default search action
12. ARES 2017: Reggio Calabria, Italy
- Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29 - September 01, 2017. ACM 2017, ISBN 978-1-4503-5257-4
ARES Full Papers: Full I - Best Paper
- David Bernhard, Oksana Kulyk, Melanie Volkamer:
Security Proofs for Participation Privacy, Receipt-Freeness and Ballot Privacy for the Helios Voting Scheme. 1:1-1:10 - Anatoli Kalysch, Johannes Götzfried, Tilo Müller:
VMAttack: Deobfuscating Virtualization-Based Packed Binaries. 2:1-2:10 - Jordi Soria-Comas, Josep Domingo-Ferrer:
A Non-Parametric Model for Accurate and Provably Private Synthetic Data Sets. 3:1-3:10
ARES Full Papers: Full II - Applications
- Enrico Schiavone, Andrea Ceccarelli, Andrea Bondavalli:
Continuous Biometric Verification for Non-Repudiation of Remote Services. 4:1-4:10 - Iakovos Gurulian, Konstantinos Markantonakis, Raja Naeem Akram, Keith Mayes:
Artificial Ambient Environments for Proximity Critical Applications. 5:1-5:10 - Tom Arjannikov, Simon Diemert, Sudhakar Ganti, Chloe Lampman, Edward C. Wiebe:
Using Markov Chains to Model Sensor Network Reliability. 6:1-6:10
ARES Full Papers: Full III - Trust
- Carlton Shepherd, Raja Naeem Akram, Konstantinos Markantonakis:
Establishing Mutually Trusted Channels for Remote Sensing Devices with Trusted Execution Environments. 7:1-7:10 - Reda Yaich, Nora Cuppens, Frédéric Cuppens:
Enabling Trust Assessment In Clouds-of-Clouds: A Similarity-Based Approach. 8:1-8:9 - Peter Mayer, Alexandra Kunz, Melanie Volkamer:
Reliable Behavioural Factors in the Information Security Context. 9:1-9:10
ARES Full Papers: Full IV - Cryptography
- Michael Rossberg, Markus Theil:
Secure Enrollment of Certificates Using Short PINs. 10:1-10:9 - Xavier Bultel, Radu Ciucanu, Matthieu Giraud, Pascal Lafourcade:
Secure Matrix Multiplication with MapReduce. 11:1-11:10
ARES Full Papers: ARES Full V - Security Models and Data Accountability
- Andrea Tundis, Alfredo Garro, Teresa Gallo, Domenico Saccà, Simona Citrigno, Sabrina Graziano, Max Mühlhäuser:
Systemic Risk Modeling and Evaluation through Simulation and Bayesian Networks. 12:1-12:10 - Andrea Tundis, Rolf Egert, Max Mühlhäuser:
Attack Scenario Modeling for Smart Grids Assessment through Simulation. 13:1-13:10 - Ricardo Neisse, Gary Steri, Igor Nai Fovino:
A Blockchain-based Approach for Data Accountability and Provenance Tracking. 14:1-14:10
ARES Full Papers: ARES Full VI Privacy I
- Spyros Boukoros, Stefan Katzenbeisser:
Measuring privacy in high dimensional microdata collections. 15:1-15:8 - Sebastian Funke, Alexander Wiesmaier, Jörg Daubert:
Constrained PET Composition for Measuring Enforced Privacy. 16:1-16:10 - Konstantinos Angelopoulos, Vasiliki Diamantopoulou, Haralambos Mouratidis, Michalis Pavlidis, Mattia Salnitri, Paolo Giorgini, José Fran. Ruiz:
A Holistic Approach for Privacy Protection in E-Government. 17:1-17:10
ARES Full Papers: ARES Full VII Privacy II
- Thomas Gougeon, Morgan Barbier, Patrick Lacharme, Gildas Avoine, Christophe Rosenberger:
Memory carving can finally unveil your embedded personal data. 18:1-18:9 - Saeed Ibrahim Alqahtani, Shujun Li:
