index - ICT Systems Security and Privacy Protection
   


Full Text Documents

29

Search


ICT Systems Security and Privacy Protection
Marko Hölbl, Kai Rannenberg, Tatjana Welzer
Front Matter

Channel Attacks


Leaky Controller: Cross-VM Memory Controller Covert Channel on Multi-core Systems
Benjamin Semal, Konstantinos Markantonakis, Raja Akram, Jan Kalbantner
3-16
Evaluation of Statistical Tests for Detecting Storage-Based Covert Channels
Thomas Sattolo, Jason Jaskolka
17-31
IE-Cache: Counteracting Eviction-Based Cache Side-Channel Attacks Through Indirect Eviction
Muhammad Mukhtar, Muhammad Bhatti, Guy Gogniat
32-45

Connection Security


Refined Detection of SSH Brute-Force Attackers Using Machine Learning
Karel Hynek, Tomáš Beneš, Tomáš Čejka, Hana Kubátová
49-63
MultiTLS: Secure Communication Channels with Cipher Suite Diversity
Ricardo Moura, David Matos, Miguel Pardal, Miguel Correia
64-77
Improving Big Data Clustering for Jamming Detection in Smart Mobility
Hind Bangui, Mouzhi Ge, Barbora Buhnova
78-91

Human Aspects of Security and Privacy


Assisting Users to Create Stronger Passwords Using ContextBased MicroTraining
Joakim Kävrestad, Marcus Nohlberg
95-108
Facilitating Privacy Attitudes and Behaviors with Affective Visual Design
Agnieszka Kitkowska, Yefim Shulman, Leonardo Martucci, Erik Wästlund
109-123
Privacy CURE: Consent Comprehension Made Easy
Olha Drozd, Sabrina Kirrane
124-139

Detecting Malware and Software Weaknesses


JavaScript Malware Detection Using Locality Sensitive Hashing
Stefan Peiser, Ludwig Friborg, Riccardo Scandariato
143-154
RouAlign: Cross-Version Function Alignment and Routine Recovery with Graphlet Edge Embedding
Can Yang, Jian Liu, Mengxia Luo, Xiaorui Gong, Baoxu Liu
155-170
Code Between the Lines: Semantic Analysis of Android Applications
Johannes Feichtner, Stefan Gruber
171-186

System Security


IMShell-Dec: Pay More Attention to External Links in PowerShell
Ruidong Han, Chao Yang, Jianfeng Ma, Siqi Ma, Yunbo Wang, Feng Li
189-202
Secure Attestation of Virtualized Environments
Michael Eckel, Andreas Fuchs, Jürgen Repp, Markus Springer
203-216

Network Security and Privacy


Security and Performance Implications of BGP Rerouting-Resistant Guard Selection Algorithms for Tor
Asya Mitseva, Marharyta Aleksandrova, Thomas Engel, Andriy Panchenko
219-233
Actively Probing Routes for Tor AS-Level Adversaries with RIPE Atlas
Wilfried Mayer, Georg Merzdovnik, Edgar Weippl
234-247
Zeek-Osquery: Host-Network Correlation for Advanced Monitoring and Intrusion Detection
Steffen Haas, Robin Sommer, Mathias Fischer
248-262

Access Control and Authentication


Revisiting Security Vulnerabilities in Commercial Password Managers
Michael Carr, Siamak Shahandashti
265-279
Evaluation of Risk-Based Re-Authentication Methods
Stephan Wiefling, Tanvi Patil, Markus Dürmuth, Luigi Lo iacono
280-294
Fuzzy Vault for Behavioral Authentication System
Md Islam, Reihaneh Safavi-Naini
295-310

Crypto Currencies


Improvements of the Balance Discovery Attack on Lightning Network Payment Channels
Gijs Dam, Rabiah Kadir, Puteri Nohuddin, Halimah Zaman
313-323
CCBRSN: A System with High Embedding Capacity for Covert Communication in Bitcoin
Weizheng Wang, Chunhua Su
324-337
Privacy-Friendly Monero Transaction Signing on a Hardware Wallet
Dusan Klinec, Vashek Matyas
338-351

Privacy and Security Management


A Matter of Life and Death: Analyzing the Security of Healthcare Networks
Guillaume Dupont, Daniel Santos, Elisa Costante, Jerry Hartog, Sandro Etalle
355-369
Establishing a Strong Baseline for Privacy Policy Classification
Najmeh Mousavi Nejad, Pablo Jabat, Rostislav Nedelchev, Simon Scerri, Damien Graux
370-383
Cross-Platform File System Activity Monitoring and Forensics – A Semantic Approach
Kabul Kurniawan, Andreas Ekelhart, Fajar Ekaputra, Elmar Kiesling
384-397

Machine Learning and Security


A Correlation-Preserving Fingerprinting Technique for Categorical Data in Relational Databases
Tanja Sarcevic, Rudolf Mayer
401-415
FDFtNet: Facing Off Fake Images Using Fake Detection Fine-Tuning Network
Hyeonseong Jeon, Youngoh Bang, Simon Woo
416-430
Escaping Backdoor Attack Detection of Deep Learning
Yayuan Xiong, Fengyuan Xu, Sheng Zhong, Qun Li
431-445

 


Designed by Inria-IES Team : http://hal.inria.fr/    Hosted by HAL : http://hal.archives-ouvertes.fr/