


default search action
8. ARES 2013: Regensburg, Germany
- 2013 International Conference on Availability, Reliability and Security, ARES 2013, Regensburg, Germany, September 2-6, 2013. IEEE Computer Society 2013, ISBN 978-0-7695-5008-4

ARES Full Papers
Best Paper Session
- Andrea Micheloni, Karl-Peter Fuchs, Dominik Herrmann, Hannes Federrath:

Laribus: Privacy-Preserving Detection of Fake SSL Certificates with a Social P2P Notary Network. 1-10 - Thanh-Trung Pham, Xavier Défago

:
Reliability Prediction for Component-Based Software Systems with Architectural-Level Fault Tolerance Mechanisms. 11-20 - Elias Bou-Harb

, Mourad Debbabi
, Chadi Assi:
A Statistical Approach for Fingerprinting Probing Activities. 21-30
Risk Management & Security Models
- Jostein Jensen, Åsmund Ahlmann Nyre:

Federated Identity Management and Usage Control - Obstacles to Industry Adoption. 31-41 - Benjamin Aziz

, Geoff W. Hamilton
:
Reputation-Controlled Business Process Workflows. 42-51 - Nada Essaouini, Frédéric Cuppens, Nora Cuppens-Boulahia, Anas Abou El Kalam

:
Conflict Management in Obligation with Deadline Policies. 52-61
Software Security
- Takanori Kobashi, Nobukazu Yoshioka

, Takao Okubo, Haruhiko Kaiya, Hironori Washizaki
, Yoshiaki Fukazawa:
Validating Security Design Patterns Application Using Model Testing. 62-71 - Jason L. Wright

, Jason W. Larsen, Miles McQueen:
Estimating Software Vulnerabilities: A Case Study Based on the Misclassification of Bugs in MySQL Server. 72-81 - Aaron Paulos, Partha P. Pal

, Richard E. Schantz, Brett Benyo
, David Johnson, Mike Hibler, Eric Eide
:
Isolation of Malicious External Inputs in a Security Focused Adaptive Execution Environment. 82-91 - Dan Fleck

, Arnur G. Tokhtabayev, Alex Alarif, Angelos Stavrou
, Tomas Nykodym:
PyTrigger: A System to Trigger & Extract User-Activated Malware Behavior. 92-101
Risk Planning & Threat Modeling
- Mike Surridge, Bassem I. Nasser, Xiaoyu Chen, Ajay Chakravarthy, Panos Melas:

Run-Time Risk Management in Adaptive ICT Systems. 102-110 - Kristian Beckers, Denis Hatebur, Maritta Heisel:

A Problem-Based Threat Analysis in Compliance with Common Criteria. 111-120 - Federica Paci

, M. Carmen Fernández Gago
, Francisco Moyano
:
Detecting Insider Threats: A Trust-Aware Framework. 121-130
Privacy
- Eric Chan-Tin, Jiyoung Shin, Jiangmin Yu:

Revisiting Circuit Clogging Attacks on Tor. 131-140 - Christian Richthammer, Michael Netter, Moritz Riesner, Günther Pernul:

Taxonomy for Social Network Data Types from the Viewpoint of Privacy and User Control. 141-150 - I. Goriac:

Measuring Anonymity with Plausibilistic Entropy. 151-160
Hardware & Network Security
- Johannes Götzfried, Tilo Müller:

ARMORED: CPU-Bound Encryption for Android-Driven ARM Devices. 161-168 - Thomas Korak, Thomas Plos, Andreas Zankl

:
Minimizing the Costs of Side-Channel Analysis Resistance Evaluations in Early Design Steps. 169-177 - Daniel Palomares, Daniel Migault, Wolfgang Velasquez, Maryline Laurent:

High Availability for IPsec VPN Platforms: ClusterIP Evaluation. 178-187
Cryptography & Security Models
- Hermann de Meer, Henrich Christopher Pöhls, Joachim Posegga, Kai Samelin:

Scope of Security Properties of Sanitizable Signatures Revisited. 188-197 - Jurlind Budurushi

