| 2017 | "Mirror, Mirror on the Wall, Who is the Fairest One of All?" - Machine Learning versus Model Checking: A Comparison between Two Static Techniques for Malware Family Identification. Vittoria Nardone, Corrado Aaron Visaggio |
| 2017 | A Collaborative Tool for Modelling Multi-stage Attacks. Ian Herwono, Fadi Ali El-Moussa |
| 2017 | A Design of Secure and ReliableWireless Transmission Channel for Implantable Medical Devices. Lake Bu, Mark G. Karpovsky |
| 2017 | A Formal Model of Web Security Showing Malicious Cross Origin Requests and Its Mitigation using CORP. Krishna Chaitanya Telikicherla, Akash Agrawall, Venkatesh Choppella |
| 2017 | A Methodology of Security Pattern Classification and of Attack-Defense Tree Generation. Loukmen Regainia, Sébastien Salva |
| 2017 | A Review of Risk Identification Approaches in the Telecommunication Domain. Ahmed Seid Yesuf |
| 2017 | A Technique for Extraction and Analysis of Application Heap Objects within Android Runtime (ART). Alberto Magno Muniz Soares, Rafael Timóteo de Sousa Jr. |
| 2017 | An Anti-Phishing Kit Scheme for Secure Web Transactions. Abdul A. Orunsolu, Adesina S. Sodiya |
| 2017 | Analysis and Assessment of Situational Awareness Models for National Cyber Security Centers. Timea Pahi, Maria Leitner, Florian Skopik |
| 2017 | Analysis of Data Sharing Agreements. Gianpiero Costantino, Fabio Martinelli, Ilaria Matteucci, Marinella Petrocchi |
| 2017 | Assessing Information Security Risks using Pairwise Weighting. Henrik Karlzén, Johan E. Bengtsson, Jonas Hallberg |
| 2017 | Attribute Permutation Steganography Detection using Attribute Position Changes Count. Iman Sedeeq, Frans Coenen, Alexei Lisitsa |
| 2017 | Batch-verifiable Secret Sharing with Unconditional Privacy. Stephan Krenn, Thomas Lorünser, Christoph Striecks |
| 2017 | Breaking a Hitag2 Protocol with Low Cost Technology. V. Gayoso Martínez, Luis Hernández Encinas, Agustín Martín Muñoz, J. Zhang |
| 2017 | Brute Force Cryptanalysis of MIFARE Classic Cards on GPU. Cihangir Tezcan |
| 2017 | Characterization of Tor Traffic using Time based Features. Arash Habibi Lashkari, Gerard Draper-Gil, Mohammad Saiful Islam Mamun, Ali A. Ghorbani |
| 2017 | CyTrONE: An Integrated Cybersecurity Training Framework. Razvan Beuran, Cuong Pham, Dat Tang, Ken-ichi Chinen, Yasuo Tan, Yoichi Shinoda |
| 2017 | Cyber-interdependency in Smart Energy Systems. Razgar Ebrahimy, Zoya Pourmirza |
| 2017 | Design of an Anomaly-based Threat Detection & Explication System. Robert Luh, Sebastian Schrittwieser, Stefan Marschalek, Helge Janicke |
| 2017 | Distance-bounding Identification. Ahmad Ahmadi, Reihaneh Safavi-Naini |
| 2017 | Distributed Protocols at the Rescue for Trustworthy Online Voting. Robert Riemann, Stéphane Grumbach |
| 2017 | Enhanced Identification of Sensitive User Inputs in Mobile Applications. Mashael Aldayel, Mohammad Alhussain |
| 2017 | Enhancing Accuracy of Android Malware Detection using Intent Instrumentation. Shahrooz Pooryousef, Morteza Amini |
| 2017 | Exploration of the Potential of Process Mining for Intrusion Detection in Smart Metering. Günther Eibl, Cornelia Ferner, Tobias Hildebrandt, Florian Stertz, Sebastian Burkhart, Stefanie Rinderle-Ma, Dominik Engel |
| 2017 | Extending the Same Origin Policy with Origin Attributes. Tanvi Vyas, Andrea Marchesini, Christoph Kerschbaumer |
| 2017 | Extracting Android Malicious Behaviors. Khanh-Huu-The Dam, Tayssir Touili |
| 2017 | Fingerprint Class Recognition for Securing EMV Transaction. Benoît Vibert, Jean-Marie Le Bars, Christophe Rosenberger, Christophe Charrier |
