default search action
SEC 2017: Rome, Italy
- Sabrina De Capitani di Vimercati, Fabio Martinelli:
ICT Systems Security and Privacy Protection - 32nd IFIP TC 11 International Conference, SEC 2017, Rome, Italy, May 29-31, 2017, Proceedings. IFIP Advances in Information and Communication Technology 502, Springer 2017, ISBN 978-3-319-58468-3
Network Security and Cyber Attacks
- Wilfried Mayer, Martin Schmiedecker:
Turning Active TLS Scanning to Eleven. 3-16 - Túlio A. Pascoal, Yuri Gil Dantas, Iguatemi E. Fonseca, Vivek Nigam:
Slow TCAM Exhaustion DDoS Attack. 17-31 - Gheorghe Hajmasan, Alexandra Mondoc, Radu Portase, Octavian Cret:
Evasive Malware Detection Using Groups of Processes. 32-45 - Michael Denzel, Mark Ryan, Eike Ritter:
A Malware-Tolerant, Self-Healing Industrial Control System Framework. 46-60 - David Myers, Kenneth Radke, Suriadi Suriadi, Ernest Foo:
Process Discovery for Industrial Control System Cyber Attack Detection. 61-75
Security and Privacy in Social Applications and Cyber Attacks Defense
- Pablo Picazo-Sanchez, Raúl Pardo, Gerardo Schneider:
Secure Photo Sharing in Social Networks. 79-92 - Lin Yuan, Joël Theytaz, Touradj Ebrahimi:
Context-Dependent Privacy-Aware Photo Sharing Based on Machine Learning. 93-107 - Khondker Jahid Reza, Md Zahidul Islam, Vladimir Estivill-Castro:
3LP: Three Layers of Protection for Individual Privacy in Facebook. 108-123 - Warren Connell, Massimiliano Albanese, Sridhar Venkatesan:
A Framework for Moving Target Defense Quantification. 124-138
Private Queries and Aggregations
- Ruben Rios, David Nuñez, Javier López:
Query Privacy in Sensing-as-a-Service Platforms. 141-154 - Hafiz Salman Asif, Jaideep Vaidya, Basit Shafiq, Nabil R. Adam:
Secure and Efficient k-NN Queries. 155-170 - Stéphane Grumbach, Robert Riemann:
Secure and Trustable Distributed Aggregation Based on Kademlia. 171-185
Operating System and Firmware Security
- Roberto Di Pietro, Federico Franzoni, Flavio Lombardi:
HyBIS: Advanced Introspection for Effective Windows Guest Protection. 189-204 - Mariem Graa, Nora Cuppens-Boulahia, Frédéric Cuppens, Jean-Louis Lanet, Routa Moussaileb:
Detection of Side Channel Attacks Based on Data Tainting in Android Systems. 205-218 - MinSik Shin, JungBeen Yu, Youngjin Yoon, Taekyoung Kwon:
The Fuzzing Awakens: File Format-Aware Mutational Fuzzing on Smartphone Media Server Daemons. 219-232 - Andrei Costin, Apostolis Zarras, Aurélien Francillon:
Towards Automated Classification of Firmware Images and Identification of Embedded Devices. 233-247 - Andreas Fuchs, Christoph Krauß, Jürgen Repp:
Runtime Firmware Product Lines Using TPM2.0. 248-261
User Authentication and Policies
- Lydia Kraus, Robert Schmidt, Marcel Walch, Florian Schaub, Sebastian Möller:
On the Use of Emojis in Mobile Authentication. 265-280 - David Lorenzi, Jaideep Vaidya, Achyuta Aich, Shamik Sural, Vijayalakshmi Atluri, Joseph Calca:
EmojiTCHA: Using Emotion Recognition to Tell Computers and Humans Apart. 281-295 - Umberto Morelli, Silvio Ranise:
Assisted Authoring, Analysis and Enforcement of Access Control Policies in the Cloud. 296-309 - Joseph Hallett, David Aspinall:
Capturing Policies for BYOD. 310-323
Applied Cryptography and Voting Schemes
- Jean-François Couchot, Raphaël Couturier, Michel Salomon:
Improving Blind Steganalysis in Spatial Domain Using a Criterion to Choose the Appropriate Steganalyzer Between CNN and SRM+EC. 327-340 - Lina Nouh, Ashkan Rahimian, Djedjiga Mouheb, Mourad Debbabi, Aiman Hanna:
BinSign: Fingerprinting Binary Functions to Support Automated Analysis of Code Executables. 341-355 - Cecilia Pasquini, Pascal Schöttle, Rainer Böhme:
Decoy Password Vaults: At Least as Hard as Steganography? 356-370 - Stephan Neumann, Manuel Noll, Melanie Volkamer:
Election-Dependent Security Evaluation of Internet Voting Schemes. 371-382
Software Security and Privacy
- Julian Kirsch, Clemens Jonischkeit, Thomas Kittel, Apostolis Zarras, Claudia Eckert:
Combating Control Flow Linearization. 385-398 - Jeffrey Avery, Eugene H. Spafford:
Ghost Patches: Fake Patches for Fake Vulnerabilities. 399-412 - Hongfa Xue, Yurong Chen, Fan Yao, Yongbo Li, Tian Lan, Guru Venkataramani:
SIMBER: Eliminating Redundant Memory Bound Checks via Statistical Inference. 413-426 - Rene Meis, Maritta Heisel:
Towards Systematic Privacy and Operability (PRIOP) Studies. 427-441 - Thibaud Antignac, David Sands, Gerardo Schneider:
Data Minimisation: A Language-Based Approach. 442-456
Privacy
- Jun Wang, Qiang Tang:
Differentially Private Neighborhood-Based Recommender Systems. 459-473 - Somayeh Taheri, Md. Morshedul Islam, Reihaneh Safavi-Naini:
Privacy-Enhanced Profile-Based Authentication Using Sparse Random Projection. 474-490 - Vasiliki Diamantopoulou, Christos Kalloniatis, Stefanos Gritzalis, Haralambos Mouratidis:
Supporting Privacy by Design Using Privacy Process Patterns. 491-505 - Edoardo Serra, Jaideep Vaidya, Haritha Akella, Ashish Sharma:
Evaluating the Privacy Implications of Frequent Itemset Disclosure. 506-519
Digital Signature, Risk Management, and Code Reuse Attacks
- Jihye Kim, Hyunok Oh:
Forward-Secure Digital Signature Schemes with Optimal Computation and Storage of Signers. 523-537 - Alessio Merlo, Gabriel Claudiu Georgiu:
RiskInDroid: Machine Learning-Based Risk Analysis on Android. 538-552 - Ahmed Seid Yesuf, Jetzabel Serna-Olvera, Kai Rannenberg:
Using Fraud Patterns for Fraud Risk Assessment of E-services. 553-567 - Liwei Chen, Mengyu Ma, Wenhao Zhang, Gang Shi, Dan Meng:
Gadget Weighted Tagging: A Flexible Framework to Protect Against Code Reuse Attacks. 568-584
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.