default search action
10. ARES 2015: Toulouse, France
- 10th International Conference on Availability, Reliability and Security, ARES 2015, Toulouse, France, August 24-27, 2015. IEEE Computer Society 2015, ISBN 978-1-4673-6590-1
ARES Full Papers
Full Papers ARES Full I: Best Paper Session
- Klaus Kursawe, Christiane Peters:
Structural Weaknesses in the Open Smart Grid Protocol. 1-10 - Dejan Baca, Martin Boldt, Bengt Carlsson, Andreas Jacobsson:
A Novel Security-Enhanced Agile Software Development Process Applied in an Industrial Setting. 11-19 - Sascha Bosse, Matthias Splieth, Klaus Turowski:
Optimizing IT Service Costs with Respect to the Availability Service Level Objective. 20-29
ARES Full II: Identity and Privacy
- Moritz Horsch, Andreas Hülsing, Johannes Buchmann:
PALPAS - PAssword Less PAssword Synchronization. 30-39 - Matthias Hummer, Michael Kunz, Michael Netter, Ludwig Fuchs, Günther Pernul:
Advanced Identity and Access Policy Management Using Contextual Data. 40-49 - Bence Gabor Bakondi, Andreas Peter, Maarten H. Everts, Pieter H. Hartel, Willem Jonker:
Publicly Verifiable Private Aggregation of Time-Series Data. 50-59
ARES Full III: Networks and Protocols
- Henrich Christopher Pöhls, Kai Samelin:
Accountable Redactable Signatures. 60-69 - Jordan Cropper, Johanna Ullrich, Peter Frühwirt, Edgar R. Weippl:
The Role and Security of Firewalls in IaaS Cloud Computing. 70-79 - Shane S. Clark, Aaron Paulos, Brett Benyo, Partha P. Pal, Richard E. Schantz:
Empirical Evaluation of the A3 Environment: Evaluating Defenses Against Zero-Day Attacks. 80-89
ARES Full IV: Software Security
- David Dewey, Bradley Reaves, Patrick Traynor:
Uncovering Use-After-Free Conditions in Compiled Code. 90-99 - Quoc-Sang Phan, Pasquale Malacaria:
All-Solution Satisfiability Modulo Theories: Applications, Algorithms and Benchmarks. 100-109 - Raphael C. S. Machado, Davidson R. Boccardo, Vinícius Gusmão Pereira de Sá, Jayme Luiz Szwarcfiter:
Fair Fingerprinting Protocol for Attesting Software Misuses. 110-119
ARES Full V: Mobile Security and Cyber Physical Systems
- Benjamin Taubmann, Manuel Huber, Sascha Wessel, Lukas Heim, Hans Peter Reiser, Georg Sigl:
A Lightweight Framework for Cold Boot Based Forensics on Mobile Devices. 120-128 - Mykola Protsenko, Sebastien Kreuter, Tilo Müller:
Dynamic Self-Protection and Tamperproofing for Android Apps Using Native Code. 129-138 - Hafizah Mansor, Konstantinos Markantonakis, Raja Naeem Akram, Keith Mayes:
Don't Brick Your Car: Firmware Confidentiality and Rollback for Vehicles. 139-148
ARES Full VI: Security Management
- Dan Gorton:
Modeling Fraud Prevention of Online Services Using Incident Response Trees and Value at Risk. 149-158 - Bahareh Shojaie, Hannes Federrath, Iman Saberi:
The Effects of Cultural Dimensions on the Development of an ISMS Based on the ISO 27001. 159-167
ARES Short Papers
Short Papers ARES Short I: Network and Probing
- Malek Belhaouane, Joaquín García-Alfaro, Hervé Debar:
On the Isofunctionality of Network Access Control Lists. 168-173 - Tariq Fadai, Sebastian Schrittwieser, Peter Kieseberg, Martin Mulazzani:
Trust me, I'm a Root CA! Analyzing SSL Root CAs in Modern Browsers and Operating Systems. 174-179 - Elias Bou-Harb, Mourad Debbabi, Chadi Assi:
