ARES B

109 papers

YearTitle / Authors
20196G Network Needs to Support Embedded Trust.
Raimo Kantola
2019A First ISA-Level Characterization of EM Pulse Effects on Superscalar Microarchitectures: A Secure Software Perspective.
Julien Proy, Karine Heydemann, Alexandre Berzati, Fabien Majéric, Albert Cohen
2019A Location Privacy Analysis of Bluetooth Mesh.
Matthias Caesar, Jan Steffan
2019A Misuse Pattern for Compromising VMs via Virtual Machine Escape in NFV.
Abdulrahman Khalid Alnaim, Ahmed M. Alwakeel, Eduardo B. Fernández
2019A Pattern for a Virtual Network Function (VNF).
Ahmed M. Alwakeel, Abdulrahman Khalid Alnaim, Eduardo B. Fernández
2019A Quantitative Evaluation of Trust in the Quality of Cyber Threat Intelligence Sources.
Thomas Schaberreiter, Veronika Kupfersberger, Konstantinos Rantos, Arnolnt Spyros, Alexandros Papanikolaou, Christos Ilioudis, Gerald Quirchmayr
2019A Secure Publish/Subscribe Protocol for Internet of Things.
Lukas Malina, Gautam Srivastava, Petr Dzurenda, Jan Hajny, Radek Fujdiak
2019A Study of Network Forensic Investigation in Docker Environments.
Daniel Spiekermann, Tobias Eggendorfer, Jörg Keller
2019A Systematic Analysis of User Evaluations in Security Research.
Peter Hamm, David Harborth, Sebastian Pape
2019AIDA Framework: Real-Time Correlation and Prediction of Intrusion Detection Alerts.
Martin Husák, Jaroslav Kaspar
2019AMON: an Automaton MONitor for Industrial Cyber-Physical Security.
Giuseppe Bernieri, Mauro Conti, Gabriele Pozzan
2019Adversarial Communication Networks Modeling for Intrusion Detection Strengthened against Mimicry.
Jorge Maestre Vidal, Marco Antonio Sotelo Monge
2019Alexa's Voice Recording Behavior: A Survey of User Understanding and Awareness.
Yousra Javed, Shashank Sethi, Akshay Jadoun
2019An Analysis Framework for Product Prices and Supplies in Darknet Marketplaces.
York Yannikos, Julian Heeger, Maria Brockmeyer
2019An Attribute-Based Privacy-Preserving Ethereum Solution for Service Delivery with Accountability Requirements.
Francesco Buccafurri, Vincenzo De Angelis, Gianluca Lax, Lorenzo Musarella, Antonia Russo
2019Analyzing Android's File-Based Encryption: Information Leakage through Unencrypted Metadata.
Tobias Groß, Matanat Ahmadova, Tilo Müller
2019Anonymous Identity Based Encryption with Traceable Identities.
Olivier Blazy, Laura Brouilhet, Duong Hieu Phan
2019Applicability of the IEC 62443 standard in Industry 4.0 / IIoT.
Björn Leander, Aida Causevic, Hans Hansson
2019Applying Security Testing Techniques to Automotive Engineering.
Irdin Pekaric, Clemens Sauerwein, Michael Felderer
2019Assessing the Applicability of Authorship Verification Methods.
Oren Halvani, Christian Winter, Lukas Graner
2019Automated Cyber Threat Sensing and Responding: Integrating Threat Intelligence into Security-Policy-Controlled Systems.
Peter Amthor, Daniel Fischer, Winfried E. Kühnhauser, Dirk Stelzer
2019Automated Pattern Inference Based on Repeatedly Observed Malware Artifacts.
Christian Doll, Arnold Sykosch, Marc Ohm, Michael Meier
2019Behavior-Aware Network Segmentation using IP Flows.
Juraj Smeriga, Tomás Jirsík
2019Black Box Attacks on Deep Anomaly Detectors.
Aditya Kuppa, Slawomir Grzonkowski, Muhammad Rizwan Asghar, Nhien-An Le-Khac
2019Blockchain Trilemma Solver Algorand has Dilemma over Undecidable Messages.
Mauro Conti, Ankit Gangwal, Michele Todero
2019Building Taxonomies based on Human-Machine Teaming: Cyber Security as an Example.
Mohamad Imad Mahaini, Shujun Li, Rahime Belen Saglam
2019Characterizing the Redundancy of DarkWeb .onion Services.
Pavlo Burda, Coen Boot, Luca Allodi
2019Costing Secure Software Development: A Systematic Mapping Study.