| 2017 | From Situation Awareness to Action: An Information Security Management Toolkit for Socio-technical Security Retrospective and Prospective Analysis. Jean-Louis Huynen, Gabriele Lenzini |
| 2017 | Gamification of Information Security Awareness and Training. Eyvind Garder B. Gjertsen, Erlend Andreas Gjære, Maria Bartnes, Waldo Rocha Flores |
| 2017 | Glassbox: Dynamic Analysis Platform for Malware Android Applications on Real Devices. Paul Irolla, Eric Filiol |
| 2017 | Hacking of the AES with Boolean Functions. Michel Dubois, Eric Filiol |
| 2017 | Health Information Exchange and Related IT-security Practices in European Hospitals. Sylvestre Uwizeyemungu, Placide Poba-Nzaou |
| 2017 | Hypervisor based Memory Introspection: Challenges, Problems and Limitations. Andrei Lutas, Daniel Ticle, Octavian Cret |
| 2017 | Identifying Mobile Repackaged Applications through Formal Methods. Fabio Martinelli, Francesco Mercaldo, Vittoria Nardone, Antonella Santone, Corrado Aaron Visaggio |
| 2017 | Identity Deception Detection on Social Media Platforms. Estée van der Walt, Jan H. P. Eloff |
| 2017 | Improved Greedy Nonrandomness Detectors for Stream Ciphers. Linus Karlsson, Martin Hell, Paul Stankovski |
| 2017 | Improving the Automatic Identification of Malicious Android Apps in Unofficial Stores through Logo Analysis. Luca Vollero, Daniele Biondo, Roberto Setola, Gianluca Bocci, Rocco Mammoliti, Alessandra Toma |
| 2017 | Internal Network Monitoring and Anomaly Detection through Host Clustering. Wietze J. B. Beukema, Thomas Attema, Harm A. Schotanus |
| 2017 | Limited Use Cryptographic Tokens in Securing Ephemeral Cloud Servers. Gautam Kumar, Brent Lagesse |
| 2017 | Localization and Inhibition of Malicious Behaviors through a Model Checking based Methodology. Mario Giovanni C. A. Cimino, Gigliola Vaglini |
| 2017 | Longkit - A Universal Framework for BIOS/UEFI Rootkits in System Management Mode. Julian Rauchberger, Robert Luh, Sebastian Schrittwieser |
| 2017 | Machine Learning Meets iOS Malware: Identifying Malicious Applications on Apple Environment. Aniello Cimitile, Fabio Martinelli, Francesco Mercaldo |
| 2017 | Macro Malware Detection using Machine Learning Techniques - A New Approach. Sergio de los Santos, José Torres |
| 2017 | Malware Detection based on Graph Classification. Khanh-Huu-The Dam, Tayssir Touili |
| 2017 | Mathematical Backdoors in Symmetric Encryption Systems - Proposal for a Backdoored AES-like Block Cipher. Arnaud Bannier, Eric Filiol |
| 2017 | Memory Forensics of Insecure Android Inter-app Communications. Mark Vella, Rachel Cilia |
| 2017 | Network and Topology Models to Support IDS Event Processing. Jörg Kippe, Steffen Pfrang |
| 2017 | Non-interactive Privacy-preserving k-NN Classifier. Hilder V. L. Pereira, Diego F. Aranha |
| 2017 | On Usage Control in Relational Database Management Systems - Obligations and Their Enforcement in Joining Datasets. Mortaza S. Bargh, Marco Vink, Sunil Choenni |
| 2017 | On the Detection of Replay Attacks in Industrial Automation Networks Operated with Profinet IO. Steffen Pfrang, David Meier |
| 2017 | On the Security of Safety-critical Embedded Systems: Who Watches the Watchers? Who Reprograms the Watchers?. Carlos Moreno, Sebastian Fischmeister |
| 2017 | Outsourcing Scheme of ABE Encryption Secure against Malicious Adversary. Go Ohtake, Reihaneh Safavi-Naini, Liang Feng Zhang |
| 2017 | Platform-agnostic Low-intrusion Optical Data Exfiltration. Arthur Costa Lopes, Diego F. Aranha |