A Time Series Approach for Inferring Orchestrated Probing Campaigns by Analyzing Darknet Traffic. 180-185 - Johanna Ullrich, Peter Kieseberg, Katharina Krombholz, Edgar R. Weippl:
On Reconnaissance with IPv6: A Pattern-Based Scanning Approach. 186-192
ARES Short II: Hardware and Physical Layer Security
- Henrique Kawakami, Roberto Gallo, Ricardo Dahab, Erick Nascimento:
Hardware Security Evaluation Using Assurance Case Models. 193-198 - Johannes Götzfried, Johannes Hampel, Tilo Müller:
Physically Secure Code and Data Storage in Autonomously Booting Systems. 199-204 - Sihem Châabouni, Amel Meddeb-Makhlouf:
Error/Intrusion Target Identification on the Physical Layer over a BICM Scheme. 205-210 - Jens Lindemann:
Towards Abuse Detection and Prevention in IaaS Cloud Computing. 211-217
ARES Short III: Social Networks, Voting and Usable Security
- Francesco Buccafurri, Gianluca Lax, Serena Nicolazzo, Antonino Nocera:
A Model Implementing Certified Reputation and Its Application to TripAdvisor. 218-223 - Oksana Kulyk, Stephan Neumann, Jurlind Budurushi, Melanie Volkamer, Rolf Haenni, Reto E. Koenig, Philémon von Bergen:
Efficiency Evaluation of Cryptographic Protocols for Boardroom Voting. 224-229 - Katharina Krombholz, Peter Frühwirt, Thomas Rieder, Ioannis Kapsalis, Johanna Ullrich, Edgar R. Weippl:
QR Code Security - How Secure and Usable Apps Can Protect Users Against Malicious QR Codes. 230-237 - Jun Pang, Yang Zhang:
Event Prediction with Community Leaders. 238-243
The 10th International Workshop on Frontiers in Availability, Reliability and Security: FARES 2015
FARES I: Monitoring and Identification
- Michael Loughlin, Asma Adnane:
Privacy and Trust in Smart Camera Sensor Networks. 244-248 - Hessel Schut, Mark Scanlon, Jason Farina, Nhien-An Le-Khac:
Towards the Forensic Identification and Investigation of Cloud Hosted Servers through Non-Invasive Wiretaps. 249-257 - Martin Husák, Petr Velan, Jan Vykopal:
Security Monitoring of HTTP Traffic Using Extended Flows. 258-265
FARES II: Cryptography and Resilience
- Richard M. Zahoransky, Christian Brenig, Thomas G. Koslowski:
Towards a Process-Centered Resilience Framework. 266-273 - Jürgen Fuß, Stefan Gradinger, Bernhard Greslehner-Nimmervoll, Robert Kolmhofer:
Complexity Estimates of a SHA-1 Near-Collision Attack for GPU and FPGA. 274-280 - Yu Ichifuji, Noriaki Koide, Noboru Sonehara:
Impacts of Tourist Accommodations as Temporal Shelter on Evacuee Overflow for the Reassignment of Shelters Jurisdiction. 281-286
The Eighth International Workshop on Digital Forensics: WSDF 2015
- Simon Lindenlauf, Hans Höfken, Marko Schuba:
Cold Boot Attacks on DDR2 and DDR3 SDRAM. 287-292 - Noora Al Mutawa, Joanne Bryce, Virginia N. L. Franqueira, Andrew Marrington:
Behavioural Evidence Analysis Applied to Digital Forensics: An Empirical Analysis of Child Pornography Cases Using P2P Networks. 293-302 - Ibrahim M. Baggili, Jeff Oduro, Kyle Anthony, Frank Breitinger, Glenn McGee:
Watch What You Wear: Preliminary Forensic Analysis of Smart Watches. 303-311 - Victoria M. Katilu, Virginia N. L. Franqueira, Olga Angelopoulou:
Challenges of Data Provenance for Cloud Forensic Investigations. 312-317
The Fourth International Workshop on Security of Mobile Applications: IWSMA 2015
