| 2017 | A Blockchain-based Approach for Data Accountability and Provenance Tracking. Ricardo Neisse, Gary Steri, Igor Nai Fovino |
| 2017 | A Cloud-Based Compilation and Hardening Platform for Android Apps. Marcel Busch, Mykolai Protsenko, Tilo Müller |
| 2017 | A Comparative Study on the Scalability of Dynamic Group Key Agreement Protocols. Orhan Ermis, Serif Bahtiyar, Emin Anarim, M. Ufuk Çaglayan |
| 2017 | A Holistic Approach for Privacy Protection in E-Government. Konstantinos Angelopoulos, Vasiliki Diamantopoulou, Haralambos Mouratidis, Michalis Pavlidis, Mattia Salnitri, Paolo Giorgini, José Fran. Ruiz |
| 2017 | A Low-Cost UAV-Based Secure Location Verification Method. Marco Rasori, Pericle Perazzo, Gianluca Dini |
| 2017 | A New Data-Hiding Approach for IP Telephony Applications with Silence Suppression. Sabine S. Schmidt, Wojciech Mazurczyk, Jörg Keller, Luca Caviglione |
| 2017 | A Non-Parametric Model for Accurate and Provably Private Synthetic Data Sets. Jordi Soria-Comas, Josep Domingo-Ferrer |
| 2017 | A Trust-based Resilient Routing Mechanism for the Internet of Things. Zeeshan Ali Khan, Johanna Ullrich, Artemios G. Voyiatzis, Peter Herrmann |
| 2017 | Adaptive Resource Management Enabling Deception (ARMED). Partha P. Pal, Nathaniel Soule, Nate Lageman, Shane S. Clark, Marco M. Carvalho, Adrian Granados, Anthony Alves |
| 2017 | An Approach to Botnet Malware Detection Using Nonparametric Bayesian Methods. Joseph DiVita, Roger A. Hallman |
| 2017 | Anomaly Detection for Simulated IEC-60870-5-104 Trafiic. Ersi Hodo, Stepan Grebeniuk, Henri Ruotsalainen, Paul Tavolato |
| 2017 | Anomaly-Based Detection and Classification of Attacks in Cyber-Physical Systems. Philipp Kreimel, Oliver Eigner, Paul Tavolato |
| 2017 | Application of the holistic Data Privacy and Security Framework PaaSword: A focus on the integration in industrial Pilots. Sebastian Thomas Schork, Antonia Schwichtenberg, Spiros Alexakis, George Moldovan |
| 2017 | Application-Specific Digital Forensics Investigative Model in Internet of Things (IoT). Tanveer A. Zia, Peng Liu, Weili Han |
| 2017 | Are Network Covert Timing Channels Statistical Anomalies? Félix Iglesias, Tanja Zseby |
| 2017 | Artificial Ambient Environments for Proximity Critical Applications. Iakovos Gurulian, Konstantinos Markantonakis, Raja Naeem Akram, Keith Mayes |
| 2017 | Attack Potential in Impact and Complexity. Luca Allodi, Fabio Massacci |
| 2017 | Attack Scenario Modeling for Smart Grids Assessment through Simulation. Andrea Tundis, Rolf Egert, Max Mühlhäuser |
| 2017 | Authentication Shutter: Alternative Countermeasure against Password Reuse Attack by Availability Control. Tetsuji Takada |
| 2017 | Busting a Myth: Review of Agile Security Engineering Methods. Kalle Rindell, Sami Hyrynsalmi, Ville Leppänen |
| 2017 | C'mon: Monitoring the Compliance of Cloud Services to Contracted Properties. Soha Alboghdady, Stefan Winter, Ahmed Taha, Heng Zhang, Neeraj Suri |
| 2017 | Constrained PET Composition for Measuring Enforced Privacy. Sebastian Funke, Alexander Wiesmaier, Jörg Daubert |
| 2017 | Continuous Biometric Verification for Non-Repudiation of Remote Services. Enrico Schiavone, Andrea Ceccarelli, Andrea Bondavalli |
| 2017 | DevOps for Better Software Security in the Cloud Invited Paper. Martin Gilje Jaatun, Daniela S. Cruzes, Jesus Luna |
| 2017 | DoS Attacks on Controller Area Networks by Fault Injections from the Software Layer. Pal-Stefan Murvay, Bogdan Groza |