Elaine Venson, Xiaomeng Guo, Zidi Yan, Barry W. Boehm
2019Cyber Security Skill Set Analysis for Common Curricula Development.
Muhammad Mudassar Yamin, Basel Katt
2019Cyber Threat Information Sharing: Perceived Benefits and Barriers.
Adam Zibak, Andrew Simpson
2019DEMISe: Interpretable Deep Extraction and Mutual Information Selection Techniques for IoT Intrusion Detection.
Luke R. Parker, Paul D. Yoo, A. Taufiq Asyhari, Lounis Chermak, Yoonchan Jhi, Kamal Taha
2019DTE Access Control Model for Integrated ICS Systems.
Khaoula Es-Salhi, David Espes, Nora Cuppens
2019Data-driven Curation, Learning and Analysis for Inferring Evolving IoT Botnets in the Wild.
Morteza Safaei Pour, Antonio Mangino, Kurt Friday, Matthias Rathbun, Elias Bou-Harb, Farkhund Iqbal, Khaled B. Shaban, Abdelkarim Erradi
2019Decision Support for Mission-Centric Cyber Defence.
Michal Javorník, Jana Komárková, Martin Husák
2019Deep Learning-based Facial Detection and Recognition in Still Images for Digital Forensics.
Patrício Domingues, Alexandre Frazão Rosário
2019Detecting DGA domains with recurrent neural networks and side information.
Ryan R. Curtin, Andrew B. Gardner, Slawomir Grzonkowski, Alexey Kleymenov, Alejandro Mosquera
2019Detection and Analysis of Tor Onion Services.
Martin Steinebach, Marcel Schäfer, Alexander Karakuz, Katharina Brandl, York Yannikos
2019Does "www." Mean Better Transport Layer Security?
Eman Salem Alashwali, Pawel Szalachowski, Andrew Martin
2019E2E Verifiable Borda Count Voting System without Tallying Authorities.
Samiran Bag, Muhammad Ajmal Azad, Feng Hao
2019Efficient Attack Countermeasure Selection Accounting for Recovery and Action Costs.
Jukka Soikkeli, Luis Muñoz-González, Emil Lupu
2019Energy Attack in LoRaWAN: Experimental Validation.
Konstantin Mikhaylov, Radek Fujdiak, Ari Pouttu, Miroslav Voznák, Lukas Malina, Petr Mlynek
2019Enhancing credibility of digital evidence through provenance-based incident response handling.
Ludwig Englbrecht, Gregor Langner, Günther Pernul, Gerald Quirchmayr
2019Examining and Constructing Attacker Categorisations: an Experimental Typology for Digital Banking.
Caroline Moeckel
2019Fake News Detection by Image Montage Recognition.
Martin Steinebach, Karol Gotkowski, Huajian Liu
2019Federated Identity Management and Interoperability for Heterogeneous Cloud Platform Ecosystems.
Nirojan Selvanathan, Dileepa Jayakody, Violeta Damjanovic-Behrendt
2019Fine-tuning of Distributed Network Covert Channels Parameters and Their Impact on Undetectability.
Krzysztof Cabaj, Wojciech Mazurczyk, Piotr Nowakowski, Piotr Zórawski
2019Framework for Anticipatory Self-Protective 5G Environments.
Jorge Maestre Vidal, Marco Antonio Sotelo Monge
2019GDPR Compliance in Cybersecurity Software: A Case Study of DPIA in Information Sharing Platform.
Martin Horák, Václav Stupka, Martin Husák
2019HEHLKAPPE: Utilizing Deep Learning to Manipulate Surveillance Camera Footage in Real-Time.
Alexander Aigner, Rene Zeller
2019IO-Trust: An out-of-band trusted memory acquisition for intrusion detection and Forensics investigations in cloud IOMMU based systems.
Ahmad Atamli, Giuseppe Petracca, Jon Crowcroft
2019Improved Manipulation Detection with Convolutional Neural Network for JPEG Images.
Huajian Liu, Martin Steinebach, Kathrin Schölei
2019Improving Borderline Adulthood Facial Age Estimation through Ensemble Learning.
Felix Anda, David Lillis, Aikaterini Kanta, Brett A. Becker, Elias Bou-Harb, Nhien-An Le-Khac, Mark Scanlon
2019Introducing Dead Drops to Network Steganography using ARP-Caches and SNMP-Walks.
Tobias Schmidbauer, Steffen Wendzel, Aleksandra Mileva, Wojciech Mazurczyk
2019IoT Ignorance is Digital Forensics Research Bliss: A Survey to Understand IoT Forensics Definitions, Challenges and Future Research Directions.
