


default search action
11. ARES 2016: Salzburg, Austria
- 11th International Conference on Availability, Reliability and Security, ARES 2016, Salzburg, Austria, August 31 - September 2, 2016. IEEE Computer Society 2016, ISBN 978-1-5090-0990-9

ARES Full Papers
ARES Full I: Best Paper Session
- Arnaud Oglaza, Romain Laborde, Abdelmalek Benzekri, François Barrère:

A Recommender-Based System for Assisting Non-technical Users in Managing Android Permissions. 1-9 - Wilfried Mayer, Aaron Zauner, Martin Schmiedecker, Markus Huber:

No Need for Black Chambers: Testing TLS in the E-mail Ecosystem at Large. 10-20 - Jose Rubio-Hernan

, Luca De Cicco, Joaquín García-Alfaro
:
Revisiting a Watermark-Based Detection Scheme to Handle Cyber-Physical Attacks. 21-28
ARES Full II: Cryptography
- Florian Dold, Christian Grothoff:

Byzantine Set-Union Consensus Using Efficient Set Reconciliation. 29-38 - Xavier Bultel, Pascal Lafourcade

:
k-Times Full Traceable Ring Signature. 39-48 - Johannes Bauer, Felix C. Freiling:

Towards Cycle-Accurate Emulation of Cortex-M Code to Detect Timing Side Channels. 49-58
ARES Full III: Network and Software Security
- Konrad-Felix Krentz, Christoph Meinel, Maxim Schnjakin:

POTR: Practical On-the-Fly Rejection of Injected and Replayed 802.15.4 Frames. 59-68 - Saurabh Verma, Ali Hamieh

, Jun Ho Huh, Henrik Holm, Siva Raj Rajagopalan, Maciej Korczynski, Nina H. Fefferman:
Stopping Amplified DNS DDoS Attacks through Distributed Query Rate Sharing. 69-78 - Johannes Götzfried, Nico Dorr, Ralph Palutke, Tilo Müller:

HyperCrypt: Hypervisor-Based Encryption of Kernel and User Space. 79-87
ARES Full IV: Privacy-Enhancing Technologies
- Denise Demirel, Stephan Krenn, Thomas Lorünser

, Giulia Traverso:
Efficient and Privacy Preserving Third Party Auditing for a Distributed Storage System. 88-97 - Oksana Kulyk, Karola Marky, Stephan Neumann, Melanie Volkamer:

Introducing Proxy Voting to Helios. 98-106
ARES Full V: Applications
- Lukas Dresel, Mykolai Protsenko, Tilo Müller:

ARTIST: The Android Runtime Instrumentation Toolkit. 107-116 - Pal-Stefan Murvay

, Alexandru Matei, Cristina Solomon, Bogdan Groza
:
Development of an AUTOSAR Compliant Cryptographic Library on State-of-the-Art Automotive Grade Controllers. 117-126 - Bernard Stepien, Amy P. Felty:

Using Expert Systems to Statically Detect "Dynamic" Conflicts in XACML. 127-136
ARES Full VI: Intrusion Detection and Incident Response
- Gustavo Gonzalez Granadillo, Alexander Motzek, Joaquín García-Alfaro

, Hervé Debar
:
Selection of Mitigation Actions Based on Financial and Operational Impact Assessments. 137-146 - Mehdi Nobakht

, Vijay Sivaraman, Roksana Boreli:
A Host-Based Intrusion Detection and Mitigation Framework for Smart Home IoT Using OpenFlow. 147-156 - Lyes Bayou, Nora Cuppens-Boulahia, David Espes

, Frédéric Cuppens:
Towards a CDS-based Intrusion Detection Deployment Scheme for Securing Industrial Wireless Sensor Networks. 157-166
ARES Full VII: Security Models and Architectures
- Sokratis Vavilis

, Alexandru Ionut Egner, Milan Petkovic, Nicola Zannone
:
Role Mining with Missing Values. 167-176 - Yannick Naudet

, Nicolas Mayer
, Christophe Feltus
:
Towards a Systemic Approach for Information Security Risk Management. 177-186 - Patrick Pleinevaux:

Towards a Metamodel for SABSA Conceptual Architecture Descriptions. 187-194 - Taciane Martimiano, Jean Everson Martina

:
Threat Modelling Service Security as a Security Ceremony. 195-204
ARES Short Papers
ARES Short I: Cloud Security
- Bernd Jäger, Reiner Kraft, Sebastian Luhn, Annika Selzer, Ulrich Waldmann:

