default search action
11. ARES 2016: Salzburg, Austria
- 11th International Conference on Availability, Reliability and Security, ARES 2016, Salzburg, Austria, August 31 - September 2, 2016. IEEE Computer Society 2016, ISBN 978-1-5090-0990-9
ARES Full Papers
ARES Full I: Best Paper Session
- Arnaud Oglaza, Romain Laborde, Abdelmalek Benzekri, François Barrère:
A Recommender-Based System for Assisting Non-technical Users in Managing Android Permissions. 1-9 - Wilfried Mayer, Aaron Zauner, Martin Schmiedecker, Markus Huber:
No Need for Black Chambers: Testing TLS in the E-mail Ecosystem at Large. 10-20 - Jose Rubio-Hernan, Luca De Cicco, Joaquín García-Alfaro:
Revisiting a Watermark-Based Detection Scheme to Handle Cyber-Physical Attacks. 21-28
ARES Full II: Cryptography
- Florian Dold, Christian Grothoff:
Byzantine Set-Union Consensus Using Efficient Set Reconciliation. 29-38 - Xavier Bultel, Pascal Lafourcade:
k-Times Full Traceable Ring Signature. 39-48 - Johannes Bauer, Felix C. Freiling:
Towards Cycle-Accurate Emulation of Cortex-M Code to Detect Timing Side Channels. 49-58
ARES Full III: Network and Software Security
- Konrad-Felix Krentz, Christoph Meinel, Maxim Schnjakin:
POTR: Practical On-the-Fly Rejection of Injected and Replayed 802.15.4 Frames. 59-68 - Saurabh Verma, Ali Hamieh, Jun Ho Huh, Henrik Holm, Siva Raj Rajagopalan, Maciej Korczynski, Nina H. Fefferman:
Stopping Amplified DNS DDoS Attacks through Distributed Query Rate Sharing. 69-78 - Johannes Götzfried, Nico Dorr, Ralph Palutke, Tilo Müller:
HyperCrypt: Hypervisor-Based Encryption of Kernel and User Space. 79-87
ARES Full IV: Privacy-Enhancing Technologies
- Denise Demirel, Stephan Krenn, Thomas Lorünser, Giulia Traverso:
Efficient and Privacy Preserving Third Party Auditing for a Distributed Storage System. 88-97 - Oksana Kulyk, Karola Marky, Stephan Neumann, Melanie Volkamer:
Introducing Proxy Voting to Helios. 98-106
ARES Full V: Applications
- Lukas Dresel, Mykolai Protsenko, Tilo Müller:
ARTIST: The Android Runtime Instrumentation Toolkit. 107-116 - Pal-Stefan Murvay, Alexandru Matei, Cristina Solomon, Bogdan Groza:
Development of an AUTOSAR Compliant Cryptographic Library on State-of-the-Art Automotive Grade Controllers. 117-126 - Bernard Stepien, Amy P. Felty:
Using Expert Systems to Statically Detect "Dynamic" Conflicts in XACML. 127-136
ARES Full VI: Intrusion Detection and Incident Response
- Gustavo Gonzalez Granadillo, Alexander Motzek, Joaquín García-Alfaro, Hervé Debar:
Selection of Mitigation Actions Based on Financial and Operational Impact Assessments. 137-146 - Mehdi Nobakht, Vijay Sivaraman, Roksana Boreli:
A Host-Based Intrusion Detection and Mitigation Framework for Smart Home IoT Using OpenFlow. 147-156 - Lyes Bayou, Nora Cuppens-Boulahia, David Espes, Frédéric Cuppens:
Towards a CDS-based Intrusion Detection Deployment Scheme for Securing Industrial Wireless Sensor Networks. 157-166
ARES Full VII: Security Models and Architectures
- Sokratis Vavilis, Alexandru Ionut Egner, Milan Petkovic, Nicola Zannone:
Role Mining with Missing Values. 167-176 - Yannick Naudet, Nicolas Mayer, Christophe Feltus:
Towards a Systemic Approach for Information Security Risk Management. 177-186 - Patrick Pleinevaux:
Towards a Metamodel for SABSA Conceptual Architecture Descriptions. 187-194 - Taciane Martimiano, Jean Everson Martina:
Threat Modelling Service Security as a Security Ceremony. 195-204
ARES Short Papers
ARES Short I: Cloud Security
- Bernd Jäger, Reiner Kraft, Sebastian Luhn, Annika Selzer, Ulrich Waldmann:
Access Control and Data Separation Metrics in Cloud Infrastructures. 205-210 - Marwa Elsayed, Mohammad Zulkernine:
