default search action
11. SecureComm 2015: Dallas, TX, USA
- Bhavani Thuraisingham, XiaoFeng Wang, Vinod Yegneswaran:
Security and Privacy in Communication Networks - 11th International Conference, SecureComm 2015, Dallas, TX, USA, October 26-29, 2015, Revised Selected Papers. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 164, Springer 2015, ISBN 978-3-319-28864-2
Mobile, System and Software Security
- Yuan Zhang, Min Yang, Guofei Gu, Hao Chen:
FineDroid: Enforcing Permissions with System-Wide Application Execution Context. 3-22 - Yongfeng Li, Tong Shen, Xin Sun, Xuerui Pan, Bing Mao:
Detection, Classification and Characterization of Android Malware Using API Data Dependency. 23-40 - André Ebert, Chadly Marouane, Benno Rott, Martin Werner:
KeyPocket - Improving Security and Usability for Provider Independent Login Architectures with Mobile Devices. 41-57 - Chao Yang, Guangliang Yang, Ashish Gehani, Vinod Yegneswaran, Dawood Tariq, Guofei Gu:
Using Provenance Patterns to Vet Sensitive Behaviors in Android Apps. 58-77 - Lin Yan, Yao Guo, Xiangqun Chen:
SplitDroid: Isolated Execution of Sensitive Components for Mobile Applications. 78-96 - Oliver Stecklina, Peter Langendörfer, Frank Vater, Thorsten Kranz, Gregor Leander:
Intrinsic Code Attestation by Instruction Chaining for Embedded Devices. 97-115 - Jidong Xiao, Hai Huang, Haining Wang:
Defeating Kernel Driver Purifier. 116-134 - Jidong Xiao, Hai Huang, Haining Wang:
Kernel Data Attack Is a Realistic Security Threat. 135-154
Cloud Security
- Hao Sun, Xiaofeng Wang, Jinshu Su, Peixin Chen:
RScam: Cloud-Based Anti-Malware via Reversible Sketch. 157-174 - Geng Tian, Zhiliang Wang, Xia Yin, Zimu Li, Xingang Shi, Ziyi Lu, Chao Zhou, Yang Yu, Dan Wu:
TADOOP: Mining Network Traffic Anomalies with Hadoop. 175-192 - Yueqiang Cheng, Qing Li, Miao Yu, Xuhua Ding, Qingni Shen:
SuperCall: A Secure Interface for Isolated Execution Environment to Dynamically Use External Services. 193-211 - Xiaojun Xiao, Yaping Lin, Wei Zhang, Xin Yao, Qi Gu:
Authenticating Top-k Results of Secure Multi-keyword Search in Cloud Computing. 212-229
Privacy and Side Channels
- Indrajeet Singh, Masoud Akhoondi, Mustafa Y. Arslan, Harsha V. Madhyastha, Srikanth V. Krishnamurthy:
Resource Efficient Privacy Preservation of Online Social Media Conversations. 233-255 - Vaibhav Rastogi, Zhengyang Qu, Jedidiah McClurg, Yinzhi Cao, Yan Chen:
Uranine: Real-time Privacy Leakage Monitoring without System Modification for Android. 256-276 - Hong Liu, Hongmin Li, Eugene Y. Vasserman:
Practicality of Using Side-Channel Analysis for Software Integrity Checking of Embedded Systems. 277-293 - Priyabrat Dash, Chris Perkins, Ryan M. Gerdes:
Remote Activation of Hardware Trojans via a Covert Temperature Channel. 294-310
Web and Network Security
- Song Li, Hai-Xin Duan, Zhiliang Wang, Xing Li:
Route Leaks Identification by Detecting Routing Loops. 313-329 - Hugo Gascon, Christian Wressnegger, Fabian Yamaguchi, Daniel Arp, Konrad Rieck:
Pulsar: Stateful Black-Box Fuzzing of Proprietary Network Protocols. 330-347 - Dae Wook Kim, Junjie Zhang:
You Are How You Query: Deriving Behavioral Fingerprints from DNS Traffic. 348-366 - Lei Yang, Fengjun Li:
Enhancing Traffic Analysis Resistance for Tor Hidden Services with Multipath Routing. 367-384 - Ashton Webster, Margaret Gratian, Ryan Eckenrod, Daven Patel, Michel Cukier:
An Improved Method for Anomaly-Based Network Scan Detection. 385-400 - Juan D. Parra Rodriguez, Joachim Posegga:
Why Web Servers Should Fear Their Clients - Abusing Websockets in Browsers for DoS. 401-417 - Chunqiang Hu, Xiuzhen Cheng, Zhi Tian, Jiguo Yu, Kemal Akkaya, Limin Sun:
An Attribute-Based Signcryption Scheme to Secure Attribute-Defined Multicast Communications. 418-437 - Yoann Bertrand, Mireille Blay-Fornarino, Karima Boudaoud, Michel Riveill:
Generation of Transmission Control Rules Compliant with Existing Access Control Policies. 438-455
Crypto, Protocol and Model
- Yongzheng Zhang, Tao Xu, Yipeng Wang, Jianliang Sun, Xiaoyu Zhang:
A Markov Random Field Approach to Automated Protocol Signature Inference. 459-476 - Mohsen Alimomeni, Reihaneh Safavi-Naini:
How to Prevent to Delegate Authentication. 477-499 - Xing Zhang, Cancan Jin, Cong Li, Zilong Wen, Qingni Shen, Yuejian Fang, Zhonghai Wu:
Ciphertext-Policy Attribute-Based Encryption with User and Authority Accountability. 500-518 - Stefan Craß, Gerson Joskowicz, Eva Kühn:
A Decentralized Access Control Model for Dynamic Collaboration of Autonomous Peers. 519-537 - Gustavo Gonzalez Granadillo, Joaquín García-Alfaro, Hervé Debar:
Using a 3D Geometrical Model to Improve Accuracy in the Evaluation and Selection of Countermeasures Against Complex Cyber Attacks. 538-555
Poster Session
- Dongdong Tian, Xiaohong Li, Jing Hu, Guangquan Xu, Zhiyong Feng:
POSTER: API-Level Multi-policy Access Control Enforcement for Android Middleware. 559-562 - Vitaly Ford, Ambareen Siraj:
POSTER: Reliable and Efficient Protection of Consumer Privacy in Advanced Metering Infrastructure. 563-566 - Xuejie Ding, Wei-qing Huang, Meng Zhang, Jianlin Zhao:
POSTER: A Security Adaptive Steganography System Applied on Digital Audio. 567-571 - Yongbo Li, Fan Yao, Tian Lan, Guru Venkataramani:
POSTER: Semantics-Aware Rule Recommendation and Enforcement for Event Paths. 572-576 - Apala Ray, Johan Åkerberg, Mats Björkman, Mikael Gidlund:
POSTER: An Approach to Assess Security, Capacity and Reachability for Heterogeneous Industrial Networks. 577-580 - Kai Cao, Yunchun Li, Hailong Yang, Jiqiang Tang, Xiaoxiang Zou:
POSTER: An Online Prefix-Preserving IP Address Anonymization Algorithm for Passive Measurement Systems. 581-584 - Yuejian Fang, Zilong Wen, Qingni Shen, Yahui Yang, Zhonghai Wu:
POSTER: Ciphertext-Policy Attribute-Based Encryption Method with Secure Decryption Key Generation and Outsourcing Decryption of ABE Ciphertexts. 585-589 - Karim Emara, Wolfgang Woerndl, Johann H. Schlichter:
POSTER: Context-Adaptive User-Centric Privacy Scheme for VANET. 590-593 - Chanwoo Bae, Jesung Jung, Jaehyun Nam, Seungwon Shin:
POSTER: A Collaborative Approach on Behavior-Based Android Malware Detection. 594-597 - Degang Sun, Xinping Zhou, Zhu Wang, Changhai Ou, Wei-qing Huang, Juan Ai:
POSTER: Using Improved Singular Value Decomposition to Enhance Correlation Power Analysis. 598-601
ATIS 2015: 6th International Workshop on Applications and Techniques in Information Security
- Ahmad Atamli-Reineh, Andrew P. Martin:
Securing Application with Software Partitioning: A Case Study Using SGX. 605-621 - Mozammel Chowdhury, Junbin Gao, Morshed U. Chowdhury:
Image Spam Classification Using Neural Network. 622-632 - Khandakar Rabbi, Quazi Mamun:
An Effective t-way Test Data Generation Strategy. 633-648 - Ala' F. A. Aburumman, Wei Jye Seo, Md. Rafiqul Islam, Muhammad Khurram Khan, Kim-Kwang Raymond Choo:
A Secure Cross-Domain SIP Solution for Mobile Ad Hoc Network Using Dynamic Clustering. 649-664 - Carlos Garcia Cordero, Emmanouil Vasilomanolakis, Max Mühlhäuser, Mathias Fischer:
Community-Based Collaborative Intrusion Detection. 665-681 - Jinkun Geng, Daren Ye, Ping Luo, Pin Lv:
A Novel Clustering Algorithm for Database Anomaly Detection. 682-696 - M. Arif Khan, Rafiqul Islam:
Secrecy Rate Based User Selection Algorithms for Massive MIMO Wireless Networks. 697-710 - Mozammel Chowdhury, Junbin Gao, Rafiqul Islam:
Human Surveillance System for Security Application. 711-724 - Ben Townsend, Jemal H. Abawajy:
Security Considerations for Wireless Carrier Agonistic Bio-Monitoring Systems. 725-737
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.