Access Control and Data Separation Metrics in Cloud Infrastructures. 205-210 - Marwa Elsayed

, Mohammad Zulkernine:
IFCaaS: Information Flow Control as a Service for Cloud Security. 211-216 - Martin Grothe, Christian Mainka

, Paul Rösler
, Johanna Jupke, Jan Kaiser, Jörg Schwenk:
Your Cloud in My Company: Modern Rights Management Services Revisited. 217-222
ARES Short II: Applications
- Alexandr Vasenev, Lorena Montoya

, Andrea Ceccarelli
:
A Hazus-Based Method for Assessing Robustness of Electricity Supply to Critical Smart Grid Consumers during Flood Events. 223-228 - Christos Iliou

, George Kalpakis
, Theodora Tsikrika
, Stefanos Vrochidis
, Ioannis Kompatsiaris:
Hybrid Focused Crawling for Homemade Explosives Discovery on Surface and Dark Web. 229-234 - Christopher Hansen

, James K. Archibald:
The Case for RAID 4: Cloud-RAID Integration with Local Storage. 235-240 - Esma Aïmeur, Sébastien Gambs, Cheu Yien Yep:

An Empirical Study on GSN Usage Intention: Factors Influencing the Adoption of Geo-Social Networks. 241-246
ARES Short III: Cryptography
- Prosanta Gope, Ruei-Hau Hsu, Jemin Lee, Tony Q. S. Quek

:
Energy Efficient Mutual Authentication and Key Agreement Scheme with Strong Anonymity Support for Secure Ubiquitious Roaming Services. 247-252 - Toan-Thinh Truong, Duong-Tien Phan, Minh-Triet Tran

, Anh Duc Duong, Isao Echizen:
Provable User Authentication Scheme in Telecare Medicine Information System Using Elliptic Curve Cryptosystem. 253-259 - Patrick Lacharme, Christophe Rosenberger

:
Synchronous One Time Biometrics with Pattern Based Authentication. 260-265 - Antonio M. Espinoza, Jeffrey Knockel, Pedro Comesaña Alfaro

, Jedidiah R. Crandall
:
V-DIFT: Vector-Based Dynamic Information Flow Tracking with Application to Locating Cryptographic Keys for Reverse Engineering. 266-271
ARES Short IV: Security Methods
- Christof Rath:

Usable Privacy-Aware Logging for Unstructured Log Entries. 272-277 - Pontus Johnson, Alexandre Vernotte, Mathias Ekstedt, Robert Lagerström

:
pwnPr3d: An Attack-Graph-Driven Probabilistic Threat-Modeling Approach. 278-283 - Jeffrey Spaulding, Shambhu J. Upadhyaya, Aziz Mohaisen

:
The Landscape of Domain Name Typosquatting: Techniques and Countermeasures. 284-289
FARES I
FARES I: International Workshop on Frontiers in Availability, Reliability and Security
- Muhammad Ajmal Azad

, Syed Khurram Rizvi:
Caller-Centrality: Identifying Telemarketers in a VoIP Network. 290-295 - Mario Faiella, Fabio Martinelli, Paolo Mori

, Andrea Saracino
, Mina Sheikhalishahi:
Collaborative Attribute Retrieval in Environment with Faulty Attribute Managers. 296-303 - Tanja Heuer

, Ina Schiering
, Frank Klawonn
, Alexander Gabel, Martin Seeger:
Recognizing Time-Efficiently Local Botnet Infections - A Case Study. 304-311 - Sainath Batthala, Mayank Swarnkar

, Neminath Hubballi, Maitreya Natu:
VoIP Profiler: Profiling Voice over IP User Communication Behavior. 312-320
WSDF 2016
WSDF I: Mobile and OS Forensics
- Kenneth M. Ovens, Gordon Morison:

Identification and Analysis of Email and Contacts Artefacts on iOS and OS X. 321-327 - Joao Paulo Claudino de Sousa, João José Costa Gondim

:
Extraction and Analysis of Volatile Memory in Android Systems: An Approach Focused on Trajectory Reconstruction Based on NMEA 0183 Standard. 328-337 - Patrício Domingues

, Miguel Frade
:
Digital Forensic Artifacts of the Cortana Device Search Cache on Windows 10 Desktop. 338-344
WSDF II: Cloud Forensics
- Saad Alqahtany