, Stephan Neumann, Maina M. Olembo, Melanie Volkamer:
Pretty Understandable Democracy - A Secure and Understandable Internet Voting Scheme. 198-207 - Eckehard Hermann, Rüdiger Grimm:

The Common Limes Security Model for Asset Flow Control in Decentralized, Insecure Systems. 208-217
ARES Short Papers
Privacy & Network Security
- Debmalya Biswas, Imad Aad, Gian Paolo Perrucci:

Privacy Panel: Usable and Quantifiable Mobile Privacy. 218-223 - Zisis Tsiatsikas, Dimitris Geneiatakis, Georgios Kambourakis

, Angelos D. Keromytis:
A Privacy-Preserving Entropy-Driven Framework for Tracing DoS Attacks in VoIP. 224-229 - Mario Kirschbaum, Thomas Plos, Jörn-Marc Schmidt:

On Secure Multi-party Computation in Bandwidth-Limited Smart-Meter Systems. 230-235 - Amir Herzberg

, Haya Schulmann:
Limiting MitM to MitE Covert-Channels. 236-241
Threat Modeling & Intrusion Detection
- Enrico Sorio, Alberto Bartoli

, Eric Medvet
:
Detection of Hidden Fraudulent URLs within Trusted Sites Using Lexical Features. 242-247 - Nikos Virvilis, Dimitris Gritzalis:

The Big Four - What We Did Wrong in Advanced Persistent Threat Detection? 248-254 - Thomas Unger, Martin Mulazzani, Dominik Fruhwirt, Markus Huber, Sebastian Schrittwieser, Edgar R. Weippl:

SHPF: Enhancing HTTP(S) Session Security with Browser Fingerprinting. 255-261 - Maria Leitner

, Michelle Miller, Stefanie Rinderle-Ma
:
An Analysis and Evaluation of Security Aspects in the Business Process Model and Notation. 262-267
Authentication, Identity Management & Trust
- Gansen Zhao, Haiyu Wang, Chunming Rong

, Yong Tang:
Resource Pool Oriented Trust Management for Cloud Infrastructure. 268-273 - Lukasz Olejnik, Claude Castelluccia:

Towards Web-Based Biometric Systems Using Personal Browsing Interests. 274-280 - Mai H. El-Sherief, Marianne A. Azer

:
A Novel Proximity Based Trust Model for Opportunistic Networks. 281-284 - David W. Chadwick

, George Inman:
The Trusted Attribute Aggregation Service (TAAS) - Providing an Attribute Aggregation Layer for Federated Identity Management. 285-290
Mobile Security
- Steffen Bartsch, Bernhard J. Berger

, Michaela Bunke, Karsten Sohr
:
The Transitivity-of-Trust Problem in Android Application Interaction. 291-296 - Jaemin Park

, Kiyoung Baek, Cheoloh Kang:
Secure Profile Provisioning Architecture for Embedded UICC. 297-303 - Zeeshan Bilal, Keith Martin:

Ultra-lightweight Mutual Authentication Protocols: Weaknesses and Countermeasures. 304-309 - Aida Ben Chehida, Ryma Abassi, Sihem Guemara El Fatmi:

A Reputation-Based Clustering Mechanism for MANET Routing Security. 310-315
FARES 2013
Organizational Security Aspects (Special OSA Session)
- Jonathan Blangenois, Guy Guemkam, Christophe Feltus

, Djamel Khadraoui:
Organizational Security Architecture for Critical Infrastructure. 316-323 - Denisse Muñante

, Laurent Gallon, Philippe Aniorté:
An Approach Based on Model-Driven Engineering to Define Security Policies Using OrBAC. 324-332 - Marko Niemimaa, Jonna Järveläinen

:
IT Service Continuity: Achieving Embeddedness through Planning. 333-340
Software Security & Testing
- Henk Birkholz, Ingo Sieverdingbeck, Nicolai Kuntze, Carsten Rudolph

