


default search action
11. SecureComm 2015: Dallas, TX, USA
- Bhavani Thuraisingham, XiaoFeng Wang, Vinod Yegneswaran:

Security and Privacy in Communication Networks - 11th International Conference, SecureComm 2015, Dallas, TX, USA, October 26-29, 2015, Revised Selected Papers. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 164, Springer 2015, ISBN 978-3-319-28864-2
Mobile, System and Software Security
- Yuan Zhang, Min Yang, Guofei Gu, Hao Chen

:
FineDroid: Enforcing Permissions with System-Wide Application Execution Context. 3-22 - Yongfeng Li, Tong Shen, Xin Sun, Xuerui Pan, Bing Mao:

Detection, Classification and Characterization of Android Malware Using API Data Dependency. 23-40 - André Ebert, Chadly Marouane, Benno Rott, Martin Werner

:
KeyPocket - Improving Security and Usability for Provider Independent Login Architectures with Mobile Devices. 41-57 - Chao Yang, Guangliang Yang, Ashish Gehani, Vinod Yegneswaran, Dawood Tariq, Guofei Gu:

Using Provenance Patterns to Vet Sensitive Behaviors in Android Apps. 58-77 - Lin Yan, Yao Guo

, Xiangqun Chen:
SplitDroid: Isolated Execution of Sensitive Components for Mobile Applications. 78-96 - Oliver Stecklina, Peter Langendörfer

, Frank Vater, Thorsten Kranz, Gregor Leander
:
Intrinsic Code Attestation by Instruction Chaining for Embedded Devices. 97-115 - Jidong Xiao, Hai Huang, Haining Wang:

Defeating Kernel Driver Purifier. 116-134 - Jidong Xiao, Hai Huang, Haining Wang:

Kernel Data Attack Is a Realistic Security Threat. 135-154
Cloud Security
- Hao Sun, Xiaofeng Wang, Jinshu Su, Peixin Chen:

RScam: Cloud-Based Anti-Malware via Reversible Sketch. 157-174 - Geng Tian, Zhiliang Wang, Xia Yin, Zimu Li, Xingang Shi, Ziyi Lu, Chao Zhou, Yang Yu, Dan Wu:

TADOOP: Mining Network Traffic Anomalies with Hadoop. 175-192 - Yueqiang Cheng, Qing Li, Miao Yu, Xuhua Ding

, Qingni Shen:
SuperCall: A Secure Interface for Isolated Execution Environment to Dynamically Use External Services. 193-211 - Xiaojun Xiao, Yaping Lin, Wei Zhang, Xin Yao, Qi Gu:

Authenticating Top-k Results of Secure Multi-keyword Search in Cloud Computing. 212-229
Privacy and Side Channels
- Indrajeet Singh, Masoud Akhoondi, Mustafa Y. Arslan, Harsha V. Madhyastha, Srikanth V. Krishnamurthy

:
Resource Efficient Privacy Preservation of Online Social Media Conversations. 233-255 - Vaibhav Rastogi, Zhengyang Qu, Jedidiah McClurg, Yinzhi Cao, Yan Chen:

Uranine: Real-time Privacy Leakage Monitoring without System Modification for Android. 256-276 - Hong Liu, Hongmin Li, Eugene Y. Vasserman

:
Practicality of Using Side-Channel Analysis for Software Integrity Checking of Embedded Systems. 277-293 - Priyabrat Dash, Chris Perkins, Ryan M. Gerdes:

Remote Activation of Hardware Trojans via a Covert Temperature Channel. 294-310
Web and Network Security
- Song Li, Hai-Xin Duan, Zhiliang Wang, Xing Li:

Route Leaks Identification by Detecting Routing Loops. 313-329 - Hugo Gascon, Christian Wressnegger, Fabian Yamaguchi, Daniel Arp, Konrad Rieck:

Pulsar: Stateful Black-Box Fuzzing of Proprietary Network Protocols. 330-347 - Dae Wook Kim, Junjie Zhang:

You Are How You Query: Deriving Behavioral Fingerprints from DNS Traffic. 348-366 - Lei Yang, Fengjun Li

:
Enhancing Traffic Analysis Resistance for Tor Hidden Services with Multipath Routing. 367-384 - Ashton Webster, Margaret Gratian, Ryan Eckenrod, Daven Patel, Michel Cukier:

An Improved Method for Anomaly-Based Network Scan Detection. 385-400 - Juan D. Parra Rodriguez, Joachim Posegga:

Why Web Servers Should Fear Their Clients - Abusing Websockets in Browsers for DoS. 401-417 - Chunqiang Hu, Xiuzhen Cheng, Zhi Tian, Jiguo Yu

, Kemal Akkaya, Limin Sun:
An Attribute-Based Signcryption Scheme to Secure Attribute-Defined Multicast Communications. 418-437 - Yoann Bertrand, Mireille Blay-Fornarino