IFCaaS: Information Flow Control as a Service for Cloud Security. 211-216 - Martin Grothe, Christian Mainka, Paul Rösler, Johanna Jupke, Jan Kaiser, Jörg Schwenk:
Your Cloud in My Company: Modern Rights Management Services Revisited. 217-222
ARES Short II: Applications
- Alexandr Vasenev, Lorena Montoya, Andrea Ceccarelli:
A Hazus-Based Method for Assessing Robustness of Electricity Supply to Critical Smart Grid Consumers during Flood Events. 223-228 - Christos Iliou, George Kalpakis, Theodora Tsikrika, Stefanos Vrochidis, Ioannis Kompatsiaris:
Hybrid Focused Crawling for Homemade Explosives Discovery on Surface and Dark Web. 229-234 - Christopher Hansen, James K. Archibald:
The Case for RAID 4: Cloud-RAID Integration with Local Storage. 235-240 - Esma Aïmeur, Sébastien Gambs, Cheu Yien Yep:
An Empirical Study on GSN Usage Intention: Factors Influencing the Adoption of Geo-Social Networks. 241-246
ARES Short III: Cryptography
- Prosanta Gope, Ruei-Hau Hsu, Jemin Lee, Tony Q. S. Quek:
Energy Efficient Mutual Authentication and Key Agreement Scheme with Strong Anonymity Support for Secure Ubiquitious Roaming Services. 247-252 - Toan-Thinh Truong, Duong-Tien Phan, Minh-Triet Tran, Anh Duc Duong, Isao Echizen:
Provable User Authentication Scheme in Telecare Medicine Information System Using Elliptic Curve Cryptosystem. 253-259 - Patrick Lacharme, Christophe Rosenberger:
Synchronous One Time Biometrics with Pattern Based Authentication. 260-265 - Antonio M. Espinoza, Jeffrey Knockel, Pedro Comesaña Alfaro, Jedidiah R. Crandall:
V-DIFT: Vector-Based Dynamic Information Flow Tracking with Application to Locating Cryptographic Keys for Reverse Engineering. 266-271
ARES Short IV: Security Methods
- Christof Rath:
Usable Privacy-Aware Logging for Unstructured Log Entries. 272-277 - Pontus Johnson, Alexandre Vernotte, Mathias Ekstedt, Robert Lagerström:
pwnPr3d: An Attack-Graph-Driven Probabilistic Threat-Modeling Approach. 278-283 - Jeffrey Spaulding, Shambhu J. Upadhyaya, Aziz Mohaisen:
The Landscape of Domain Name Typosquatting: Techniques and Countermeasures. 284-289
FARES I
FARES I: International Workshop on Frontiers in Availability, Reliability and Security
- Muhammad Ajmal Azad, Syed Khurram Rizvi:
Caller-Centrality: Identifying Telemarketers in a VoIP Network. 290-295 - Mario Faiella, Fabio Martinelli, Paolo Mori, Andrea Saracino, Mina Sheikhalishahi:
Collaborative Attribute Retrieval in Environment with Faulty Attribute Managers. 296-303 - Tanja Heuer, Ina Schiering, Frank Klawonn, Alexander Gabel, Martin Seeger:
Recognizing Time-Efficiently Local Botnet Infections - A Case Study. 304-311 - Sainath Batthala, Mayank Swarnkar, Neminath Hubballi, Maitreya Natu:
VoIP Profiler: Profiling Voice over IP User Communication Behavior. 312-320
WSDF 2016
WSDF I: Mobile and OS Forensics
- Kenneth M. Ovens, Gordon Morison:
Identification and Analysis of Email and Contacts Artefacts on iOS and OS X. 321-327 - Joao Paulo Claudino de Sousa, João José Costa Gondim:
Extraction and Analysis of Volatile Memory in Android Systems: An Approach Focused on Trajectory Reconstruction Based on NMEA 0183 Standard. 328-337 - Patrício Domingues, Miguel Frade:
Digital Forensic Artifacts of the Cortana Device Search Cache on Windows 10 Desktop. 338-344
WSDF II: Cloud Forensics
- Saad Alqahtany, Nathan L. Clarke, Steven Furnell, Christoph Reich:
A Forensic Acquisition and Analysis System for IaaS: Architectural Model and Experiment. 345-354 - Manabu Hirano, Hiromu Ogawa:
A Log-Structured Block Preservation and Restoration System for Proactive Forensic Data Collection in the Cloud. 355-364
IWSMA 2016