, Nathan L. Clarke
, Steven Furnell, Christoph Reich
:
A Forensic Acquisition and Analysis System for IaaS: Architectural Model and Experiment. 345-354 - Manabu Hirano, Hiromu Ogawa:

A Log-Structured Block Preservation and Restoration System for Proactive Forensic Data Collection in the Cloud. 355-364
IWSMA 2016
IWSMA I: International Workshop on Security of Mobile Applications
- Georg Merzdovnik

, Damjan Buhov, Artemios G. Voyiatzis, Edgar R. Weippl:
Notary-Assisted Certificate Pinning for Improved Security of Android Apps. 365-371 - Alberto Ferrante

, Eric Medvet, Francesco Mercaldo, Jelena Milosevic, Corrado Aaron Visaggio:
Spotting the Malicious Moment: Characterizing Malware Behavior Using Dynamic Features. 372-381
IWSMA II: International Workshop on Security of Mobile Applications
- Sanaah Al Salami, Joonsang Baek

, Khaled Salah, Ernesto Damiani
:
Lightweight Encryption for Smart Home. 382-388 - Fuensanta Torres Garcia, Katharina Krombholz, Rudolf Mayer

, Edgar R. Weippl:
Hand Dynamics for Behavioral User Authentication. 389-398
IWCC 2016
IWCC I: International Workshop on Cyber Crime
- Murdoch Watney

:
Law Enforcement Access to Password Protected and/or Encrypted Mobile Data. 399-405 - Daniel Spiekermann, Tobias Eggendorfer

:
Towards Digital Investigation in Virtual Networks: A Study of Challenges and Open Problems. 406-413 - Jason W. Clark:

Threat from Within: Case Studies of Insiders Who Committed Information Technology Sabotage. 414-422 - Svrana Kumar, Logesh Madhavan, Mangalam Nagappan, Biplab Sikdar

:
Malware in Pirated Software: Case Study of Malware Encounters in Personal Computers. 423-427
SAW 2016
SAW I: International Software Assurance Workshop
- Aleksandar Hudic, Matthias Flittner, Thomas Lorünser

, Philipp M. Radl, Roland Bless
:
Towards a Unified Secure Cloud Service Development and Deployment Life-Cycle. 428-436 - Nicola Basilico

, Andrea Lanzi, Mattia Monga
:
A Security Game Model for Remote Software Protection. 437-443 - Gabriela Gheorghe, Muhammad Rizwan Asghar

, Jean Lancrenon, Sankalp Ghatpande:
SPARER: Secure Cloud-Proof Storage for e-Health Scenarios. 444-453
SAW II: International Software Assurance Workshop
- Nikhil Tripathi

, Neminath Hubballi, Yogendra Singh:
How Secure are Web Servers? An Empirical Study of Slow HTTP DoS Attacks and Detection. 454-463 - Gohar Shakoori, Mehran S. Fallah, Zeinab Iranmanesh:

A Type System for Quantified Information-Flow Security in Java-Like Languages. 464-473 - Jakub Breier

:
On Analyzing Program Behavior under Fault Injection Attacks. 474-479
SAW III: International Software Assurance Workshop
- Maria Leitner

, Arndt Bonitz:
Authentication in the Context of E-Participation: Current Practice, Challenges and Recommendations. 480-485
SecATM 2016
SecATM I: ATM Security Research and Development
- John Hird, Martin Hawley, Chris Machin:

Air Traffic Management Security Research in SESAR. 486-492 - Claudio Porretti, Raoul Lahaije, Denis Kolev:

A New Vision for ATM Security Management: The Security Management Platform. 493-498 - Karol Gotz, Martin Hawley, Chris Machin, John Hird:

'CTRL_S' - A Security Tool for SESAR's Design-In Security Approach. 499-502
SecATM II: Risk Assessment and Incident Management
- Hamid Asgari, Sarah Haines, Adrian Waller:

Security Risk Assessment and Risk Treatment for Integrated Modular Communication. 503-509 - Martin Gilje Jaatun, Rainer Koelle

:
Cyber Security Incident Management in the Aviation Domain. 510-516 - Tobias Kiesling, Matias Krempel, Josef Niederl, Jürgen Ziegler:

A Model-Based Approach for Aviation Cyber Security Risk Assessment. 517-525
SecATM III: Testing and Validation
- Doris di Marco, Alessandro Manzo, Marco Ivaldi, John Hird:

Security Testing with Controller-Pilot Data Link Communications. 526-531 - Patrizia Montefusco, Rosana Casar, Rainer Koelle, Tim H. Stelkens-Kobsch:

