


default search action
12. ARES 2017: Reggio Calabria, Italy
- Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29 - September 01, 2017. ACM 2017, ISBN 978-1-4503-5257-4

ARES Full Papers: Full I - Best Paper
- David Bernhard, Oksana Kulyk, Melanie Volkamer:

Security Proofs for Participation Privacy, Receipt-Freeness and Ballot Privacy for the Helios Voting Scheme. 1:1-1:10 - Anatoli Kalysch, Johannes Götzfried, Tilo Müller:

VMAttack: Deobfuscating Virtualization-Based Packed Binaries. 2:1-2:10 - Jordi Soria-Comas

, Josep Domingo-Ferrer
:
A Non-Parametric Model for Accurate and Provably Private Synthetic Data Sets. 3:1-3:10
ARES Full Papers: Full II - Applications
- Enrico Schiavone

, Andrea Ceccarelli
, Andrea Bondavalli
:
Continuous Biometric Verification for Non-Repudiation of Remote Services. 4:1-4:10 - Iakovos Gurulian, Konstantinos Markantonakis

, Raja Naeem Akram
, Keith Mayes:
Artificial Ambient Environments for Proximity Critical Applications. 5:1-5:10 - Tom Arjannikov, Simon Diemert, Sudhakar Ganti, Chloe Lampman, Edward C. Wiebe:

Using Markov Chains to Model Sensor Network Reliability. 6:1-6:10
ARES Full Papers: Full III - Trust
- Carlton Shepherd, Raja Naeem Akram

, Konstantinos Markantonakis
:
Establishing Mutually Trusted Channels for Remote Sensing Devices with Trusted Execution Environments. 7:1-7:10 - Reda Yaich, Nora Cuppens, Frédéric Cuppens:

Enabling Trust Assessment In Clouds-of-Clouds: A Similarity-Based Approach. 8:1-8:9 - Peter Mayer

, Alexandra Kunz, Melanie Volkamer:
Reliable Behavioural Factors in the Information Security Context. 9:1-9:10
ARES Full Papers: Full IV - Cryptography
- Michael Rossberg, Markus Theil:

Secure Enrollment of Certificates Using Short PINs. 10:1-10:9 - Xavier Bultel, Radu Ciucanu, Matthieu Giraud, Pascal Lafourcade

:
Secure Matrix Multiplication with MapReduce. 11:1-11:10
ARES Full Papers: ARES Full V - Security Models and Data Accountability
- Andrea Tundis

, Alfredo Garro
, Teresa Gallo, Domenico Saccà, Simona Citrigno, Sabrina Graziano
, Max Mühlhäuser:
Systemic Risk Modeling and Evaluation through Simulation and Bayesian Networks. 12:1-12:10 - Andrea Tundis

, Rolf Egert, Max Mühlhäuser:
Attack Scenario Modeling for Smart Grids Assessment through Simulation. 13:1-13:10 - Ricardo Neisse, Gary Steri

, Igor Nai Fovino:
A Blockchain-based Approach for Data Accountability and Provenance Tracking. 14:1-14:10
ARES Full Papers: ARES Full VI Privacy I
- Spyros Boukoros, Stefan Katzenbeisser:

Measuring privacy in high dimensional microdata collections. 15:1-15:8 - Sebastian Funke, Alexander Wiesmaier

, Jörg Daubert:
Constrained PET Composition for Measuring Enforced Privacy. 16:1-16:10 - Konstantinos Angelopoulos, Vasiliki Diamantopoulou, Haralambos Mouratidis, Michalis Pavlidis

, Mattia Salnitri
, Paolo Giorgini
, José Fran. Ruiz:
A Holistic Approach for Privacy Protection in E-Government. 17:1-17:10
ARES Full Papers: ARES Full VII Privacy II
- Thomas Gougeon, Morgan Barbier

, Patrick Lacharme, Gildas Avoine, Christophe Rosenberger
:
Memory carving can finally unveil your embedded personal data. 18:1-18:9 - Saeed Ibrahim Alqahtani, Shujun Li

