Skip to Main content Skip to Navigation
   


Full Text Documents

Chargement de la page

Search

Chargement de la page

ICT Systems Security and Privacy Protection
Marko Hölbl, Kai Rannenberg, Tatjana Welzer
Front Matter

Channel Attacks


Leaky Controller: Cross-VM Memory Controller Covert Channel on Multi-core Systems
Benjamin Semal, Konstantinos Markantonakis, Raja Akram, Jan Kalbantner
3-16
Evaluation of Statistical Tests for Detecting Storage-Based Covert Channels
Thomas Sattolo, Jason Jaskolka
17-31
IE-Cache: Counteracting Eviction-Based Cache Side-Channel Attacks Through Indirect Eviction
Muhammad Mukhtar, Muhammad Bhatti, Guy Gogniat
32-45

Connection Security


Refined Detection of SSH Brute-Force Attackers Using Machine Learning
Karel Hynek, Tomáš Beneš, Tomáš Čejka, Hana Kubátová
49-63
MultiTLS: Secure Communication Channels with Cipher Suite Diversity
Ricardo Moura, David Matos, Miguel Pardal, Miguel Correia
64-77
Improving Big Data Clustering for Jamming Detection in Smart Mobility
Hind Bangui, Mouzhi Ge, Barbora Buhnova
78-91

Human Aspects of Security and Privacy


Assisting Users to Create Stronger Passwords Using ContextBased MicroTraining
Joakim Kävrestad, Marcus Nohlberg
95-108
Facilitating Privacy Attitudes and Behaviors with Affective Visual Design
Agnieszka Kitkowska, Yefim Shulman, Leonardo Martucci, Erik Wästlund
109-123
Privacy CURE: Consent Comprehension Made Easy
Olha Drozd, Sabrina Kirrane
124-139

Detecting Malware and Software Weaknesses


JavaScript Malware Detection Using Locality Sensitive Hashing
Stefan Peiser, Ludwig Friborg, Riccardo Scandariato
143-154
RouAlign: Cross-Version Function Alignment and Routine Recovery with Graphlet Edge Embedding
Can Yang, Jian Liu, Mengxia Luo, Xiaorui Gong, Baoxu Liu
155-170
Code Between the Lines: Semantic Analysis of Android Applications
Johannes Feichtner, Stefan Gruber
171-186

System Security


IMShell-Dec: Pay More Attention to External Links in PowerShell
Ruidong Han, Chao Yang, Jianfeng Ma, Siqi Ma, Yunbo Wang, Feng Li
189-202
Secure Attestation of Virtualized Environments
Michael Eckel, Andreas Fuchs, Jürgen Repp, Markus Springer
203-216

Network Security and Privacy


Security and Performance Implications of BGP Rerouting-Resistant Guard Selection Algorithms for Tor
Asya Mitseva, Marharyta Aleksandrova, Thomas Engel, Andriy Panchenko
219-233
Actively Probing Routes for Tor AS-Level Adversaries with RIPE Atlas
Wilfried Mayer, Georg Merzdovnik, Edgar Weippl
234-247
Zeek-Osquery: Host-Network Correlation for Advanced Monitoring and Intrusion Detection
Steffen Haas, Robin Sommer, Mathias Fischer
248-262

Access Control and Authentication


Revisiting Security Vulnerabilities in Commercial Password Managers
Michael Carr, Siamak Shahandashti
265-279
Evaluation of Risk-Based Re-Authentication Methods
Stephan Wiefling, Tanvi Patil, Markus Dürmuth, Luigi Lo iacono
280-294
Fuzzy Vault for Behavioral Authentication System
Md Islam, Reihaneh Safavi-Naini
295-310

Crypto Currencies


Improvements of the Balance Discovery Attack on Lightning Network Payment Channels
Gijs Dam, Rabiah Kadir, Puteri Nohuddin, Halimah Zaman
313-323
CCBRSN: A System with High Embedding Capacity for Covert Communication in Bitcoin
Weizheng Wang, Chunhua Su
324-337
Privacy-Friendly Monero Transaction Signing on a Hardware Wallet
Dusan Klinec, Vashek Matyas
338-351

Privacy and Security Management


A Matter of Life and Death: Analyzing the Security of Healthcare Networks
Guillaume Dupont, Daniel Santos, Elisa Costante, Jerry Hartog, Sandro Etalle
355-369
Establishing a Strong Baseline for Privacy Policy Classification
Najmeh Mousavi Nejad, Pablo Jabat, Rostislav Nedelchev, Simon Scerri, Damien Graux
370-383
Cross-Platform File System Activity Monitoring and Forensics – A Semantic Approach
Kabul Kurniawan, Andreas Ekelhart, Fajar Ekaputra, Elmar Kiesling
384-397

Machine Learning and Security


A Correlation-Preserving Fingerprinting Technique for Categorical Data in Relational Databases
Tanja Sarcevic, Rudolf Mayer
401-415
FDFtNet: Facing Off Fake Images Using Fake Detection Fine-Tuning Network
Hyeonseong Jeon, Youngoh Bang, Simon Woo
416-430
Escaping Backdoor Attack Detection of Deep Learning
Yayuan Xiong, Fengyuan Xu, Sheng Zhong, Qun Li
431-445

 


Designed by Inria-IES Team : http://hal.inria.fr/    Hosted by HAL : http://hal.archives-ouvertes.fr/