Addressing Security in the ATM Environment: From Identification to Validation of Security Countermeasures with Introduction of New Security Capabilities in the ATM System Context. 532-541
ASSD 2016
ASSD I: Secure DevOps
- Vaishnavi Mohan, Lotfi Ben Othmane:

SecDevOps: Is It a Marketing Buzzword? - Mapping Research on Security in DevOps. 542-547
ASSD II: Experiences in Agile Development of Secure Software
- Tosin Daniel Oyetoyan, Daniela Soares Cruzes, Martin Gilje Jaatun:

An Empirical Study on the Relationship between Software Security Skills, Usage and Training Needs in Agile Settings. 548-555 - Kalle Rindell

, Sami Hyrynsalmi
, Ville Leppänen
:
Case Study of Security Development in an Agile Environment: Building Identity Management for a Government Agency. 556-563 - Lotfi Ben Othmane, Azmat Ali:

Towards Effective Security Assurance for Incremental Software Development the Case of Zen Cart Application. 564-571
ASSD III: Assessment of Research on Agile Development of Secure Software
- Chad Heitzenrater, Andrew C. Simpson

:
Misuse, Abuse and Reuse: Economic Utility Functions for Characterising Security Requirements. 572-581 - Cristina Rosa Camacho, Sabrina Marczak

, Daniela S. Cruzes:
Agile Team Members Perceptions on Non-functional Testing: Influencing Factors from an Empirical Study. 582-589
WMA 2016
WMA I: International Workshop on Malware Analysis
- Laura García, Ricardo J. Rodríguez:

A Peek under the Hood of iOS Malware. 590-598
WMA II: International Workshop on Malware Analysis
- Enrico Mariconti

, Jeremiah Onaolapo, Gordon J. Ross, Gianluca Stringhini:
What's Your Major Threat? On the Differences between the Network Behavior of Targeted and Commodity Malware. 599-608 - Eric Medvet, Francesco Mercaldo:

Exploring the Usage of Topic Modeling for Android Malware Static Analysis. 609-617 - Marián Kühnel, Ulrike Meyer:

Classification of Short Messages Initiated by Mobile Malware. 618-627
WMA III: International Workshop on Malware Analysis
- Francesco Mercaldo, Vittoria Nardone, Antonella Santone:

Ransomware Inside Out. 628-637 - Neminath Hubballi, Himanshu Dogra:

Detecting Packed Executable File: Supervised or Anomaly Detection Method? 638-643
ISPM 2016
ISPM I: Challenges, Threats and Solutions
- Meredydd Williams, Jason R. C. Nurse, Sadie Creese:

The Perfect Storm: The Privacy Paradox and the Internet-of-Things. 644-652
ISPM II: Models and Communication
- Jenni Reuben

, Leonardo A. Martucci, Simone Fischer-Hübner, Heather S. Packer, Hans Hedbom, Luc Moreau
:
Privacy Impact Assessment Template for Provenance. 653-660 - Otto Hellwig, Gerald Quirchmayr, Edith Huber, Gernot Goluch, Franz Vock, Bettina Pospisil

:
Major Challenges in Structuring and Institutionalizing CERT-Communication. 661-667 - Thomas Schaberreiter, Gerald Quirchmayr, Anna-Maija Juuso, Moussa Ouedraogo, Juha Röning

:
Towards a Complex Systems Approach to Legal and Economic Impact Analysis of Critical Infrastructures. 668-676
FASES 2016
FASES I: Data Protection, Privacy Preservation and Discrimination Discovery
- Rica Gonen, Tamir Tassa:

Privacy Preserving Computations for Viral Marketing: The Case of Rational Players. 677-686 - Stefanos Malliaros, Christoforos Ntantogian

, Christos Xenakis
:
Protecting Sensitive Information in the Volatile Memory from Disclosure Attacks. 687-693
FASES II: Economic Value of Personal Information
- Miriam Marciel, José González Cabañas

, Yonas Mitike Kassa, Roberto Gonzalez, Mohamed Ahmed:
The Value of Online Users: Empirical Evaluation of the Price of Personalized Ads. 694-700 - Yonas Mitike Kassa, José González Cabañas

, Ángel Cuevas
, Rubén Cuevas Rumín
, Miriam Marciel, Roberto Gonzalez:
Your Data in the Eyes of the Beholders: Design of a Unified Data Valuation Portal to Estimate Value of Personal Information from Market Perspective. 701-705
FASES III: Novel Methods for Authentication, Identification and Certificates Issuance
- Kostantinos Papadamou