| 2017 | Efficient ID-based Designated Verifier Signature. Olivier Blazy, Emmanuel Conchon, Paul Germouty, Amandine Jambert |
| 2017 | Enabling Trust Assessment In Clouds-of-Clouds: A Similarity-Based Approach. Reda Yaich, Nora Cuppens, Frédéric Cuppens |
| 2017 | End-node Fingerprinting for Malware Detection on HTTPS Data. Tomás Komárek, Petr Somol |
| 2017 | Establishing Mutually Trusted Channels for Remote Sensing Devices with Trusted Execution Environments. Carlton Shepherd, Raja Naeem Akram, Konstantinos Markantonakis |
| 2017 | FROST: Anti-Forensics Digital-Dead-DROp Information Hiding RobuST to Detection & Data Loss with Fault tolerance. Avinash Srinivasan, Hunter Dong, Angelos Stavrou |
| 2017 | Forensic Image Inspection Assisted by Deep Learning. Felix Mayer, Martin Steinebach |
| 2017 | Forensic State Acquisition from Internet of Things (FSAIoT): A general framework and practical approach for IoT forensics through IoT device state acquisition. Christopher Meffert, Devon Clark, Ibrahim M. Baggili, Frank Breitinger |
| 2017 | Fully threshold broadcast encryption. Sigurd Eskeland |
| 2017 | Go with the -Bitcoin- Flow, with Visual Analytics. Stefano Bistarelli, Francesco Santini |
| 2017 | How to Ensure Bad Quality in Metal Additive Manufacturing: In-Situ Infrared Thermography from the Security Perspective. Andrew Slaughter, Mark Yampolskiy, Manyalibo Matthews, Wayne E. King, Gabe Guss, Yuval Elovici |
| 2017 | Identification of Dependency-based Attacks on Node.js. Brian Pfretzschner, Lotfi Ben Othmane |
| 2017 | Implementing Secure DevOps assessment for highly regulated environments. Hasan Yasar |
| 2017 | Incremental Clustering for Semi-Supervised Anomaly Detection applied on Log Data. Markus Wurzenberger, Florian Skopik, Max Landauer, Philipp Greitbauer, Roman Fiedler, Wolfgang Kastner |
| 2017 | Insider Misuse Attribution using Biometrics. Abdulrahman Alruban, Nathan L. Clarke, Fudong Li, Steven Furnell |
| 2017 | Integrating Reactive Cloud Applications in SERECA. Christof Fetzer, Giovanni Mazzeo, John Oliver, Luigi Romano, Martijn Verburg |
| 2017 | Investigating User Comprehension and Risk Perception of Apple's Touch ID Technology. Yousra Javed, Mohamed Shehab, Emmanuel Bello-Ogunu |
| 2017 | Investigating the darknet: limitations in Slovenian legal system. Anze Mihelic, Blaz Markelj, Igor Bernik, Sabina Zgaga |
| 2017 | JSDES: An Automated De-Obfuscation System for Malicious JavaScript. Moataz AbdelKhalek, Ahmed F. Shosha |
| 2017 | Learning Android Malware. Khanh-Huu-The Dam, Tayssir Touili |
| 2017 | Lightweight Address Hopping for Defending the IPv6 IoT. Aljosha Judmayer, Johanna Ullrich, Georg Merzdovnik, Artemios G. Voyiatzis, Edgar R. Weippl |
| 2017 | M2M-REP: Reputation of Machines in the Internet of Things. Muhammad Ajmal Azad, Samiran Bag, Feng Hao |
| 2017 | Machine Learning Approach for Detection of nonTor Traffic. Elike Hodo, Xavier J. A. Bellekens, Ephraim Iorkyase, Andrew W. Hamilton, Christos Tachtatzis, Robert C. Atkinson |
| 2017 | Malware and Formal Methods: Rigorous Approaches for detecting Malicious Behaviour. Fabio Martinelli, Francesco Mercaldo, Vittoria Nardone, Antonella Santone |
| 2017 | Measuring privacy in high dimensional microdata collections. Spyros Boukoros, Stefan Katzenbeisser |
| 2017 | Memory carving can finally unveil your embedded personal data. Thomas Gougeon, Morgan Barbier, Patrick Lacharme, Gildas Avoine, Christophe Rosenberger |
