Table of Contents
|
ICT Systems Security and Privacy Protection Weizhi Meng, Simone Fischer-Hübner, Christian D. Jensen |
Front Matter |
Privacy Models and Preferences
|
A Privacy Calculus Model for Contact Tracing Apps: Analyzing the German Corona-Warn-App David Harborth, Sebastian Pape |
3-19 |
Deriving and Using Synthetic Consequences for Privacy Risk Modeling Stuart S. Shapiro |
20-33 |
Enhanced Privacy in Smart Workplaces: Employees’ Preferences for Transparency Indicators and Control Interactions in the Case of Data Collection with Smart Watches Alexander Richter, Patrick Kühtreiber, Delphine Reinhardt |
34-50 |
Network Security and IDS
|
DAEMON: Dynamic Auto-encoders for Contextualised Anomaly Detection Applied to Security MONitoring Alexandre Dey, Eric Totel, and Benjamin Costé |
53-69 |
FOCUS: Frequency Based Detection of Covert Ultrasonic Signals Wouter Hellemans, Md Masoom Rabbani, Jo Vliegen, Nele Mentens |
70-86 |
Passive, Transparent, and Selective TLS Decryption for Network Security Monitoring Florian Wilkens, Steffen Haas, Johanna Amann, Mathias Fischer |
87-105 |
Network Security and Privacy
|
A Study on the Use of 3rd Party DNS Resolvers for Malware Filtering or Censorship Circumvention Martin Fejrskov, Emmanouil Vasilomanolakis, Jens Myrup Pedersen |
109-125 |
RAAM: A Restricted Adversarial Attack Model with Adding Perturbations to Traffic Features Peishuai Sun, Shuhao Li, Jiang Xie, Hongbo Xu, Zhenyu Cheng, Rui Qin |
126-141 |
Evaluation of Circuit Lifetimes in Tor Kevin Köster, Matthias Marx, Anne Kunstmann, Hannes Federrath |
142-157 |
Forensics
|
D-Cloud-Collector: Admissible Forensic Evidence from Mobile Cloud Storage Mark Vella, Christian Colombo |
161-178 |
Robust PDF Files Forensics Using Coding Style Supriya Adhatarao, Cédric Lauradoux |
179-195 |
Light-Weight File Fragments Classification Using Depthwise Separable Convolutions Kunwar Muhammed Saaim, Muhamad Felemban, Saleh Alsaleh, Ahmad Almulhem |
196-211 |
Trust and PETs
|
Novel Approaches for the Development of Trusted IoT Entities Davide Ferraris, Carmen Fernandez-Gago, Javier Lopez |
215-230 |
Requirements and Secure Serialization for Selective Disclosure Verifiable Credentials Vasilis Kalos, George C. C. Polyzos |
231-247 |
Crypto-Based solutions
|
UP-MLE: Efficient and Practical Updatable Block-Level Message-Locked Encryption Scheme Based on Update Properties Shaoqiang Wu, Chunfu Jia, Ding Wang |
251-269 |
CryptKSP: A Kernel Stack Protection Model Based on AES-NI Hardware Feature Bingnan Zhong, Zicheng Wang, Yinggang Guo, Qingkai Zeng |
270-286 |
Usable Security
|
Usability Insights from Establishing TLS Connections Lydia Kraus, Matěj Grabovský, Martin Ukrop, Katarína Galanská, Vashek Matyáš |
289-305 |
Usability of Antivirus Tools in a Threat Detection Scenario Michael Körber, Anatoli Kalysch, Werner Massonne, Zinaida Benenson |
306-322 |
Data Minimisation Potential for Timestamps in Git: An Empirical Analysis of User Configurations Christian Burkert, Johanna Mcdougall, Hannes Federrath |
323-339 |
Blockchain
|
Greedy Networking in Cryptocurrency Blockchain Simeon Wuthier, Pranav Chandramouli, Xiaobo Zhou, Sang-Yoon Chang |
343-359 |
Towards Supporting Attribute-Based Access Control in Hyperledger Fabric Blockchain Amshumaan Pericherla, Proteet Paul, Shamik Sural, Jaideep Vaidya, Vijayalakshmi Atluri |
360-376 |
Mobile Security and Privacy
|
AndroClonium: Bytecode-Level Code Clone Detection for Obfuscated Android Apps Ardalan Foroughipour, Natalia Stakhanova, Farzaneh Abazari, Bahman Sistany |
379-397 |
One Light, One App: Tackling a Common Misperception Causing Breach of User Privacy Efi Siapiti, Ioanna Dionysiou, Harald Gjermundrød |
398-411 |
Double-X: Towards Double-Cross-Based Unlock Mechanism on Smartphones Wenjuan Li, Jiao Tan, Nan Zhu |
412-428 |
PETs and Crypto
|
Post-Quantum Cheating Detectable Private Information Retrieval Lin Zhu, Changlu Lin, Fuchun Lin, Liang Feng Zhang |
431-448 |
Anonymous Trusted Data Relocation for TEEs Vasco Guita, Daniel Andrade, João Nuno Silva, Miguel Correia |
449-466 |
Efficient Volume-Hiding Encrypted Multi-Maps with Support for Conjunctive Queries Tianci Li, Jiaojiao Wu, Jianfeng Wang |
467-485 |
Vulnerabilities
|
Upside Down: Exploring the Ecosystem of Dark Web Data Markets Bogdan Covrig, Enrique Barrueco Mikelarena, Constanta Rosca, Catalina Goanta, Gerasimos Spanakis, Apostolis Zarras |
489-506 |
An Efficient Use-after-Free Mitigation Approach via Static Dangling Pointer Nullification Yue Yu, Xiaoqi Jia, Xun An, Shengzhi Zhang |
507-523 |