


default search action
3rd ICISSP 2017: Porto, Portugal
- Paolo Mori, Steven Furnell, Olivier Camp:

Proceedings of the 3rd International Conference on Information Systems Security and Privacy, ICISSP 2017, Porto, Portugal, February 19-21, 2017. SciTePress 2017, ISBN 978-989-758-209-7
Invited Speakers
Keynote Speakers
- Elisa Bertino:

Security and Privacy in the IoT. ICISSP 2017: 5 - Nancy Cam-Winget:

Sensor Networks as the new Attack Target. ICISSP 2017: 7 - Bart Preneel:

The Future of Information Security. ICISSP 2017: 9
Papers
Full Papers
- Abdul A. Orunsolu, Adesina S. Sodiya:

An Anti-Phishing Kit Scheme for Secure Web Transactions. 15-24 - Vincent Haupert, Tilo Müller:

Rest in Protection - A Kernel-level Approach to Mitigate RIP Tampering. 25-37 - Günther Eibl, Cornelia Ferner, Tobias Hildebrandt, Florian Stertz, Sebastian Burkhart, Stefanie Rinderle-Ma

, Dominik Engel:
Exploration of the Potential of Process Mining for Intrusion Detection in Smart Metering. 38-46 - Elena Reshetova, Filippo Bonazzi, N. Asokan:

SELint: An SEAndroid Policy Analysis Tool. 47-58 - Eyvind Garder B. Gjertsen, Erlend Andreas Gjære, Maria Bartnes, Waldo Rocha Flores:

Gamification of Information Security Awareness and Training. 59-70 - Go Ohtake, Reihaneh Safavi-Naini, Liang Feng Zhang:

Outsourcing Scheme of ABE Encryption Secure against Malicious Adversary. 71-82 - Tal Hadad, Bronislav Sidik, Nir Ofek, Rami Puzis, Lior Rokach:

User Feedback Analysis for Mobile Malware Detection. 83-94 - Iman Sedeeq, Frans Coenen

, Alexei Lisitsa:
Attribute Permutation Steganography Detection using Attribute Position Changes Count. 95-100 - Nada Alruhaily

, Behzad Bordbar, Tom Chothia:
Towards an Understanding of the Misclassification Rates of Machine Learning-based Malware Detection Systems. 101-112 - Marc Hüffmeyer, Pascal Hirmer, Bernhard Mitschang, Ulf Schreier, Matthias Wieland:

SitAC - A System for Situation-aware Access Control - Controlling Access to Sensor Data. 113-125 - Wei-Han Lee, Changchang Liu, Shouling Ji, Prateek Mittal, Ruby B. Lee:

Quantification of De-anonymization Risks in Social Networks. 126-135 - Loukmen Regainia, Sébastien Salva:

A Methodology of Security Pattern Classification and of Attack-Defense Tree Generation. 136-146 - Alberto Magno Muniz Soares, Rafael Timóteo de Sousa Jr.:

A Technique for Extraction and Analysis of Application Heap Objects within Android Runtime (ART). 147-156 - Razvan Beuran, Cuong Pham, Dat Tang, Ken-ichi Chinen, Yasuo Tan, Yoichi Shinoda:

CyTrONE: An Integrated Cybersecurity Training Framework. 157-166 - Gianpiero Costantino, Fabio Martinelli, Ilaria Matteucci

, Marinella Petrocchi:
Analysis of Data Sharing Agreements. 167-178 - Zeineb Zhioua, Yves Roudier, Rabéa Ameur-Boulifa, Takoua Kechiche, Stuart Short:

Tracking Dependent Information Flows. 179-189 - Mortaza S. Bargh, Marco Vink, Sunil Choenni:

On Usage Control in Relational Database Management Systems - Obligations and Their Enforcement in Joining Datasets. 190-201 - Ahmad Ahmadi, Reihaneh Safavi-Naini:

Distance-bounding Identification. 202-212 - Jean-Louis Huynen, Gabriele Lenzini:

From Situation Awareness to Action: An Information Security Management Toolkit for Socio-technical Security Retrospective and Prospective Analysis. 213-224 - Linus Karlsson, Martin Hell, Paul Stankovski:

Improved Greedy Nonrandomness Detectors for Stream Ciphers. 225-232 - Lake Bu, Mark G. Karpovsky:

A Design of Secure and ReliableWireless Transmission Channel for Implantable Medical Devices. 233-242
Short Papers
- Michael Kiperberg, Amit Resh, Asaf Algawi, Nezer Jacob Zaidenberg