| 2017 | Microblogging in a Privacy-Preserving way. Nikolaos P. Karvelas, Marius Senftleben, Stefan Katzenbeisser |
| 2017 | NEXTLEAP: Decentralizing Identity with Privacy for Secure Messaging. Harry Halpin |
| 2017 | On Using TLS to Secure In-Vehicle Networks. Daniel Zelle, Christoph Krauß, Hubert Strauß, Karsten Schmidt |
| 2017 | On the Sequential Pattern and Rule Mining in the Analysis of Cyber Security Alerts. Martin Husák, Jaroslav Kaspar, Elias Bou-Harb, Pavel Celeda |
| 2017 | On the Usefulness of Compression Models for Authorship Verification. Oren Halvani, Christian Winter, Lukas Graner |
| 2017 | One-Message Unilateral Entity Authentication Schemes. Alfredo De Santis, Manuela Flores, Barbara Masucci |
| 2017 | Orchestrating Privacy Enhancing Technologies and Services with BPM Tools: The WITDOM Data Protection Orchestrator. Nicolás Notario, Eleonora Ciceri, Alberto Crespo, Eduardo González Real, Ilio Catallo, Sauro Vicini |
| 2017 | Overcoming Limits of Blockchain for IoT Applications. Francesco Buccafurri, Gianluca Lax, Serena Nicolazzo, Antonino Nocera |
| 2017 | PPAndroid-Benchmarker: Benchmarking Privacy Protection Systems on Android Devices. Saeed Ibrahim Alqahtani, Shujun Li |
| 2017 | Popularity-based Detection of Domain Generation Algorithms. Jasper Abbink, Christian Doerr |
| 2017 | Position Paper: The Past, Present, and Future of Sanitizable and Redactable Signatures. Arne Bilzhause, Henrich C. Pöhls, Kai Samelin |
| 2017 | Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29 - September 01, 2017 |
| 2017 | Protecting Future Maritime Communication. Christian Frøystad, Karin Bernsmed, Per Håkon Meland |
| 2017 | Protection of personal data in security alert sharing platforms. Václav Stupka, Martin Horák, Martin Husák |
| 2017 | Provisioning Software with Hardware-Software Binding. Robert P. Lee, Konstantinos Markantonakis, Raja Naeem Akram |
| 2017 | Quantifying the Spectrum of Denial-of-Service Attacks through Internet Backscatter. Norbert Blenn, Vincent Ghiëtte, Christian Doerr |
| 2017 | Quantitave Dynamic Taint Analysis of Privacy Leakage in Android Arabic Apps. Ayman Youssef, Ahmed F. Shosha |
| 2017 | REMI: A Reliable and Secure Multicast Routing Protocol for IoT Networks. Mauro Conti, Pallavi Kaliyar, Chhagan Lal |
| 2017 | Reliable Behavioural Factors in the Information Security Context. Peter Mayer, Alexandra Kunz, Melanie Volkamer |
| 2017 | Resource Hints in HTML5: A New Pandora's Box of Security Nightmares. Natalija Vlajic, Xue Ying Shi, Hamzeh Roumani, Pooria Madani |
| 2017 | Rolling DICE: Lightweight Remote Attestation for COTS IoT Hardware. Lukas Jäger, Richard Petri, Andreas Fuchs |
| 2017 | SAFE and Secure: Deeply Integrating Security in a New Hazard Analysis. Sam Procter, Eugene Y. Vasserman, John Hatcliff |
| 2017 | SONAR: Automatic Detection of Cyber Security Events over the Twitter Stream. Quentin Le Sceller, ElMouatez Billah Karbab, Mourad Debbabi, Farkhund Iqbal |
| 2017 | Searchable Encryption with Access Control. Nils Löken |
| 2017 | Secure Enrollment of Certificates Using Short PINs. Michael Rossberg, Markus Theil |
| 2017 | Secure Matrix Multiplication with MapReduce. Xavier Bultel, Radu Ciucanu, Matthieu Giraud, Pascal Lafourcade |
| 2017 | Secure and Efficient Data Sharing with Atribute-based Proxy Re-encryption Scheme. Masoomeh Sepehri, Alberto Trombetta |
