default search action
WISA 2014: Jeju Island, Korea
- Kyung Hyune Rhee, Jeong Hyun Yi:
Information Security Applications - 15th International Workshop, WISA 2014, Jeju Island, Korea, August 25-27, 2014. Revised Selected Papers. Lecture Notes in Computer Science 8909, Springer 2015, ISBN 978-3-319-15086-4
Malware Detection
- Ahmed E. Kosba, Aziz Mohaisen, Andrew G. West, Trevor Tonn, Huy Kang Kim:
ADAM: Automated Detection and Attribution of Malicious Webpages. 3-16 - Jaehyeok Song, Jonghyuk Song, Jong Kim:
Detection of Heap-Spraying Attacks Using String Trace Graph. 17-26 - Ubaidullah Rajput, Fizza Abbas, Rasheed Hussain, Hasoo Eun, Heekuck Oh:
A Simple Yet Efficient Approach to Combat Transaction Malleability in Bitcoin. 27-37
Mobile Security
- Zhongwen Zhang:
Before Unrooting your Android Phone, Patching up Permission System First! 41-54 - Eunhyun Kim, Kyungwon Park, Hyoungshick Kim, Jaeseung Song:
I've Got Your Number: - Harvesting Users' Personal Data via Contacts Sync for the KakaoTalk Messenger. 55-67 - Jina Kang, Daehyun Kim, Hyoungshick Kim, Jun Ho Huh:
Analyzing Unnecessary Permissions Requested by Android Apps Based on Users' Opinions. 68-79
Vulnerability Analysis
- Shinichi Matsumoto, Yuya Onitsuka, Junpei Kawamoto, Kouichi Sakurai:
Reconstructing and Visualizing Evidence of Artifact from Firefox SessionStorage. 83-94 - Shinjo Park, Suwan Park, Insu Yun, Dongkwan Kim, Yongdae Kim:
Analyzing Security of Korean USIM-Based PKI Certificate Service. 95-106 - Aziz Mohaisen, Omar Alrawi:
AMAL: High-Fidelity, Behavior-Based Automated Malware Analysis and Classification. 107-121 - Ashar Javed, Jörg Schwenk:
Systematically Breaking Online WYSIWYG Editors. 122-133
Applied Cryptography
- Ryoma Ito, Atsuko Miyaji:
New Integrated Long-Term Glimpse of RC4. 137-149 - Hwajeong Seo, Zhe Liu, Yasuyuki Nogami, Jongseok Choi, Howon Kim:
Improved Modular Multiplication for Optimal Prime Fields. 150-161
Network Security
- Dongwan Kang, JooHyung Oh, Chaetae Im:
Context Based Smart Access Control on BYOD Environments. 165-176 - Chao-Lieh Chen, Shen-Chien Chen, Chun-Ruei Chang, Chia-Fei Lin:
Scalable and Autonomous Mobile Device-Centric Cloud for Secured D2D Sharing. 177-189 - Ngoc-Tu Chau, Minh-Duong Nguyen, Seung Wook Jung, Souhwan Jung:
SecaaS Framework and Architecture: A Design of Dynamic Packet Control. 190-201 - Aziz Mohaisen, Mansurul Bhuiyan, Yannis Labrou:
Name Server Switching: Anomaly Signatures, Usage, Clustering, and Prediction. 202-215 - Fizza Abbas, Ubaidullah Rajput, Rasheed Hussain, Hasoo Eun, Heekuck Oh:
A Trustless Broker Based Protocol to Discover Friends in Proximity-Based Mobile Social Networks. 216-227
Cryptography
- Minkyu Joo, Pil Joong Lee:
Shared and Searchable Encrypted Data for Semi-trusted Servers with Controllable Sharing Property. 231-243 - Pairat Thorncharoensri, Willy Susilo, Yi Mu:
Fair Multi-signature. 244-256 - Ibrahim F. Elashry, Yi Mu, Willy Susilo:
An Efficient Variant of Boneh-Gentry-Hamburg's Identity-Based Encryption Without Pairing. 257-268 - Fei Tang, Hongda Li:
Joint Signature and Encryption in the Presence of Continual Leakage. 269-280
Hardware Security
- Jörn Müller-Quade, Antonio Sobreira de Almeida:
Wireless Key Exchange Using Frequency Impairments. 283-294 - Fangyu Zheng, Wuqiong Pan, Jingqiang Lin, Jiwu Jing, Yuan Zhao:
Exploiting the Potential of GPUs for Modular Multiplication in ECC. 295-306 - Yeoncheol Lee, Hwajeong Seo, Howon Kim:
The Unified Hardware Design for GCM and SGCM. 307-320 - Yongdae Kim:
Successful Profiling Attacks with Different Measurement Environments for Each Phase. 321-330 - Taesung Kim, Sungjun Ahn, Seungkwang Lee, Dooho Choi:
Function Masking: A New Countermeasure Against Side Channel Attack. 331-342
Critical Infrastructure Security and Policy
- Seungoh Choi, Yeop Chang, Jeong-Han Yun, Woonyon Kim:
Multivariate Statistic Approach to Field Specifications of Binary Protocols in SCADA System. 345-357 - Kyoung-Ho Kim, Jeong-Han Yun, Yeop Chang, Woonyon Kim:
Packet Loss Consideration for Burst-Based Anomaly Detection in SCADA Network. 358-369 - Ji-Yeon Kim, Hyung-Jong Kim:
Defining Security Primitives for Eliciting Flexible Attack Scenarios Through CAPEC Analysis. 370-382 - Youngin You, Sangkyo Oh, Kyungho Lee:
Advanced Security Assessment for Control Effectiveness. 383-393 - Misun Song, JunSeok Seo, Kyungho Lee:
Study on the Effectiveness of the Security Countermeasures Against Spear Phishing. 394-404
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.