index - ICT Systems Security and Privacy Protection Access content directly
   


Full Text Documents

27

Search


Table of Contents
ICT Systems Security and Privacy Protection
Jaap-Henk Hoepman, Stefan Katzenbeisser (Eds.)
Front Matter

Cryptographic Protocols


Coercion-Resistant Proxy Voting
Oksana Kulyk, Stephan Neumann, Karola Marky, Jurlind Budurushi, Melanie Volkamer
3-16
A Posteriori Openable Public Key Encryption
Xavier Bultel, Pascal Lafourcade
17-31
Multicast Delayed Authentication for Streaming Synchrophasor Data in the Smart Grid
Sérgio Câmara, Dhananjay Anand, Victoria Pillitteri, Luiz Carmo
32-46

Human Aspects of Security


Developing a Human Activity Model for Insider IS Security Breaches Using Action Design Research
Gurpreet Dhillon, Spyridon Samonas, Ugo Etudo
49-61
Evaluating CVSS Base Score Using Vulnerability Rewards Programs
Awad Younis, Yashwant Malaiya, Indrajit Ray
62-75
Defining Objectives for Preventing Cyberstalking
Gurpreet Dhillon, Chandrashekar Challa, Kane Smith
76-87

Cyber Infrastructure


Using Process Invariants to Detect Cyber Attacks on a Water Treatment System
Sridhar Adepu, Aditya Mathur
91-104
Expression and Enforcement of Security Policy for Virtual Resource Allocation in IaaS Cloud
Yanhuang Li, Nora Cuppens-Boulahia, Jean-Michel Crom, Frédéric Cuppens, Vincent Frey
105-118
Software Defined Networking Reactive Stateful Firewall
Salaheddine Zerkane, David Espes, Philippe Le Parc, Frederic Cuppens
119-132

Phishing and Data Sharing


Teaching Phishing-Security: Which Way is Best?
Simon Stockhardt, Benjamin Reinheimer, Melanie Volkamer, Peter Mayer, Alexandra Kunz, Philipp Rack, Daniel Lehmann
135-149
On Gender Specific Perception of Data Sharing in Japan
Markus Tschersich, Shinsaku Kiyomoto, Sebastian Pape, Toru Nakamura, Gökhan Bal, Haruo Takasaki, Kai Rannenberg
150-160
TORPEDO: TOoltip-poweRed Phishing Email DetectiOn
Melanie Volkamer, Karen Renaud, Benjamin Reinheimer
161-175

Social Networks


SybilRadar: A Graph-Structure Based Framework for Sybil Detection in On-line Social Networks
Dieudonné Mulamba, Indrajit Ray, Indrakshi Ray
179-193
Collateral Damage of Facebook Apps: Friends, Providers, and Privacy Interdependence
Iraklis Symeonidis, Fatemeh Shirazi, Gergely Biczók, Cristina Pérez-Solà, Bart Preneel
194-208

Software Vulnerabilities


Automated Source Code Instrumentation for Verifying Potential Vulnerabilities
Hongzhe Li, Jaesang Oh, Hakjoo Oh, Heejo Lee
211-226
An Information Flow-Based Taxonomy to Understand the Nature of Software Vulnerabilities
Daniela Oliveira, Jedidiah Crandall, Harry Kalodner, Nicole Morin, Megan Maher, Jesus Navarro, Felix Emiliano
227-242
XSS PEEKER: Dissecting the XSS Exploitation Techniques and Fuzzing Mechanisms of Blackbox Web Application Scanners
Enrico Bazzoli, Claudio Criscione, Federico Maggi, Stefano Zanero
243-258

TPM and Internet of Things


A Utility-Based Reputation Model for the Internet of Things
Benjamin Aziz, Paul Fremantle, Rui Wei, Alvaro Arenas
261-275
Advanced Remote Firmware Upgrades Using TPM 2.0
Andreas Fuchs, Christoph Krauß, Jürgen Repp
276-289

Sidechannel Analysis


RegRSA: Using Registers as Buffers to Resist Memory Disclosure Attacks
Yuan Zhao, Jingqiang Lin, Wuqiong Pan, Cong Xue, Fangyu Zheng, Ziqiang Ma
293-307
Uncertain? No, It’s Very Certain!
Changhai Ou, Zhu Wang, Degang Sun, Xinping Zhou, Juan Ai
308-320

Software Security


Advanced or Not? A Comparative Study of the Use of Anti-debugging and Anti-VM Techniques in Generic and Targeted Malware
Ping Chen, Christophe Huygens, Lieven Desmet, Wouter Joosen
323-336
NativeProtector: Protecting Android Applications by Isolating and Intercepting Third-Party Native Libraries
Yu-Yang Hong, Yu-Ping Wang, Jie Yin
337-351
A Progress-Sensitive Flow-Sensitive Inlined Information-Flow Control Monitor
Andrew Bedford, Stephen Chong, Josée Desharnais, Nadia Tawbi
352-366

Privacy


Deducing User Presence from Inter-Message Intervals in Home Automation Systems
Frederik Möllers, Christoph Sorge
369-383
Privacy by Design Principles in Design of New Generation Cognitive Assistive Technologies
Ella Kolkowska, Annica Kristofferson
384-397
A Trustless Privacy-Preserving Reputation System
Alexander Schaub, Rémi Bazin, Omar Hasan, Lionel Brunie
398-411

 

 


Designed by Inria-IES Team : http://hal.inria.fr/    Hosted by HAL : http://hal.archives-ouvertes.fr/