ICISSP C

81 papers

YearTitle / Authors
2017"Mirror, Mirror on the Wall, Who is the Fairest One of All?" - Machine Learning versus Model Checking: A Comparison between Two Static Techniques for Malware Family Identification.
Vittoria Nardone, Corrado Aaron Visaggio
2017A Collaborative Tool for Modelling Multi-stage Attacks.
Ian Herwono, Fadi Ali El-Moussa
2017A Design of Secure and ReliableWireless Transmission Channel for Implantable Medical Devices.
Lake Bu, Mark G. Karpovsky
2017A Formal Model of Web Security Showing Malicious Cross Origin Requests and Its Mitigation using CORP.
Krishna Chaitanya Telikicherla, Akash Agrawall, Venkatesh Choppella
2017A Methodology of Security Pattern Classification and of Attack-Defense Tree Generation.
Loukmen Regainia, Sébastien Salva
2017A Review of Risk Identification Approaches in the Telecommunication Domain.
Ahmed Seid Yesuf
2017A Technique for Extraction and Analysis of Application Heap Objects within Android Runtime (ART).
Alberto Magno Muniz Soares, Rafael Timóteo de Sousa Jr.
2017An Anti-Phishing Kit Scheme for Secure Web Transactions.
Abdul A. Orunsolu, Adesina S. Sodiya
2017Analysis and Assessment of Situational Awareness Models for National Cyber Security Centers.
Timea Pahi, Maria Leitner, Florian Skopik
2017Analysis of Data Sharing Agreements.
Gianpiero Costantino, Fabio Martinelli, Ilaria Matteucci, Marinella Petrocchi
2017Assessing Information Security Risks using Pairwise Weighting.
Henrik Karlzén, Johan E. Bengtsson, Jonas Hallberg
2017Attribute Permutation Steganography Detection using Attribute Position Changes Count.
Iman Sedeeq, Frans Coenen, Alexei Lisitsa
2017Batch-verifiable Secret Sharing with Unconditional Privacy.
Stephan Krenn, Thomas Lorünser, Christoph Striecks
2017Breaking a Hitag2 Protocol with Low Cost Technology.
V. Gayoso Martínez, Luis Hernández Encinas, Agustín Martín Muñoz, J. Zhang
2017Brute Force Cryptanalysis of MIFARE Classic Cards on GPU.
Cihangir Tezcan
2017Characterization of Tor Traffic using Time based Features.
Arash Habibi Lashkari, Gerard Draper-Gil, Mohammad Saiful Islam Mamun, Ali A. Ghorbani
2017CyTrONE: An Integrated Cybersecurity Training Framework.
Razvan Beuran, Cuong Pham, Dat Tang, Ken-ichi Chinen, Yasuo Tan, Yoichi Shinoda
2017Cyber-interdependency in Smart Energy Systems.
Razgar Ebrahimy, Zoya Pourmirza
2017Design of an Anomaly-based Threat Detection & Explication System.
Robert Luh, Sebastian Schrittwieser, Stefan Marschalek, Helge Janicke
2017Distance-bounding Identification.
Ahmad Ahmadi, Reihaneh Safavi-Naini
2017Distributed Protocols at the Rescue for Trustworthy Online Voting.
Robert Riemann, Stéphane Grumbach
2017Enhanced Identification of Sensitive User Inputs in Mobile Applications.
Mashael Aldayel, Mohammad Alhussain
2017Enhancing Accuracy of Android Malware Detection using Intent Instrumentation.
Shahrooz Pooryousef, Morteza Amini
2017Exploration of the Potential of Process Mining for Intrusion Detection in Smart Metering.
Günther Eibl, Cornelia Ferner, Tobias Hildebrandt, Florian Stertz, Sebastian Burkhart, Stefanie Rinderle-Ma, Dominik Engel
2017Extending the Same Origin Policy with Origin Attributes.
Tanvi Vyas, Andrea Marchesini, Christoph Kerschbaumer
2017Extracting Android Malicious Behaviors.
Khanh-Huu-The Dam, Tayssir Touili
2017Fingerprint Class Recognition for Securing EMV Transaction.
