index - Future Challenges in Security and Privacy for Academia and Industry Access content directly
   


Full Text Documents

Chargement de la page

Search

Chargement de la page

Table of Contents
Future Challenges in Security and Privacy for Academia and Industry
Jan Camenisch, Simone Fischer-Hübner, Yuko Murayama, Armand Portmann, Carlos Rieder (Eds.)
Front Matter

Kristian Beckman Award Keynote


Patience, Persistence, and Faith: Evolving the Gold Standard in Privacy and Data Protection
Ann Cavoukian
1-16

Malware, Information Flow and DoS Attacks


iSAM: An iPhone Stealth Airborne Malware
Dimitrios Damopoulos, Georgios Kambourakis, Stefanos Gritzalis
17-28
TCP Ack Storm DoS Attacks
Raz Abramov, Amir Herzberg
29-40
Detecting Hidden Storage Side Channel Vulnerabilities in Networked Applications
Felix Freiling, Sebastian Schinzel
41-55

Authentication


Breaking reCAPTCHA: A Holistic Approach via Shape Recognition
Paul Baecher, Niklas Büscher, Marc Fischlin, Benjamin Milde
56-67
From Multiple Credentials to Browser-Based Single Sign-On: Are We More Secure?
Alessandro Armando, Roberto Carbone, Luca Compagna, Jorge Cuellar, Giancarlo Pellegrino, Alessandro Sorniotti
68-79
Quantifying the Effect of Graphical Password Guidelines for Better Security
Mohd Jali, Steven Furnell, Paul Dowland
80-91

Network Security and Security Protocols


A Case Study in Practical Security of Cable Networks
Amir Alsbih, Felix Freiling, Christian Schindelhauer
92-103
Ceremony Analysis: Strengths and Weaknesses
Kenneth Radke, Colin Boyd, Juan Gonzalez Nieto, Margot Brereton
104-115
Preventing Board Flooding Attacks in Coercion-Resistant Electronic Voting Schemes
Reto Koenig, Rolf Haenni, Stephan Fischli
116-127
Piracy Protection for Streaming Content in Home Networks
Hongxia Jin, Jeffrey Lotspiech
128-141

Software Security


JITDefender: A Defense against JIT Spraying Attacks
Ping Chen, Yi Fang, Bing Mao, Li Xie
142-153
Retrofitting Security in COTS Software with Binary Rewriting
Pádraig O’sullivan, Kapil Anand, Aparna Kotha, Matthew Smithson, Rajeev Barua, Angelos Keromytis
154-172
Generating Optimised and Formally Checked Packet Parsing Code
Sebastien Mondet, Ion Alberdi, Thomas Plagemann
173-184

Policy Compliance and Obligations


Organizational Power and Information Security Rule Compliance
Ella Kolkowska, Gurpreet Dhillon
185-196
Delegation of Obligations and Responsibility
Meriam Ben Ghorbel, Frédéric Cuppens, Nora Cuppens-Boulahia, Daniel Le Métayer, Guillaume Piolle
197-209
Distributed Security Policy Conformance
Mirko Montanari, Ellick Chan, Kevin Larson, Wucherl Yoo, Roy Campbell
210-222

Privacy Attacks and Privacy-Enhancing Technologies


Scalable Privacy-Preserving Data Mining with Asynchronously Partitioned Datasets
Hiroaki Kikuchi, Daisuke Kagawa, Anirban Basu, Kazuhiko Ishii, Masayuki Terada, Sadayuki Hongo
223-234
Privacy-Enhanced Web-Based Event Scheduling with Majority Agreement
Benjamin Kellermann
235-246
Analyzing Key-Click Patterns of PIN Input for Recognizing VoIP Users
Ge Zhang
247-258

Risk Analysis and Security Metrics


Problem Analysis of Traditional IT-Security Risk Assessment Methods – An Experience Report from the Insurance and Auditing Domain
Stefan Taubenberger, Jan Jürjens, Yijun Yu, Bashar Nuseibeh
259-270
On Computing Enterprise IT Risk Metrics
Sandeep Bhatt, William Horne, Prasad Rao
271-280
A Kolmogorov Complexity Approach for Measuring Attack Path Complexity
Nwokedi Idika, Bharat Bhargava
281-292

Intrusion Detection


Extending LSCs for Behavioral Signature Modeling
Sven Patzina, Lars Patzina, Andy Schürr
293-304
Detecting illegal system calls using a data-oriented detection model
Jonathan-Christofer Demay, Frédéric Majorczyk, Eric Totel, Frédéric Tronel
305-316

Appendix


IFIP Technical Committee 11 Security and Privacy Protection in Information Processing Systems
Kai Rannenberg, Sh Solms, Leon Strous
317-325

 

 


Designed by Inria-IES Team : http://hal.inria.fr/    Hosted by HAL : http://hal.archives-ouvertes.fr/