


default search action
SEC 2017: Rome, Italy
- Sabrina De Capitani di Vimercati, Fabio Martinelli:

ICT Systems Security and Privacy Protection - 32nd IFIP TC 11 International Conference, SEC 2017, Rome, Italy, May 29-31, 2017, Proceedings. IFIP Advances in Information and Communication Technology 502, Springer 2017, ISBN 978-3-319-58468-3
Network Security and Cyber Attacks
- Wilfried Mayer, Martin Schmiedecker:

Turning Active TLS Scanning to Eleven. 3-16 - Túlio A. Pascoal

, Yuri Gil Dantas, Iguatemi E. Fonseca, Vivek Nigam:
Slow TCAM Exhaustion DDoS Attack. 17-31 - Gheorghe Hajmasan

, Alexandra Mondoc
, Radu Portase
, Octavian Cret
:
Evasive Malware Detection Using Groups of Processes. 32-45 - Michael Denzel, Mark Ryan

, Eike Ritter:
A Malware-Tolerant, Self-Healing Industrial Control System Framework. 46-60 - David Myers

, Kenneth Radke, Suriadi Suriadi, Ernest Foo
:
Process Discovery for Industrial Control System Cyber Attack Detection. 61-75
Security and Privacy in Social Applications and Cyber Attacks Defense
- Pablo Picazo-Sanchez

, Raúl Pardo
, Gerardo Schneider
:
Secure Photo Sharing in Social Networks. 79-92 - Lin Yuan

, Joël Theytaz, Touradj Ebrahimi
:
Context-Dependent Privacy-Aware Photo Sharing Based on Machine Learning. 93-107 - Khondker Jahid Reza, Md Zahidul Islam

, Vladimir Estivill-Castro
:
3LP: Three Layers of Protection for Individual Privacy in Facebook. 108-123 - Warren Connell, Massimiliano Albanese

, Sridhar Venkatesan:
A Framework for Moving Target Defense Quantification. 124-138
Private Queries and Aggregations
- Ruben Rios, David Nuñez, Javier López:

Query Privacy in Sensing-as-a-Service Platforms. 141-154 - Hafiz Salman Asif, Jaideep Vaidya, Basit Shafiq, Nabil R. Adam:

Secure and Efficient k-NN Queries. 155-170 - Stéphane Grumbach, Robert Riemann

:
Secure and Trustable Distributed Aggregation Based on Kademlia. 171-185
Operating System and Firmware Security
- Roberto Di Pietro

, Federico Franzoni, Flavio Lombardi
:
HyBIS: Advanced Introspection for Effective Windows Guest Protection. 189-204 - Mariem Graa, Nora Cuppens-Boulahia, Frédéric Cuppens, Jean-Louis Lanet, Routa Moussaileb:

Detection of Side Channel Attacks Based on Data Tainting in Android Systems. 205-218 - MinSik Shin, JungBeen Yu, Youngjin Yoon, Taekyoung Kwon:

The Fuzzing Awakens: File Format-Aware Mutational Fuzzing on Smartphone Media Server Daemons. 219-232 - Andrei Costin, Apostolis Zarras

, Aurélien Francillon
:
Towards Automated Classification of Firmware Images and Identification of Embedded Devices. 233-247 - Andreas Fuchs, Christoph Krauß

, Jürgen Repp:
Runtime Firmware Product Lines Using TPM2.0. 248-261
User Authentication and Policies
- Lydia Kraus, Robert Schmidt, Marcel Walch, Florian Schaub, Sebastian Möller

:
On the Use of Emojis in Mobile Authentication. 265-280 - David Lorenzi, Jaideep Vaidya, Achyuta Aich, Shamik Sural

, Vijayalakshmi Atluri
, Joseph Calca:
EmojiTCHA: Using Emotion Recognition to Tell Computers and Humans Apart. 281-295 - Umberto Morelli, Silvio Ranise

:
Assisted Authoring, Analysis and Enforcement of Access Control Policies in the Cloud. 296-309 - Joseph Hallett, David Aspinall:

Capturing Policies for BYOD. 310-323
Applied Cryptography and Voting Schemes
- Jean-François Couchot, Raphaël Couturier

, Michel Salomon
:
Improving Blind Steganalysis in Spatial Domain Using a Criterion to Choose the Appropriate Steganalyzer Between CNN and SRM+EC. 327-340 - Lina Nouh, Ashkan Rahimian, Djedjiga Mouheb

, Mourad Debbabi
, Aiman Hanna:
BinSign: Fingerprinting Binary Functions to Support Automated Analysis of Code Executables. 341-355 - Cecilia Pasquini

, Pascal Schöttle, Rainer Böhme
:
Decoy Password Vaults: At Least as Hard as Steganography? 356-370 - Stephan Neumann, Manuel Noll, Melanie Volkamer:

Election-Dependent Security Evaluation of Internet Voting Schemes. 371-382
Software Security and Privacy
- Julian Kirsch, Clemens Jonischkeit, Thomas Kittel, Apostolis Zarras

, Claudia Eckert:
Combating Control Flow Linearization. 385-398 - Jeffrey Avery, Eugene H. Spafford

:
Ghost Patches: Fake Patches for Fake Vulnerabilities. 399-412 - Hongfa Xue, Yurong Chen, Fan Yao

, Yongbo Li, Tian Lan, Guru Venkataramani:
SIMBER: Eliminating Redundant Memory Bound Checks via Statistical Inference. 413-426 - Rene Meis

, Maritta Heisel:
Towards Systematic Privacy and Operability (PRIOP) Studies. 427-441 - Thibaud Antignac

, David Sands
, Gerardo Schneider
:
Data Minimisation: A Language-Based Approach. 442-456
Privacy
- Jun Wang, Qiang Tang:

Differentially Private Neighborhood-Based Recommender Systems. 459-473 - Somayeh Taheri, Md. Morshedul Islam

, Reihaneh Safavi-Naini:
Privacy-Enhanced Profile-Based Authentication Using Sparse Random Projection. 474-490 - Vasiliki Diamantopoulou, Christos Kalloniatis, Stefanos Gritzalis

, Haralambos Mouratidis:
Supporting Privacy by Design Using Privacy Process Patterns. 491-505 - Edoardo Serra

, Jaideep Vaidya, Haritha Akella, Ashish Sharma:
Evaluating the Privacy Implications of Frequent Itemset Disclosure. 506-519
Digital Signature, Risk Management, and Code Reuse Attacks
- Jihye Kim

, Hyunok Oh:
Forward-Secure Digital Signature Schemes with Optimal Computation and Storage of Signers. 523-537 - Alessio Merlo, Gabriel Claudiu Georgiu:

RiskInDroid: Machine Learning-Based Risk Analysis on Android. 538-552 - Ahmed Seid Yesuf, Jetzabel Serna-Olvera, Kai Rannenberg:

Using Fraud Patterns for Fraud Risk Assessment of E-services. 553-567 - Liwei Chen, Mengyu Ma, Wenhao Zhang, Gang Shi, Dan Meng:

Gadget Weighted Tagging: A Flexible Framework to Protect Against Code Reuse Attacks. 568-584

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