Benoît Vibert, Jean-Marie Le Bars, Christophe Rosenberger, Christophe Charrier
2017From Situation Awareness to Action: An Information Security Management Toolkit for Socio-technical Security Retrospective and Prospective Analysis.
Jean-Louis Huynen, Gabriele Lenzini
2017Gamification of Information Security Awareness and Training.
Eyvind Garder B. Gjertsen, Erlend Andreas Gjære, Maria Bartnes, Waldo Rocha Flores
2017Glassbox: Dynamic Analysis Platform for Malware Android Applications on Real Devices.
Paul Irolla, Eric Filiol
2017Hacking of the AES with Boolean Functions.
Michel Dubois, Eric Filiol
2017Health Information Exchange and Related IT-security Practices in European Hospitals.
Sylvestre Uwizeyemungu, Placide Poba-Nzaou
2017Hypervisor based Memory Introspection: Challenges, Problems and Limitations.
Andrei Lutas, Daniel Ticle, Octavian Cret
2017Identifying Mobile Repackaged Applications through Formal Methods.
Fabio Martinelli, Francesco Mercaldo, Vittoria Nardone, Antonella Santone, Corrado Aaron Visaggio
2017Identity Deception Detection on Social Media Platforms.
Estée van der Walt, Jan H. P. Eloff
2017Improved Greedy Nonrandomness Detectors for Stream Ciphers.
Linus Karlsson, Martin Hell, Paul Stankovski
2017Improving the Automatic Identification of Malicious Android Apps in Unofficial Stores through Logo Analysis.
Luca Vollero, Daniele Biondo, Roberto Setola, Gianluca Bocci, Rocco Mammoliti, Alessandra Toma
2017Internal Network Monitoring and Anomaly Detection through Host Clustering.
Wietze J. B. Beukema, Thomas Attema, Harm A. Schotanus
2017Limited Use Cryptographic Tokens in Securing Ephemeral Cloud Servers.
Gautam Kumar, Brent Lagesse
2017Localization and Inhibition of Malicious Behaviors through a Model Checking based Methodology.
Mario Giovanni C. A. Cimino, Gigliola Vaglini
2017Longkit - A Universal Framework for BIOS/UEFI Rootkits in System Management Mode.
Julian Rauchberger, Robert Luh, Sebastian Schrittwieser
2017Machine Learning Meets iOS Malware: Identifying Malicious Applications on Apple Environment.
Aniello Cimitile, Fabio Martinelli, Francesco Mercaldo
2017Macro Malware Detection using Machine Learning Techniques - A New Approach.
Sergio de los Santos, José Torres
2017Malware Detection based on Graph Classification.
Khanh-Huu-The Dam, Tayssir Touili
2017Mathematical Backdoors in Symmetric Encryption Systems - Proposal for a Backdoored AES-like Block Cipher.
Arnaud Bannier, Eric Filiol
2017Memory Forensics of Insecure Android Inter-app Communications.
Mark Vella, Rachel Cilia
2017Network and Topology Models to Support IDS Event Processing.
Jörg Kippe, Steffen Pfrang
2017Non-interactive Privacy-preserving k-NN Classifier.
Hilder V. L. Pereira, Diego F. Aranha
2017On Usage Control in Relational Database Management Systems - Obligations and Their Enforcement in Joining Datasets.
Mortaza S. Bargh, Marco Vink, Sunil Choenni
2017On the Detection of Replay Attacks in Industrial Automation Networks Operated with Profinet IO.
Steffen Pfrang, David Meier
2017On the Security of Safety-critical Embedded Systems: Who Watches the Watchers? Who Reprograms the Watchers?.
Carlos Moreno, Sebastian Fischmeister
2017Outsourcing Scheme of ABE Encryption Secure against Malicious Adversary.
Go Ohtake, Reihaneh Safavi-Naini, Liang Feng Zhang
2017Platform-agnostic Low-intrusion Optical Data Exfiltration.
Arthur Costa Lopes, Diego F. Aranha
2017Privacy Preserving Data Classification using Inner-product Functional Encryption.
