default search action
8. ARES 2013: Regensburg, Germany
- 2013 International Conference on Availability, Reliability and Security, ARES 2013, Regensburg, Germany, September 2-6, 2013. IEEE Computer Society 2013, ISBN 978-0-7695-5008-4
ARES Full Papers
Best Paper Session
- Andrea Micheloni, Karl-Peter Fuchs, Dominik Herrmann, Hannes Federrath:
Laribus: Privacy-Preserving Detection of Fake SSL Certificates with a Social P2P Notary Network. 1-10 - Thanh-Trung Pham, Xavier Défago:
Reliability Prediction for Component-Based Software Systems with Architectural-Level Fault Tolerance Mechanisms. 11-20 - Elias Bou-Harb, Mourad Debbabi, Chadi Assi:
A Statistical Approach for Fingerprinting Probing Activities. 21-30
Risk Management & Security Models
- Jostein Jensen, Åsmund Ahlmann Nyre:
Federated Identity Management and Usage Control - Obstacles to Industry Adoption. 31-41 - Benjamin Aziz, Geoff W. Hamilton:
Reputation-Controlled Business Process Workflows. 42-51 - Nada Essaouini, Frédéric Cuppens, Nora Cuppens-Boulahia, Anas Abou El Kalam:
Conflict Management in Obligation with Deadline Policies. 52-61
Software Security
- Takanori Kobashi, Nobukazu Yoshioka, Takao Okubo, Haruhiko Kaiya, Hironori Washizaki, Yoshiaki Fukazawa:
Validating Security Design Patterns Application Using Model Testing. 62-71 - Jason L. Wright, Jason W. Larsen, Miles McQueen:
Estimating Software Vulnerabilities: A Case Study Based on the Misclassification of Bugs in MySQL Server. 72-81 - Aaron Paulos, Partha P. Pal, Richard E. Schantz, Brett Benyo, David Johnson, Mike Hibler, Eric Eide:
Isolation of Malicious External Inputs in a Security Focused Adaptive Execution Environment. 82-91 - Dan Fleck, Arnur G. Tokhtabayev, Alex Alarif, Angelos Stavrou, Tomas Nykodym:
PyTrigger: A System to Trigger & Extract User-Activated Malware Behavior. 92-101
Risk Planning & Threat Modeling
- Mike Surridge, Bassem I. Nasser, Xiaoyu Chen, Ajay Chakravarthy, Panos Melas:
Run-Time Risk Management in Adaptive ICT Systems. 102-110 - Kristian Beckers, Denis Hatebur, Maritta Heisel:
A Problem-Based Threat Analysis in Compliance with Common Criteria. 111-120 - Federica Paci, M. Carmen Fernández Gago, Francisco Moyano:
Detecting Insider Threats: A Trust-Aware Framework. 121-130
Privacy
- Eric Chan-Tin, Jiyoung Shin, Jiangmin Yu:
Revisiting Circuit Clogging Attacks on Tor. 131-140 - Christian Richthammer, Michael Netter, Moritz Riesner, Günther Pernul:
Taxonomy for Social Network Data Types from the Viewpoint of Privacy and User Control. 141-150 - I. Goriac:
Measuring Anonymity with Plausibilistic Entropy. 151-160
Hardware & Network Security
- Johannes Götzfried, Tilo Müller:
ARMORED: CPU-Bound Encryption for Android-Driven ARM Devices. 161-168 - Thomas Korak, Thomas Plos, Andreas Zankl:
Minimizing the Costs of Side-Channel Analysis Resistance Evaluations in Early Design Steps. 169-177 - Daniel Palomares, Daniel Migault, Wolfgang Velasquez, Maryline Laurent:
High Availability for IPsec VPN Platforms: ClusterIP Evaluation. 178-187
Cryptography & Security Models
- Hermann de Meer, Henrich Christopher Pöhls, Joachim Posegga, Kai Samelin:
Scope of Security Properties of Sanitizable Signatures Revisited. 188-197 - Jurlind Budurushi, Stephan Neumann, Maina M. Olembo, Melanie Volkamer:
Pretty Understandable Democracy - A Secure and Understandable Internet Voting Scheme. 198-207 - Eckehard Hermann, Rüdiger Grimm:
The Common Limes Security Model for Asset Flow Control in Decentralized, Insecure Systems. 208-217
ARES Short Papers
Privacy & Network Security
- Debmalya Biswas, Imad Aad, Gian Paolo Perrucci:
Privacy Panel: Usable and Quantifiable Mobile Privacy. 218-223 - Zisis Tsiatsikas, Dimitris Geneiatakis, Georgios Kambourakis, Angelos D. Keromytis:
A Privacy-Preserving Entropy-Driven Framework for Tracing DoS Attacks in VoIP. 224-229 - Mario Kirschbaum, Thomas Plos, Jörn-Marc Schmidt:
On Secure Multi-party Computation in Bandwidth-Limited Smart-Meter Systems. 230-235 - Amir Herzberg, Haya Schulmann:
Limiting MitM to MitE Covert-Channels. 236-241
Threat Modeling & Intrusion Detection
- Enrico Sorio, Alberto Bartoli, Eric Medvet:
Detection of Hidden Fraudulent URLs within Trusted Sites Using Lexical Features. 242-247 - Nikos Virvilis, Dimitris Gritzalis:
The Big Four - What We Did Wrong in Advanced Persistent Threat Detection? 248-254 - Thomas Unger, Martin Mulazzani, Dominik Fruhwirt, Markus Huber, Sebastian Schrittwieser, Edgar R. Weippl:
SHPF: Enhancing HTTP(S) Session Security with Browser Fingerprinting. 255-261 - Maria Leitner, Michelle Miller, Stefanie Rinderle-Ma:
An Analysis and Evaluation of Security Aspects in the Business Process Model and Notation. 262-267
Authentication, Identity Management & Trust
- Gansen Zhao, Haiyu Wang, Chunming Rong, Yong Tang:
Resource Pool Oriented Trust Management for Cloud Infrastructure. 268-273 - Lukasz Olejnik, Claude Castelluccia:
Towards Web-Based Biometric Systems Using Personal Browsing Interests. 274-280 - Mai H. El-Sherief, Marianne A. Azer:
A Novel Proximity Based Trust Model for Opportunistic Networks. 281-284 - David W. Chadwick, George Inman:
The Trusted Attribute Aggregation Service (TAAS) - Providing an Attribute Aggregation Layer for Federated Identity Management. 285-290
Mobile Security
- Steffen Bartsch, Bernhard J. Berger, Michaela Bunke, Karsten Sohr:
The Transitivity-of-Trust Problem in Android Application Interaction. 291-296 - Jaemin Park, Kiyoung Baek, Cheoloh Kang:
Secure Profile Provisioning Architecture for Embedded UICC. 297-303 - Zeeshan Bilal, Keith Martin:
Ultra-lightweight Mutual Authentication Protocols: Weaknesses and Countermeasures. 304-309 - Aida Ben Chehida, Ryma Abassi, Sihem Guemara El Fatmi:
A Reputation-Based Clustering Mechanism for MANET Routing Security. 310-315
FARES 2013
Organizational Security Aspects (Special OSA Session)
- Jonathan Blangenois, Guy Guemkam, Christophe Feltus, Djamel Khadraoui:
Organizational Security Architecture for Critical Infrastructure. 316-323 - Denisse Muñante, Laurent Gallon, Philippe Aniorté:
An Approach Based on Model-Driven Engineering to Define Security Policies Using OrBAC. 324-332 - Marko Niemimaa, Jonna Järveläinen:
IT Service Continuity: Achieving Embeddedness through Planning. 333-340
Software Security & Testing
- Henk Birkholz, Ingo Sieverdingbeck, Nicolai Kuntze, Carsten Rudolph:
Enhancing Security Testing via Automated Replication of IT-Asset Topologies. 341-349 - Seiji Munetoh, Nobukazu Yoshioka:
Model-Assisted Access Control Implementation for Code-centric Ruby-on-Rails Web Application Development. 350-359 - Mohammed A. Alhomidi, Martin J. Reed:
A Genetic Algorithm Approach for the Most Likely Attack Path Problem. 360-366 - Yehia Elrakaiby, Yves Le Traon:
A PEP-PDP Architecture to Monitor and Enforce Security Policies in Java Applications. 367-374
Privacy & Forensics
- Aswami Ariffin, Christian D'Orazio, Kim-Kwang Raymond Choo, Jill Slay:
iOS Forensics: How Can We Recover Deleted Image Files with Timestamp in a Forensically Sound Manner? 375-382 - Raphael Wigoutschnigg, Peter Schartner, Stefan Rass:
Shared Crowds: A Token-Ring Approach to Hide the Receiver. 383-389 - Michael Gruhn, Tilo Müller:
On the Practicability of Cold Boot Attacks. 390-397