:
PPAndroid-Benchmarker: Benchmarking Privacy Protection Systems on Android Devices. 19:1-19:10
ARES Full Papers: Ares Full VIII - Network Security and Intrusion Detection
- Aljosha Judmayer, Johanna Ullrich

, Georg Merzdovnik
, Artemios G. Voyiatzis, Edgar R. Weippl:
Lightweight Address Hopping for Defending the IPv6 IoT. 20:1-20:10 - Norbert Blenn, Vincent Ghiëtte, Christian Doerr:

Quantifying the Spectrum of Denial-of-Service Attacks through Internet Backscatter. 21:1-21:10 - Martin Husák

, Jaroslav Kaspar, Elias Bou-Harb
, Pavel Celeda
:
On the Sequential Pattern and Rule Mining in the Analysis of Cyber Security Alerts. 22:1-22:10 - Quentin Le Sceller, ElMouatez Billah Karbab, Mourad Debbabi

, Farkhund Iqbal
:
SONAR: Automatic Detection of Cyber Security Events over the Twitter Stream. 23:1-23:11
ARES Short Papers: ARES Short I - Cryptography
- Nils Löken:

Searchable Encryption with Access Control. 24:1-24:6 - Alfredo De Santis

, Manuela Flores
, Barbara Masucci:
One-Message Unilateral Entity Authentication Schemes. 25:1-25:6 - Francesco Buccafurri, Gianluca Lax, Serena Nicolazzo

, Antonino Nocera
:
Overcoming Limits of Blockchain for IoT Applications. 26:1-26:6
ARES Short Papers: ARES Short II - IoT and Security Engineering
- Zeeshan Ali Khan, Johanna Ullrich

, Artemios G. Voyiatzis, Peter Herrmann
:
A Trust-based Resilient Routing Mechanism for the Internet of Things. 27:1-27:6 - Muhammad Ajmal Azad

, Samiran Bag, Feng Hao
:
M2M-REP: Reputation of Machines in the Internet of Things. 28:1-28:7 - Sravani Teja Bulusu, Romain Laborde, Ahmad Samer Wazan, François Barrère, Abdelmalek Benzekri:

Which Security Requirements Engineering Methodology Should I Choose?: Towards a Requirements Engineering-based Evaluation Approach. 29:1-29:6 - Marco Rasori, Pericle Perazzo

, Gianluca Dini:
A Low-Cost UAV-Based Secure Location Verification Method. 30:1-30:6
ARES Short Papers: ARES Short III - Security Monitoring and Analysis
- Markus Wurzenberger, Florian Skopik, Max Landauer, Philipp Greitbauer, Roman Fiedler, Wolfgang Kastner

:
Incremental Clustering for Semi-Supervised Anomaly Detection applied on Log Data. 31:1-31:6 - Luca Allodi, Fabio Massacci

:
Attack Potential in Impact and Complexity. 32:1-32:6 - Sebastian Neuner, Artemios G. Voyiatzis, Martin Schmiedecker, Edgar R. Weippl:

Timestamp hiccups: Detecting manipulated filesystem timestamps on NTFS. 33:1-33:6 - Shankar Karuppayah, Leon Böck, Tim Grube, Selvakumar Manickam

, Max Mühlhäuser, Mathias Fischer:
SensorBuster: On Identifying Sensor Nodes in P2P Botnets. 34:1-34:6
ARES Short Papers: ARES Short IV - Applications
- Yousra Javed, Mohamed Shehab

, Emmanuel Bello-Ogunu:
Investigating User Comprehension and Risk Perception of Apple's Touch ID Technology. 35:1-35:6 - Soha Alboghdady, Stefan Winter, Ahmed Taha, Heng Zhang, Neeraj Suri

:
C'mon: Monitoring the Compliance of Cloud Services to Contracted Properties. 36:1-36:6 - Marcel Busch

, Mykolai Protsenko, Tilo Müller:
A Cloud-Based Compilation and Hardening Platform for Android Apps. 37:1-37:6 - Stefano Bistarelli