IWSMA 2015 IWSMA I: Android Security
- Gerardo Canfora, Francesco Mercaldo, Giovanni Moriano, Corrado Aaron Visaggio:
Composition-Malware: Building Android Malware at Run Time. 318-326 - Damjan Buhov, Markus Huber, Georg Merzdovnik, Edgar R. Weippl, Vesna Dimitrova:
Network Security Challenges in Android Applications. 327-332 - Gerardo Canfora, Andrea De Lorenzo, Eric Medvet, Francesco Mercaldo, Corrado Aaron Visaggio:
Effectiveness of Opcode ngrams for Detection of Multi Family Android Malware. 333-340
IWSMA II: Networks Security
- Aida Ben Chehida Douss, Ryma Abassi, Sihem Guemara El Fatmi:
A Model for Specification and Validation of a Trust Management Based Security Scheme in a MANET Environment. 341-350 - Matti J. Peltola, Pekka Kekolahti:
Risk Assessment of Public Safety and Security Mobile Service. 351-359 - Aida Ben Chehida Douss, Samiha Ayed, Ryma Abassi, Nora Cuppens, Sihem Guemara El Fatmi:
Trust Negotiation Based Approach to Enforce MANET Routing Security. 360-366
International Workshop on Cyber Crime: IWCC 2015
IWCC I: Cyber Crime Techniques and Prevention
- Murdoch Watney:
Intensifying State Surveillance of Electronic Communications: A Legal Solution in Addressing Extremism or Not? 367-373 - Jason W. Clark, Matt Collins, Jeremy R. Strozer:
Malicious Insiders with Ties to the Internet Underground Community. 374-381 - Geumhwan Cho, Junsung Cho, Youngbae Song, Hyoungshick Kim:
An Empirical Study of Click Fraud in Mobile Advertising Networks. 382-388 - Martin Husák, Milan Cermák, Tomás Jirsík, Pavel Celeda:
Network-Based HTTPS Client Identification Using SSL/TLS Fingerprinting. 389-396
IWCC II: Cyber Crime Techniques and Prevention
- Pavol Sokol, Martin Husák, Frantiek Liptak:
Deploying Honeypots and Honeynets: Issue of Privacy. 397-403 - Sebastian Neuner, Martin Mulazzani, Sebastian Schrittwieser, Edgar R. Weippl:
Gradually Improving the Forensic Process. 404-410 - Jingning Chen, Fenlin Liu, Xiangyang Luo, Fan Zhao, Guang Zhu:
A Landmark Calibration Based IP Geolocation Approach. 411-416 - Hang Cheng, Xinpeng Zhang, Jiang Yu, Fengyong Li:
Markov Process Based Retrieval for Encrypted JPEG Images. 417-421
IWCC III: Information Hiding I
- Jaspreet Kaur, Steffen Wendzel, Michael Meier:
Countermeasures for Covert Channel-Internal Control Protocols. 422-428 - Artur Janicki:
Novel Method of Hiding Information in IP Telephony Using Pitch Approximation. 429-435 - Wojciech Fraczek, Krzysztof Szczypiorski:
Steg Blocks: Ensuring Perfect Undetectability of Network Steganography. 436-441 - Jason Hiney, Tejas Dakve, Krzysztof Szczypiorski, Kris Gaj:
Using Facebook for Image Steganography. 442-447
IWCC IV: Information Hiding II
- Hasan Abdulrahman, Marc Chaumont, Philippe Montesinos, Baptiste Magnier:
Color Image Stegananalysis Using Correlations between RGB Channels. 448-454 - Hui Tian, Yanpeng Wu, Yongfeng Huang, Jin Liu, Yonghong Chen, Tian Wang, Yiqiao Cai:
Steganalysis of Low Bit-Rate Speech Based on Statistic Characteristics of Pulse Positions. 455-460 - Yi Zhang, Xiangyang Luo, Chunfang Yang, Dengpan Ye, Fenlin Liu:
A JPEG-Compression Resistant Adaptive Steganography Based on Relative Relationship between DCT Coefficients. 461-466
The Second International Workshop on Software Assurance: SAW 2015