PPAndroid-Benchmarker: Benchmarking Privacy Protection Systems on Android Devices. 19:1-19:10
ARES Full Papers: Ares Full VIII - Network Security and Intrusion Detection
- Aljosha Judmayer, Johanna Ullrich, Georg Merzdovnik, Artemios G. Voyiatzis, Edgar R. Weippl:
Lightweight Address Hopping for Defending the IPv6 IoT. 20:1-20:10 - Norbert Blenn, Vincent Ghiëtte, Christian Doerr:
Quantifying the Spectrum of Denial-of-Service Attacks through Internet Backscatter. 21:1-21:10 - Martin Husák, Jaroslav Kaspar, Elias Bou-Harb, Pavel Celeda:
On the Sequential Pattern and Rule Mining in the Analysis of Cyber Security Alerts. 22:1-22:10 - Quentin Le Sceller, ElMouatez Billah Karbab, Mourad Debbabi, Farkhund Iqbal:
SONAR: Automatic Detection of Cyber Security Events over the Twitter Stream. 23:1-23:11
ARES Short Papers: ARES Short I - Cryptography
- Nils Löken:
Searchable Encryption with Access Control. 24:1-24:6 - Alfredo De Santis, Manuela Flores, Barbara Masucci:
One-Message Unilateral Entity Authentication Schemes. 25:1-25:6 - Francesco Buccafurri, Gianluca Lax, Serena Nicolazzo, Antonino Nocera:
Overcoming Limits of Blockchain for IoT Applications. 26:1-26:6
ARES Short Papers: ARES Short II - IoT and Security Engineering
- Zeeshan Ali Khan, Johanna Ullrich, Artemios G. Voyiatzis, Peter Herrmann:
A Trust-based Resilient Routing Mechanism for the Internet of Things. 27:1-27:6 - Muhammad Ajmal Azad, Samiran Bag, Feng Hao:
M2M-REP: Reputation of Machines in the Internet of Things. 28:1-28:7 - Sravani Teja Bulusu, Romain Laborde, Ahmad Samer Wazan, François Barrère, Abdelmalek Benzekri:
Which Security Requirements Engineering Methodology Should I Choose?: Towards a Requirements Engineering-based Evaluation Approach. 29:1-29:6 - Marco Rasori, Pericle Perazzo, Gianluca Dini:
A Low-Cost UAV-Based Secure Location Verification Method. 30:1-30:6
ARES Short Papers: ARES Short III - Security Monitoring and Analysis
- Markus Wurzenberger, Florian Skopik, Max Landauer, Philipp Greitbauer, Roman Fiedler, Wolfgang Kastner:
Incremental Clustering for Semi-Supervised Anomaly Detection applied on Log Data. 31:1-31:6 - Luca Allodi, Fabio Massacci:
Attack Potential in Impact and Complexity. 32:1-32:6 - Sebastian Neuner, Artemios G. Voyiatzis, Martin Schmiedecker, Edgar R. Weippl:
Timestamp hiccups: Detecting manipulated filesystem timestamps on NTFS. 33:1-33:6 - Shankar Karuppayah, Leon Böck, Tim Grube, Selvakumar Manickam, Max Mühlhäuser, Mathias Fischer:
SensorBuster: On Identifying Sensor Nodes in P2P Botnets. 34:1-34:6
ARES Short Papers: ARES Short IV - Applications
- Yousra Javed, Mohamed Shehab, Emmanuel Bello-Ogunu:
Investigating User Comprehension and Risk Perception of Apple's Touch ID Technology. 35:1-35:6 - Soha Alboghdady, Stefan Winter, Ahmed Taha, Heng Zhang, Neeraj Suri:
C'mon: Monitoring the Compliance of Cloud Services to Contracted Properties. 36:1-36:6 - Marcel Busch, Mykolai Protsenko, Tilo Müller:
A Cloud-Based Compilation and Hardening Platform for Android Apps. 37:1-37:6 - Stefano Bistarelli, Francesco Santini:
Go with the -Bitcoin- Flow, with Visual Analytics. 38:1-38:6
FARES 2017: FARES I - Critical Infrastructures and Cyber2Physical
- Christof Fetzer, Giovanni Mazzeo, John Oliver, Luigi Romano, Martijn Verburg:
Integrating Reactive Cloud Applications in SERECA. 39:1-39:8 - Philipp Kreimel, Oliver Eigner, Paul Tavolato:
Anomaly-Based Detection and Classification of Attacks in Cyber-Physical Systems. 40:1-40:6
FARES 2017: FARES II - Identity Management and Access Control
- Tetsuji Takada:
Authentication Shutter: Alternative Countermeasure against Password Reuse Attack by Availability Control. 41:1-41:9 - Abdulrahman Alruban, Nathan L. Clarke, Fudong Li, Steven Furnell:
Insider Misuse Attribution using Biometrics. 42:1-42:7 - Olga Kieselmann, Arno Wacker, Gregor Schiele:
k-rAC: a Fine-Grained k-Resilient Access Control Scheme for Distributed Hash Tables. 43:1-43:10 - Olivier Blazy, Emmanuel Conchon, Paul Germouty, Amandine Jambert:
Efficient ID-based Designated Verifier Signature. 44:1-44:8
FARES 2017: FARES III - Code Security and Privacy
- Kevin Kirchner, Stefan Rosenthaler:
bin2llvm: Analysis of Binary Programs Using LLVM Intermediate Representation. 45:1-45:7 - Michiel Willocx, Jan Vossaert, Vincent Naessens:
Security Analysis of Cordova Applications in Google Play. 46:1-46:7 - Nicholas Akinyokun, Vanessa Teague:
Security and Privacy Implications of NFC-enabled Contactless Payment Systems. 47:1-47:10 - Nikolaos P. Karvelas, Marius Senftleben, Stefan Katzenbeisser:
Microblogging in a Privacy-Preserving way. 48:1-48:6
FARES 2017: FARES IV - Security Models and Methods
- Robert P. Lee, Konstantinos Markantonakis, Raja Naeem Akram:
Provisioning Software with Hardware-Software Binding. 49:1-49:9 - Enrico Frumento, Federica Freschi, Davide Andreoletti, Angelo Consoli:
Victim Communication Stack (VCS): A flexible model to select the Human Attack Vector. 50:1-50:6 - Sigurd Eskeland:
Fully threshold broadcast encryption. 51:1-51:5 - Partha P. Pal, Nathaniel Soule, Nate Lageman, Shane S. Clark, Marco M. Carvalho, Adrian Granados, Anthony Alves:
Adaptive Resource Management Enabling Deception (ARMED). 52:1-52:8
WSDF 2017: WSDF I
- Felix Mayer, Martin Steinebach:
Forensic Image Inspection Assisted by Deep Learning. 53:1-53:9
WSDF 2017: WSDF II
- Oren Halvani, Christian Winter, Lukas Graner:
On the Usefulness of Compression Models for Authorship Verification. 54:1-54:10 - Tanveer A. Zia, Peng Liu, Weili Han:
Application-Specific Digital Forensics Investigative Model in Internet of Things (IoT). 55:1-55:7 - Christopher Meffert, Devon Clark, Ibrahim M. Baggili, Frank Breitinger:
Forensic State Acquisition from Internet of Things (FSAIoT): A general framework and practical approach for IoT forensics through IoT device state acquisition. 56:1-56:11
IWSMA 2017: IWSMA I
- Abeer Al Jarrah, Mohamed Shehab:
The Demon is in the Configuration: Revisiting Hybrid Mobile Apps Configuration Model. 57:1-57:10 - Ayman Youssef, Ahmed F. Shosha:
Quantitave Dynamic Taint Analysis of Privacy Leakage in Android Arabic Apps. 58:1-58:9 - Khanh-Huu-The Dam, Tayssir Touili:
Learning Android Malware. 59:1-59:9