, Riginos Samaras, Michael Sirivianos
:
Ensuring the Authenticity and Fidelity of Captured Photos Using Trusted Execution and Mobile Application Licensing Capabilities. 706-714 - Luigi Stammati, Claudio Pisa, Tooska Dargahi

, Alberto Caponi, Giuseppe Bianchi:
FEBA: An Action-Based Feature Extraction Framework for Behavioural Identification and Authentication. 715-724 - Thaís Bardini Idalino

, Marina Coelho, Jean Everson Martina:
Automated Issuance of Digital Certificates through the Use of Federations. 725-732
SECPID 2016
SECPID I: Security and Privacy in the Cloud I
- Thomas Lorünser

, Daniel Slamanig
, Thomas Länger, Henrich C. Pöhls:
PRISMACLOUD Tools: A Cryptographic Toolbox for Increasing Security in Cloud Services. 733-741 - Felix Hörandner

, Stephan Krenn, Andrea Migliavacca, Florian Thiemer, Bernd Zwattendorfer:
CREDENTIAL: A Framework for Privacy-Preserving Cloud-Based Data Sharing. 742-749 - Bojan Suzic, Andreas Reiter:

Towards Secure Collaboration in Federated Cloud Environments. 750-759
SECPID II: Security and Privacy in the Cloud II
- Arne Bilzhause, Manuel Huber

, Henrich C. Pöhls, Kai Samelin:
Cryptographically Enforced Four-Eyes Principle. 760-767 - Sauro Vicini

, Francesco Alberti, Nicolás Notario, Alberto Crespo
, Juan Ramón Troncoso-Pastoriza, Alberto Sanna:
Co-creating Security-and-Privacy-by-Design Systems. 768-775 - Michael Diener, Leopold Blessing, Nina Rappel:

Tackling the Cloud Adoption Dilemma - A User Centric Concept to Control Cloud Migration Processes by Using Machine Learning Technologies. 776-785
MUININ 2016
MUININ I
- Xiubo Zhang, Stephen Kelly, Khurshid Ahmad

:
The Slandail Monitor: Real-Time Processing and Visualisation of Social Media Data for Emergency Management. 786-791 - Damian Jackson, Paul Hayes:

Ensuring Security of Data and Information Flow in Emergency Response Decision Support. 792-797 - Christian Berger, Paolo de Stefani

, Taiwo A. Oriola
:
Legal Implications of Using Social Media Data in Emergency Response. 798-799 - Maria Spyropoulou, Khurshid Ahmad

:
Disaster-Related Public Speeches: The Role of Emotions. 800-804
MUININ II
- Min Jing

, Bryan W. Scotney, Sonya A. Coleman
, T. Martin McGinnity
:
The Application of Social Media Image Analysis to an Emergency Management System. 805-810 - Sabine Gründer-Fahrer, Christian Berger, Antje Schlaf, Gerhard Heyer:

Computational, Communicative, and Legal Conditions for Using Social Media in Disaster Management in Germany. 811-820
SOCOTUD 2016
SOCOTUD I: Talks and Discussions on Recent Trends in User Involvement and Social Collaboration
- Sebastian Franken, Sabine Kolvenbach, Wolfgang Gräther:

Involving End Users into Collaborative Software Development: The Showcase of CloudTeams. 821-826 - Evangelos Arvanitakis, Michael Petychakis, Evmorfia Biliri

, Ariadni Michalitsi-Psarrou
, Panagiotis Kokkinakos
, Fenareti Lampathaki
, Dimitrios Askounis:
Social Analytics in an Enterprise Context: From Manufacturing to Software Development. 827-833 - Brian Greaves, Marijke Coetzee

:
SmartNet: Secure Content Sharing for Peer-to-Peer Smart Group Spaces. 834-843
SOCOTUD II: Demonstration, Talks, and Discussion on Social Collaboration in Software Development
- Alexander Böhm

, Benjamin Taubmann, Hans P. Reiser
:
Geographic Localization of an Anonymous Social Network Message Data Set. 844-850 - Iosif Alvertis, Dimitris Papaspyros, Sotiris Koussouris

, Spyros Mouzakitis
, Dimitris Askounis:
Using Crowdsourced and Anonymized Personas in the Requirements Elicitation and Software Development Phases of Software Engineering. 851-856

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














