Table of Contents
|
ICT Systems Security and Privacy Protection Sabrina De Capitani Di Vimercati, Fabio Martinelli |
Front Matter |
Network Security and Cyber Attacks
|
Turning Active TLS Scanning to Eleven Wilfried Mayer, Martin Schmiedecker |
3-16 |
Slow TCAM Exhaustion DDoS Attack Túlio Pascoal, Yuri Dantas, Iguatemi Fonseca, Vivek Nigam |
17-31 |
Evasive Malware Detection Using Groups of Processes Gheorghe Hăjmăşan, Alexandra Mondoc, Radu Portase, Octavian Creţ |
32-45 |
A Malware-Tolerant, Self-Healing Industrial Control System Framework Michael Denzel, Mark Ryan, Eike Ritter |
46-60 |
Process Discovery for Industrial Control System Cyber Attack Detection David Myers, Kenneth Radke, Suriadi Suriadi, Ernest Foo |
61-75 |
Security and Privacy in Social Applications and Cyber Attacks Defense
|
Secure Photo Sharing in Social Networks Pablo Picazo-Sanchez, Raúl Pardo, Gerardo Schneider |
79-92 |
Context-Dependent Privacy-Aware Photo Sharing Based on Machine Learning Lin Yuan, Joël Theytaz, Touradj Ebrahimi |
93-107 |
3LP: Three Layers of Protection for Individual Privacy in Facebook Khondker Reza, Md Islam, Vladimir Estivill-Castro |
108-123 |
A Framework for Moving Target Defense Quantification Warren Connell, Massimiliano Albanese, Sridhar Venkatesan |
124-138 |
Private Queries and Aggregations
|
Query Privacy in Sensing-as-a-Service Platforms Ruben Rios, David Nuñez, Javier Lopez |
141-154 |
Secure and Efficient k-NN Queries Hafiz Asif, Jaideep Vaidya, Basit Shafiq, Nabil Adam |
155-170 |
Secure and Trustable Distributed Aggregation Based on Kademlia Stéphane Grumbach, Robert Riemann |
171-185 |
Operating System and Firmware Security
|
HyBIS: Advanced Introspection for Effective Windows Guest Protection Roberto Di Pietro, Federico Franzoni, Flavio Lombardi |
189-204 |
Detection of Side Channel Attacks Based on Data Tainting in Android Systems Mariem Graa, Nora Cuppens-Boulahia, Frédéric Cuppens, Jean-Louis Lanet, Routa Moussaileb |
205-218 |
The Fuzzing Awakens: File Format-Aware Mutational Fuzzing on Smartphone Media Server Daemons Minsik Shin, Jungbeen Yu, Youngjin Yoon, Taekyoung Kwon |
219-232 |
Towards Automated Classification of Firmware Images and Identification of Embedded Devices Andrei Costin, Apostolis Zarras, Aurélien Francillon |
233-247 |
Runtime Firmware Product Lines Using TPM2.0 Andreas Fuchs, Christoph Krauß, Jürgen Repp |
248-261 |
User Authentication and Policies
|
On the Use of Emojis in Mobile Authentication Lydia Kraus, Robert Schmidt, Marcel Walch, Florian Schaub, Sebastian Möller |
265-280 |
EmojiTCHA: Using Emotion Recognition to Tell Computers and Humans Apart David Lorenzi, Jaideep Vaidya, Achyuta Aich, Shamik Sural, Vijayalakshmi Atluri, Joseph Calca |
281-295 |
Assisted Authoring, Analysis and Enforcement of Access Control Policies in the Cloud Umberto Morelli, Silvio Ranise |
296-309 |
Capturing Policies for BYOD Joseph Hallett, David Aspinall |
310-323 |
Applied Cryptography and Voting Schemes
|
Improving Blind Steganalysis in Spatial Domain Using a Criterion to Choose the Appropriate Steganalyzer Between CNN and SRM+EC Jean-François Couchot, Raphaël Couturier, Michel Salomon |
327-340 |
BinSign: Fingerprinting Binary Functions to Support Automated Analysis of Code Executables Lina Nouh, Ashkan Rahimian, Djedjiga Mouheb, Mourad Debbabi, Aiman Hanna |
341-355 |
Decoy Password Vaults: At Least as Hard as Steganography? Cecilia Pasquini, Pascal Schöttle, Rainer Böhme |
356-370 |
Election-Dependent Security Evaluation of Internet Voting Schemes Stephan Neumann, Manuel Noll, Melanie Volkamer |
371-382 |
Software Security and Privacy
|
Combating Control Flow Linearization Julian Kirsch, Clemens Jonischkeit, Thomas Kittel, Apostolis Zarras, Claudia Eckert |
385-398 |
Ghost Patches: Fake Patches for Fake Vulnerabilities Jeffrey Avery, Eugene Spafford |
399-412 |
SIMBER: Eliminating Redundant Memory Bound Checks via Statistical Inference Hongfa Xue, Yurong Chen, Fan Yao, Yongbo Li, Tian Lan, Guru Venkataramani |
413-426 |
Towards Systematic Privacy and Operability (PRIOP) Studies Rene Meis, Maritta Heisel |
427-441 |
Data Minimisation: A Language-Based Approach Thibaud Antignac, David Sands, Gerardo Schneider |
442-456 |
Privacy
|
Differentially Private Neighborhood-Based Recommender Systems Jun Wang, Qiang Tang |
459-473 |
Privacy-Enhanced Profile-Based Authentication Using Sparse Random Projection Somayeh Taheri, Md Islam, Reihaneh Safavi-Naini |
474-490 |
Supporting Privacy by Design Using Privacy Process Patterns Vasiliki Diamantopoulou, Christos Kalloniatis, Stefanos Gritzalis, Haralambos Mouratidis |
491-505 |
Evaluating the Privacy Implications of Frequent Itemset Disclosure Edoardo Serra, Jaideep Vaidya, Haritha Akella, Ashish Sharma |
506-519 |
Digital Signature, Risk Management, and Code Reuse Attacks
|
Forward-Secure Digital Signature Schemes with Optimal Computation and Storage of Signers Jihye Kim, Hyunok Oh |
523-537 |
RiskInDroid: Machine Learning-Based Risk Analysis on Android Alessio Merlo, Gabriel Georgiu |
538-552 |
Using Fraud Patterns for Fraud Risk Assessment of E-services Ahmed Yesuf, Jetzabel Serna-Olvera, Kai Rannenberg |
553-567 |
Gadget Weighted Tagging: A Flexible Framework to Protect Against Code Reuse Attacks Liwei Chen, Mengyu Ma, Wenhao Zhang, Gang Shi, Dan Meng |
568-584 |