IWCC 2017: IWCC I
- Merylin Monaro, Riccardo Spolaor, QianQian Li, Mauro Conti, Luciano Gamberini, Giuseppe Sartori:
Type Me the Truth!: Detecting Deceitful Users via Keystroke Dynamics. 60:1-60:6 - Natalija Vlajic, Xue Ying Shi, Hamzeh Roumani, Pooria Madani:
Resource Hints in HTML5: A New Pandora's Box of Security Nightmares. 61:1-61:9
IWCC 2017: IWCC II
- Orhan Ermis, Serif Bahtiyar, Emin Anarim, M. Ufuk Çaglayan:
A Comparative Study on the Scalability of Dynamic Group Key Agreement Protocols. 62:1-62:6 - Masoomeh Sepehri, Alberto Trombetta:
Secure and Efficient Data Sharing with Atribute-based Proxy Re-encryption Scheme. 63:1-63:6
SAW 2017: SAW I
- Dorottya Papp, Levente Buttyán, Zhendong Ma:
Towards Semi-automated Detection of Trigger-based Behavior for Software Security Assurance. 64:1-64:6 - Václav Stupka, Martin Horák, Martin Husák:
Protection of personal data in security alert sharing platforms. 65:1-65:8 - Sam Procter, Eugene Y. Vasserman, John Hatcliff:
SAFE and Secure: Deeply Integrating Security in a New Hazard Analysis. 66:1-66:10 - Daniel Zelle, Christoph Krauß, Hubert Strauß, Karsten Schmidt:
On Using TLS to Secure In-Vehicle Networks. 67:1-67:10
SSE 2017: SSE I - DevSecOps and cloud computing
- Brian Pfretzschner, Lotfi Ben Othmane:
Identification of Dependency-based Attacks on Node.js. 68:1-68:6 - Martin Gilje Jaatun, Daniela S. Cruzes, Jesus Luna:
DevOps for Better Software Security in the Cloud Invited Paper. 69:1-69:6 - Hasan Yasar:
Implementing Secure DevOps assessment for highly regulated environments. 70:1-70:3
SSE 2017: SSE II - Agile secure software development
- Pal-Stefan Murvay, Bogdan Groza:
DoS Attacks on Controller Area Networks by Fault Injections from the Software Layer. 71:1-71:10 - Felix Schuckert, Basel Katt, Hanno Langweg:
Source Code Patterns of SQL Injection Vulnerabilities. 72:1-72:7 - Patrik Maier, Zhendong Ma, Roderick Bloem:
Towards a Secure SCRUM Process for Agile Web Application Development. 73:1-73:8 - Kalle Rindell, Sami Hyrynsalmi, Ville Leppänen:
Busting a Myth: Review of Agile Security Engineering Methods. 74:1-74:10
WMA 2017: WMA I - Malware detection
- Joseph DiVita, Roger A. Hallman:
An Approach to Botnet Malware Detection Using Nonparametric Bayesian Methods. 75:1-75:9 - Fabio Martinelli, Francesco Mercaldo, Vittoria Nardone, Antonella Santone:
Malware and Formal Methods: Rigorous Approaches for detecting Malicious Behaviour. 76:1-76:6 - Tomás Komárek, Petr Somol:
End-node Fingerprinting for Malware Detection on HTTPS Data. 77:1-77:7
WMA 2017: WMA II - Defensive technologies
- Andrew Slaughter, Mark Yampolskiy, Manyalibo Matthews, Wayne E. King, Gabe Guss, Yuval Elovici:
How to Ensure Bad Quality in Metal Additive Manufacturing: In-Situ Infrared Thermography from the Security Perspective. 78:1-78:10 - Jasper Abbink, Christian Doerr:
Popularity-based Detection of Domain Generation Algorithms. 79:1-79:8 - Moataz AbdelKhalek, Ahmed F. Shosha:
JSDES: An Automated De-Obfuscation System for Malicious JavaScript. 80:1-80:13
CUING 2017: CUING I
- Félix Iglesias, Tanja Zseby:
Are Network Covert Timing Channels Statistical Anomalies? 81:1-81:9 - Avinash Srinivasan, Hunter Dong, Angelos Stavrou:
FROST: Anti-Forensics Digital-Dead-DROp Information Hiding RobuST to Detection & Data Loss with Fault tolerance. 82:1-82:8 - Sabine S. Schmidt, Wojciech Mazurczyk, Jörg Keller, Luca Caviglione:
A New Data-Hiding Approach for IP Telephony Applications with Silence Suppression. 83:1-83:6
CUING 2017: CUING II
- Mauro Conti, Pallavi Kaliyar, Chhagan Lal:
REMI: A Reliable and Secure Multicast Routing Protocol for IoT Networks. 84:1-84:8 - Elike Hodo, Xavier J. A. Bellekens, Ephraim Iorkyase, Andrew W. Hamilton, Christos Tachtatzis, Robert C. Atkinson:
Machine Learning Approach for Detection of nonTor Traffic. 85:1-85:6 - Anze Mihelic, Blaz Markelj, Igor Bernik, Sabina Zgaga:
Investigating the darknet: limitations in Slovenian legal system. 86:1-86:7
SECPID 2017: SECPID I
- Arne Bilzhause, Henrich C. Pöhls, Kai Samelin:
Position Paper: The Past, Present, and Future of Sanitizable and Redactable Signatures. 87:1-87:9 - Andreas Happe, Florian Wohner, Thomas Lorünser:
The Archistar Secret-Sharing Backup Proxy. 88:1-88:8 - Nicolás Notario, Eleonora Ciceri, Alberto Crespo, Eduardo González Real, Ilio Catallo, Sauro Vicini:
Orchestrating Privacy Enhancing Technologies and Services with BPM Tools: The WITDOM Data Protection Orchestrator. 89:1-89:7
SECPID 2017: SECPID II
- Alexandros Kostopoulos, Evangelos Sfakianakis, Ioannis P. Chochliouros, John Sören Pettersson, Stephan Krenn, Welderufael Tesfay, Andrea Migliavacca, Felix Hörandner:
Towards the Adoption of Secure Cloud Identity Services. 90:1-90:7 - Paul Grace, Mike Surridge:
Towards a Model of User-centered Privacy Preservation. 91:1-91:8 - Harry Halpin:
NEXTLEAP: Decentralizing Identity with Privacy for Secure Messaging. 92:1-92:10
SECPID 2017: SECPID III
- Erkuden Rios, Eider Iturbe, Maria Carmen Palacios:
Self-healing Multi-Cloud Application Modelling. 93:1-93:9 - Sebastian Thomas Schork, Antonia Schwichtenberg, Spiros Alexakis, George Moldovan:
Application of the holistic Data Privacy and Security Framework PaaSword: A focus on the integration in industrial Pilots. 94:1-94:10
S-CI 2017: S-CI I - CyberSecurity and Critical Infrastructures
- Lukas Jäger, Richard Petri, Andreas Fuchs:
Rolling DICE: Lightweight Remote Attestation for COTS IoT Hardware. 95:1-95:8 - Aljosa Pasic, Jose-Ramon Martinez-Salio, Susana Gonzalez Zarzosa, Rodrigo Diaz:
ZONESEC: built-in cyber-security for wide area surveillance system. 96:1-96:5 - Christian Frøystad, Karin Bernsmed, Per Håkon Meland:
Protecting Future Maritime Communication. 97:1-97:10
S-CI 2017: S-CI II - Critical Infrastructure Systems CyberSecurity Tools
- Mustafa Ayoob, Wael Adi, Vassilis Prevelakis:
Using Ciphers for Failure-Recovery in ITS Systems. 98:1-98:7 - Kubilay Demir, Neeraj Suri:
Towards DDoS Attack Resilient Wide Area Monitoring Systems. 99:1-99:7 - Ersi Hodo, Stepan Grebeniuk, Henri Ruotsalainen, Paul Tavolato:
Anomaly Detection for Simulated IEC-60870-5-104 Trafiic. 100:1-100:7
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.