Tina Wu, Frank Breitinger, Ibrahim M. Baggili
2019IoT-HarPSecA: A Framework for Facilitating the Design and Development of Secure IoT Devices.
Musa G. Samaila, Moser Z. V. José, João B. F. Sequeiros, Mário M. Freire, Pedro R. M. Inácio
2019Language-based Integration of Digital Forensics & Incident Response.
Christopher Stelly, Vassil Roussev
2019Large-Scale Analysis of Pop-Up Scam on Typosquatting URLs.
Tobias Dam, Lukas Daniel Klausner, Damjan Buhov, Sebastian Schrittwieser
2019Learning Software Security in Context: An Evaluation in Open Source Software Development Environment.
Shao-Fang Wen, Basel Katt
2019Leveraging Kernel Security Mechanisms to Improve Container Security: a Survey.
Maxime Bélair, Sylvie Laniepce, Jean-Marc Menaud
2019Limits in the data for detecting criminals on social media.
Andrea Tundis, Leon Böck, Victoria Stanilescu, Max Mühlhäuser
2019Location Tracking Using Smartphone Accelerometer and Magnetometer Traces.
Khuong An Nguyen, Raja Naeem Akram, Konstantinos Markantonakis, Zhiyuan Luo, Chris Watkins
2019Managing Security in Software: Or: How I Learned to Stop Worrying and Manage the Security Technical Debt.
Kalle Rindell, Karin Bernsmed, Martin Gilje Jaatun
2019Managing the Overestimation of Resilience.
Thomas Clédel, Nora Cuppens, Frédéric Cuppens
2019Map My Murder: A Digital Forensic Study of Mobile Health and Fitness Applications.
Courtney Hassenfeldt, Shabana Baig, Ibrahim M. Baggili, Xiaolu Zhang
2019Methodology for the Automated Metadata-Based Classification of Incriminating Digital Forensic Artefacts.
Xiaoyu Du, Mark Scanlon
2019Model Driven Security in a Mobile Banking Application Context.
Serafettin Sentürk, Hasan Yasar, Ibrahim Sogukpinar
2019NERD: Network Entity Reputation Database.
Václav Bartos
2019Near-optimal Evasion of Randomized Convex-inducing Classifiers in Adversarial Environments.
Pooria Madani, Natalija Vlajic
2019Obfuscation-Resilient Code Recognition in Android Apps.
Johannes Feichtner, Christof Rabensteiner
2019On the Exploitation of Online SMS Receiving Services to Forge ID Verification.
Mohammad Hajian Berenjestanaki, Mauro Conti, Ankit Gangwal
2019On the Utility of Synthetic Data: An Empirical Evaluation on Machine Learning Tasks.
Markus Hittmeir, Andreas Ekelhart, Rudolf Mayer
2019Ontology of Metrics for Cyber Security Assessment.
Elena Doynikova, Andrey Fedorchenko, Igor V. Kotenko
2019Performance Evaluation of Elliptic Curve Libraries on Automotive-Grade Microcontrollers.
Lucian Popa, Bogdan Groza, Pal-Stefan Murvay
2019Plug-and-Patch: Secure Value Added Services for Electric Vehicle Charging.
Lucas Buschlinger, Markus Springer, Maria Zhdanova
2019PoliDOM: Mitigation of DOM-XSS by Detection and Prevention of Unauthorized DOM Tampering.
Junaid Iqbal, Ratinder Kaur, Natalia Stakhanova
2019Post-Quantum Cryptography in Embedded Systems.
Soundes Marzougui, Juliane Krämer
2019Post-Quantum UC-Secure Oblivious Transfer in the Standard Model with Adaptive Corruptions.
Olivier Blazy, Céline Chevalier, Quoc-Huy Vu
2019Practical Group-Signatures with Privacy-Friendly Openings.
Stephan Krenn, Kai Samelin, Christoph Striecks
2019Preserving context security in AWS IoT Core.
Luca Calderoni
2019Privacy and Robust Hashes.
Martin Steinebach, Sebastian Lutz, Huajian Liu
2019Privacy-Enhancing Context Authentication from Location-Sensitive Data.
Pradip Mainali, Carlton Shepherd, Fabien A. P. Petitcolas
2019Privacy-Enhancing Fall Detection from Remote Sensor Data Using Multi-Party Computation.
