IFIP TC6 Open Digital Library

SEC 2013: Auckland, New Zealand

Security and Privacy Protection in Information Processing Systems - 28th IFIP TC 11 International Conference, SEC 2013, Auckland, New Zealand, July 8-10, 2013. Proceedings

Lech J. Janczewski, Henry B. Wolfe, Sujeet Shenoi

Springer, IFIP Advances in Information and Communication Technology 405, ISBN: 978-3-642-39217-7



Exploring Timeline-Based Malware Classification.

Rafiqul Islam, Irfan Altas, Md. Saiful Islam 0003


Screening Smartphone Applications Using Behavioral Signatures.

Suyeon Lee, Jehyun Lee, Heejo Lee


Game Theoretic Approach for Cost-Benefit Analysis of Malware Proliferation Prevention.

Theodoros Spyridopoulos, George C. Oikonomou, Theo Tryfonas, Mengmeng Ge


Authentication and Authorization

Evolving a Secure Internet.

William J. Caelli, Lam-for Kwok, Dennis Longley


Enhancing Click-Draw Based Graphical Passwords Using Multi-Touch on Mobile Phones.

Yuxin Meng, Wenjuan Li, Lam-for Kwok


Applying DAC Principles to the RDF Graph Data Model.

Sabrina Kirrane, Alessandra Mileo, Stefan Decker


A Lightweight Gait Authentication on Mobile Phone Regardless of Installation Error.

Thang Hoang, Deokjai Choi, Quang Viet Vo, Huy Anh Nguyen, Thuc Dinh Nguyen


A Vulnerability in the Song Authentication Protocol for Low-Cost RFID Tags.

Sarah Abughazalah, Konstantinos Markantonakis, Keith Mayes


Network Security/ Cryptography

Extraction of ABNF Rules from RFCs to Enable Automated Test Data Generation.

Markus Gruber, Phillip Wieser, Stefan Nachtnebel, Christian Schanes, Thomas Grechenig


Key Derivation Function: The SCKDF Scheme.

Chuah Chai Wen, Ed Dawson, Leonie Simpson


Sustainable Pseudo-random Number Generator.

Huafei Zhu, Wee Siong Ng, See-Kiong Ng


Software Security

Improving Mobile Device Security with Operating System-Level Virtualization.

Sascha Wessel, Frederic Stumpf, Ilja Herdt, Claudia Eckert


Generating Realistic Application Workloads for Mix-Based Systems for Controllable, Repeatable and Usable Experimentation.

Karl-Peter Fuchs, Dominik Herrmann, Hannes Federrath


An Empirical Evaluation of the Android Security Framework.

Alessandro Armando, Alessio Merlo, Luca Verderame


A Security Engineering Process Approach for the Future Development of Complex Aircraft Cabin Systems.

Hartmut Hintze, Benjamin Wiegraefe, Ralf God


Mobile Device Encryption Systems.

Peter Teufl, Thomas Zefferer, Christof Stromberger


Smartphone Volatile Memory Acquisition for Security Analysis and Forensics Investigation.

Vrizlynn L. L. Thing, Zheng-Leong Chua


Program Transformation for Non-interference Verification on Programs with Pointers.

Mounir Assaf, Julien Signoles, Frédéric Tronel, Eric Totel


Policy Compliance and Obligations

A Viable System Model for Information Security Governance: Establishing a Baseline of the Current Information Security Operations System.

Ezzat Alqurashi, Gary Wills, Lester Gilbert


A Review of the Theory of Planned Behaviour in the Context of Information Security Policy Compliance.

Teodor Sommestad, Jonas Hallberg


Privacy Protection

Enforcement of Privacy Requirements.

Padmanabhan Krishnan, Kostyantyn Vorobyov


Towards Security-Enhanced and Privacy-Preserving Mashup Compositions.

Heidelinde Hobel, Johannes Heurix, Amin Anjomshoaa, Edgar Weippl


On Privacy-Preserving Ways to Porting the Austrian eID System to the Public Cloud.

Bernd Zwattendorfer, Daniel Slamanig


Risk Analysis and Security Metrics

Using the Conflicting Incentives Risk Analysis Method.

Lisa Rajbhandari, Einar Snekkenes


Performance Analysis of Scalable Attack Representation Models.

Jin B. Hong, Dong Seong Kim


ADAPT: A Game Inspired Attack-Defense and Performance Metric Taxonomy.

Chris B. Simmons, Sajjan G. Shiva, Harkeerat Singh Bedi, Vivek Shandilya


Social Engineering

Phishing for the Truth: A Scenario-Based Experiment of Users' Behavioural Response to Emails.

Kathryn Parsons, Agata McCormac, Malcolm Robert Pattinson, Marcus A. Butavicius, Cate Jerram


Phishing and Organisational Learning.

Wayne D. Kearney, Hennie A. Kruger


A Case for Societal Digital Security Culture.

Lotfi Ben Othmane, Harold Weffers, Rohit Ranchal, Pelin Angin, Bharat K. Bhargava, Mohd Murtadha Mohamad


Security Management/Forensic

Secure Outsourcing: An Investigation of the Fit between Clients and Providers.

Gurpreet Dhillon, Romilla Chowdhuri, Filipe de Sá-Soares


Performance Analysis of File Carving Tools.

Thomas Laurenson