IEEE/ACM International Conference on Availability, Reliability and Security, ARES 2017


Title/Authors Title Research Artifacts
[?] A research artifact is any by-product of a research project that is not directly included in the published research paper. In Computer Science research this is often source code and data sets, but it could also be media, documentation, inputs to proof assistants, shell-scripts to run experiments, etc.
Details

Type Me the Truth!: Detecting Deceitful Users via Keystroke Dynamics

Merylin Monaro, Riccardo Spolaor, QianQian Li, Mauro Conti, Luciano Gamberini, Giuseppe Sartori

Type Me the Truth!: Detecting Deceitful Users via Keystroke Dynamics

Details
Discussion Comments: 0
Verification: Authors have not verified information

Protection of personal data in security alert sharing platforms

Václav Stupka, Martin Horák, Martin Husák

Protection of personal data in security alert sharing platforms

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced no artifacts
Verification: Authors have verified information

Insider Misuse Attribution using Biometrics

Abdulrahman Alruban, Nathan L. Clarke, Fudong Li, Steven Furnell

Insider Misuse Attribution using Biometrics

Details
Discussion Comments: 0
Verification: Authors have not verified information

Memory carving can finally unveil your embedded personal data

Thomas Gougeon, Morgan Barbier, Patrick Lacharme, Gildas Avoine, Christophe Rosenberger

Memory carving can finally unveil your embedded personal data

Details
Discussion Comments: 0
Verification: Authors have not verified information

C'mon: Monitoring the Compliance of Cloud Services to Contracted Properties

Soha Alboghdady, Stefan Winter, Ahmed Taha, Heng Zhang, Neeraj Suri

C'mon: Monitoring the Compliance of Cloud Services to Contracted Properties

Details
Discussion Comments: 0
Verification: Authors have not verified information

An Approach to Botnet Malware Detection Using Nonparametric Bayesian Methods

Joseph DiVita, Roger A. Hallman

An Approach to Botnet Malware Detection Using Nonparametric Bayesian Methods

Details
Discussion Comments: 0
Verification: Authors have not verified information

The Demon is in the Configuration: Revisiting Hybrid Mobile Apps Configuration Model

Abeer Al Jarrah, Mohamed Shehab

The Demon is in the Configuration: Revisiting Hybrid Mobile Apps Configuration Model

Details
Discussion Comments: 0
Verification: Authors have not verified information

Popularity-based Detection of Domain Generation Algorithms

Jasper Abbink, Christian Doerr

Popularity-based Detection of Domain Generation Algorithms

Details
Discussion Comments: 0
Verification: Authors have not verified information

Application-Specific Digital Forensics Investigative Model in Internet of Things (IoT)

Tanveer A. Zia, Peng Liu, Weili Han

Application-Specific Digital Forensics Investigative Model in Internet of Things (IoT)

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Protecting Future Maritime Communication

Christian Frøystad, Karin Bernsmed, Per Håkon Meland

Protecting Future Maritime Communication

Details
Discussion Comments: 0
Verification: Authors have not verified information

Investigating the darknet: limitations in Slovenian legal system

Anze Mihelic, Blaz Markelj, Igor Bernik, Sabina Zgaga

Investigating the darknet: limitations in Slovenian legal system

Details
Discussion Comments: 0
Verification: Authors have not verified information

Efficient ID-based Designated Verifier Signature

Olivier Blazy, Emmanuel Conchon, Paul Germouty, Amandine Jambert

Efficient ID-based Designated Verifier Signature

Details
Discussion Comments: 0
Verification: Authors have not verified information

DoS Attacks on Controller Area Networks by Fault Injections from the Software Layer

Pal-Stefan Murvay, Bogdan Groza

DoS Attacks on Controller Area Networks by Fault Injections from the Software Layer

Details
Discussion Comments: 0
Verification: Authors have not verified information

Quantifying the Spectrum of Denial-of-Service Attacks through Internet Backscatter

Norbert Blenn, Vincent Ghiëtte, Christian Doerr

Quantifying the Spectrum of Denial-of-Service Attacks through Internet Backscatter

Details
Discussion Comments: 0
Verification: Authors have not verified information