SAW I: Security Design and Validation
- Martin Gilje Jaatun, Inger Anne Tøndel:
How Much Cloud Can You Handle? 467-473 - Germain Jolly, Baptiste Hemery, Christophe Rosenberger:
Generation of Local and Expected Behaviors of a Smart Card Application to Detect Software Anomaly. 474-480 - Otto Hellwig, Gerald Quirchmayr, Edith Huber, Timo Mischitz, Markus Huber:
Towards a CERT-Communication Model as Basis to Software Assurance. 481-485 - Jung-Woo Sohn, Jungwoo Ryoo:
Securing Web Applications with Better "Patches": An Architectural Approach for Systematic Input Validation with Security Patterns. 486-492
SAW II: Software Testing and Assurance
- Shinsaku Kiyomoto, Toru Nakamura, Haruo Takasaki, Tatsuhiko Hirabayashi:
Personal Agent for Services in ITS. 493-500 - Yury Zhauniarovich, Anton Philippov, Olga Gadyatskaya, Bruno Crispo, Fabio Massacci:
Towards Black Box Testing of Android Apps. 501-510 - Simon Tjoa, Patrick Kochberger, Christoph Malin, Andreas Schmoll:
An Open Source Code Analyzer and Reviewer (OSCAR) Framework. 511-515 - Marc Antoine Gosselin-Lavigne, Hugo Gonzalez, Natalia Stakhanova, Ali A. Ghorbani:
A Performance Evaluation of Hash Functions for IP Reputation Lookup Using Bloom Filters. 516-521
The First International Workshop on Agile Secure Software Development: ASSD 2015
ASSD I: Experiences in Agile Development of Secure software
- Jesus Choliz, Julian Vilas, José Moreira:
Independent Security Testing on Agile Software Development: A Case Study in a Software Company. 522-531 - Nasser Al-Hadhrami, Benjamin Aziz, Shantanu Sardesai, Lotfi Ben Othmane:
Incremental Development of RBAC-Controlled E-Marking System Using the B Method. 532-539
ASSD II: Assessment of Research on Agile Development of Secure software
- Hela Oueslati, Mohammad Masudur Rahman, Lotfi Ben Othmane:
Literature Review of the Challenges of Developing Secure Software Using the Agile Approach. 540-547 - Stephan Renatus, Clemens Teichmann, Jörn Eichler:
Method Selection and Tailoring for Agile Threat Assessment and Mitigation. 548-555
The International Workshop on Cloud Security and Forensics: WCSF 2015
- Jason Farina, Mark Scanlon, Nhien-An Le-Khac, M. Tahar Kechadi:
Overview of the Forensic Investigation of Cloud Services. 556-565 - Jaemin Park, Eunchan Kim, Sungjin Park, Cheoloh Kang:
Advanced Attribute-Based Key Management for Mobile Devices in Hybrid Clouds. 566-575 - Somchart Fugkeaw, Hiroyuki Sato:
Enabling Constraints and Dynamic Preventive Access Control Policy Enforcement in the Cloud. 576-583 - Manabu Hirano, Hayate Takase, Koki Yoshida:
Evaluation of a Sector-Hash Based Rapid File Detection Method for Monitoring Infrastructure-as-a-Service Cloud Platforms. 584-591
International Workshop on Multimedia Forensics and Security: MFSec 2015
MFSec I: Web and Social Media Data Analytics for Privacy Awareness and terrorist-related Content identification
- Georgios Petkos, Symeon Papadopoulos, Yiannis Kompatsiaris:
PScore: A Framework for Enhancing Privacy Awareness in Online Social Networks. 592-600 - Theodora Tsikrika, George Kalpakis, Stefanos Vrochidis, Ioannis Kompatsiaris, Iraklis Paraskakis, Isaak Kavasidis, Jonathan Middleton, Una Williamson:
A Framework for the Discovery, Analysis, and Retrieval of Multimedia Homemade Explosives Information on the Web. 601-610