, Karima Boudaoud, Michel Riveill
:
Generation of Transmission Control Rules Compliant with Existing Access Control Policies. 438-455
Crypto, Protocol and Model
- Yongzheng Zhang, Tao Xu, Yipeng Wang, Jianliang Sun, Xiaoyu Zhang:

A Markov Random Field Approach to Automated Protocol Signature Inference. 459-476 - Mohsen Alimomeni, Reihaneh Safavi-Naini:

How to Prevent to Delegate Authentication. 477-499 - Xing Zhang, Cancan Jin, Cong Li, Zilong Wen, Qingni Shen, Yuejian Fang, Zhonghai Wu:

Ciphertext-Policy Attribute-Based Encryption with User and Authority Accountability. 500-518 - Stefan Craß, Gerson Joskowicz, Eva Kühn:

A Decentralized Access Control Model for Dynamic Collaboration of Autonomous Peers. 519-537 - Gustavo Gonzalez Granadillo, Joaquín García-Alfaro

, Hervé Debar
:
Using a 3D Geometrical Model to Improve Accuracy in the Evaluation and Selection of Countermeasures Against Complex Cyber Attacks. 538-555
Poster Session
- Dongdong Tian, Xiaohong Li, Jing Hu, Guangquan Xu, Zhiyong Feng:

POSTER: API-Level Multi-policy Access Control Enforcement for Android Middleware. 559-562 - Vitaly Ford, Ambareen Siraj:

POSTER: Reliable and Efficient Protection of Consumer Privacy in Advanced Metering Infrastructure. 563-566 - Xuejie Ding, Wei-qing Huang, Meng Zhang, Jianlin Zhao:

POSTER: A Security Adaptive Steganography System Applied on Digital Audio. 567-571 - Yongbo Li, Fan Yao

, Tian Lan, Guru Venkataramani:
POSTER: Semantics-Aware Rule Recommendation and Enforcement for Event Paths. 572-576 - Apala Ray, Johan Åkerberg, Mats Björkman, Mikael Gidlund

:
POSTER: An Approach to Assess Security, Capacity and Reachability for Heterogeneous Industrial Networks. 577-580 - Kai Cao, Yunchun Li, Hailong Yang, Jiqiang Tang, Xiaoxiang Zou:

POSTER: An Online Prefix-Preserving IP Address Anonymization Algorithm for Passive Measurement Systems. 581-584 - Yuejian Fang, Zilong Wen, Qingni Shen, Yahui Yang, Zhonghai Wu:

POSTER: Ciphertext-Policy Attribute-Based Encryption Method with Secure Decryption Key Generation and Outsourcing Decryption of ABE Ciphertexts. 585-589 - Karim Emara

, Wolfgang Woerndl, Johann H. Schlichter:
POSTER: Context-Adaptive User-Centric Privacy Scheme for VANET. 590-593 - Chanwoo Bae, Jesung Jung, Jaehyun Nam, Seungwon Shin:

POSTER: A Collaborative Approach on Behavior-Based Android Malware Detection. 594-597 - Degang Sun, Xinping Zhou, Zhu Wang, Changhai Ou, Wei-qing Huang, Juan Ai:

POSTER: Using Improved Singular Value Decomposition to Enhance Correlation Power Analysis. 598-601
ATIS 2015: 6th International Workshop on Applications and Techniques in Information Security
- Ahmad Atamli-Reineh, Andrew P. Martin:

Securing Application with Software Partitioning: A Case Study Using SGX. 605-621 - Mozammel Chowdhury, Junbin Gao

, Morshed U. Chowdhury
:
Image Spam Classification Using Neural Network. 622-632 - Khandakar Rabbi, Quazi Mamun

:
An Effective t-way Test Data Generation Strategy. 633-648 - Ala' F. A. Aburumman, Wei Jye Seo

, Md. Rafiqul Islam
, Muhammad Khurram Khan
, Kim-Kwang Raymond Choo
:
A Secure Cross-Domain SIP Solution for Mobile Ad Hoc Network Using Dynamic Clustering. 649-664 - Carlos Garcia Cordero

, Emmanouil Vasilomanolakis
, Max Mühlhäuser, Mathias Fischer:
Community-Based Collaborative Intrusion Detection. 665-681 - Jinkun Geng, Daren Ye, Ping Luo, Pin Lv:

A Novel Clustering Algorithm for Database Anomaly Detection. 682-696 - M. Arif Khan

, Rafiqul Islam
:
Secrecy Rate Based User Selection Algorithms for Massive MIMO Wireless Networks. 697-710 - Mozammel Chowdhury, Junbin Gao

, Rafiqul Islam
:
Human Surveillance System for Security Application. 711-724 - Ben Townsend

, Jemal H. Abawajy:
Security Considerations for Wireless Carrier Agonistic Bio-Monitoring Systems. 725-737

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