On the Usefulness of Compression Models for Authorship Verification

Oren Halvani, Christian Winter, Lukas Graner

On the Usefulness of Compression Models for Authorship Verification

Details
Discussion Comments: 0
Verification: Authors have not verified information

Quantitave Dynamic Taint Analysis of Privacy Leakage in Android Arabic Apps

Ayman Youssef, Ahmed F. Shosha

Quantitave Dynamic Taint Analysis of Privacy Leakage in Android Arabic Apps

Details
Discussion Comments: 0
Verification: Authors have not verified information

Measuring privacy in high dimensional microdata collections

Spyros Boukoros, Stefan Katzenbeisser

Measuring privacy in high dimensional microdata collections

Details
Discussion Comments: 0
Verification: Authors have not verified information

SAFE and Secure: Deeply Integrating Security in a New Hazard Analysis

Sam Procter, Eugene Y. Vasserman, John Hatcliff

SAFE and Secure: Deeply Integrating Security in a New Hazard Analysis

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

The Archistar Secret-Sharing Backup Proxy

Andreas Happe, Florian Wohner, Thomas Lorünser

The Archistar Secret-Sharing Backup Proxy

Details
Discussion Comments: 0
Verification: Authors have not verified information

Reliable Behavioural Factors in the Information Security Context

Peter Mayer, Alexandra Kunz, Melanie Volkamer

Reliable Behavioural Factors in the Information Security Context

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced no artifacts
Verification: Authors have verified information

Fully threshold broadcast encryption

Sigurd Eskeland

Fully threshold broadcast encryption

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced no artifacts
Verification: Author has verified information

Provisioning Software with Hardware-Software Binding

Robert P. Lee, Konstantinos Markantonakis, Raja Naeem Akram

Provisioning Software with Hardware-Software Binding

Details
Discussion Comments: 0
Verification: Authors have not verified information

End-node Fingerprinting for Malware Detection on HTTPS Data

Tomás Komárek, Petr Somol

End-node Fingerprinting for Malware Detection on HTTPS Data

Details
Discussion Comments: 0
Verification: Authors have not verified information

Searchable Encryption with Access Control

Nils Löken

Searchable Encryption with Access Control

Details
Discussion Comments: 0
Verification: Author has not verified information

DevOps for Better Software Security in the Cloud Invited Paper

Martin Gilje Jaatun, Daniela S. Cruzes, Jesus Luna

DevOps for Better Software Security in the Cloud Invited Paper

Details
Discussion Comments: 0
Verification: Authors have not verified information

Authentication Shutter: Alternative Countermeasure against Password Reuse Attack by Availability Control

Tetsuji Takada

Authentication Shutter: Alternative Countermeasure against Password Reuse Attack by Availability Control

Details
Discussion Comments: 0
Verification: Author has not verified information

k-rAC: a Fine-Grained k-Resilient Access Control Scheme for Distributed Hash Tables

Olga Kieselmann, Arno Wacker, Gregor Schiele

k-rAC: a Fine-Grained k-Resilient Access Control Scheme for Distributed Hash Tables

Details
Discussion Comments: 0
Verification: Authors have not verified information

Security Analysis of Cordova Applications in Google Play

Michiel Willocx, Jan Vossaert, Vincent Naessens

Security Analysis of Cordova Applications in Google Play

Details
Discussion Comments: 0
Verification: Authors have not verified information

Continuous Biometric Verification for Non-Repudiation of Remote Services

Enrico Schiavone, Andrea Ceccarelli, Andrea Bondavalli

Continuous Biometric Verification for Non-Repudiation of Remote Services

Details
Discussion Comments: 0
Verification: Authors have not verified information

Constrained PET Composition for Measuring Enforced Privacy

Sebastian Funke, Alexander Wiesmaier, Jörg Daubert

Constrained PET Composition for Measuring Enforced Privacy

Details
Discussion Comments: 0
Verification: Authors have not verified information

A Non-Parametric Model for Accurate and Provably Private Synthetic Data Sets

Jordi Soria-Comas, Josep Domingo-Ferrer

A Non-Parametric Model for Accurate and Provably Private Synthetic Data Sets

Details
Discussion Comments: 0
Verification: Authors have not verified information