Damien Ligier, Sergiu Carpov, Caroline Fontaine, Renaud Sirdey
2017Privacy Preserving Transparent Mobile Authentication.
Julien Hatin, Estelle Cherrier, Jean-Jacques Schwartzmann, Christophe Rosenberger
2017Proceedings of the 3rd International Conference on Information Systems Security and Privacy, ICISSP 2017, Porto, Portugal, February 19-21, 2017.
Paolo Mori, Steven Furnell, Olivier Camp
2017Quantification of De-anonymization Risks in Social Networks.
Wei-Han Lee, Changchang Liu, Shouling Ji, Prateek Mittal, Ruby B. Lee
2017Real-time DSP Implementations of Voice Encryption Algorithms.
Cristina-Loredana Duta, Laura Gheorghe, Nicolae Tapus
2017Rest in Protection - A Kernel-level Approach to Mitigate RIP Tampering.
Vincent Haupert, Tilo Müller
2017SELint: An SEAndroid Policy Analysis Tool.
Elena Reshetova, Filippo Bonazzi, N. Asokan
2017Secure APIs for Applications in Microkernel-based Systems.
Mohammad Hamad, Vassilis Prevelakis
2017Security Issues with BACnet Value Handling.
Matthew Peacock, Michael N. Johnstone, Craig Valli
2017Security and Privacy in the IoT.
Elisa Bertino
2017Sensor Networks as the new Attack Target.
Nancy Cam-Winget
2017Sequitur-based Inference and Analysis Framework for Malicious System Behavior.
Robert Luh, Gregor Schramm, Markus Wagner, Sebastian Schrittwieser
2017SitAC - A System for Situation-aware Access Control - Controlling Access to Sensor Data.
Marc Hüffmeyer, Pascal Hirmer, Bernhard Mitschang, Ulf Schreier, Matthias Wieland
2017Static and Dynamic Analysis of Android Malware.
Ankita Kapratwar, Fabio Di Troia, Mark Stamp
2017Stealth Address and Key Management Techniques in Blockchain Systems.
Nicolas T. Courtois, Rebekah Mercer
2017System for Executing Encrypted Java Programs.
Michael Kiperberg, Amit Resh, Asaf Algawi, Nezer Jacob Zaidenberg
2017The Future of Information Security.
Bart Preneel
2017There's Wally! Location Tracking in Android without Permissions.
Efthimios Alepis, Constantinos Patsakis
2017Towards Confidentiality-strengthened Personalized Genomic Medicine Embedding Homomorphic Cryptography.
Kalpana Singh, Renaud Sirdey, François Artiguenave, David Cohen, Sergiu Carpov
2017Towards Optimized Security-aware (O-Sec) VM Placement Algorithms.
Motlatsi i Isaac Thulo, Jan H. P. Eloff
2017Towards a Privacy Scorecard - Initial Design Exemplified on an Intelligent Transport Systems Service.
Aida Omerovic, Marit Kjøsnes Natvig, Isabelle C. R. Tardy
2017Towards an Understanding of the Misclassification Rates of Machine Learning-based Malware Detection Systems.
Nada Alruhaily, Behzad Bordbar, Tom Chothia
2017Tracking Dependent Information Flows.
Zeineb Zhioua, Yves Roudier, Rabéa Ameur-Boulifa, Takoua Kechiche, Stuart Short
2017Traffic Statistics of a High-Bandwidth Tor Exit Node.
Michael Sonntag, René Mayrhofer
2017User Feedback Analysis for Mobile Malware Detection.
Tal Hadad, Bronislav Sidik, Nir Ofek, Rami Puzis, Lior Rokach
2017Verifying Data Secure Flow in AUTOSAR Models by Static Analysis.
Cinzia Bernardeschi, Marco Di Natale, Gianluca Dini, Maurizio Palmieri
2017White-box Implementation of Stream Cipher.
Kazuhide Fukushima, Seira Hidano, Shinsaku Kiyomoto
2017Why Snoopy Loves Online Services: An Analysis of (Lack of) Privacy in Online Services.
Vittoria Cozza, Zisis Tsiatsikas, Mauro Conti, Georgios Kambourakis