Table of Contents
|
Information Security Theory and Practice Sara Foresti, Javier Lopez |
Front Matter |
Authentication and Key Management
|
Securing Transactions with the eIDAS Protocols Frank Morgner, Paul Bastian, Marc Fischlin |
3-18 |
Novel Lightweight Signcryption-Based Key Distribution Mechanisms for MIKEY Kim Nguyen, Nouha Oualha, Maryline Laurent |
19-34 |
Codes v. People: A Comparative Usability Study of Two Password Recovery Mechanisms Vlasta Stavova, Vashek Matyas, Mike Just |
35-50 |
Secure Hardware Systems
|
An Implementation of a High Assurance Smart Meter Using Protected Module Architectures Jan Mühlberg, Sara Cleemput, Mustafa Mustafa, Jo Bulck, Bart Preneel, Frank Piessens |
53-69 |
Security Challenges of Small Cell as a Service in Virtualized Mobile Edge Computing Environments Vassilios Vassilakis, Emmanouil Panaousis, Haralambos Mouratidis |
70-84 |
An HMM-Based Anomaly Detection Approach for SCADA Systems Kyriakos Stefanidis, Artemios Voyiatzis |
85-99 |
Attacks to Software and Network Systems
|
Attacking and Defending Dynamic Analysis System-Calls Based IDS Ishai Rosenberg, Ehud Gudes |
103-119 |
Towards Automatic Risk Analysis and Mitigation of Software Applications Leonardo Regano, Daniele Canavese, Cataldo Basile, Alessio Viticchié, Antonio Lioy |
120-135 |
Runtime Code Polymorphism as a Protection Against Side Channel Attacks Damien Couroussé, Thierno Barry, Bruno Robisson, Philippe Jaillon, Olivier Potin, Jean-Louis Lanet |
136-152 |
Analysis of a Code-Based Countermeasure Against Side-Channel and Fault Attacks Guillaume Barbu, Alberto Battistello |
153-168 |
Access Control and Data Protection
|
LAMP - Label-Based Access-Control for More Privacy in Online Social Networks Leila Bahri, Barbara Carminati, Elena Ferrari, William Lucia |
171-186 |
Privacy-Preserving Two-Party Skyline Queries Over Horizontally Partitioned Data Ling Chen, Ting Yu, Rada Chirkova |
187-203 |
Fault-Channel Watermarks Peter Samarin, Alexander Skripnik, Kerstin Lemke-Rust |
204-219 |
Short Papers
|
The Effect of Semantic Elaboration on the Perceived Security and Privacy Risk of Privacy-ABCs — An Empirical Experiment Ahmad Sabouri |
223-235 |
Delegating Biometric Authentication with the Sumcheck Protocol Hervé Chabanne, Julien Keuffer, Roch Lescuyer |
236-244 |
Password Generators: Old Ideas and New Fatma Al Maqbali, Chris Mitchell |
245-253 |
Provable Network Activity for Protecting Users Against False Accusation Panagiotis Papadopoulos, Elias Athanasopoulos, Eleni Kosta, George Siganos, Angelos Keromytis, Evangelos Markatos |
254-261 |
Combining Third Party Components Securely in Automotive Systems Madeline Cheah, Siraj Shaikh, Jeremy Bryans, Hoang Nguyen |
262-269 |