Implementing Secure DevOps assessment for highly regulated environments

Hasan Yasar

Implementing Secure DevOps assessment for highly regulated environments

Details
Discussion Comments: 0
Verification: Author has not verified information

Source Code Patterns of SQL Injection Vulnerabilities

Felix Schuckert, Basel Katt, Hanno Langweg

Source Code Patterns of SQL Injection Vulnerabilities

Details
Discussion Comments: 0
Verification: Authors have not verified information

NEXTLEAP: Decentralizing Identity with Privacy for Secure Messaging

Harry Halpin

NEXTLEAP: Decentralizing Identity with Privacy for Secure Messaging

Details
Discussion Comments: 0
Verification: Author has not verified information

Secure and Efficient Data Sharing with Atribute-based Proxy Re-encryption Scheme

Masoomeh Sepehri, Alberto Trombetta

Secure and Efficient Data Sharing with Atribute-based Proxy Re-encryption Scheme

Details
Discussion Comments: 0
Verification: Authors have not verified information

JSDES: An Automated De-Obfuscation System for Malicious JavaScript

Moataz AbdelKhalek, Ahmed Shosha

JSDES: An Automated De-Obfuscation System for Malicious JavaScript

Details
Discussion Comments: 0
Verification: Authors have not verified information

Machine Learning Approach for Detection of nonTor Traffic

Elike Hodo, Xavier J. A. Bellekens, Ephraim Iorkyase, Andrew W. Hamilton, Christos Tachtatzis, Robert C. Atkinson

Machine Learning Approach for Detection of nonTor Traffic

Details
Discussion Comments: 0
Verification: Authors have not verified information

A Trust-based Resilient Routing Mechanism for the Internet of Things

Zeeshan Ali Khan, Johanna Ullrich, Artemios G. Voyiatzis, Peter Herrmann

A Trust-based Resilient Routing Mechanism for the Internet of Things

Details
Discussion Comments: 0
Verification: Authors have not verified information

FROST: Anti-Forensics Digital-Dead-DROp Information Hiding RobuST to Detection & Data Loss with Fault tolerance

Avinash Srinivasan, Hunter Dong, Angelos Stavrou

FROST: Anti-Forensics Digital-Dead-DROp Information Hiding RobuST to Detection & Data Loss with Fault tolerance

Details
Discussion Comments: 0
Verification: Authors have not verified information

Using Ciphers for Failure-Recovery in ITS Systems

Mustafa Ayoob, Wael Adi, Vassilis Prevelakis

Using Ciphers for Failure-Recovery in ITS Systems

Details
Discussion Comments: 0
Verification: Authors have not verified information

Identification of Dependency-based Attacks on Node.js

Brian Pfretzschner, Lotfi Ben Othmane

Identification of Dependency-based Attacks on Node.js

Details
Discussion Comments: 0
Verification: Authors have not verified information

Anomaly Detection for Simulated IEC-60870-5-104 Trafiic

Ersi Hodo, Stepan Grebeniuk, Henri Ruotsalainen, Paul Tavolato

Anomaly Detection for Simulated IEC-60870-5-104 Trafiic

Details
Discussion Comments: 0
Verification: Authors have not verified information

Secure Matrix Multiplication with MapReduce

Xavier Bultel, Radu Ciucanu, Matthieu Giraud, Pascal Lafourcade

Secure Matrix Multiplication with MapReduce

Details
Discussion Comments: 0
Verification: Authors have not verified information

Self-healing Multi-Cloud Application Modelling

Erkuden Rios, Eider Iturbe, Maria Carmen Palacios

Self-healing Multi-Cloud Application Modelling

Details
Discussion Comments: 0
Verification: Authors have not verified information

Towards the Adoption of Secure Cloud Identity Services

Alexandros Kostopoulos, Evangelos Sfakianakis, Ioannis P. Chochliouros, John Sören Pettersson, Stephan Krenn, Welderufael Tesfay, Andrea Migliavacca, Felix Hörandner

Towards the Adoption of Secure Cloud Identity Services

Details
Discussion Comments: 0
Verification: Authors have not verified information

