default search action
11th FPS 2018: Montreal, QC, Canada
- Nur Zincir-Heywood, Guillaume Bonfante, Mourad Debbabi, Joaquín García-Alfaro:
Foundations and Practice of Security - 11th International Symposium, FPS 2018, Montreal, QC, Canada, November 13-15, 2018, Revised Selected Papers. Lecture Notes in Computer Science 11358, Springer 2019, ISBN 978-3-030-18418-6
Invited Papers
- Guang Gong:
Securing Internet-of-Things. 3-16 - Sébastien Gambs:
Privacy and Ethical Challenges in Big Data. 17-26
Mobile Security
- Tobias Hamann, Heiko Mantel:
Decentralized Dynamic Security Enforcement for Mobile Applications with CliSeAuDroid. 29-45 - David Bissessar, Maryam Hezaveh, Fayzah Alshammari, Carlisle Adams:
Mobile Travel Credentials. 46-58
Cloud Security and Big Data
- Suryadipta Majumdar, Taous Madi, Yosr Jarraya, Makan Pourzandi, Lingyu Wang, Mourad Debbabi:
Cloud Security Auditing: Major Approaches and Existing Challenges. 61-77 - Xavier Bultel, Radu Ciucanu, Matthieu Giraud, Pascal Lafourcade, Lihua Ye:
Secure Joins with MapReduce. 78-94 - Aniss Chohra, Mourad Debbabi, Paria Shirani:
Daedalus: Network Anomaly Detection on IDS Stream Logs. 95-111
IoT Security
- Luigi Logrippo, Abdelouadoud Stambouli:
Configuring Data Flows in the Internet of Things for Security and Privacy Requirements. 115-130 - Tahir Ahmad, Silvio Ranise:
Validating Requirements of Access Control for Cloud-Edge IoT Solutions (Short Paper). 131-139
Software Security, Malware Analysis, and Vulnerability Detection
- Erick Eduardo Bernal Martinez, Bella Oh, Feng Li, Xiao Luo:
Evading Deep Neural Network and Random Forest Classifiers by Generating Adversarial Samples. 143-155 - Léopold Ouairy, Hélène Le Bouder, Jean-Louis Lanet:
Protection of Systems Against Fuzzing Attacks. 156-172 - Yuri Gil Dantas, Tobias Hamann, Heiko Mantel:
A Comparative Study Across Static and Dynamic Side-Channel Countermeasures. 173-189
Cryptography
- Hibiki Ono, Yoshifumi Manabe:
Card-Based Cryptographic Protocols with the Minimum Number of Cards Using Private Operations. 193-207 - Giovanni Di Crescenzo:
Cryptographic Formula Obfuscation. 208-224 - Onur Duman, Amr M. Youssef:
Fault Analysis of the New Ukrainian Hash Function Standard: Kupyna. 225-240
Cyber Physical Security and Hardware Security
- Sébanjila Kevin Bukasa, Ludovic Claudepierre, Ronan Lashermes, Jean-Louis Lanet:
When Fault Injection Collides with Hardware Complexity. 243-256 - Mariana Segovia, Ana Rosa Cavalli, Nora Cuppens, Joaquín García-Alfaro:
A Study on Mitigation Techniques for SCADA-Driven Cyber-Physical Systems (Position Paper). 257-264
Access Control
- Thang Bui, Scott D. Stoller, Jiajie Li:
Mining Relationship-Based Access Control Policies from Incomplete and Noisy Data. 267-284 - Antonio Nehme, Vitor Jesus, Khaled Mahbub, Ali E. Abdallah:
Fine-Grained Access Control for Microservices. 285-300 - Vignesh M. Pagadala, Indrakshi Ray:
Achieving Mobile-Health Privacy Using Attribute-Based Access Control. 301-316
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.