Table of Contents
|
ICT Systems Security and Privacy Protection Gurpreet Dhillon, Fredrik Karlsson, Karin Hedström, André Zúquete |
Front Matter |
Intrusion Detection
|
Hunting Brand Domain Forgery: A Scalable Classification for Homograph Attack Tran Phuong Thao, Yukiko Sawaya, Hoang-Quoc Nguyen-Son, Akira Yamada, Kazumasa Omote, Ayumu Kubota |
3-18 |
GanDef: A GAN Based Adversarial Training Defense for Neural Network Classifier Guanxiong Liu, Issa Khalil, Abdallah Khreishah |
19-32 |
Control Logic Injection Attacks on Industrial Control Systems Hyunguk Yoo, Irfan Ahmed |
33-48 |
An Efficient and Scalable Intrusion Detection System on Logs of Distributed Applications David Lanoe, Michel Hurfin, Eric Totel, Carlos Maziero |
49-63 |
Access Control
|
Performance of Password Guessing Enumerators Under Cracking Conditions Mathieu Valois, Patrick Lacharme, Jean-Marie Le Bars |
67-80 |
An Offline Dictionary Attack Against zkPAKE Protocol José Becerra, Peter Ryan, Petra Šala, Marjan Škrobot |
81-90 |
Fine-Grained Access Control in Industrial Internet of Things Dominik Ziegler, Josef Sabongui, Gerald Palfinger |
91-104 |
Towards an Automated Extraction of ABAC Constraints from Natural Language Policies Manar Alohaly, Hassan Takabi, Eduardo Blanco |
105-119 |
Removing Problems in Rule-Based Policies Zheng Cheng, Jean-Claude Royer, Massimo Tisi |
120-133 |
Is This Really You? An Empirical Study on Risk-Based Authentication Applied in the Wild Stephan Wiefling, Luigi Lo Iacono, Markus Dürmuth |
134-148 |
Organizational and Behavioral
|
ESARA: A Framework for Enterprise Smartphone Apps Risk Assessment Majid Hatamian, Sebastian Pape, Kai Rannenberg |
165-179 |
SocialAuth: Designing Touch Behavioral Smartphone User Authentication Based on Social Networking Applications Weizhi Meng, Wenjuan Li, Lijun Jiang, Jianying Zhou |
180-193 |
The Influence of Organizational, Social and Personal Factors on Cybersecurity Awareness and Behavior of Home Computer Users Joëlle Simonet, Stephanie Teufel |
194-208 |
To Be, or Not to Be Notified Patrick Murmann, Delphine Reinhardt, Simone Fischer-Hübner |
209-222 |
A Structured Comparison of the Corporate Information Security Maturity Level Michael Schmid, Sebastian Pape |
223-237 |
Predicting Students’ Security Behavior Using Information-Motivation-Behavioral Skills Model Ali Farooq, Debora Jeske, Jouni Isoaho |
238-252 |
Why Do People Pay for Privacy-Enhancing Technologies? The Case of Tor and JonDonym David Harborth, Xinyuan Cai, Sebastian Pape |
253-267 |
Crypto and Encryption
|
Arcana: Enabling Private Posts on Public Microblog Platforms Anirudh Narasimman, Qiaozhi Wang, Fengjun Li, Dongwon Lee, Bo Luo |
271-285 |
Fast Keyed-Verification Anonymous Credentials on Standard Smart Cards Jan Camenisch, Manu Drijvers, Petr Dzurenda, Jan Hajny |
286-298 |
BlockTag: Design and Applications of a Tagging System for Blockchain Analysis Yazan Boshmaf, Husam Al Jawaheri, Mashael Al Sabah |
299-313 |
Forward Secure Identity-Based Signature Scheme with RSA Hankyung Ko, Gweonho Jeong, Jongho Kim, Jihye Kim, Hyunok Oh |
314-327 |
Integrity
|
On the Effectiveness of Control-Flow Integrity Against Modern Attack Techniques Sarwar Sayeed, Hector Marco-Gisbert |
331-344 |
Automatically Proving Purpose Limitation in Software Architectures Kai Bavendiek, Tobias Mueller, Florian Wittner, Thea Schwaneberg, Christian-Alexander Behrendt, Wolfgang Schulz, Hannes Federrath, Sibylle Schupp |
345-358 |
Commit Signatures for Centralized Version Control Systems Sangat Vaidya, Santiago Torres-Arias, Reza Curtmola, Justin Cappos |
359-373 |
Towards Contractual Agreements for Revocation of Online Data Theodor Schnitzler, Markus Dürmuth, Christina Pöpper |
374-387 |