Forensic State Acquisition from Internet of Things (FSAIoT): A general framework and practical approach for IoT forensics through IoT device state acquisition

Christopher Meffert, Devon Clark, Ibrahim M. Baggili, Frank Breitinger

Forensic State Acquisition from Internet of Things (FSAIoT): A general framework and practical approach for IoT forensics through IoT device state acquisition

Details
Discussion Comments: 0
Verification: Authors have not verified information

How to Ensure Bad Quality in Metal Additive Manufacturing: In-Situ Infrared Thermography from the Security Perspective

Andrew Slaughter, Mark Yampolskiy, Manyalibo Matthews, Wayne E. King, Gabe Guss, Yuval Elovici

How to Ensure Bad Quality in Metal Additive Manufacturing: In-Situ Infrared Thermography from the Security Perspective

Details
Discussion Comments: 0
Verification: Authors have not verified information

Forensic Image Inspection Assisted by Deep Learning

Felix Mayer, Martin Steinebach

Forensic Image Inspection Assisted by Deep Learning

Details
Discussion Comments: 0
Verification: Authors have not verified information

Position Paper: The Past, Present, and Future of Sanitizable and Redactable Signatures

Arne Bilzhause, Henrich C. Pöhls, Kai Samelin

Position Paper: The Past, Present, and Future of Sanitizable and Redactable Signatures

Details
Discussion Comments: 0
Verification: Authors have not verified information

Towards Semi-automated Detection of Trigger-based Behavior for Software Security Assurance

Dorottya Papp, Levente Buttyán, Zhendong Ma

Towards Semi-automated Detection of Trigger-based Behavior for Software Security Assurance

Details
Discussion Comments: 0
Verification: Authors have not verified information

Towards a Secure SCRUM Process for Agile Web Application Development

Patrik Maier, Zhendong Ma, Roderick Bloem

Towards a Secure SCRUM Process for Agile Web Application Development

Details
Discussion Comments: 0
Verification: Authors have not verified information

Application of the holistic Data Privacy and Security Framework PaaSword: A focus on the integration in industrial Pilots

Sebastian Thomas Schork, Antonia Schwichtenberg, Spiros Alexakis, George Moldovan

Application of the holistic Data Privacy and Security Framework PaaSword: A focus on the integration in industrial Pilots

Details
Discussion Comments: 0
Verification: Authors have not verified information

Rolling DICE: Lightweight Remote Attestation for COTS IoT Hardware

Lukas Jäger, Richard Petri, Andreas Fuchs

Rolling DICE: Lightweight Remote Attestation for COTS IoT Hardware

Details
Discussion Comments: 0
Verification: Authors have not verified information

Security and Privacy Implications of NFC-enabled Contactless Payment Systems

Nicholas Akinyokun, Vanessa Teague

Security and Privacy Implications of NFC-enabled Contactless Payment Systems

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced no artifacts
Verification: Authors have verified information

Enabling Trust Assessment In Clouds-of-Clouds: A Similarity-Based Approach

Reda Yaich, Nora Cuppens, Frédéric Cuppens

Enabling Trust Assessment In Clouds-of-Clouds: A Similarity-Based Approach

Details
Discussion Comments: 0
Verification: Authors have not verified information

A Comparative Study on the Scalability of Dynamic Group Key Agreement Protocols

Orhan Ermis, Serif Bahtiyar, Emin Anarim, M. Ufuk Çaglayan

A Comparative Study on the Scalability of Dynamic Group Key Agreement Protocols

Details
Discussion Comments: 0
Verification: Authors have not verified information

Which Security Requirements Engineering Methodology Should I Choose?: Towards a Requirements Engineering-based Evaluation Approach

Sravani Teja Bulusu, Romain Laborde, Ahmad Samer Wazan, François Barrère, Abdelmalek Benzekri

Which Security Requirements Engineering Methodology Should I Choose?: Towards a Requirements Engineering-based Evaluation Approach

Details
Discussion Comments: 0
Verification: Authors have not verified information

Microblogging in a Privacy-Preserving way

Nikolaos P. Karvelas, Marius Senftleben, Stefan Katzenbeisser

Microblogging in a Privacy-Preserving way

Details
Discussion Comments: 0
Verification: Authors have not verified information