:
System for Executing Encrypted Java Programs. 245-252 - Arash Habibi Lashkari

, Gerard Draper-Gil, Mohammad Saiful Islam Mamun, Ali A. Ghorbani:
Characterization of Tor Traffic using Time based Features. 253-262 - Kazuhide Fukushima

, Seira Hidano, Shinsaku Kiyomoto:
White-box Implementation of Stream Cipher. 263-269 - Michael Sonntag, René Mayrhofer

:
Traffic Statistics of a High-Bandwidth Tor Exit Node. 270-277 - Efthimios Alepis, Constantinos Patsakis:

There's Wally! Location Tracking in Android without Permissions. 278-284 - Andrei Lutas, Daniel Ticle, Octavian Cret:

Hypervisor based Memory Introspection: Challenges, Problems and Limitations. 285-294 - Sergio de los Santos, José Torres:

Macro Malware Detection using Machine Learning Techniques - A New Approach. 295-302 - Stephan Krenn

, Thomas Lorünser
, Christoph Striecks
:
Batch-verifiable Secret Sharing with Unconditional Privacy. 303-311 - Ian Herwono, Fadi Ali El-Moussa:

A Collaborative Tool for Modelling Multi-stage Attacks. 312-317 - Henrik Karlzén, Johan E. Bengtsson, Jonas Hallberg:

Assessing Information Security Risks using Pairwise Weighting. 318-324 - Kalpana Singh, Renaud Sirdey

, François Artiguenave, David Cohen, Sergiu Carpov
:
Towards Confidentiality-strengthened Personalized Genomic Medicine Embedding Homomorphic Cryptography. 325-333 - Timea Pahi

, Maria Leitner, Florian Skopik
:
Analysis and Assessment of Situational Awareness Models for National Cyber Security Centers. 334-345 - Julian Rauchberger, Robert Luh, Sebastian Schrittwieser

:
Longkit - A Universal Framework for BIOS/UEFI Rootkits in System Management Mode. 346-353 - Julien Hatin, Estelle Cherrier, Jean-Jacques Schwartzmann, Christophe Rosenberger

:
Privacy Preserving Transparent Mobile Authentication. 354-361 - Hilder V. L. Pereira, Diego F. Aranha

:
Non-interactive Privacy-preserving k-NN Classifier. 362-371 - Jörg Kippe, Steffen Pfrang:

Network and Topology Models to Support IDS Event Processing. 372-379 - Shahrooz Pooryousef, Morteza Amini:

Enhancing Accuracy of Android Malware Detection using Intent Instrumentation. 380-388 - Ahmed Seid Yesuf:

A Review of Risk Identification Approaches in the Telecommunication Domain. 389-396 - Robert Luh, Sebastian Schrittwieser

, Stefan Marschalek, Helge Janicke:
Design of an Anomaly-based Threat Detection & Explication System. 397-402 - Benoît Vibert, Jean-Marie Le Bars, Christophe Rosenberger

, Christophe Charrier:
Fingerprint Class Recognition for Securing EMV Transaction. 403-410 - Motlatsi i Isaac Thulo, Jan H. P. Eloff:

Towards Optimized Security-aware (O-Sec) VM Placement Algorithms. 411-422 - Damien Ligier, Sergiu Carpov

, Caroline Fontaine, Renaud Sirdey
:
Privacy Preserving Data Classification using Inner-product Functional Encryption. 423-430 - Vittoria Cozza

, Zisis Tsiatsikas, Mauro Conti
, Georgios Kambourakis:
Why Snoopy Loves Online Services: An Analysis of (Lack of) Privacy in Online Services. 431-438 - Cristina-Loredana Duta, Laura Gheorghe, Nicolae Tapus

:
Real-time DSP Implementations of Voice Encryption Algorithms. 439-446 - Gautam Kumar, Brent Lagesse:

Limited Use Cryptographic Tokens in Securing Ephemeral Cloud Servers. 447-454 - Khanh-Huu-The Dam

, Tayssir Touili:
Malware Detection based on Graph Classification. 455-463 - Tanvi Vyas, Andrea Marchesini, Christoph Kerschbaumer:

Extending the Same Origin Policy with Origin Attributes. 464-473 - Arthur Costa Lopes, Diego F. Aranha

:
Platform-agnostic Low-intrusion Optical Data Exfiltration. 474-480 - Mark Vella, Rachel Cilia:

Memory Forensics of Insecure Android Inter-app Communications. 481-486 - Aniello Cimitile, Fabio Martinelli, Francesco Mercaldo:

Machine Learning Meets iOS Malware: Identifying Malicious Applications on Apple Environment. 487-492 - Carlos Moreno, Sebastian Fischmeister:

On the Security of Safety-critical Embedded Systems: Who Watches the Watchers? Who Reprograms the Watchers?. 493-498 - Robert Riemann

, Stéphane Grumbach:
Distributed Protocols at the Rescue for Trustworthy Online Voting. 499-505 - Mashael Aldayel

, Mohammad Alhussain:
Enhanced Identification of Sensitive User Inputs in Mobile Applications. 506-515 - Krishna Chaitanya Telikicherla, Akash Agrawall, Venkatesh Choppella:

A Formal Model of Web Security Showing Malicious Cross Origin Requests and Its Mitigation using CORP. 516-523 - Cihangir Tezcan

:
Brute Force Cryptanalysis of MIFARE Classic Cards on GPU. 524-528 - Razgar Ebrahimy

, Zoya Pourmirza:
Cyber-interdependency in Smart Energy Systems. 529-537 - Sylvestre Uwizeyemungu, Placide Poba-Nzaou:

Health Information Exchange and Related IT-security Practices in European Hospitals. 538-545 - Matthew Peacock

, Michael N. Johnstone, Craig Valli
:
Security Issues with BACnet Value Handling. 546-552 - Mohammad Hamad

, Vassilis Prevelakis:
Secure APIs for Applications in Microkernel-based Systems. 553-558 - Nicolas T. Courtois, Rebekah Mercer:

Stealth Address and Key Management Techniques in Blockchain Systems. 559-566 - Luca Vollero, Daniele Biondo, Roberto Setola, Gianluca Bocci, Rocco Mammoliti, Alessandra Toma:

Improving the Automatic Identification of Malicious Android Apps in Unofficial Stores through Logo Analysis. 567-572 - Estée van der Walt, Jan H. P. Eloff:

Identity Deception Detection on Social Media Platforms. 573-578 - V. Gayoso Martínez, Luis Hernández Encinas

, Agustín Martín Muñoz, J. Zhang:
Breaking a Hitag2 Protocol with Low Cost Technology. 579-584 - Aida Omerovic, Marit Kjøsnes Natvig, Isabelle C. R. Tardy:

Towards a Privacy Scorecard - Initial Design Exemplified on an Intelligent Transport Systems Service. 585-593
1st International Workshop on FORmal methods for Security Engineering
Full Papers
- Michel Dubois, Eric Filiol

:
Hacking of the AES with Boolean Functions. 599-609 - Paul Irolla, Eric Filiol

:
Glassbox: Dynamic Analysis Platform for Malware Android Applications on Real Devices. 610-621 - Arnaud Bannier, Eric Filiol

:
Mathematical Backdoors in Symmetric Encryption Systems - Proposal for a Backdoored AES-like Block Cipher. 622-631 - Robert Luh, Gregor Schramm, Markus Wagner

, Sebastian Schrittwieser
:
Sequitur-based Inference and Analysis Framework for Malicious System Behavior. 632-643 - Mario Giovanni C. A. Cimino, Gigliola Vaglini:

Localization and Inhibition of Malicious Behaviors through a Model Checking based Methodology. ICISSP 2017: 644-652 - Ankita Kapratwar, Fabio Di Troia, Mark Stamp

:
Static and Dynamic Analysis of Android Malware. 653-662 - Vittoria Nardone, Corrado Aaron Visaggio:

"Mirror, Mirror on the Wall, Who is the Fairest One of All?" - Machine Learning versus Model Checking: A Comparison between Two Static Techniques for Malware Family Identification. 663-672 - Fabio Martinelli, Francesco Mercaldo, Vittoria Nardone, Antonella Santone, Corrado Aaron Visaggio:

Identifying Mobile Repackaged Applications through Formal Methods. 673-682 - Steffen Pfrang, David Meier:

On the Detection of Replay Attacks in Industrial Automation Networks Operated with Profinet IO. 683-693 - Wietze J. B. Beukema, Thomas Attema

, Harm A. Schotanus:
Internal Network Monitoring and Anomaly Detection through Host Clustering. 694-703 - Cinzia Bernardeschi

, Marco Di Natale, Gianluca Dini, Maurizio Palmieri:
Verifying Data Secure Flow in AUTOSAR Models by Static Analysis. 704-713 - Khanh-Huu-The Dam

, Tayssir Touili:
Extracting Android Malicious Behaviors. 714-723

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