, Francesco Santini
:
Go with the -Bitcoin- Flow, with Visual Analytics. 38:1-38:6
FARES 2017: FARES I - Critical Infrastructures and Cyber2Physical
- Christof Fetzer, Giovanni Mazzeo

, John Oliver, Luigi Romano, Martijn Verburg:
Integrating Reactive Cloud Applications in SERECA. 39:1-39:8 - Philipp Kreimel, Oliver Eigner

, Paul Tavolato:
Anomaly-Based Detection and Classification of Attacks in Cyber-Physical Systems. 40:1-40:6
FARES 2017: FARES II - Identity Management and Access Control
- Tetsuji Takada

:
Authentication Shutter: Alternative Countermeasure against Password Reuse Attack by Availability Control. 41:1-41:9 - Abdulrahman Alruban, Nathan L. Clarke

, Fudong Li, Steven Furnell:
Insider Misuse Attribution using Biometrics. 42:1-42:7 - Olga Kieselmann, Arno Wacker, Gregor Schiele:

k-rAC: a Fine-Grained k-Resilient Access Control Scheme for Distributed Hash Tables. 43:1-43:10 - Olivier Blazy

, Emmanuel Conchon, Paul Germouty, Amandine Jambert:
Efficient ID-based Designated Verifier Signature. 44:1-44:8
FARES 2017: FARES III - Code Security and Privacy
- Kevin Kirchner, Stefan Rosenthaler:

bin2llvm: Analysis of Binary Programs Using LLVM Intermediate Representation. 45:1-45:7 - Michiel Willocx

, Jan Vossaert, Vincent Naessens:
Security Analysis of Cordova Applications in Google Play. 46:1-46:7 - Nicholas Akinyokun, Vanessa Teague:

Security and Privacy Implications of NFC-enabled Contactless Payment Systems. 47:1-47:10 - Nikolaos P. Karvelas, Marius Senftleben, Stefan Katzenbeisser:

Microblogging in a Privacy-Preserving way. 48:1-48:6
FARES 2017: FARES IV - Security Models and Methods
- Robert P. Lee, Konstantinos Markantonakis

, Raja Naeem Akram
:
Provisioning Software with Hardware-Software Binding. 49:1-49:9 - Enrico Frumento, Federica Freschi, Davide Andreoletti, Angelo Consoli:

Victim Communication Stack (VCS): A flexible model to select the Human Attack Vector. 50:1-50:6 - Sigurd Eskeland:

Fully threshold broadcast encryption. 51:1-51:5 - Partha P. Pal

, Nathaniel Soule, Nate Lageman, Shane S. Clark, Marco M. Carvalho, Adrian Granados, Anthony Alves:
Adaptive Resource Management Enabling Deception (ARMED). 52:1-52:8
WSDF 2017: WSDF I
- Felix Mayer, Martin Steinebach:

Forensic Image Inspection Assisted by Deep Learning. 53:1-53:9
WSDF 2017: WSDF II
- Oren Halvani, Christian Winter, Lukas Graner

:
On the Usefulness of Compression Models for Authorship Verification. 54:1-54:10 - Tanveer A. Zia

, Peng Liu, Weili Han:
Application-Specific Digital Forensics Investigative Model in Internet of Things (IoT). 55:1-55:7 - Christopher Meffert, Devon Clark, Ibrahim M. Baggili

, Frank Breitinger
:
Forensic State Acquisition from Internet of Things (FSAIoT): A general framework and practical approach for IoT forensics through IoT device state acquisition. 56:1-56:11
IWSMA 2017: IWSMA I
- Abeer Al Jarrah, Mohamed Shehab

:
The Demon is in the Configuration: Revisiting Hybrid Mobile Apps Configuration Model. 57:1-57:10 - Ayman Youssef, Ahmed F. Shosha:

Quantitave Dynamic Taint Analysis of Privacy Leakage in Android Arabic Apps. 58:1-58:9 - Khanh-Huu-The Dam

, Tayssir Touili:
Learning Android Malware. 59:1-59:9
IWCC 2017: IWCC I
- Merylin Monaro, Riccardo Spolaor, QianQian Li, Mauro Conti