On Using TLS to Secure In-Vehicle Networks

Daniel Zelle, Christoph Krauß, Hubert Strauß, Karsten Schmidt

On Using TLS to Secure In-Vehicle Networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

SensorBuster: On Identifying Sensor Nodes in P2P Botnets

Shankar Karuppayah, Leon Böck, Tim Grube, Selvakumar Manickam, Max Mühlhäuser, Mathias Fischer

SensorBuster: On Identifying Sensor Nodes in P2P Botnets

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Malware and Formal Methods: Rigorous Approaches for detecting Malicious Behaviour

Fabio Martinelli, Francesco Mercaldo, Vittoria Nardone, Antonella Santone

Malware and Formal Methods: Rigorous Approaches for detecting Malicious Behaviour

Details
Discussion Comments: 0
Verification: Authors have not verified information

VMAttack: Deobfuscating Virtualization-Based Packed Binaries

Anatoli Kalysch, Johannes Götzfried, Tilo Müller

VMAttack: Deobfuscating Virtualization-Based Packed Binaries

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Towards DDoS Attack Resilient Wide Area Monitoring Systems

Kubilay Demir, Neeraj Suri

Towards DDoS Attack Resilient Wide Area Monitoring Systems

Details
Discussion Comments: 0
Verification: Authors have not verified information

Attack Potential in Impact and Complexity

Luca Allodi, Fabio Massacci

Attack Potential in Impact and Complexity

Details
Discussion Comments: 0
Verification: Authors have not verified information

Adaptive Resource Management Enabling Deception (ARMED)

Partha P. Pal, Nathaniel Soule, Nate Lageman, Shane S. Clark, Marco M. Carvalho, Adrian Granados, Anthony Alves

Adaptive Resource Management Enabling Deception (ARMED)

Details
Discussion Comments: 0
Verification: Authors have not verified information

ZONESEC: built-in cyber-security for wide area surveillance system

Aljosa Pasic, Jose-Ramon Martinez-Salio, Susana Gonzalez Zarzosa, Rodrigo Diaz

ZONESEC: built-in cyber-security for wide area surveillance system

Details
Discussion Comments: 0
Verification: Authors have not verified information

Busting a Myth: Review of Agile Security Engineering Methods

Kalle Rindell, Sami Hyrynsalmi, Ville Leppänen

Busting a Myth: Review of Agile Security Engineering Methods

Details
Discussion Comments: 0
Verification: Authors have not verified information

Resource Hints in HTML5: A New Pandora's Box of Security Nightmares

Natalija Vlajic, X. Y. Shi, Hamzeh Roumani, Pooria Madani

Resource Hints in HTML5: A New Pandora's Box of Security Nightmares

Details
Discussion Comments: 0
Verification: Authors have not verified information

Security Proofs for Participation Privacy, Receipt-Freeness and Ballot Privacy for the Helios Voting Scheme

David Bernhard, Oksana Kulyk, Melanie Volkamer

Security Proofs for Participation Privacy, Receipt-Freeness and Ballot Privacy for the Helios Voting Scheme

Details
Discussion Comments: 0
Verification: Authors have not verified information

Incremental Clustering for Semi-Supervised Anomaly Detection applied on Log Data

Markus Wurzenberger, Florian Skopik, Max Landauer, Philipp Greitbauer, Roman Fiedler, Wolfgang Kastner

Incremental Clustering for Semi-Supervised Anomaly Detection applied on Log Data

Details
Discussion Comments: 0
Verification: Authors have not verified information

Using Markov Chains to Model Sensor Network Reliability

Tom Arjannikov, Simon Diemert, Sudhakar Ganti, Chloe Lampman, Edward C. Wiebe

Using Markov Chains to Model Sensor Network Reliability

Details
Discussion Comments: 0
Verification: Authors have not verified information

REMI: A Reliable and Secure Multicast Routing Protocol for IoT Networks

Mauro Conti, Pallavi Kaliyar, Chhagan Lal

REMI: A Reliable and Secure Multicast Routing Protocol for IoT Networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