MFSec II: Forensic Analysis of Audiovisual data
- Dana Codreanu, André Péninou, Florence Sèdes:
Video Spatio-Temporal Filtering Based on Cameras and Target Objects Trajectories - Videosurveillance Forensic Framework. 611-617 - Morgan Barbier, Jean-Marie Le Bars, Christophe Rosenberger:
Image Watermarking with Biometric Data for Copyright Protection. 618-625 - Eric Chan-Tin:
AnonCall: Making Anonymous Cellular Phone Calls. 626-631 - George Kalpakis, Theodora Tsikrika, Fotini Markatopoulou, Nikiforos Pittaras, Stefanos Vrochidis, Vasileios Mezaris, Ioannis Patras, Ioannis Kompatsiaris:
Concept Detection in Multimedia Web Resources About Home Made Explosives. 632-641
Workshop on Security and Privacy in Cloud-Based Applications: Au2EU 2015
- John Zic, Nerolie Oakes, Dongxi Liu, Jane Li, Chen Wang, Shiping Chen:
A Secure Integrated Platform for Rapdily Formed Multiorganisation Collaborations. 642-651 - Stefan Thaler, Jerry den Hartog, Dhouha Ayed, Dieter Sommer, Michael Hitchens:
Cross-Domain Attribute Conversion for Authentication and Authorization. 652-659 - Mamadou H. Diallo, Michael August, Roger Hallman, Megan Kline, Henry Au, Vic Beach:
Nomad: A Framework for Developing Mission-Critical Cloud-Based Applications. 660-669 - Bernd Jäger, Reiner Kraft, Sebastian Luhn, Annika Selzer, Ulrich Waldmann:
The Measurement of Data Locations in the Cloud. 670-675 - Yacine Hebbal, Sylvie Laniepce, Jean-Marc Menaud:
Virtual Machine Introspection: Techniques and Applications. 676-685
The First International Workshop on Future Scenarios for Cyber Crime and Cyber Terrorism: FCCT 2015
- Michal Choras, Rafal Kozik, Maria Pilar Torres Bruna, Artsiom Yautsiukhin, Andrew Churchill, Iwona Maciejewska, Irene Eguinoa, Adel Jomni:
Comprehensive Approach to Increase Cyber Security and Resilience. 686-692 - Max Kilger:
Integrating Human Behavior Into the Development of Future Cyberterrorism Scenarios. 693-700 - Jart Armin, Bryn Thompson, Davide Ariu, Giorgio Giacinto, Fabio Roli, Piotr Kijewski:
2020 Cybercrime Economic Costs: No Measure No Solution. 701-710 - Jart Armin, Paolo Foti, Marco Cremonini:
0-Day Vulnerabilities and Cybercrime. 711-718 - Davide Ariu, Luca Didaci, Giorgio Fumera, Enrico Frumento, Federica Freschi, Giorgio Giacinto, Fabio Roli:
Yet Another Cybersecurity Roadmapping Methodology. 719-726
The First International Workshop on Security Testing and Monitoring: STAM 2015
STAM I: Security Testing and Monitoring Solutions
- Jorge López, Stéphane Maag, Gerardo Morales:
TEAR: A Multi-purpose Formal Language Specification for TEsting at Runtime. 727-734 - Mohamed H. E. Aouadi, Khalifa Toumi, Ana R. Cavalli:
An Active Testing Tool for Security Testing of Distributed Systems. 735-740
STAM II: Security in Virtualized and Cloud Environments
- Bertrand Mathieu, Guillaume Doyen, Wissam Mallouli, Thomas Silverston, Olivier Bettan, François-Xavier Aguessy, Thibault Cholez, Abdelkader Lahmadi, Patrick Truong, Edgardo Montes de Oca:
Monitoring and Securing New Functions Deployed in a Virtualized Networking Environment. 741-748 - Valentina Casola, Alessandra De Benedictis, Massimiliano Rak:
Security Monitoring in the Cloud: An SLA-Based Approach. 749-755
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.