IWSMA I: International Workshop on Security of Mobile Applications
- Georg Merzdovnik, Damjan Buhov, Artemios G. Voyiatzis, Edgar R. Weippl:
Notary-Assisted Certificate Pinning for Improved Security of Android Apps. 365-371 - Alberto Ferrante, Eric Medvet, Francesco Mercaldo, Jelena Milosevic, Corrado Aaron Visaggio:
Spotting the Malicious Moment: Characterizing Malware Behavior Using Dynamic Features. 372-381
IWSMA II: International Workshop on Security of Mobile Applications
- Sanaah Al Salami, Joonsang Baek, Khaled Salah, Ernesto Damiani:
Lightweight Encryption for Smart Home. 382-388 - Fuensanta Torres Garcia, Katharina Krombholz, Rudolf Mayer, Edgar R. Weippl:
Hand Dynamics for Behavioral User Authentication. 389-398
IWCC 2016
IWCC I: International Workshop on Cyber Crime
- Murdoch Watney:
Law Enforcement Access to Password Protected and/or Encrypted Mobile Data. 399-405 - Daniel Spiekermann, Tobias Eggendorfer:
Towards Digital Investigation in Virtual Networks: A Study of Challenges and Open Problems. 406-413 - Jason W. Clark:
Threat from Within: Case Studies of Insiders Who Committed Information Technology Sabotage. 414-422 - Svrana Kumar, Logesh Madhavan, Mangalam Nagappan, Biplab Sikdar:
Malware in Pirated Software: Case Study of Malware Encounters in Personal Computers. 423-427
SAW 2016
SAW I: International Software Assurance Workshop
- Aleksandar Hudic, Matthias Flittner, Thomas Lorünser, Philipp M. Radl, Roland Bless:
Towards a Unified Secure Cloud Service Development and Deployment Life-Cycle. 428-436 - Nicola Basilico, Andrea Lanzi, Mattia Monga:
A Security Game Model for Remote Software Protection. 437-443 - Gabriela Gheorghe, Muhammad Rizwan Asghar, Jean Lancrenon, Sankalp Ghatpande:
SPARER: Secure Cloud-Proof Storage for e-Health Scenarios. 444-453
SAW II: International Software Assurance Workshop
- Nikhil Tripathi, Neminath Hubballi, Yogendra Singh:
How Secure are Web Servers? An Empirical Study of Slow HTTP DoS Attacks and Detection. 454-463 - Gohar Shakoori, Mehran S. Fallah, Zeinab Iranmanesh:
A Type System for Quantified Information-Flow Security in Java-Like Languages. 464-473 - Jakub Breier:
On Analyzing Program Behavior under Fault Injection Attacks. 474-479
SAW III: International Software Assurance Workshop
- Maria Leitner, Arndt Bonitz:
Authentication in the Context of E-Participation: Current Practice, Challenges and Recommendations. 480-485
SecATM 2016
SecATM I: ATM Security Research and Development
- John Hird, Martin Hawley, Chris Machin:
Air Traffic Management Security Research in SESAR. 486-492 - Claudio Porretti, Raoul Lahaije, Denis Kolev:
A New Vision for ATM Security Management: The Security Management Platform. 493-498 - Karol Gotz, Martin Hawley, Chris Machin, John Hird:
'CTRL_S' - A Security Tool for SESAR's Design-In Security Approach. 499-502
SecATM II: Risk Assessment and Incident Management
- Hamid Asgari, Sarah Haines, Adrian Waller:
Security Risk Assessment and Risk Treatment for Integrated Modular Communication. 503-509 - Martin Gilje Jaatun, Rainer Koelle:
Cyber Security Incident Management in the Aviation Domain. 510-516 - Tobias Kiesling, Matias Krempel, Josef Niederl, Jürgen Ziegler:
A Model-Based Approach for Aviation Cyber Security Risk Assessment. 517-525
SecATM III: Testing and Validation
- Doris di Marco, Alessandro Manzo, Marco Ivaldi, John Hird:
Security Testing with Controller-Pilot Data Link Communications. 526-531 - Patrizia Montefusco, Rosana Casar, Rainer Koelle, Tim H. Stelkens-Kobsch:
Addressing Security in the ATM Environment: From Identification to Validation of Security Countermeasures with Introduction of New Security Capabilities in the ATM System Context. 532-541
