index - ICT Systems Security and Privacy Protection Access content directly
   


Full Text Documents

Chargement de la page

Search

Chargement de la page

Table of Contents
ICT Systems Security and Privacy Protection
Jaap-Henk Hoepman, Stefan Katzenbeisser (Eds.)
Front Matter

Cryptographic Protocols


Coercion-Resistant Proxy Voting
Oksana Kulyk, Stephan Neumann, Karola Marky, Jurlind Budurushi, Melanie Volkamer
3-16
A Posteriori Openable Public Key Encryption
Xavier Bultel, Pascal Lafourcade
17-31
Multicast Delayed Authentication for Streaming Synchrophasor Data in the Smart Grid
Sérgio Câmara, Dhananjay Anand, Victoria Pillitteri, Luiz Carmo
32-46

Human Aspects of Security


Developing a Human Activity Model for Insider IS Security Breaches Using Action Design Research
Gurpreet Dhillon, Spyridon Samonas, Ugo Etudo
49-61
Evaluating CVSS Base Score Using Vulnerability Rewards Programs
Awad Younis, Yashwant Malaiya, Indrajit Ray
62-75
Defining Objectives for Preventing Cyberstalking
Gurpreet Dhillon, Chandrashekar Challa, Kane Smith
76-87

Cyber Infrastructure


Using Process Invariants to Detect Cyber Attacks on a Water Treatment System
Sridhar Adepu, Aditya Mathur
91-104
Expression and Enforcement of Security Policy for Virtual Resource Allocation in IaaS Cloud
Yanhuang Li, Nora Cuppens-Boulahia, Jean-Michel Crom, Frédéric Cuppens, Vincent Frey
105-118
Software Defined Networking Reactive Stateful Firewall
Salaheddine Zerkane, David Espes, Philippe Le Parc, Frederic Cuppens
119-132

Phishing and Data Sharing


Teaching Phishing-Security: Which Way is Best?
Simon Stockhardt, Benjamin Reinheimer, Melanie Volkamer, Peter Mayer, Alexandra Kunz, Philipp Rack, Daniel Lehmann
135-149
On Gender Specific Perception of Data Sharing in Japan
Markus Tschersich, Shinsaku Kiyomoto, Sebastian Pape, Toru Nakamura, Gökhan Bal, Haruo Takasaki, Kai Rannenberg
150-160
TORPEDO: TOoltip-poweRed Phishing Email DetectiOn
Melanie Volkamer, Karen Renaud, Benjamin Reinheimer
161-175

Social Networks


SybilRadar: A Graph-Structure Based Framework for Sybil Detection in On-line Social Networks
Dieudonné Mulamba, Indrajit Ray, Indrakshi Ray
179-193
Collateral Damage of Facebook Apps: Friends, Providers, and Privacy Interdependence
Iraklis Symeonidis, Fatemeh Shirazi, Gergely Biczók, Cristina Pérez-Solà, Bart Preneel
194-208

Software Vulnerabilities


Automated Source Code Instrumentation for Verifying Potential Vulnerabilities
Hongzhe Li, Jaesang Oh, Hakjoo Oh, Heejo Lee
211-226
An Information Flow-Based Taxonomy to Understand the Nature of Software Vulnerabilities
Daniela Oliveira, Jedidiah Crandall, Harry Kalodner, Nicole Morin, Megan Maher, Jesus Navarro, Felix Emiliano
227-242
XSS PEEKER: Dissecting the XSS Exploitation Techniques and Fuzzing Mechanisms of Blackbox Web Application Scanners
Enrico Bazzoli, Claudio Criscione, Federico Maggi, Stefano Zanero
243-258

TPM and Internet of Things


A Utility-Based Reputation Model for the Internet of Things
Benjamin Aziz, Paul Fremantle, Rui Wei, Alvaro Arenas
261-275
Advanced Remote Firmware Upgrades Using TPM 2.0
Andreas Fuchs, Christoph Krauß, Jürgen Repp
276-289

Sidechannel Analysis


RegRSA: Using Registers as Buffers to Resist Memory Disclosure Attacks
Yuan Zhao, Jingqiang Lin, Wuqiong Pan, Cong Xue, Fangyu Zheng, Ziqiang Ma
293-307
Uncertain? No, It’s Very Certain!
Changhai Ou, Zhu Wang, Degang Sun, Xinping Zhou, Juan Ai
308-320

Software Security


Advanced or Not? A Comparative Study of the Use of Anti-debugging and Anti-VM Techniques in Generic and Targeted Malware
Ping Chen, Christophe Huygens, Lieven Desmet, Wouter Joosen
323-336
NativeProtector: Protecting Android Applications by Isolating and Intercepting Third-Party Native Libraries
Yu-Yang Hong, Yu-Ping Wang, Jie Yin
337-351
A Progress-Sensitive Flow-Sensitive Inlined Information-Flow Control Monitor
Andrew Bedford, Stephen Chong, Josée Desharnais, Nadia Tawbi
352-366

Privacy


Deducing User Presence from Inter-Message Intervals in Home Automation Systems
Frederik Möllers, Christoph Sorge
369-383
Privacy by Design Principles in Design of New Generation Cognitive Assistive Technologies
Ella Kolkowska, Annica Kristofferson
384-397
A Trustless Privacy-Preserving Reputation System
Alexander Schaub, Rémi Bazin, Omar Hasan, Lionel Brunie
398-411

 

 


Designed by Inria-IES Team : http://hal.inria.fr/    Hosted by HAL : http://hal.archives-ouvertes.fr/