M2M-REP: Reputation of Machines in the Internet of Things

Muhammad Ajmal Azad, Samiran Bag, Feng Hao

M2M-REP: Reputation of Machines in the Internet of Things

Details
Discussion Comments: 0
Verification: Authors have not verified information

A New Data-Hiding Approach for IP Telephony Applications with Silence Suppression

Sabine S. Schmidt, Wojciech Mazurczyk, Jörg Keller, Luca Caviglione

A New Data-Hiding Approach for IP Telephony Applications with Silence Suppression

Details
Discussion Comments: 0
Verification: Authors have not verified information

Systemic Risk Modeling and Evaluation through Simulation and Bayesian Networks

Andrea Tundis, Alfredo Garro, Teresa Gallo, Domenico Saccà, Simona Citrigno, Sabrina Graziano, Max Mühlhäuser

Systemic Risk Modeling and Evaluation through Simulation and Bayesian Networks

Details
Author Comments:
Discussion Comments: 0
Sharing: Other
Verification: Authors have verified information

Towards a Model of User-centered Privacy Preservation

Paul Grace, Mike Surridge

Towards a Model of User-centered Privacy Preservation

Details
Discussion Comments: 0
Verification: Authors have not verified information

PPAndroid-Benchmarker: Benchmarking Privacy Protection Systems on Android Devices

Saeed Ibrahim Alqahtani, Shujun Li

PPAndroid-Benchmarker: Benchmarking Privacy Protection Systems on Android Devices

Details
Discussion Comments: 0
Verification: Authors have not verified information

Establishing Mutually Trusted Channels for Remote Sensing Devices with Trusted Execution Environments

Carlton Shepherd, Raja Naeem Akram, Konstantinos Markantonakis

Establishing Mutually Trusted Channels for Remote Sensing Devices with Trusted Execution Environments

Details
Discussion Comments: 0
Verification: Authors have not verified information

Investigating User Comprehension and Risk Perception of Apple's Touch ID Technology

Yousra Javed, Mohamed Shehab, Emmanuel Bello-Ogunu

Investigating User Comprehension and Risk Perception of Apple's Touch ID Technology

Details
Discussion Comments: 0
Verification: Authors have not verified information

Go with the -Bitcoin- Flow, with Visual Analytics

Stefano Bistarelli, Francesco Santini

Go with the -Bitcoin- Flow, with Visual Analytics

Details
Discussion Comments: 0
Verification: Authors have not verified information

One-Message Unilateral Entity Authentication Schemes

Alfredo De Santis, Manuela Flores, Barbara Masucci

One-Message Unilateral Entity Authentication Schemes

Details
Discussion Comments: 0
Verification: Authors have not verified information

A Low-Cost UAV-Based Secure Location Verification Method

Marco Rasori, Pericle Perazzo, Gianluca Dini

A Low-Cost UAV-Based Secure Location Verification Method

Details
Author Comments:
Discussion Comments: 0
Sharing: Not able to share produced artifacts
Verification: Authors have verified information

Attack Scenario Modeling for Smart Grids Assessment through Simulation

Andrea Tundis, Rolf Egert, Max Mühlhäuser

Attack Scenario Modeling for Smart Grids Assessment through Simulation

Details
Author Comments:
Discussion Comments: 0
Sharing: Other
Verification: Authors have verified information

A Cloud-Based Compilation and Hardening Platform for Android Apps

Marcel Busch, Mykolai Protsenko, Tilo Müller

A Cloud-Based Compilation and Hardening Platform for Android Apps

Details
Discussion Comments: 0
Verification: Authors have not verified information

Learning Android Malware

Khanh-Huu-The Dam, Tayssir Touili

Learning Android Malware

Details
Discussion Comments: 0
Verification: Authors have not verified information

Victim Communication Stack (VCS): A flexible model to select the Human Attack Vector

Enrico Frumento, Federica Freschi, Davide Andreoletti, Angelo Consoli

Victim Communication Stack (VCS): A flexible model to select the Human Attack Vector

Details
Discussion Comments: 0
Verification: Authors have not verified information

