Full Text Documents

28

Search


Table of Contents
ICT Systems Security and Privacy Protection
Audun Jøsang, Lynn Futcher, Janne Hagen
Front Matter

Digital Signatures


XML Signature Wrapping Still Considered Harmful: A Case Study on the Personal Health Record in Germany
Paul Höller, Alexander Krumeich, Luigi Lo Iacono
3-18
Trust Me If You Can: Trusted Transformation Between (JSON) Schemas to Support Global Authentication of Education Credentials
Stefan More, Peter Grassberger, Felix Hörandner, Andreas Abraham, Lukas Daniel Klausner
19-35
SIUV: A Smart Car Identity Management and Usage Control System Based on Verifiable Credentials
Ali Hariri, Subhajit Bandopadhyay, Athanasios Rizos, Theo Dimitrakos, Bruno Crispo, Muttukrishnan Rajarajan
36-50

Vulnerability Management


A Performance Assessment of Free-to-Use Vulnerability Scanners - Revisited
Ricardo Araújo, António Pinto, Pedro Pinto
53-65
QuickBCC: Quick and Scalable Binary Vulnerable Code Clone Detection
Hajin Jang, Kyeongseok Yang, Geonwoo Lee, Yoonjong Na, Jeremy D. Seideman, Shoufu Luo, Heejo Lee, Sven Dietrich
66-82
Automatic Inference of Taint Sources to Discover Vulnerabilities in SOHO Router Firmware
Kai Cheng, Dongliang Fang, Chuan Qin, Huizhao Wang, Yaowen Zheng, Nan Yu, Limin Sun
83-99

Covert Channels and Cryptography


ESQABE: Predicting Encrypted Search Queries
Isaac Meers, Mariano Di Martino, Peter Quax, Wim Lamotte
103-117
Reconnection-Based Covert Channels in Wireless Networks
Sebastian Zillien, Steffen Wendzel
118-133
Minecraft Altered Skin Channel (MASC)
Sam Abrams, Brandon Keller, Kenneth Nero, Gino Placella, Daryl Johnson
134-145
Lattice-Based Weak Curve Fault Attack on ECDSA
Weiqiong Cao, Hongsong Shi, Hua Chen, Wei Wei, Jiazhe Chen
146-161

Application and System Security


HyperSec: Visual Analytics for Blockchain Security Monitoring
Benedikt Putz, Fabian Böhm, Günther Pernul
165-180
100 Popular Open-Source Infosec Tools
Rauli Kaksonen, Tommi Järvenpää, Jukka Pajukangas, Mihai Mahalean, Juha Röning
181-195
RootAsRole: Towards a Secure Alternative to sudo/su Commands for Home Users and SME Administrators
Ahmad Samer Wazan, David Chadwick, Remi Venant, Romain Laborde, Abdelmalek Benzekri
196-209

Privacy


Accept All: The Landscape of Cookie Banners in Greece and the UK
Georgios Kampanos, Siamak F. Shahandashti
213-227
The AppChk Crowd-Sourcing Platform: Which Third Parties are iOS Apps Talking To?
Oleg Geier, Dominik Herrmann
228-241
Compiling Personal Data and Subject Categories from App Data Models
Christian Burkert, Maximilian Blochberger, Hannes Federrath
242-255
Privacy Concerns Go Hand in Hand with Lack of Knowledge: The Case of the German Corona-Warn-App
Sebastian Pape, David Harborth, Jacob Leon Kröger
256-269
Perceived Privacy Problems Within Digital Contact Tracing: A Study Among Swedish Citizens
Ali Padyab, Joakim Kävrestad
270-283

Network Security


Secure and Scalable IoT: An IoT Network Platform Based on Network Overlay and MAC Security
Junwon Lee, Heejo Lee
287-301
Enriching DNS Flows with Host-Based Events to Bypass Future Protocol Encryption
Stanislav Špaček, Daniel Tovarňák, Pavel Čeleda
302-316
Advanced Cowrie Configuration to Increase Honeypot Deceptiveness
Warren Z. Cabral, Craig Valli, Leslie F. Sikos, Samuel G. Wakeling
317-331
Less is Often More: Header Whitelisting as Semantic Gap Mitigation in HTTP-Based Software Systems
Andre Büttner, Hoai Viet Nguyen, Nils Gruschka, Luigi Lo Iacono
332-347

Machine Learning for Security


TAR: Generalized Forensic Framework to Detect Deepfakes Using Weakly Supervised Learning
Sangyup Lee, Shahroz Tariq, Junyaup Kim, Simon S. Woo
351-366
Anomaly Detection for Insider Threats: An Objective Comparison of Machine Learning Models and Ensembles
Filip Wieslaw Bartoszewski, Mike Just, Michael A. Lones, Oleksii Mandrychenko
367-381
Revitalizing Self-Organizing Map: Anomaly Detection Using Forecasting Error Patterns
Young Geun Kim, Jeong-Han Yun, Siho Han, Hyoung Chun Kim, Simon S. Woo
382-397

Security Management


What Is Lurking in Your Backups?
Ben Lenard, Alexander Rasin, Nick Scope, James Wagner
401-415
How Do Users Chain Email Accounts Together?
Lydia Kraus, Mária S̆vidron̆ová, Elizabeth Stobert
416-429
Tensions that Hinder the Implementation of Digital Security Governance
Stef Schinagl, Svetlana Khapova, Abbas Shahim
430-445

 

 


Designed by Inria-IES Team : http://ifip.hal.science/    Hosted by HAL : http://hal.archives-ouvertes.fr/