, Luciano Gamberini, Giuseppe Sartori:
Type Me the Truth!: Detecting Deceitful Users via Keystroke Dynamics. 60:1-60:6 - Natalija Vlajic, Xue Ying Shi, Hamzeh Roumani, Pooria Madani

:
Resource Hints in HTML5: A New Pandora's Box of Security Nightmares. 61:1-61:9
IWCC 2017: IWCC II
- Orhan Ermis, Serif Bahtiyar

, Emin Anarim
, M. Ufuk Çaglayan:
A Comparative Study on the Scalability of Dynamic Group Key Agreement Protocols. 62:1-62:6 - Masoomeh Sepehri

, Alberto Trombetta
:
Secure and Efficient Data Sharing with Atribute-based Proxy Re-encryption Scheme. 63:1-63:6
SAW 2017: SAW I
- Dorottya Papp

, Levente Buttyán, Zhendong Ma:
Towards Semi-automated Detection of Trigger-based Behavior for Software Security Assurance. 64:1-64:6 - Václav Stupka, Martin Horák, Martin Husák:

Protection of personal data in security alert sharing platforms. 65:1-65:8 - Sam Procter

, Eugene Y. Vasserman
, John Hatcliff:
SAFE and Secure: Deeply Integrating Security in a New Hazard Analysis. 66:1-66:10 - Daniel Zelle

, Christoph Krauß
, Hubert Strauß, Karsten Schmidt:
On Using TLS to Secure In-Vehicle Networks. 67:1-67:10
SSE 2017: SSE I - DevSecOps and cloud computing
- Brian Pfretzschner, Lotfi Ben Othmane:

Identification of Dependency-based Attacks on Node.js. 68:1-68:6 - Martin Gilje Jaatun, Daniela S. Cruzes, Jesus Luna:

DevOps for Better Software Security in the Cloud Invited Paper. 69:1-69:6 - Hasan Yasar:

Implementing Secure DevOps assessment for highly regulated environments. 70:1-70:3
SSE 2017: SSE II - Agile secure software development
- Pal-Stefan Murvay

, Bogdan Groza
:
DoS Attacks on Controller Area Networks by Fault Injections from the Software Layer. 71:1-71:10 - Felix Schuckert, Basel Katt, Hanno Langweg:

Source Code Patterns of SQL Injection Vulnerabilities. 72:1-72:7 - Patrik Maier, Zhendong Ma, Roderick Bloem

:
Towards a Secure SCRUM Process for Agile Web Application Development. 73:1-73:8 - Kalle Rindell

, Sami Hyrynsalmi
, Ville Leppänen
:
Busting a Myth: Review of Agile Security Engineering Methods. 74:1-74:10
WMA 2017: WMA I - Malware detection
- Joseph DiVita, Roger A. Hallman

:
An Approach to Botnet Malware Detection Using Nonparametric Bayesian Methods. 75:1-75:9 - Fabio Martinelli, Francesco Mercaldo, Vittoria Nardone, Antonella Santone:

Malware and Formal Methods: Rigorous Approaches for detecting Malicious Behaviour. 76:1-76:6 - Tomás Komárek, Petr Somol:

End-node Fingerprinting for Malware Detection on HTTPS Data. 77:1-77:7
WMA 2017: WMA II - Defensive technologies
- Andrew Slaughter, Mark Yampolskiy, Manyalibo Matthews

, Wayne E. King, Gabe Guss, Yuval Elovici:
How to Ensure Bad Quality in Metal Additive Manufacturing: In-Situ Infrared Thermography from the Security Perspective. 78:1-78:10 - Jasper Abbink, Christian Doerr:

Popularity-based Detection of Domain Generation Algorithms. 79:1-79:8 - Moataz AbdelKhalek, Ahmed F. Shosha:

JSDES: An Automated De-Obfuscation System for Malicious JavaScript. 80:1-80:13
CUING 2017: CUING I
- Félix Iglesias

, Tanja Zseby:
Are Network Covert Timing Channels Statistical Anomalies? 81:1-81:9 - Avinash Srinivasan, Hunter Dong, Angelos Stavrou