:
Enhancing Security Testing via Automated Replication of IT-Asset Topologies. 341-349 - Seiji Munetoh

, Nobukazu Yoshioka
:
Model-Assisted Access Control Implementation for Code-centric Ruby-on-Rails Web Application Development. 350-359 - Mohammed A. Alhomidi, Martin J. Reed:

A Genetic Algorithm Approach for the Most Likely Attack Path Problem. 360-366 - Yehia Elrakaiby

, Yves Le Traon:
A PEP-PDP Architecture to Monitor and Enforce Security Policies in Java Applications. 367-374
Privacy & Forensics
- Aswami Ariffin, Christian D'Orazio, Kim-Kwang Raymond Choo

, Jill Slay
:
iOS Forensics: How Can We Recover Deleted Image Files with Timestamp in a Forensically Sound Manner? 375-382 - Raphael Wigoutschnigg, Peter Schartner, Stefan Rass

:
Shared Crowds: A Token-Ring Approach to Hide the Receiver. 383-389 - Michael Gruhn, Tilo Müller:

On the Practicability of Cold Boot Attacks. 390-397
Network & Cloud Security
- Amir Herzberg

, Haya Schulmann:
DNSSEC: Interoperability Challenges and Transition Mechanisms. 398-405 - Aleksandar Hudic, Elise Revell, Dimitris E. Simos:

A Generation Method of Cryptographic Keys for Enterprise Communication Systems. 406-411 - Iryna Windhorst, Ali Sunyaev

:
Dynamic Certification of Cloud Services. 412-417
SecSE 2013
- José Fran. Ruiz, Marcos Arjona, Antonio Mana

, Niklas Carstens:
Secure Engineering and Modelling of a Metering Devices System. 418-427 - Per Håkon Meland, Erlend Andreas Gjære, Stéphane Paul:

The Use and Usefulness of Threats in Goal-Oriented Modelling. 428-436 - Suliman A. Alsuhibany

, Aad P. A. van Moorsel:
Modelling and Analysis of Release Order of Security Algorithms Using Stochastic Petri Nets. 437-445 - Hongzhe Li, Taebeom Kim, Munkhbayar Bat-Erdene, Heejo Lee:

Software Vulnerability Detection Using Backward Trace Analysis and Symbolic Execution. 446-454 - Vincenzo Ciancia

, Fabio Martinelli, Ilaria Matteucci
, Marinella Petrocchi, José Antonio Martín, Ernesto Pimentel
:
Automated Synthesis and Ranking of Secure BPMN Orchestrators. 455-464 - Kristian Beckers, Maritta Heisel, Isabelle Côté, Ludger Goeke, Selim Güler:

Structured Pattern-Based Security Requirements Elicitation for Clouds. 465-474
WSDF 2013
- Rainer Poisel, Simon Tjoa

:
A Comprehensive Literature Review of File Carving. 475-484 - Paolo Bertasi, Nicola Zago:

FASTDD: An Open Source Forensic Imaging Tool. 485-492 - Rolf Stobe, Hans Höfken, Marko Schuba, Michael Breuer:

Artificial Aging of Mobile Devices Using a Simulated GSM/GPRS Network. 493-497 - York Yannikos

, Christian Winter:
Model-Based Generation of Synthetic Disk Images for Digital Forensic Tool Testing. 498-505
RISI 2013
Resilience and Privacy
- Koichiro Hayashi:

Social Issues of Big Data and Cloud: Privacy, Confidentiality, and Public Utility. 506-511 - Memiko Otsuki, Noboru Sonehara:

Estimating the Value of Personal Information with SNS Utility. 512-516 - Tomoya Muraki, Shintaro Oishi, Masatsugu Ichino, Isao Echizen, Hiroshi Yoshiura:

Anonymizing Face Images by Using Similarity-Based Metric. 517-524
Resilience and Safety
- Hiroshi Maruyama, Kiyoshi Watanabe, Sachiko Yoshihama, Naohiko Uramoto, Yoichiro Takehora, Kazuhiro Minami:

ICHIGAN Security - A Security Architecture That Enables Situation-Based Policy Switching. 525-529 - Kelly Y. Itakura, Noboru Sonehara:

Using Twitter's Mentions for Efficient Emergency Message Propagation. 530-537 - Moussa Ouedraogo, Manel Khodja, Djamel Khadraoui:

Towards a Risk Based Assessment of QoS Degradation for Critical Infrastructure. 538-545
SecOnT 2013
- Yulia Cherdantseva

, Jeremy Hilton
:
A Reference Model of Information Assurance & Security. 546-555 - David A. Mundie, David M. McIntire:

An Ontology for Malware Analysis. 556-558 - Kristian Beckers, Maritta Heisel:

A Usability Evaluation of the NESSoS Common Body of Knowledge. 559-568 - Arwa M. Wali

, Soon Ae Chun
, James Geller:
A Bootstrapping Approach for Developing a Cyber-security Ontology Using Textbook Index Terms. 569-576 - Karin Bernsmed, Astrid Undheim, Per Håkon Meland, Martin Gilje Jaatun

:
Towards an Ontology for Cloud Security Obligations. 577-581 - Jakub Breier

, Ladislav Hudec:
On Selecting Critical Security Controls. 582-588 - Tove Gustavi, Pontus Svenson:

Taxonomy for Port Security Systems. 592-598
IWMSA 2013
- Gianluca Dini

, Fabio Martinelli, Andrea Saracino
, Daniele Sgandurra:
Probabilistic Contract Compliance for Mobile Applications. 599-606 - Gerardo Canfora

, Francesco Mercaldo, Corrado Aaron Visaggio
:
A Classifier of Malicious Android Applications. 607-614 - Ken Mano, Kazuhiro Minami, Hiroshi Maruyama:

Privacy-Preserving Publishing of Pseudonym-Based Trajectory Location Data Set. 615-624
RaSIEM 2013
- Valerio Vianello, Vincenzo Gulisano

, Ricardo Jiménez-Peris, Marta Patiño-Martínez
, Rubén Torres, Rodrigo Diaz, Elsa Prieto
:
A Scalable SIEM Correlation Engine and Its Application to the Olympic Games IT Infrastructure. 625-629 - Kahina Lazri, Sylvie Laniepce, Jalel Ben-Othman

:
Reconsidering Intrusion Monitoring Requirements in Shared Cloud Platforms. 630-637 - Igor V. Kotenko

, Olga Polubelova, Igor Saenko
, Elena Doynikova
:
The Ontology of Metrics for Security Evaluation and Decision Support in SIEM Systems. 638-645 - Cesario Di Sarno, Valerio Formicola

, Mario Sicuranza
, Giovanni Paragliola
:
Addressing Security Issues of Electronic Health Record Systems through Enhanced SIEM Technology. 646-653 - Stefan Asanger, Andrew Hutchison:

Experiences and Challenges in Enhancing Security Information and Event Management Capability Using Unsupervised Anomaly Detection. 654-661 - Roland Rieke

, Maria Zhdanova
, Jürgen Repp, Romain Giot, Chrystel Gaber:
Fraud Detection in Mobile Payments Utilizing Process Behavior Analysis. 662-669
ECTCM 2013
- Fabrizio Baiardi

, Fabio Corò, Federico Tonelli, Luca Guidi:
GVScan: Scanning Networks for Global Vulnerabilities. 670-677 - Ge Zhang, Simone Fischer-Hübner:

Counteract DNS Attacks on SIP Proxies Using Bloom Filters. 678-684 - Harald Lampesberger

:
A Grammatical Inference Approach to Language-Based Anomaly Detection in XML. 685-693 - Mark Scanlon

, M. Tahar Kechadi
:
Universal Peer-to-Peer Network Investigation Framework. 694-700 - Jean-François Lalande

, Steffen Wendzel
:
Hiding Privacy Leaks in Android Applications Using Low-Attention Raising Covert Channels. 701-710 - Thomas Eder, Michael Rodler, Dieter Vymazal, Markus Zeilinger:

