Full Text Documents

Chargement de la page

Search

Chargement de la page

Table of Contents
ICT Systems Security and Privacy Protection
Weizhi Meng, Simone Fischer-Hübner, Christian D. Jensen
Front Matter

Privacy Models and Preferences


A Privacy Calculus Model for Contact Tracing Apps: Analyzing the German Corona-Warn-App
David Harborth, Sebastian Pape
3-19
Deriving and Using Synthetic Consequences for Privacy Risk Modeling
Stuart S. Shapiro
20-33
Enhanced Privacy in Smart Workplaces: Employees’ Preferences for Transparency Indicators and Control Interactions in the Case of Data Collection with Smart Watches
Alexander Richter, Patrick Kühtreiber, Delphine Reinhardt
34-50

Network Security and IDS


DAEMON: Dynamic Auto-encoders for Contextualised Anomaly Detection Applied to Security MONitoring
Alexandre Dey, Eric Totel, and Benjamin Costé
53-69
FOCUS: Frequency Based Detection of Covert Ultrasonic Signals
Wouter Hellemans, Md Masoom Rabbani, Jo Vliegen, Nele Mentens
70-86
Passive, Transparent, and Selective TLS Decryption for Network Security Monitoring
Florian Wilkens, Steffen Haas, Johanna Amann, Mathias Fischer
87-105

Network Security and Privacy


A Study on the Use of 3rd Party DNS Resolvers for Malware Filtering or Censorship Circumvention
Martin Fejrskov, Emmanouil Vasilomanolakis, Jens Myrup Pedersen
109-125
RAAM: A Restricted Adversarial Attack Model with Adding Perturbations to Traffic Features
Peishuai Sun, Shuhao Li, Jiang Xie, Hongbo Xu, Zhenyu Cheng, Rui Qin
126-141
Evaluation of Circuit Lifetimes in Tor
Kevin Köster, Matthias Marx, Anne Kunstmann, Hannes Federrath
142-157

Forensics


D-Cloud-Collector: Admissible Forensic Evidence from Mobile Cloud Storage
Mark Vella, Christian Colombo
161-178
Robust PDF Files Forensics Using Coding Style
Supriya Adhatarao, Cédric Lauradoux
179-195
Light-Weight File Fragments Classification Using Depthwise Separable Convolutions
Kunwar Muhammed Saaim, Muhamad Felemban, Saleh Alsaleh, Ahmad Almulhem
196-211

Trust and PETs


Novel Approaches for the Development of Trusted IoT Entities
Davide Ferraris, Carmen Fernandez-Gago, Javier Lopez
215-230
Requirements and Secure Serialization for Selective Disclosure Verifiable Credentials
Vasilis Kalos, George C. C. Polyzos
231-247

Crypto-Based solutions


UP-MLE: Efficient and Practical Updatable Block-Level Message-Locked Encryption Scheme Based on Update Properties
Shaoqiang Wu, Chunfu Jia, Ding Wang
251-269
CryptKSP: A Kernel Stack Protection Model Based on AES-NI Hardware Feature
Bingnan Zhong, Zicheng Wang, Yinggang Guo, Qingkai Zeng
270-286

Usable Security


Usability Insights from Establishing TLS Connections
Lydia Kraus, Matěj Grabovský, Martin Ukrop, Katarína Galanská, Vashek Matyáš
289-305
Usability of Antivirus Tools in a Threat Detection Scenario
Michael Körber, Anatoli Kalysch, Werner Massonne, Zinaida Benenson
306-322
Data Minimisation Potential for Timestamps in Git: An Empirical Analysis of User Configurations
Christian Burkert, Johanna Mcdougall, Hannes Federrath
323-339

Blockchain


Greedy Networking in Cryptocurrency Blockchain
Simeon Wuthier, Pranav Chandramouli, Xiaobo Zhou, Sang-Yoon Chang
343-359
Towards Supporting Attribute-Based Access Control in Hyperledger Fabric Blockchain
Amshumaan Pericherla, Proteet Paul, Shamik Sural, Jaideep Vaidya, Vijayalakshmi Atluri
360-376

Mobile Security and Privacy


AndroClonium: Bytecode-Level Code Clone Detection for Obfuscated Android Apps
Ardalan Foroughipour, Natalia Stakhanova, Farzaneh Abazari, Bahman Sistany
379-397
One Light, One App: Tackling a Common Misperception Causing Breach of User Privacy
Efi Siapiti, Ioanna Dionysiou, Harald Gjermundrød
398-411
Double-X: Towards Double-Cross-Based Unlock Mechanism on Smartphones
Wenjuan Li, Jiao Tan, Nan Zhu
412-428

PETs and Crypto


Post-Quantum Cheating Detectable Private Information Retrieval
Lin Zhu, Changlu Lin, Fuchun Lin, Liang Feng Zhang
431-448
Anonymous Trusted Data Relocation for TEEs
Vasco Guita, Daniel Andrade, João Nuno Silva, Miguel Correia
449-466
Efficient Volume-Hiding Encrypted Multi-Maps with Support for Conjunctive Queries
Tianci Li, Jiaojiao Wu, Jianfeng Wang
467-485

Vulnerabilities


Upside Down: Exploring the Ecosystem of Dark Web Data Markets
Bogdan Covrig, Enrique Barrueco Mikelarena, Constanta Rosca, Catalina Goanta, Gerasimos Spanakis, Apostolis Zarras
489-506
An Efficient Use-after-Free Mitigation Approach via Static Dangling Pointer Nullification
Yue Yu, Xiaoqi Jia, Xun An, Shengzhi Zhang
507-523

 

 


Designed by Inria-IES Team : http://hal.inria.fr/    Hosted by HAL : http://hal.archives-ouvertes.fr/