| 2017 | Privacy Preserving Data Classification using Inner-product Functional Encryption. Damien Ligier, Sergiu Carpov, Caroline Fontaine, Renaud Sirdey |
| 2017 | Privacy Preserving Transparent Mobile Authentication. Julien Hatin, Estelle Cherrier, Jean-Jacques Schwartzmann, Christophe Rosenberger |
| 2017 | Proceedings of the 3rd International Conference on Information Systems Security and Privacy, ICISSP 2017, Porto, Portugal, February 19-21, 2017. Paolo Mori, Steven Furnell, Olivier Camp |
| 2017 | Quantification of De-anonymization Risks in Social Networks. Wei-Han Lee, Changchang Liu, Shouling Ji, Prateek Mittal, Ruby B. Lee |
| 2017 | Real-time DSP Implementations of Voice Encryption Algorithms. Cristina-Loredana Duta, Laura Gheorghe, Nicolae Tapus |
| 2017 | Rest in Protection - A Kernel-level Approach to Mitigate RIP Tampering. Vincent Haupert, Tilo Müller |
| 2017 | SELint: An SEAndroid Policy Analysis Tool. Elena Reshetova, Filippo Bonazzi, N. Asokan |
| 2017 | Secure APIs for Applications in Microkernel-based Systems. Mohammad Hamad, Vassilis Prevelakis |
| 2017 | Security Issues with BACnet Value Handling. Matthew Peacock, Michael N. Johnstone, Craig Valli |
| 2017 | Security and Privacy in the IoT. Elisa Bertino |
| 2017 | Sensor Networks as the new Attack Target. Nancy Cam-Winget |
| 2017 | Sequitur-based Inference and Analysis Framework for Malicious System Behavior. Robert Luh, Gregor Schramm, Markus Wagner, Sebastian Schrittwieser |
| 2017 | SitAC - A System for Situation-aware Access Control - Controlling Access to Sensor Data. Marc Hüffmeyer, Pascal Hirmer, Bernhard Mitschang, Ulf Schreier, Matthias Wieland |
| 2017 | Static and Dynamic Analysis of Android Malware. Ankita Kapratwar, Fabio Di Troia, Mark Stamp |
| 2017 | Stealth Address and Key Management Techniques in Blockchain Systems. Nicolas T. Courtois, Rebekah Mercer |
| 2017 | System for Executing Encrypted Java Programs. Michael Kiperberg, Amit Resh, Asaf Algawi, Nezer Jacob Zaidenberg |
| 2017 | The Future of Information Security. Bart Preneel |
| 2017 | There's Wally! Location Tracking in Android without Permissions. Efthimios Alepis, Constantinos Patsakis |
| 2017 | Towards Confidentiality-strengthened Personalized Genomic Medicine Embedding Homomorphic Cryptography. Kalpana Singh, Renaud Sirdey, François Artiguenave, David Cohen, Sergiu Carpov |
| 2017 | Towards Optimized Security-aware (O-Sec) VM Placement Algorithms. Motlatsi i Isaac Thulo, Jan H. P. Eloff |
| 2017 | Towards a Privacy Scorecard - Initial Design Exemplified on an Intelligent Transport Systems Service. Aida Omerovic, Marit Kjøsnes Natvig, Isabelle C. R. Tardy |
| 2017 | Towards an Understanding of the Misclassification Rates of Machine Learning-based Malware Detection Systems. Nada Alruhaily, Behzad Bordbar, Tom Chothia |
| 2017 | Tracking Dependent Information Flows. Zeineb Zhioua, Yves Roudier, Rabéa Ameur-Boulifa, Takoua Kechiche, Stuart Short |
| 2017 | Traffic Statistics of a High-Bandwidth Tor Exit Node. Michael Sonntag, René Mayrhofer |
| 2017 | User Feedback Analysis for Mobile Malware Detection. Tal Hadad, Bronislav Sidik, Nir Ofek, Rami Puzis, Lior Rokach |
| 2017 | Verifying Data Secure Flow in AUTOSAR Models by Static Analysis. Cinzia Bernardeschi, Marco Di Natale, Gianluca Dini, Maurizio Palmieri |
| 2017 | White-box Implementation of Stream Cipher. Kazuhide Fukushima, Seira Hidano, Shinsaku Kiyomoto |
| 2017 | Why Snoopy Loves Online Services: An Analysis of (Lack of) Privacy in Online Services. Vittoria Cozza, Zisis Tsiatsikas, Mauro Conti, Georgios Kambourakis |