index - ICT Systems Security and Privacy Protection
   


Full Text Documents

Chargement de la page

Search

Chargement de la page

Table of Contents
ICT Systems Security and Privacy Protection
Audun Jøsang, Lynn Futcher, Janne Hagen
Front Matter

Digital Signatures


XML Signature Wrapping Still Considered Harmful: A Case Study on the Personal Health Record in Germany
Paul Höller, Alexander Krumeich, Luigi Lo Iacono
3-18
Trust Me If You Can: Trusted Transformation Between (JSON) Schemas to Support Global Authentication of Education Credentials
Stefan More, Peter Grassberger, Felix Hörandner, Andreas Abraham, Lukas Daniel Klausner
19-35
SIUV: A Smart Car Identity Management and Usage Control System Based on Verifiable Credentials
Ali Hariri, Subhajit Bandopadhyay, Athanasios Rizos, Theo Dimitrakos, Bruno Crispo, Muttukrishnan Rajarajan
36-50

Vulnerability Management


A Performance Assessment of Free-to-Use Vulnerability Scanners - Revisited
Ricardo Araújo, António Pinto, Pedro Pinto
53-65
QuickBCC: Quick and Scalable Binary Vulnerable Code Clone Detection
Hajin Jang, Kyeongseok Yang, Geonwoo Lee, Yoonjong Na, Jeremy D. Seideman, Shoufu Luo, Heejo Lee, Sven Dietrich
66-82
Automatic Inference of Taint Sources to Discover Vulnerabilities in SOHO Router Firmware
Kai Cheng, Dongliang Fang, Chuan Qin, Huizhao Wang, Yaowen Zheng, Nan Yu, Limin Sun
83-99

Covert Channels and Cryptography


ESQABE: Predicting Encrypted Search Queries
Isaac Meers, Mariano Di Martino, Peter Quax, Wim Lamotte
103-117
Reconnection-Based Covert Channels in Wireless Networks
Sebastian Zillien, Steffen Wendzel
118-133
Minecraft Altered Skin Channel (MASC)
Sam Abrams, Brandon Keller, Kenneth Nero, Gino Placella, Daryl Johnson
134-145
Lattice-Based Weak Curve Fault Attack on ECDSA
Weiqiong Cao, Hongsong Shi, Hua Chen, Wei Wei, Jiazhe Chen
146-161

Application and System Security


HyperSec: Visual Analytics for Blockchain Security Monitoring
Benedikt Putz, Fabian Böhm, Günther Pernul
165-180
100 Popular Open-Source Infosec Tools
Rauli Kaksonen, Tommi Järvenpää, Jukka Pajukangas, Mihai Mahalean, Juha Röning
181-195
RootAsRole: Towards a Secure Alternative to sudo/su Commands for Home Users and SME Administrators
Ahmad Samer Wazan, David Chadwick, Remi Venant, Romain Laborde, Abdelmalek Benzekri
196-209

Privacy


Accept All: The Landscape of Cookie Banners in Greece and the UK
Georgios Kampanos, Siamak F. Shahandashti
213-227
The AppChk Crowd-Sourcing Platform: Which Third Parties are iOS Apps Talking To?
Oleg Geier, Dominik Herrmann
228-241
Compiling Personal Data and Subject Categories from App Data Models
Christian Burkert, Maximilian Blochberger, Hannes Federrath
242-255
Privacy Concerns Go Hand in Hand with Lack of Knowledge: The Case of the German Corona-Warn-App
Sebastian Pape, David Harborth, Jacob Leon Kröger
256-269
Perceived Privacy Problems Within Digital Contact Tracing: A Study Among Swedish Citizens
Ali Padyab, Joakim Kävrestad
270-283

Network Security


Secure and Scalable IoT: An IoT Network Platform Based on Network Overlay and MAC Security
Junwon Lee, Heejo Lee
287-301
Enriching DNS Flows with Host-Based Events to Bypass Future Protocol Encryption
Stanislav Špaček, Daniel Tovarňák, Pavel Čeleda
302-316
Advanced Cowrie Configuration to Increase Honeypot Deceptiveness
Warren Z. Cabral, Craig Valli, Leslie F. Sikos, Samuel G. Wakeling
317-331
Less is Often More: Header Whitelisting as Semantic Gap Mitigation in HTTP-Based Software Systems
Andre Büttner, Hoai Viet Nguyen, Nils Gruschka, Luigi Lo Iacono
332-347

Machine Learning for Security


TAR: Generalized Forensic Framework to Detect Deepfakes Using Weakly Supervised Learning
Sangyup Lee, Shahroz Tariq, Junyaup Kim, Simon S. Woo
351-366
Anomaly Detection for Insider Threats: An Objective Comparison of Machine Learning Models and Ensembles
Filip Wieslaw Bartoszewski, Mike Just, Michael A. Lones, Oleksii Mandrychenko
367-381
Revitalizing Self-Organizing Map: Anomaly Detection Using Forecasting Error Patterns
Young Geun Kim, Jeong-Han Yun, Siho Han, Hyoung Chun Kim, Simon S. Woo
382-397

Security Management


What Is Lurking in Your Backups?
Ben Lenard, Alexander Rasin, Nick Scope, James Wagner
401-415
How Do Users Chain Email Accounts Together?
Lydia Kraus, Mária S̆vidron̆ová, Elizabeth Stobert
416-429
Tensions that Hinder the Implementation of Digital Security Governance
Stef Schinagl, Svetlana Khapova, Abbas Shahim
430-445

 

 


Designed by Inria-IES Team : http://ifip.hal.science/    Hosted by HAL : http://hal.archives-ouvertes.fr/