ASSD 2016
ASSD I: Secure DevOps
- Vaishnavi Mohan, Lotfi Ben Othmane:
SecDevOps: Is It a Marketing Buzzword? - Mapping Research on Security in DevOps. 542-547
ASSD II: Experiences in Agile Development of Secure Software
- Tosin Daniel Oyetoyan, Daniela Soares Cruzes, Martin Gilje Jaatun:
An Empirical Study on the Relationship between Software Security Skills, Usage and Training Needs in Agile Settings. 548-555 - Kalle Rindell, Sami Hyrynsalmi, Ville Leppänen:
Case Study of Security Development in an Agile Environment: Building Identity Management for a Government Agency. 556-563 - Lotfi Ben Othmane, Azmat Ali:
Towards Effective Security Assurance for Incremental Software Development the Case of Zen Cart Application. 564-571
ASSD III: Assessment of Research on Agile Development of Secure Software
- Chad Heitzenrater, Andrew C. Simpson:
Misuse, Abuse and Reuse: Economic Utility Functions for Characterising Security Requirements. 572-581 - Cristina Rosa Camacho, Sabrina Marczak, Daniela S. Cruzes:
Agile Team Members Perceptions on Non-functional Testing: Influencing Factors from an Empirical Study. 582-589
WMA 2016
WMA I: International Workshop on Malware Analysis
- Laura García, Ricardo J. Rodríguez:
A Peek under the Hood of iOS Malware. 590-598
WMA II: International Workshop on Malware Analysis
- Enrico Mariconti, Jeremiah Onaolapo, Gordon J. Ross, Gianluca Stringhini:
What's Your Major Threat? On the Differences between the Network Behavior of Targeted and Commodity Malware. 599-608 - Eric Medvet, Francesco Mercaldo:
Exploring the Usage of Topic Modeling for Android Malware Static Analysis. 609-617 - Marián Kühnel, Ulrike Meyer:
Classification of Short Messages Initiated by Mobile Malware. 618-627
WMA III: International Workshop on Malware Analysis
- Francesco Mercaldo, Vittoria Nardone, Antonella Santone:
Ransomware Inside Out. 628-637 - Neminath Hubballi, Himanshu Dogra:
Detecting Packed Executable File: Supervised or Anomaly Detection Method? 638-643
ISPM 2016
ISPM I: Challenges, Threats and Solutions
- Meredydd Williams, Jason R. C. Nurse, Sadie Creese:
The Perfect Storm: The Privacy Paradox and the Internet-of-Things. 644-652
ISPM II: Models and Communication
- Jenni Reuben, Leonardo A. Martucci, Simone Fischer-Hübner, Heather S. Packer, Hans Hedbom, Luc Moreau:
Privacy Impact Assessment Template for Provenance. 653-660 - Otto Hellwig, Gerald Quirchmayr, Edith Huber, Gernot Goluch, Franz Vock, Bettina Pospisil:
Major Challenges in Structuring and Institutionalizing CERT-Communication. 661-667 - Thomas Schaberreiter, Gerald Quirchmayr, Anna-Maija Juuso, Moussa Ouedraogo, Juha Röning:
Towards a Complex Systems Approach to Legal and Economic Impact Analysis of Critical Infrastructures. 668-676
FASES 2016
FASES I: Data Protection, Privacy Preservation and Discrimination Discovery
- Rica Gonen, Tamir Tassa:
Privacy Preserving Computations for Viral Marketing: The Case of Rational Players. 677-686 - Stefanos Malliaros, Christoforos Ntantogian, Christos Xenakis:
Protecting Sensitive Information in the Volatile Memory from Disclosure Attacks. 687-693
FASES II: Economic Value of Personal Information
- Miriam Marciel, José González Cabañas, Yonas Mitike Kassa, Roberto Gonzalez, Mohamed Ahmed:
The Value of Online Users: Empirical Evaluation of the Price of Personalized Ads. 694-700 - Yonas Mitike Kassa, José González Cabañas, Ángel Cuevas, Rubén Cuevas Rumín, Miriam Marciel, Roberto Gonzalez:
Your Data in the Eyes of the Beholders: Design of a Unified Data Valuation Portal to Estimate Value of Personal Information from Market Perspective. 701-705
