default search action
11th CRiSIS 2016: Roscoff, France
- Frédéric Cuppens, Nora Cuppens, Jean-Louis Lanet, Axel Legay:
Risks and Security of Internet and Systems - 11th International Conference, CRiSIS 2016, Roscoff, France, September 5-7, 2016, Revised Selected Papers. Lecture Notes in Computer Science 10158, Springer 2017, ISBN 978-3-319-54875-3
Protection of Personal Data
- Esma Aïmeur, Gilles Brassard, Jonathan Rioux:
CLiKC: A Privacy-Mindful Approach When Sharing Data. 3-10 - Aurélien Palisse, Hélène Le Bouder, Jean-Louis Lanet, Colas Le Guernic, Axel Legay:
Ransomware and the Legacy Crypto API. 11-28
Risk and Security Analysis Methodology
- Razika Lounas, Nisrine Jafri, Axel Legay, Mohamed Mezghiche, Jean-Louis Lanet:
A Formal Verification of Safe Update Point Detection in Dynamic Software Updating. 31-45 - Hela Hakim, Asma Sellami, Hanêne Ben-Abdallah:
Analyzing the Risk of Authenticity Violation Based on the Structural and Functional Sizes of UML Sequence Diagrams. 46-59 - Sravani Teja Bulusu, Romain Laborde, Ahmad Samer Wazan, François Barrère, Abdelmalek Benzekri:
Towards the Weaving of the Characteristics of Good Security Requirements. 60-74
Methodology for Security
- Olga Gadyatskaya, Katsiaryna Labunets, Federica Paci:
Towards Empirical Evaluation of Automated Risk Assessment Methods. 77-86 - Gustavo Gonzalez Granadillo, Joaquín García-Alfaro, Hervé Debar:
An n-Sided Polygonal Model to Calculate the Impact of Cyber Security Events. 87-102
Security and Formal Methods
- Barbara Kordy, Piotr Kordy, Yoann van den Boom:
SPTool - Equivalence Checker for SAND Attack Trees. 105-113 - Frédéric Mangano, Simon Duquennoy, Nikolai Kosmatov:
Formal Verification of a Memory Allocation Module of Contiki with Frama-C: A Case Study. 114-120
Network Security
- Salaheddine Zerkane, David Espes, Philippe Le Parc, Frédéric Cuppens:
A Proactive Stateful Firewall for Software Defined Networking. 123-138 - Julien Duchêne, Colas Le Guernic, Eric Alata, Vincent Nicomette, Mohamed Kaâniche:
Protocol Reverse Engineering: Challenges and Obfuscation. 139-144
Detection and Monitoring
- Muhammad Imran Khan, Simon N. Foley:
Detecting Anomalous Behavior in DBMS Logs. 147-152 - Younes Abid, Abdessamad Imine, Amedeo Napoli, Chedy Raïssi, Michaël Rusinowitch:
Online Link Disclosure Strategies for Social Networks. 153-168 - Rui Abreu, César Andrés, Ana R. Cavalli:
A Framework to Reduce the Cost of Monitoring and Diagnosis Using Game Theory. 169-182
Cryptography
- Amine Mrabet, Nadia El Mrabet, Ronan Lashermes, Jean-Baptiste Rigaud, Belgacem Bouallegue, Sihem Mesnager, Mohsen Machhout:
High-Performance Elliptic Curve Cryptography by Using the CIOS Method for Modular Multiplication. 185-198 - Damien Jauvart, Jacques J. A. Fournier, Nadia El Mrabet, Louis Goubin:
Improving Side-Channel Attacks Against Pairing-Based Cryptography. 199-213 - Benjamin Lac, Marc Beunardeau, Anne Canteaut, Jacques J. A. Fournier, Renaud Sirdey:
A First DFA on PRIDE: From Theory to Practice. 214-238
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.