:
FROST: Anti-Forensics Digital-Dead-DROp Information Hiding RobuST to Detection & Data Loss with Fault tolerance. 82:1-82:8 - Sabine S. Schmidt, Wojciech Mazurczyk

, Jörg Keller, Luca Caviglione:
A New Data-Hiding Approach for IP Telephony Applications with Silence Suppression. 83:1-83:6
CUING 2017: CUING II
- Mauro Conti

, Pallavi Kaliyar, Chhagan Lal
:
REMI: A Reliable and Secure Multicast Routing Protocol for IoT Networks. 84:1-84:8 - Elike Hodo, Xavier J. A. Bellekens

, Ephraim Iorkyase, Andrew W. Hamilton, Christos Tachtatzis
, Robert C. Atkinson
:
Machine Learning Approach for Detection of nonTor Traffic. 85:1-85:6 - Anze Mihelic, Blaz Markelj, Igor Bernik, Sabina Zgaga:

Investigating the darknet: limitations in Slovenian legal system. 86:1-86:7
SECPID 2017: SECPID I
- Arne Bilzhause, Henrich C. Pöhls, Kai Samelin:

Position Paper: The Past, Present, and Future of Sanitizable and Redactable Signatures. 87:1-87:9 - Andreas Happe, Florian Wohner, Thomas Lorünser

:
The Archistar Secret-Sharing Backup Proxy. 88:1-88:8 - Nicolás Notario, Eleonora Ciceri, Alberto Crespo

, Eduardo González Real, Ilio Catallo, Sauro Vicini
:
Orchestrating Privacy Enhancing Technologies and Services with BPM Tools: The WITDOM Data Protection Orchestrator. 89:1-89:7
SECPID 2017: SECPID II
- Alexandros Kostopoulos, Evangelos Sfakianakis, Ioannis P. Chochliouros, John Sören Pettersson, Stephan Krenn, Welderufael Tesfay, Andrea Migliavacca, Felix Hörandner

:
Towards the Adoption of Secure Cloud Identity Services. 90:1-90:7 - Paul Grace

, Mike Surridge
:
Towards a Model of User-centered Privacy Preservation. 91:1-91:8 - Harry Halpin:

NEXTLEAP: Decentralizing Identity with Privacy for Secure Messaging. 92:1-92:10
SECPID 2017: SECPID III
- Erkuden Rios

, Eider Iturbe
, Maria Carmen Palacios
:
Self-healing Multi-Cloud Application Modelling. 93:1-93:9 - Sebastian Thomas Schork

, Antonia Schwichtenberg, Spiros Alexakis, George Moldovan:
Application of the holistic Data Privacy and Security Framework PaaSword: A focus on the integration in industrial Pilots. 94:1-94:10
S-CI 2017: S-CI I - CyberSecurity and Critical Infrastructures
- Lukas Jäger, Richard Petri

, Andreas Fuchs:
Rolling DICE: Lightweight Remote Attestation for COTS IoT Hardware. 95:1-95:8 - Aljosa Pasic

, Jose-Ramon Martinez-Salio, Susana Gonzalez Zarzosa, Rodrigo Diaz:
ZONESEC: built-in cyber-security for wide area surveillance system. 96:1-96:5 - Christian Frøystad, Karin Bernsmed, Per Håkon Meland:

Protecting Future Maritime Communication. 97:1-97:10
S-CI 2017: S-CI II - Critical Infrastructure Systems CyberSecurity Tools
- Mustafa Ayoob, Wael Adi, Vassilis Prevelakis:

Using Ciphers for Failure-Recovery in ITS Systems. 98:1-98:7 - Kubilay Demir

, Neeraj Suri
:
Towards DDoS Attack Resilient Wide Area Monitoring Systems. 99:1-99:7 - Ersi Hodo, Stepan Grebeniuk, Henri Ruotsalainen, Paul Tavolato:

Anomaly Detection for Simulated IEC-60870-5-104 Trafiic. 100:1-100:7

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