ANANAS - A Framework for Analyzing Android Applications. 711-719 - Bianca Danczul, Jürgen Fuß

, Stefan Gradinger, Bernhard Greslehner, Wolfgang Kastl, Florian Wex:
Cuteforce Analyzer: A Distributed Bruteforce Attack on PDF Encryption with GPUs and FPGAs. 720-725 - Mirko Haustein, Herbert Sighart, Dennis Titze, Peter Schoo:

Collaboratively Exchanging Warning Messages between Peers While under Attack. 726-731
RAMSS 2013
- Paolo Rocchi, Gurami Tsitsiashvili

:
Some General Properties of Multi-state Physical Models. 732-736 - Ilia Frenkel, Lev Khvatskin, Svetlana Daichman, Anatoly Lisnianski:

Assessing Water Cooling System Performance: Lz-Transform Method. 737-742 - Christos Koukouvinos, Christina Parpoula, Dimitris E. Simos:

Genetic Algorithm and Data Mining Techniques for Design Selection in Databases. 743-746 - Andreas Makrides, Alex Karagrigoriou

:
Statistical Inference for Multi-state Systems: The Weibull Case. 747-752
SecATM 2013
- Woohyun Shim, Fabio Massacci

, Martina de Gramatica, Alessandra Tedeschi, Alessandro Pollini
:
Evaluation of Airport Security Training Programs: Perspectives and Issues. 753-758 - Roberta Cardinali, Enrico Anniballi, Carlo Bongioanni

, Antonio Macera, Fabiola Colone
, Pierfrancesco Lombardo
:
ARGUS 3D: Security Enhancements through Innovative Radar Technologies. 759-765 - Christian Raspotnig, Vikash Katta, Péter Kárpáti, Andreas L. Opdahl

:
Enhancing CHASSIS: A Method for Combining Safety and Security. 766-773 - Howard Chivers, John Hird:

Security Blind Spots in the ATM Safety Culture. 774-779 - Vikash Katta, Christian Raspotnig, Péter Kárpáti, Tor Stålhane:

Requirements Management in a Combined Process for Safety and Security Assessments. 780-786 - Rainer Koelle

, Walter Strijland, Stefan Roels:
Towards Harmonising the Legislative, Regulatory, and Standards-Based Framework for ATM Security: Developing a Software Support Tool. 787-793 - Martin Gilje Jaatun

, Tor Erlend Fægri:
Sink or SWIM: Information Security Requirements in the Sky. 794-801 - Martin Hawley, Paul Howard, Rainer Koelle

, Peter Saxton:
Collaborative Security Management: Developing Ideas in Security Management for Air Traffic Control. 802-806 - Antonio Marotta, Gabriella Carrozza, Luigi Battaglia, Patrizia Montefusco, Vittorio Manetti:

Applying the SecRAM Methodology in a CLOUD-Based ATM Environment. 807-813 - Franco Bergomi, Stéphane Paul, Bjørnar Solhaug, Raphaël Vignon-Davillier:

Beyond Traceability: Compared Approaches to Consistent Security Risk Assessments. 814-820
ARES-IND 2013
- Esma Aïmeur, Manuel Lafond:

The Scourge of Internet Personal Data Collection. 821-828 - Beatriz Gallego-Nicasio Crespo:

User Interface Harmonization for IT Security Management: User-Centered Design in the PoSecCo Project. 829-835 - Andrzej Dziech, Jaroslaw Bialas, Andrzej Glowacz, Pawel Korus

, Mikolaj Leszczuk
, Andrzej Matiolanski, Remigiusz Baran
:
Overview of Recent Advances in CCTV Processing Chain in the INDECT and INSIGMA Projects. 836-843 - Gunnar Schomaker, Andreas Herrholz, Guillaume Duc, Renaud Pacalet, Salvatore Raho, Miltos D. Grammatikakis

, Marcello Coppola
, Ignacio Garcia Vega:
TRESCCA - Trustworthy Embedded Systems for Secure Cloud Computing. 844-845

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