Pradip Mainali, Carlton Shepherd
2019Productivity and Patterns of Activity in Bug Bounty Programs: Analysis of HackerOne and Google Vulnerability Research.
Donatello Luna, Luca Allodi, Marco Cremonini
2019Protocol-independent Detection of "Messaging Ordering" Network Covert Channels.
Steffen Wendzel
2019Realistically Fingerprinting Social Media Webpages in HTTPS Traffic.
Mariano Di Martino, Peter Quax, Wim Lamotte
2019Requirements and Recommendations for IoT/IIoT Models to automate Security Assurance through Threat Modelling, Security Analysis and Penetration Testing.
Ralph Ankele, Stefan Marksteiner, Kai Nahrgang, Heribert Vallant
2019Revisiting Data Hiding Techniques for Apple File System.
Thomas Göbel, Jan Türr, Harald Baier
2019SET-OT: A Secure Equality Testing Protocol Based on Oblivious Transfer.
Ferhat Karakoç, Majid Nateghizad, Zekeriya Erkin
2019STAMAD: a STAtic MAlware Detector.
Khanh-Huu-The Dam, Tayssir Touili
2019Securing Ethernet-based Optical Fronthaul for 5G Network.
Joo Yeon Cho, Andrew Sergeev, Jim Zou
2019Securing V2X Communications for the Future: Can PKI Systems offer the answer?
Thanassis Giannetsos, Ioannis Krontiris
2019Securing the Device Drivers of Your Embedded Systems: Framework and Prototype.
Zhuohua Li, Jincheng Wang, Mingshen Sun, John C. S. Lui
2019Semantic Mediation for A Posteriori Log Analysis.
Farah Dernaika, Nora Cuppens-Boulahia, Frédéric Cuppens, Olivier Raynaud
2019Sniffing Detection within the Network: Revisiting Existing and Proposing Novel Approaches.
Krzysztof Cabaj, Marcin Gregorczyk, Wojciech Mazurczyk, Piotr Nowakowski, Piotr Zórawski
2019SocialTruth Project Approach to Online Disinformation (Fake News) Detection and Mitigation.
Michal Choras, Marek Pawlicki, Rafal Kozik, Konstantinos P. Demestichas, Pavlos Kosmides, Manik Gupta
2019Strong Tenant Separation in Cloud Computing Platforms.
Michael Pfeiffer, Michael Rossberg, Simon Buttgereit, Guenter Schaefer
2019The Internet Banking [in]Security Spiral: Past, Present, and Future of Online Banking Protection Mechanisms based on a Brazilian case study.
Marcus Botacin, Anatoli Kalysch, André Grégio
2019The Security Intention Meeting Series as a way to increase visibility of software security decisions in agile development projects.
Inger Anne Tøndel, Daniela Soares Cruzes, Martin Gilje Jaatun, Kalle Rindell
2019The power of interpretation: Qualitative methods in cybersecurity research.
Damjan Fujs, Anze Mihelic, Simon L. R. Vrhovec
2019Thieves in the Browser: Web-based Cryptojacking in the Wild.
Marius Musch, Christian Wressnegger, Martin Johns, Konrad Rieck
2019Towards Efficient Reconstruction of Attacker Lateral Movement.
Florian Wilkens, Steffen Haas, Dominik Kaaser, Peter Kling, Mathias Fischer
2019Towards Reversible Storage Network Covert Channels.
Wojciech Mazurczyk, Przemyslaw Szary, Steffen Wendzel, Luca Caviglione
2019Towards a Security Architecture for Hybrid WMNs.
Markus Theil, Martin Backhaus, Michael Rossberg, Guenter Schaefer
2019Towards a framework for detecting advanced Web bots.
Christos Iliou, Theodoros Kostoulas, Theodora Tsikrika, Vasilis Katos, Stefanos Vrochidis, Yiannis Kompatsiaris
2019Using Context and Provenance to defend against USB-borne attacks.
Tobias Mueller, Ephraim Zimmer, Ludovico de Nittis
2019Using Temporal and Topological Features for Intrusion Detection in Operational Networks.
Simon D. Duque Antón, Daniel Fraunholz, Hans Dieter Schotten
2019Zero Residual Attacks on Industrial Control Systems and Stateful Countermeasures.
Hamid Reza Ghaeini, Nils Ole Tippenhauer, Jianying Zhou
2019eBook Readers, Location Surveillance and the Threat to Freedom of Association.
Stephen B. Wicker
2018Proceedings of the 14th International Conference on Availability, Reliability and Security, ARES 2019, Canterbury, UK, August 26-29, 2019.