default search action
3rd ICISSP 2017: Porto, Portugal
- Paolo Mori, Steven Furnell, Olivier Camp:
Proceedings of the 3rd International Conference on Information Systems Security and Privacy, ICISSP 2017, Porto, Portugal, February 19-21, 2017. SciTePress 2017, ISBN 978-989-758-209-7
Invited Speakers
Keynote Speakers
- Elisa Bertino:
Security and Privacy in the IoT. ICISSP 2017: 5 - Nancy Cam-Winget:
Sensor Networks as the new Attack Target. ICISSP 2017: 7 - Bart Preneel:
The Future of Information Security. ICISSP 2017: 9
Papers
Full Papers
- Abdul A. Orunsolu, Adesina S. Sodiya:
An Anti-Phishing Kit Scheme for Secure Web Transactions. 15-24 - Vincent Haupert, Tilo Müller:
Rest in Protection - A Kernel-level Approach to Mitigate RIP Tampering. 25-37 - Günther Eibl, Cornelia Ferner, Tobias Hildebrandt, Florian Stertz, Sebastian Burkhart, Stefanie Rinderle-Ma, Dominik Engel:
Exploration of the Potential of Process Mining for Intrusion Detection in Smart Metering. 38-46 - Elena Reshetova, Filippo Bonazzi, N. Asokan:
SELint: An SEAndroid Policy Analysis Tool. 47-58 - Eyvind Garder B. Gjertsen, Erlend Andreas Gjære, Maria Bartnes, Waldo Rocha Flores:
Gamification of Information Security Awareness and Training. 59-70 - Go Ohtake, Reihaneh Safavi-Naini, Liang Feng Zhang:
Outsourcing Scheme of ABE Encryption Secure against Malicious Adversary. 71-82 - Tal Hadad, Bronislav Sidik, Nir Ofek, Rami Puzis, Lior Rokach:
User Feedback Analysis for Mobile Malware Detection. 83-94 - Iman Sedeeq, Frans Coenen, Alexei Lisitsa:
Attribute Permutation Steganography Detection using Attribute Position Changes Count. 95-100 - Nada Alruhaily, Behzad Bordbar, Tom Chothia:
Towards an Understanding of the Misclassification Rates of Machine Learning-based Malware Detection Systems. 101-112 - Marc Hüffmeyer, Pascal Hirmer, Bernhard Mitschang, Ulf Schreier, Matthias Wieland:
SitAC - A System for Situation-aware Access Control - Controlling Access to Sensor Data. 113-125 - Wei-Han Lee, Changchang Liu, Shouling Ji, Prateek Mittal, Ruby B. Lee:
Quantification of De-anonymization Risks in Social Networks. 126-135 - Loukmen Regainia, Sébastien Salva:
A Methodology of Security Pattern Classification and of Attack-Defense Tree Generation. 136-146 - Alberto Magno Muniz Soares, Rafael Timóteo de Sousa Jr.:
A Technique for Extraction and Analysis of Application Heap Objects within Android Runtime (ART). 147-156 - Razvan Beuran, Cuong Pham, Dat Tang, Ken-ichi Chinen, Yasuo Tan, Yoichi Shinoda:
CyTrONE: An Integrated Cybersecurity Training Framework. 157-166 - Gianpiero Costantino, Fabio Martinelli, Ilaria Matteucci, Marinella Petrocchi:
Analysis of Data Sharing Agreements. 167-178 - Zeineb Zhioua, Yves Roudier, Rabéa Ameur-Boulifa, Takoua Kechiche, Stuart Short:
Tracking Dependent Information Flows. 179-189 - Mortaza S. Bargh, Marco Vink, Sunil Choenni:
On Usage Control in Relational Database Management Systems - Obligations and Their Enforcement in Joining Datasets. 190-201 - Ahmad Ahmadi, Reihaneh Safavi-Naini:
Distance-bounding Identification. 202-212 - Jean-Louis Huynen, Gabriele Lenzini:
From Situation Awareness to Action: An Information Security Management Toolkit for Socio-technical Security Retrospective and Prospective Analysis. 213-224 - Linus Karlsson, Martin Hell, Paul Stankovski:
Improved Greedy Nonrandomness Detectors for Stream Ciphers. 225-232 - Lake Bu, Mark G. Karpovsky:
A Design of Secure and ReliableWireless Transmission Channel for Implantable Medical Devices. 233-242
Short Papers
- Michael Kiperberg, Amit Resh, Asaf Algawi, Nezer Jacob Zaidenberg:
System for Executing Encrypted Java Programs. 245-252 - Arash Habibi Lashkari, Gerard Draper-Gil, Mohammad Saiful Islam Mamun, Ali A. Ghorbani:
Characterization of Tor Traffic using Time based Features. 253-262 - Kazuhide Fukushima, Seira Hidano, Shinsaku Kiyomoto:
White-box Implementation of Stream Cipher. 263-269 - Michael Sonntag, René Mayrhofer:
Traffic Statistics of a High-Bandwidth Tor Exit Node. 270-277 - Efthimios Alepis, Constantinos Patsakis:
There's Wally! Location Tracking in Android without Permissions. 278-284 - Andrei Lutas, Daniel Ticle, Octavian Cret:
Hypervisor based Memory Introspection: Challenges, Problems and Limitations. 285-294 - Sergio de los Santos, José Torres:
Macro Malware Detection using Machine Learning Techniques - A New Approach. 295-302 - Stephan Krenn, Thomas Lorünser, Christoph Striecks:
Batch-verifiable Secret Sharing with Unconditional Privacy. 303-311 - Ian Herwono, Fadi Ali El-Moussa:
A Collaborative Tool for Modelling Multi-stage Attacks. 312-317 - Henrik Karlzén, Johan E. Bengtsson, Jonas Hallberg:
Assessing Information Security Risks using Pairwise Weighting. 318-324 - Kalpana Singh, Renaud Sirdey, François Artiguenave, David Cohen, Sergiu Carpov:
Towards Confidentiality-strengthened Personalized Genomic Medicine Embedding Homomorphic Cryptography. 325-333 - Timea Pahi, Maria Leitner, Florian Skopik:
Analysis and Assessment of Situational Awareness Models for National Cyber Security Centers. 334-345 - Julian Rauchberger, Robert Luh, Sebastian Schrittwieser:
Longkit - A Universal Framework for BIOS/UEFI Rootkits in System Management Mode. 346-353 - Julien Hatin, Estelle Cherrier, Jean-Jacques Schwartzmann, Christophe Rosenberger:
Privacy Preserving Transparent Mobile Authentication. 354-361 - Hilder V. L. Pereira, Diego F. Aranha:
Non-interactive Privacy-preserving k-NN Classifier. 362-371 - Jörg Kippe, Steffen Pfrang:
Network and Topology Models to Support IDS Event Processing. 372-379 - Shahrooz Pooryousef, Morteza Amini:
Enhancing Accuracy of Android Malware Detection using Intent Instrumentation. 380-388 - Ahmed Seid Yesuf:
A Review of Risk Identification Approaches in the Telecommunication Domain. 389-396 - Robert Luh, Sebastian Schrittwieser, Stefan Marschalek, Helge Janicke:
Design of an Anomaly-based Threat Detection & Explication System. 397-402 - Benoît Vibert, Jean-Marie Le Bars, Christophe Rosenberger, Christophe Charrier:
Fingerprint Class Recognition for Securing EMV Transaction. 403-410 - Motlatsi i Isaac Thulo, Jan H. P. Eloff:
Towards Optimized Security-aware (O-Sec) VM Placement Algorithms. 411-422 - Damien Ligier, Sergiu Carpov, Caroline Fontaine, Renaud Sirdey:
Privacy Preserving Data Classification using Inner-product Functional Encryption. 423-430 - Vittoria Cozza, Zisis Tsiatsikas, Mauro Conti, Georgios Kambourakis:
Why Snoopy Loves Online Services: An Analysis of (Lack of) Privacy in Online Services. 431-438 - Cristina-Loredana Duta, Laura Gheorghe, Nicolae Tapus:
Real-time DSP Implementations of Voice Encryption Algorithms. 439-446 - Gautam Kumar, Brent Lagesse:
Limited Use Cryptographic Tokens in Securing Ephemeral Cloud Servers. 447-454 - Khanh-Huu-The Dam, Tayssir Touili:
Malware Detection based on Graph Classification. 455-463 - Tanvi Vyas, Andrea Marchesini, Christoph Kerschbaumer:
Extending the Same Origin Policy with Origin Attributes. 464-473 - Arthur Costa Lopes, Diego F. Aranha:
Platform-agnostic Low-intrusion Optical Data Exfiltration. 474-480 - Mark Vella, Rachel Cilia:
Memory Forensics of Insecure Android Inter-app Communications. 481-486 - Aniello Cimitile, Fabio Martinelli, Francesco Mercaldo:
Machine Learning Meets iOS Malware: Identifying Malicious Applications on Apple Environment. 487-492 - Carlos Moreno, Sebastian Fischmeister:
On the Security of Safety-critical Embedded Systems: Who Watches the Watchers? Who Reprograms the Watchers?. 493-498 - Robert Riemann, Stéphane Grumbach:
Distributed Protocols at the Rescue for Trustworthy Online Voting. 499-505 - Mashael Aldayel, Mohammad Alhussain:
Enhanced Identification of Sensitive User Inputs in Mobile Applications. 506-515 - Krishna Chaitanya Telikicherla, Akash Agrawall, Venkatesh Choppella:
A Formal Model of Web Security Showing Malicious Cross Origin Requests and Its Mitigation using CORP. 516-523 - Cihangir Tezcan:
Brute Force Cryptanalysis of MIFARE Classic Cards on GPU. 524-528 - Razgar Ebrahimy, Zoya Pourmirza:
Cyber-interdependency in Smart Energy Systems. 529-537 - Sylvestre Uwizeyemungu, Placide Poba-Nzaou:
Health Information Exchange and Related IT-security Practices in European Hospitals. 538-545 - Matthew Peacock, Michael N. Johnstone, Craig Valli:
Security Issues with BACnet Value Handling. 546-552 - Mohammad Hamad, Vassilis Prevelakis:
Secure APIs for Applications in Microkernel-based Systems. 553-558 - Nicolas T. Courtois, Rebekah Mercer:
Stealth Address and Key Management Techniques in Blockchain Systems. 559-566 - Luca Vollero, Daniele Biondo, Roberto Setola, Gianluca Bocci, Rocco Mammoliti, Alessandra Toma:
Improving the Automatic Identification of Malicious Android Apps in Unofficial Stores through Logo Analysis. 567-572 - Estée van der Walt, Jan H. P. Eloff:
Identity Deception Detection on Social Media Platforms. 573-578 - V. Gayoso Martínez, Luis Hernández Encinas, Agustín Martín Muñoz, J. Zhang:
Breaking a Hitag2 Protocol with Low Cost Technology. 579-584 - Aida Omerovic, Marit Kjøsnes Natvig, Isabelle C. R. Tardy:
Towards a Privacy Scorecard - Initial Design Exemplified on an Intelligent Transport Systems Service. 585-593
1st International Workshop on FORmal methods for Security Engineering
Full Papers
- Michel Dubois, Eric Filiol:
Hacking of the AES with Boolean Functions. 599-609 - Paul Irolla, Eric Filiol:
Glassbox: Dynamic Analysis Platform for Malware Android Applications on Real Devices. 610-621 - Arnaud Bannier, Eric Filiol:
Mathematical Backdoors in Symmetric Encryption Systems - Proposal for a Backdoored AES-like Block Cipher. 622-631 - Robert Luh, Gregor Schramm, Markus Wagner, Sebastian Schrittwieser:
Sequitur-based Inference and Analysis Framework for Malicious System Behavior. 632-643 - Mario Giovanni C. A. Cimino, Gigliola Vaglini:
Localization and Inhibition of Malicious Behaviors through a Model Checking based Methodology. ICISSP 2017: 644-652 - Ankita Kapratwar, Fabio Di Troia, Mark Stamp:
Static and Dynamic Analysis of Android Malware. 653-662 - Vittoria Nardone, Corrado Aaron Visaggio:
"Mirror, Mirror on the Wall, Who is the Fairest One of All?" - Machine Learning versus Model Checking: A Comparison between Two Static Techniques for Malware Family Identification. 663-672 - Fabio Martinelli, Francesco Mercaldo, Vittoria Nardone, Antonella Santone, Corrado Aaron Visaggio:
Identifying Mobile Repackaged Applications through Formal Methods. 673-682 - Steffen Pfrang, David Meier:
On the Detection of Replay Attacks in Industrial Automation Networks Operated with Profinet IO. 683-693 - Wietze J. B. Beukema, Thomas Attema, Harm A. Schotanus:
Internal Network Monitoring and Anomaly Detection through Host Clustering. 694-703 - Cinzia Bernardeschi, Marco Di Natale, Gianluca Dini, Maurizio Palmieri:
Verifying Data Secure Flow in AUTOSAR Models by Static Analysis. 704-713 - Khanh-Huu-The Dam, Tayssir Touili:
Extracting Android Malicious Behaviors. 714-723
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.