index - Archive ouverte HAL Access content directly

Full Text Documents

Chargement de la page


Chargement de la page

Table of Contents
ICT Systems Security and Privacy Protection
Audun Jøsang, Lynn Futcher, Janne Hagen
Front Matter

Digital Signatures

XML Signature Wrapping Still Considered Harmful: A Case Study on the Personal Health Record in Germany
Paul Höller, Alexander Krumeich, Luigi Lo Iacono
Trust Me If You Can: Trusted Transformation Between (JSON) Schemas to Support Global Authentication of Education Credentials
Stefan More, Peter Grassberger, Felix Hörandner, Andreas Abraham, Lukas Daniel Klausner
SIUV: A Smart Car Identity Management and Usage Control System Based on Verifiable Credentials
Ali Hariri, Subhajit Bandopadhyay, Athanasios Rizos, Theo Dimitrakos, Bruno Crispo, Muttukrishnan Rajarajan

Vulnerability Management

A Performance Assessment of Free-to-Use Vulnerability Scanners - Revisited
Ricardo Araújo, António Pinto, Pedro Pinto
QuickBCC: Quick and Scalable Binary Vulnerable Code Clone Detection
Hajin Jang, Kyeongseok Yang, Geonwoo Lee, Yoonjong Na, Jeremy D. Seideman, Shoufu Luo, Heejo Lee, Sven Dietrich
Automatic Inference of Taint Sources to Discover Vulnerabilities in SOHO Router Firmware
Kai Cheng, Dongliang Fang, Chuan Qin, Huizhao Wang, Yaowen Zheng, Nan Yu, Limin Sun

Covert Channels and Cryptography

ESQABE: Predicting Encrypted Search Queries
Isaac Meers, Mariano Di Martino, Peter Quax, Wim Lamotte
Reconnection-Based Covert Channels in Wireless Networks
Sebastian Zillien, Steffen Wendzel
Minecraft Altered Skin Channel (MASC)
Sam Abrams, Brandon Keller, Kenneth Nero, Gino Placella, Daryl Johnson
Lattice-Based Weak Curve Fault Attack on ECDSA
Weiqiong Cao, Hongsong Shi, Hua Chen, Wei Wei, Jiazhe Chen

Application and System Security

HyperSec: Visual Analytics for Blockchain Security Monitoring
Benedikt Putz, Fabian Böhm, Günther Pernul
100 Popular Open-Source Infosec Tools
Rauli Kaksonen, Tommi Järvenpää, Jukka Pajukangas, Mihai Mahalean, Juha Röning
RootAsRole: Towards a Secure Alternative to sudo/su Commands for Home Users and SME Administrators
Ahmad Samer Wazan, David Chadwick, Remi Venant, Romain Laborde, Abdelmalek Benzekri


Accept All: The Landscape of Cookie Banners in Greece and the UK
Georgios Kampanos, Siamak F. Shahandashti
The AppChk Crowd-Sourcing Platform: Which Third Parties are iOS Apps Talking To?
Oleg Geier, Dominik Herrmann
Compiling Personal Data and Subject Categories from App Data Models
Christian Burkert, Maximilian Blochberger, Hannes Federrath
Privacy Concerns Go Hand in Hand with Lack of Knowledge: The Case of the German Corona-Warn-App
Sebastian Pape, David Harborth, Jacob Leon Kröger
Perceived Privacy Problems Within Digital Contact Tracing: A Study Among Swedish Citizens
Ali Padyab, Joakim Kävrestad

Network Security

Secure and Scalable IoT: An IoT Network Platform Based on Network Overlay and MAC Security
Junwon Lee, Heejo Lee
Enriching DNS Flows with Host-Based Events to Bypass Future Protocol Encryption
Stanislav Špaček, Daniel Tovarňák, Pavel Čeleda
Advanced Cowrie Configuration to Increase Honeypot Deceptiveness
Warren Z. Cabral, Craig Valli, Leslie F. Sikos, Samuel G. Wakeling
Less is Often More: Header Whitelisting as Semantic Gap Mitigation in HTTP-Based Software Systems
Andre Büttner, Hoai Viet Nguyen, Nils Gruschka, Luigi Lo Iacono

Machine Learning for Security

TAR: Generalized Forensic Framework to Detect Deepfakes Using Weakly Supervised Learning
Sangyup Lee, Shahroz Tariq, Junyaup Kim, Simon S. Woo
Anomaly Detection for Insider Threats: An Objective Comparison of Machine Learning Models and Ensembles
Filip Wieslaw Bartoszewski, Mike Just, Michael A. Lones, Oleksii Mandrychenko
Revitalizing Self-Organizing Map: Anomaly Detection Using Forecasting Error Patterns
Young Geun Kim, Jeong-Han Yun, Siho Han, Hyoung Chun Kim, Simon S. Woo

Security Management

What Is Lurking in Your Backups?
Ben Lenard, Alexander Rasin, Nick Scope, James Wagner
How Do Users Chain Email Accounts Together?
Lydia Kraus, Mária S̆vidron̆ová, Elizabeth Stobert
Tensions that Hinder the Implementation of Digital Security Governance
Stef Schinagl, Svetlana Khapova, Abbas Shahim



Designed by Inria-IES Team :    Hosted by HAL :