| 2017 | Security Analysis of Cordova Applications in Google Play. Michiel Willocx, Jan Vossaert, Vincent Naessens |
| 2017 | Security Proofs for Participation Privacy, Receipt-Freeness and Ballot Privacy for the Helios Voting Scheme. David Bernhard, Oksana Kulyk, Melanie Volkamer |
| 2017 | Security and Privacy Implications of NFC-enabled Contactless Payment Systems. Nicholas Akinyokun, Vanessa Teague |
| 2017 | Self-healing Multi-Cloud Application Modelling. Erkuden Rios, Eider Iturbe, Maria Carmen Palacios |
| 2017 | SensorBuster: On Identifying Sensor Nodes in P2P Botnets. Shankar Karuppayah, Leon Böck, Tim Grube, Selvakumar Manickam, Max Mühlhäuser, Mathias Fischer |
| 2017 | Source Code Patterns of SQL Injection Vulnerabilities. Felix Schuckert, Basel Katt, Hanno Langweg |
| 2017 | Systemic Risk Modeling and Evaluation through Simulation and Bayesian Networks. Andrea Tundis, Alfredo Garro, Teresa Gallo, Domenico Saccà, Simona Citrigno, Sabrina Graziano, Max Mühlhäuser |
| 2017 | The Archistar Secret-Sharing Backup Proxy. Andreas Happe, Florian Wohner, Thomas Lorünser |
| 2017 | The Demon is in the Configuration: Revisiting Hybrid Mobile Apps Configuration Model. Abeer Al Jarrah, Mohamed Shehab |
| 2017 | Timestamp hiccups: Detecting manipulated filesystem timestamps on NTFS. Sebastian Neuner, Artemios G. Voyiatzis, Martin Schmiedecker, Edgar R. Weippl |
| 2017 | Towards DDoS Attack Resilient Wide Area Monitoring Systems. Kubilay Demir, Neeraj Suri |
| 2017 | Towards Semi-automated Detection of Trigger-based Behavior for Software Security Assurance. Dorottya Papp, Levente Buttyán, Zhendong Ma |
| 2017 | Towards a Model of User-centered Privacy Preservation. Paul Grace, Mike Surridge |
| 2017 | Towards a Secure SCRUM Process for Agile Web Application Development. Patrik Maier, Zhendong Ma, Roderick Bloem |
| 2017 | Towards the Adoption of Secure Cloud Identity Services. Alexandros Kostopoulos, Evangelos Sfakianakis, Ioannis P. Chochliouros, John Sören Pettersson, Stephan Krenn, Welderufael Tesfay, Andrea Migliavacca, Felix Hörandner |
| 2017 | Type Me the Truth!: Detecting Deceitful Users via Keystroke Dynamics. Merylin Monaro, Riccardo Spolaor, Qianqian Li, Mauro Conti, Luciano Gamberini, Giuseppe Sartori |
| 2017 | Using Ciphers for Failure-Recovery in ITS Systems. Mustafa Ayoob, Wael Adi, Vassilis Prevelakis |
| 2017 | Using Markov Chains to Model Sensor Network Reliability. Tom Arjannikov, Simon Diemert, Sudhakar Ganti, Chloe Lampman, Edward C. Wiebe |
| 2017 | VMAttack: Deobfuscating Virtualization-Based Packed Binaries. Anatoli Kalysch, Johannes Götzfried, Tilo Müller |
| 2017 | Victim Communication Stack (VCS): A flexible model to select the Human Attack Vector. Enrico Frumento, Federica Freschi, Davide Andreoletti, Angelo Consoli |
| 2017 | Which Security Requirements Engineering Methodology Should I Choose?: Towards a Requirements Engineering-based Evaluation Approach. Sravani Teja Bulusu, Romain Laborde, Ahmad Samer Wazan, François Barrère, Abdelmalek Benzekri |
| 2017 | ZONESEC: built-in cyber-security for wide area surveillance system. Aljosa Pasic, Jose-Ramon Martinez-Salio, Susana Gonzalez Zarzosa, Rodrigo Diaz |
| 2017 | bin2llvm: Analysis of Binary Programs Using LLVM Intermediate Representation. Kevin Kirchner, Stefan Rosenthaler |
| 2017 | k-rAC: a Fine-Grained k-Resilient Access Control Scheme for Distributed Hash Tables. Olga Kieselmann, Arno Wacker, Gregor Schiele |