FASES III: Novel Methods for Authentication, Identification and Certificates Issuance
- Kostantinos Papadamou, Riginos Samaras, Michael Sirivianos:
Ensuring the Authenticity and Fidelity of Captured Photos Using Trusted Execution and Mobile Application Licensing Capabilities. 706-714 - Luigi Stammati, Claudio Pisa, Tooska Dargahi, Alberto Caponi, Giuseppe Bianchi:
FEBA: An Action-Based Feature Extraction Framework for Behavioural Identification and Authentication. 715-724 - Thaís Bardini Idalino, Marina Coelho, Jean Everson Martina:
Automated Issuance of Digital Certificates through the Use of Federations. 725-732
SECPID 2016
SECPID I: Security and Privacy in the Cloud I
- Thomas Lorünser, Daniel Slamanig, Thomas Länger, Henrich C. Pöhls:
PRISMACLOUD Tools: A Cryptographic Toolbox for Increasing Security in Cloud Services. 733-741 - Felix Hörandner, Stephan Krenn, Andrea Migliavacca, Florian Thiemer, Bernd Zwattendorfer:
CREDENTIAL: A Framework for Privacy-Preserving Cloud-Based Data Sharing. 742-749 - Bojan Suzic, Andreas Reiter:
Towards Secure Collaboration in Federated Cloud Environments. 750-759
SECPID II: Security and Privacy in the Cloud II
- Arne Bilzhause, Manuel Huber, Henrich C. Pöhls, Kai Samelin:
Cryptographically Enforced Four-Eyes Principle. 760-767 - Sauro Vicini, Francesco Alberti, Nicolás Notario, Alberto Crespo, Juan Ramón Troncoso-Pastoriza, Alberto Sanna:
Co-creating Security-and-Privacy-by-Design Systems. 768-775 - Michael Diener, Leopold Blessing, Nina Rappel:
Tackling the Cloud Adoption Dilemma - A User Centric Concept to Control Cloud Migration Processes by Using Machine Learning Technologies. 776-785
MUININ 2016
MUININ I
- Xiubo Zhang, Stephen Kelly, Khurshid Ahmad:
The Slandail Monitor: Real-Time Processing and Visualisation of Social Media Data for Emergency Management. 786-791 - Damian Jackson, Paul Hayes:
Ensuring Security of Data and Information Flow in Emergency Response Decision Support. 792-797 - Christian Berger, Paolo de Stefani, Taiwo Oriola:
Legal Implications of Using Social Media Data in Emergency Response. 798-799 - Maria Spyropoulou, Khurshid Ahmad:
Disaster-Related Public Speeches: The Role of Emotions. 800-804
MUININ II
- Min Jing, Bryan W. Scotney, Sonya A. Coleman, T. Martin McGinnity:
The Application of Social Media Image Analysis to an Emergency Management System. 805-810 - Sabine Gründer-Fahrer, Christian Berger, Antje Schlaf, Gerhard Heyer:
Computational, Communicative, and Legal Conditions for Using Social Media in Disaster Management in Germany. 811-820
SOCOTUD 2016
SOCOTUD I: Talks and Discussions on Recent Trends in User Involvement and Social Collaboration
- Sebastian Franken, Sabine Kolvenbach, Wolfgang Gräther:
Involving End Users into Collaborative Software Development: The Showcase of CloudTeams. 821-826 - Evangelos Arvanitakis, Michael Petychakis, Evmorfia Biliri, Ariadni Michalitsi-Psarrou, Panagiotis Kokkinakos, Fenareti Lampathaki, Dimitrios Askounis:
Social Analytics in an Enterprise Context: From Manufacturing to Software Development. 827-833 - Brian Greaves, Marijke Coetzee:
SmartNet: Secure Content Sharing for Peer-to-Peer Smart Group Spaces. 834-843
SOCOTUD II: Demonstration, Talks, and Discussion on Social Collaboration in Software Development
- Alexander Böhm, Benjamin Taubmann, Hans P. Reiser:
Geographic Localization of an Anonymous Social Network Message Data Set. 844-850 - Iosif Alvertis, Dimitris Papaspyros, Sotiris Koussouris, Spyros Mouzakitis, Dimitris Askounis:
Using Crowdsourced and Anonymized Personas in the Requirements Elicitation and Software Development Phases of Software Engineering. 851-856
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.