ICT Systems Security and Privacy Protection Marko Hölbl, Kai Rannenberg, Tatjana Welzer |
Front Matter |
Channel Attacks
|
Leaky Controller: Cross-VM Memory Controller Covert Channel on Multi-core Systems Benjamin Semal, Konstantinos Markantonakis, Raja Akram, Jan Kalbantner |
3-16 |
Evaluation of Statistical Tests for Detecting Storage-Based Covert Channels Thomas Sattolo, Jason Jaskolka |
17-31 |
IE-Cache: Counteracting Eviction-Based Cache Side-Channel Attacks Through Indirect Eviction Muhammad Mukhtar, Muhammad Bhatti, Guy Gogniat |
32-45 |
Connection Security
|
Refined Detection of SSH Brute-Force Attackers Using Machine Learning Karel Hynek, Tomáš Beneš, Tomáš Čejka, Hana Kubátová |
49-63 |
MultiTLS: Secure Communication Channels with Cipher Suite Diversity Ricardo Moura, David Matos, Miguel Pardal, Miguel Correia |
64-77 |
Improving Big Data Clustering for Jamming Detection in Smart Mobility Hind Bangui, Mouzhi Ge, Barbora Buhnova |
78-91 |
Human Aspects of Security and Privacy
|
Assisting Users to Create Stronger Passwords Using ContextBased MicroTraining Joakim Kävrestad, Marcus Nohlberg |
95-108 |
Facilitating Privacy Attitudes and Behaviors with Affective Visual Design Agnieszka Kitkowska, Yefim Shulman, Leonardo Martucci, Erik Wästlund |
109-123 |
Privacy CURE: Consent Comprehension Made Easy Olha Drozd, Sabrina Kirrane |
124-139 |
Detecting Malware and Software Weaknesses
|
JavaScript Malware Detection Using Locality Sensitive Hashing Stefan Peiser, Ludwig Friborg, Riccardo Scandariato |
143-154 |
RouAlign: Cross-Version Function Alignment and Routine Recovery with Graphlet Edge Embedding Can Yang, Jian Liu, Mengxia Luo, Xiaorui Gong, Baoxu Liu |
155-170 |
Code Between the Lines: Semantic Analysis of Android Applications Johannes Feichtner, Stefan Gruber |
171-186 |
System Security
|
IMShell-Dec: Pay More Attention to External Links in PowerShell Ruidong Han, Chao Yang, Jianfeng Ma, Siqi Ma, Yunbo Wang, Feng Li |
189-202 |
Secure Attestation of Virtualized Environments Michael Eckel, Andreas Fuchs, Jürgen Repp, Markus Springer |
203-216 |
Network Security and Privacy
|
Security and Performance Implications of BGP Rerouting-Resistant Guard Selection Algorithms for Tor Asya Mitseva, Marharyta Aleksandrova, Thomas Engel, Andriy Panchenko |
219-233 |
Actively Probing Routes for Tor AS-Level Adversaries with RIPE Atlas Wilfried Mayer, Georg Merzdovnik, Edgar Weippl |
234-247 |
Zeek-Osquery: Host-Network Correlation for Advanced Monitoring and Intrusion Detection Steffen Haas, Robin Sommer, Mathias Fischer |
248-262 |
Access Control and Authentication
|
Revisiting Security Vulnerabilities in Commercial Password Managers Michael Carr, Siamak Shahandashti |
265-279 |
Evaluation of Risk-Based Re-Authentication Methods Stephan Wiefling, Tanvi Patil, Markus Dürmuth, Luigi Lo iacono |
280-294 |
Fuzzy Vault for Behavioral Authentication System Md Islam, Reihaneh Safavi-Naini |
295-310 |
Crypto Currencies
|
Improvements of the Balance Discovery Attack on Lightning Network Payment Channels Gijs Dam, Rabiah Kadir, Puteri Nohuddin, Halimah Zaman |
313-323 |
CCBRSN: A System with High Embedding Capacity for Covert Communication in Bitcoin Weizheng Wang, Chunhua Su |
324-337 |
Privacy-Friendly Monero Transaction Signing on a Hardware Wallet Dusan Klinec, Vashek Matyas |
338-351 |
Privacy and Security Management
|
A Matter of Life and Death: Analyzing the Security of Healthcare Networks Guillaume Dupont, Daniel Santos, Elisa Costante, Jerry Hartog, Sandro Etalle |
355-369 |
Establishing a Strong Baseline for Privacy Policy Classification Najmeh Mousavi Nejad, Pablo Jabat, Rostislav Nedelchev, Simon Scerri, Damien Graux |
370-383 |
Cross-Platform File System Activity Monitoring and Forensics – A Semantic Approach Kabul Kurniawan, Andreas Ekelhart, Fajar Ekaputra, Elmar Kiesling |
384-397 |
Machine Learning and Security
|
A Correlation-Preserving Fingerprinting Technique for Categorical Data in Relational Databases Tanja Sarcevic, Rudolf Mayer |
401-415 |
FDFtNet: Facing Off Fake Images Using Fake Detection Fine-Tuning Network Hyeonseong Jeon, Youngoh Bang, Simon Woo |
416-430 |
Escaping Backdoor Attack Detection of Deep Learning Yayuan Xiong, Fengyuan Xu, Sheng Zhong, Qun Li |
431-445 |