default search action
38th SP 2017: San Jose, CA, USA - Workshops
- 2017 IEEE Security and Privacy Workshops, SP Workshops 2017, San Jose, CA, USA, May 25, 2017. IEEE Computer Society 2017, ISBN 978-1-5386-1968-1
BioStar: Workshop on Bio-inspired Security, Trust, Assurance and Resilience
- Hisham Salah, Mohamed Eltoweissy:
On the Personalization of Trust Management. 1-10 - Konstantin Böttinger:
Guiding a Colony of Black-Box Fuzzers with Chemotaxis. 11-16 - Jörg Keller, Gabriele Spenger, Steffen Wendzel:
Ant Colony-Inspired Parallel Algorithm to Improve Cryptographic Pseudo Random Number Generators. 17-22 - Ruidan Li, Errin W. Fulp:
Evolutionary Approaches for Resilient Surveillance Management. 23-28 - Steffen Wendzel, Wojciech Mazurczyk, Georg Haas:
Don't You Touch My Nuts: Information Hiding in Cyber Physical Systems. 29-34 - Errin W. Fulp, H. Donald Gage, Matthew R. McNiece:
Using Evolutionary Diversity to Identify Problematic Software Parameters. 35-40 - Brian M. Powell, Ekampreet Kalsy, Gaurav Goswami, Mayank Vatsa, Richa Singh, Afzel Noore:
Attack-Resistant aiCAPTCHA Using a Negative Selection Artificial Immune System. 41-46 - Jamison Rose, Yudong Liu, Ahmed Awad:
Biometric Authentication Using Mouse and Eye Movement Data. 47-55 - Ankur Chattopadhyay, Michael J. Schulz, Clinton Rettler, Katie Turkiewicz, Laleah Fernandez, Askar Ziganshin:
Towards a Biometric Authentication-Based Hybrid Trust-Computing Approach for Verification of Provider Profiles in Online Healthcare Information. 56-65
LangSec: Fourth Workshop on Language Theoretic Security
- Stefan Lucks, Norina Marie Grosch, Joshua Konig:
Taming the Length Field in Binary Data: Calc-Regular Languages. 66-79 - Pierre Chifflier, Geoffroy Couprie:
Writing Parsers Like it is 2017. 80-92 - Tobias Bieschke, Lars Hermerschmidt, Bernhard Rumpe, Peter Stanchev:
Eliminating Input-Based Attacks by Deriving Automated Encoders and Decoders from Context-Free Grammars. 93-101 - Yi Lu, Sora Bae, Padmanabhan Krishnan, K. R. Raghavendra:
Inference of Security-Sensitive Entities in Libraries. 102-109 - Kit Sum Tse, Peter C. Johnson:
A Framework for Validating Session Protocols. 110-119 - Prashant Anantharaman, Michael E. Locasto, Gabriela F. Ciocarlie, Ulf Lindqvist:
Building Hardened Internet-of-Things Clients with Language-Theoretic Security. 120-126 - Jacob I. Torrey, Mark P. Bridgman, Tomasz Tuzel:
Research Report: Hardware-Enforcement of Walther-Recursive Program Functions. 127-131 - Andrei Costin:
Lua Code: Security Overview and Practical Approaches to Static Analysis. 132-142 - Aniqua Z. Baset, Tamara Denning:
IDE Plugins for Detecting Input-Validation Vulnerabilities. 143-146
MoST: Mobile Security Technologies
- Phu H. Phung, Abhinav Mohanty, Rahul Rachapalli, Meera Sridhar:
HybridGuard: A Principal-Based Permission and Fine-Grained Policy Enforcement Framework for Web-Based Mobile Applications. 147-156 - Julian Sexton, Andrey Chudnov, David A. Naumann:
Spartan Jester: End-to-End Information Flow Control for Hybrid Android Applications. 157-162 - Michael Backes, Sven Bugiel, Philipp von Styp-Rekowsky, Marvin WiBfeld:
Seamless In-App Ad Blocking on Stock Android. 163-168 - Piers O'Hanlon, Ravishankar Borgaonkar, Lucca Hirschi:
Mobile Subscriber WiFi Privacy. 169-178 - Carlton Shepherd, Iakovos Gurulian, Eibe Frank, Konstantinos Markantonakis, Raja Naeem Akram, Emmanouil Panaousis, Keith Mayes:
The Applicability of Ambient Sensors as Proximity Evidence for NFC Transactions. 179-188 - Fang Liu, Haipeng Cai, Gang Wang, Danfeng Yao, Karim O. Elish, Barbara G. Ryder:
MR-Droid: A Scalable and Prioritized Analysis of Inter-App Communication Risks. 189-198
WTMC: Second Workshop on Traffic Measurements for Cybersecurity
- Oliver Gasser, Quirin Scheitle, Carl Denis, Nadja Schricker, Georg Carle:
Security Implications of Publicly Reachable Building Automation Systems. 199-204 - Paul Prasse, Lukás Machlica, Tomás Pevný, Jirí Havelka, Tobias Scheffer:
Malware Detection by Analysing Network Traffic with Neural Networks. 205-210 - Kinan Dak Albab, Rawane Issa, Andrei Lapets, Azer Bestavros, Nikolaj Volgushev:
Scalable Secure Multi-party Network Vulnerability Analysis via Symbolic Optimization. 211-216 - Stefan Prandl, Mihai M. Lazarescu, Duc-Son Pham, Sieteng Soh, Subhash C. Kak:
An Investigation of Power Law Probability Distributions for Network Anomaly Detection. 217-222 - Aonan Zhai, Fei Xu, Zigang Cao, Haiqing Pan, Zhen Li, Gang Xiong:
Real Time Network File Similarity Detection Based on Approximate Matching. 223-228 - Aarthi Reddy, Meredith Ordway-West, Melissa Lee, Matt Dugan, Joshua Whitney, Ronen Kahana, Brad Ford, Johan Muedsam, Austin Henslee, Max Rao:
Using Gaussian Mixture Models to Detect Outliers in Seasonal Univariate Network Traffic. 229-234 - Khalid Shahbar, Nur Zincir-Heywood:
Effects of Shared Bandwidth on Anonymity of the I2P Network Users. 235-240 - José Camacho, Pedro Garcia-Teodoro, Gabriel Maciá-Fernández:
Traffic Monitoring and Diagnosis with Multivariate Statistical Network Monitoring: A Case Study. 241-246 - Jeroen van der Ham:
Ethics and Internet Measurements. 247-251
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.