A Proactive Investigation Scheme for Evidence Acquisition
Alexios Mylonas, Vasilis Meletiadis, Bill Tsoumas, Lilian Mitrou, Dimitris Gritzalis
249-260

Social Networks and Social Engineering


Modeling Social Engineering Botnet Dynamics across Multiple Social Networks
Shuhao Li, Xiaochun Yun, Zhiyu Hao, Yongzheng Zhang, Xiang Cui, Yipeng Wang
261-272
Layered Analysis of Security Ceremonies
Giampaolo Bella, Lizzie Coles-Kemp
273-286

Applied Cryptography, Anonymity and Trust


A Small Depth-16 Circuit for the AES S-Box
Joan Boyar, René Peralta
287-298
Formal Verification of the mERA-Based eServices with Trusted Third Party Protocol
Maria Christofi, Aline Gouget
299-314

Usable Security


My Authentication Album: Adaptive Images-Based Login Mechanism
Amir Herzberg, Ronen Margulies
315-326
Balancing Security and Usability of Local Security Mechanisms for Mobile Devices
Shuzhe Yang, Gökhan Bal
327-338
Analyzing Value Conflicts for a Work-Friendly ISS Policy Implementation
Ella Kolkowska, Bart Decker
339-351
When Convenience Trumps Security: Defining Objectives for Security and Usability of Systems
Gurpreet Dhillon, Tiago Oliveira, Santa Susarapu, Mário Caldeira
352-363

Security and Trust Models


Security-by-Contract for the OSGi Platform
Olga Gadyatskaya, Fabio Massacci, Anton Philippov
364-375
Cyber Weather Forecasting: Forecasting Unknown Internet Worms Using Randomness Analysis
Hyundo Park, Sung-Oh Jung, Heejo Lee, Hoh In
376-387
Incentive Compatible Moving Target Defense against VM-Colocation Attacks in Clouds
Yulong Zhang, Min Li, Kun Bai, Meng Yu, Wanyu Zang
388-399
Give Rookies A Chance: A Trust-Based Institutional Online Supplier Recommendation Framework
Han Jiao, Jixue Liu, Jiuyong Li, Chengfei Liu
400-411

Security Economics


A Game-Theoretic Formulation of Security Investment Decisions under Ex-ante Regulation
Giuseppe D’acquisto, Marta Flamini, Maurizio Naldi
412-423
Optimizing Network Patching Policy Decisions
Yolanta Beres, Jonathan Griffin
424-442
A Risk Assessment Method for Smartphones
Marianthi Theoharidou, Alexios Mylonas, Dimitris Gritzalis
443-456
Empirical Benefits of Training to Phishing Susceptibility
Ronald Dodge, Kathryn Coronges, Ericka Rovira
457-464

Authentication and Delegation


Multi-modal Behavioural Biometric Authentication for Mobile Devices
Hataichanok Saevanee, Nathan Clarke, Steven Furnell
465-474
Analysis and Modeling of False Synchronizations in 3G-WLAN Integrated Networks
Christoforos Ntantogian, Christos Xenakis, Ioannis Stavrakakis
475-488
Password Protected Smart Card and Memory Stick Authentication against Off-Line Dictionary Attacks
Yongge Wang
489-500
Distributed Path Authentication for Dynamic RFID-Enabled Supply Chains
Shaoying Cai, Yingjiu Li, Yunlei Zhao
501-512
Enhanced Dictionary Based Rainbow Table
Vrizlynn Thing, Hwei-Ming Ying
513-524

Short Papers


Authorization Policies for Materialized Views
Sarah Nait Bahloul, Emmanuel Coquery, Mohand-Said Hacid
525-530
Enhancing the Security of On-line Transactions with CAPTCHA Keyboard
Yongdong Wu, Zhigang Zhao
531-536
Fighting Pollution Attack in Peer-to-Peer Streaming Networks: A Trust Management Approach
Xin Kang, Yongdong Wu
537-542
A Framework for Anonymizing GSM Calls over a Smartphone VoIP Network
Ioannis Psaroudakis, Vasilios Katos, Pavlos Efraimidis
543-548
A Browser-Based Distributed System for the Detection of HTTPS Stripping Attacks against Web Pages
Marco Prandini, Marco Ramilli
549-554
Privacy-Preserving Mechanisms for Organizing Tasks in a Pervasive eHealth System
Milica Milutinovic, Vincent Naessens, Bart Decker
555-560
Web Services Security Assessment: An Authentication-Focused Approach
Yannis Soupionis, Miltiadis Kandias
561-566
Open Issues and Proposals in the IT Security Management of Commercial Ports: The S-PORT National Case
Nineta Polemi, Theodoros Ntouskas
567-572
A Response Strategy Model for Intrusion Response Systems
Nor Anuar, Maria Papadaki, Steven Furnell, Nathan Clarke
573-578
Intrusion Tolerance of Stealth DoS Attacks to Web Services
Massimo Ficco, Massimiliano Rak
579-584
Towards Use-Based Usage Control
Christos Grompanopoulos, Ioannis Mavridis
585-590

 

 


Designed by Inria-IES Team : http://hal.inria.fr/    Hosted by HAL : http://hal.archives-ouvertes.fr/