SONAR: Automatic Detection of Cyber Security Events over the Twitter Stream

Quentin Le Sceller, ElMouatez Billah Karbab, Mourad Debbabi, Farkhund Iqbal

SONAR: Automatic Detection of Cyber Security Events over the Twitter Stream

Details
Discussion Comments: 0
Verification: Authors have not verified information

Anomaly-Based Detection and Classification of Attacks in Cyber-Physical Systems

Philipp Kreimel, Oliver Eigner, Paul Tavolato

Anomaly-Based Detection and Classification of Attacks in Cyber-Physical Systems

Details
Discussion Comments: 0
Verification: Authors have not verified information

Integrating Reactive Cloud Applications in SERECA

Christof Fetzer, Giovanni Mazzeo, John Oliver, Luigi Romano, Martijn Verburg

Integrating Reactive Cloud Applications in SERECA

Details
Discussion Comments: 0
Verification: Authors have not verified information

A Holistic Approach for Privacy Protection in E-Government

Konstantinos Angelopoulos, Vasiliki Diamantopoulou, Haralambos Mouratidis, Michalis Pavlidis, Mattia Salnitri, Paolo Giorgini, José F. Ruiz

A Holistic Approach for Privacy Protection in E-Government

Details
Discussion Comments: 0
Verification: Authors have not verified information

Timestamp hiccups: Detecting manipulated filesystem timestamps on NTFS

Sebastian Neuner, Artemios G. Voyiatzis, Martin Schmiedecker, Edgar R. Weippl

Timestamp hiccups: Detecting manipulated filesystem timestamps on NTFS

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Lightweight Address Hopping for Defending the IPv6 IoT

Aljosha Judmayer, Johanna Ullrich, Georg Merzdovnik, Artemios G. Voyiatzis, Edgar R. Weippl

Lightweight Address Hopping for Defending the IPv6 IoT

Details
Discussion Comments: 0
Verification: Authors have not verified information

Secure Enrollment of Certificates Using Short PINs

Michael Rossberg, Markus Theil

Secure Enrollment of Certificates Using Short PINs

Details
Discussion Comments: 0
Verification: Authors have not verified information

A Blockchain-based Approach for Data Accountability and Provenance Tracking

Ricardo Neisse, Gary Steri, Igor Nai Fovino

A Blockchain-based Approach for Data Accountability and Provenance Tracking

Details
Discussion Comments: 0
Verification: Authors have not verified information

On the Sequential Pattern and Rule Mining in the Analysis of Cyber Security Alerts

Martin Husák, Jaroslav Kaspar, Elias Bou-Harb, Pavel Celeda

On the Sequential Pattern and Rule Mining in the Analysis of Cyber Security Alerts

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Are Network Covert Timing Channels Statistical Anomalies?

Félix Iglesias, Tanja Zseby

Are Network Covert Timing Channels Statistical Anomalies?

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Artificial Ambient Environments for Proximity Critical Applications

Iakovos Gurulian, Konstantinos Markantonakis, Raja Naeem Akram, Keith Mayes

Artificial Ambient Environments for Proximity Critical Applications

Details
Discussion Comments: 0
Verification: Authors have not verified information

Overcoming Limits of Blockchain for IoT Applications

Francesco Buccafurri, Gianluca Lax, Serena Nicolazzo, Antonino Nocera

Overcoming Limits of Blockchain for IoT Applications

Details
Discussion Comments: 0
Verification: Authors have not verified information

bin2llvm: Analysis of Binary Programs Using LLVM Intermediate Representation

Kevin Kirchner, Stefan Rosenthaler

bin2llvm: Analysis of Binary Programs Using LLVM Intermediate Representation

Details
Discussion Comments: 0
Verification: Authors have not verified information

Orchestrating Privacy Enhancing Technologies and Services with BPM Tools: The WITDOM Data Protection Orchestrator

Nicolás Notario, Eleonora Ciceri, Alberto Crespo, Eduardo González Real, Ilio Catallo, Sauro Vicini

Orchestrating Privacy Enhancing Technologies and Services with BPM Tools: The WITDOM Data Protection Orchestrator

Details
Author Comments:
Discussion Comments: 0
Sharing: Not able to share produced artifacts
Verification: Authors have verified information