Network & Cloud Security
- Amir Herzberg, Haya Schulmann:
DNSSEC: Interoperability Challenges and Transition Mechanisms. 398-405 - Aleksandar Hudic, Elise Revell, Dimitris E. Simos:
A Generation Method of Cryptographic Keys for Enterprise Communication Systems. 406-411 - Iryna Windhorst, Ali Sunyaev:
Dynamic Certification of Cloud Services. 412-417
SecSE 2013
- José Fran. Ruiz, Marcos Arjona, Antonio Mana, Niklas Carstens:
Secure Engineering and Modelling of a Metering Devices System. 418-427 - Per Håkon Meland, Erlend Andreas Gjære, Stéphane Paul:
The Use and Usefulness of Threats in Goal-Oriented Modelling. 428-436 - Suliman A. Alsuhibany, Aad P. A. van Moorsel:
Modelling and Analysis of Release Order of Security Algorithms Using Stochastic Petri Nets. 437-445 - Hongzhe Li, Taebeom Kim, Munkhbayar Bat-Erdene, Heejo Lee:
Software Vulnerability Detection Using Backward Trace Analysis and Symbolic Execution. 446-454 - Vincenzo Ciancia, Fabio Martinelli, Ilaria Matteucci, Marinella Petrocchi, José Antonio Martín, Ernesto Pimentel:
Automated Synthesis and Ranking of Secure BPMN Orchestrators. 455-464 - Kristian Beckers, Maritta Heisel, Isabelle Côté, Ludger Goeke, Selim Güler:
Structured Pattern-Based Security Requirements Elicitation for Clouds. 465-474
WSDF 2013
- Rainer Poisel, Simon Tjoa:
A Comprehensive Literature Review of File Carving. 475-484 - Paolo Bertasi, Nicola Zago:
FASTDD: An Open Source Forensic Imaging Tool. 485-492 - Rolf Stobe, Hans Höfken, Marko Schuba, Michael Breuer:
Artificial Aging of Mobile Devices Using a Simulated GSM/GPRS Network. 493-497 - York Yannikos, Christian Winter:
Model-Based Generation of Synthetic Disk Images for Digital Forensic Tool Testing. 498-505
RISI 2013
Resilience and Privacy
- Koichiro Hayashi:
Social Issues of Big Data and Cloud: Privacy, Confidentiality, and Public Utility. 506-511 - Memiko Otsuki, Noboru Sonehara:
Estimating the Value of Personal Information with SNS Utility. 512-516 - Tomoya Muraki, Shintaro Oishi, Masatsugu Ichino, Isao Echizen, Hiroshi Yoshiura:
Anonymizing Face Images by Using Similarity-Based Metric. 517-524
Resilience and Safety
- Hiroshi Maruyama, Kiyoshi Watanabe, Sachiko Yoshihama, Naohiko Uramoto, Yoichiro Takehora, Kazuhiro Minami:
ICHIGAN Security - A Security Architecture That Enables Situation-Based Policy Switching. 525-529 - Kelly Y. Itakura, Noboru Sonehara:
Using Twitter's Mentions for Efficient Emergency Message Propagation. 530-537 - Moussa Ouedraogo, Manel Khodja, Djamel Khadraoui:
Towards a Risk Based Assessment of QoS Degradation for Critical Infrastructure. 538-545
SecOnT 2013
- Yulia Cherdantseva, Jeremy Hilton:
A Reference Model of Information Assurance & Security. 546-555 - David A. Mundie, David M. McIntire:
An Ontology for Malware Analysis. 556-558 - Kristian Beckers, Maritta Heisel:
A Usability Evaluation of the NESSoS Common Body of Knowledge. 559-568 - Arwa Wali, Soon Ae Chun, James Geller:
A Bootstrapping Approach for Developing a Cyber-security Ontology Using Textbook Index Terms. 569-576 - Karin Bernsmed, Astrid Undheim, Per Håkon Meland, Martin Gilje Jaatun:
Towards an Ontology for Cloud Security Obligations. 577-581 - Jakub Breier, Ladislav Hudec:
On Selecting Critical Security Controls. 582-588 - Tove Gustavi, Pontus Svenson:
Taxonomy for Port Security Systems. 592-598
IWMSA 2013
- Gianluca Dini, Fabio Martinelli, Andrea Saracino, Daniele Sgandurra:
Probabilistic Contract Compliance for Mobile Applications. 599-606 - Gerardo Canfora, Francesco Mercaldo, Corrado Aaron Visaggio:
A Classifier of Malicious Android Applications. 607-614 - Ken Mano, Kazuhiro Minami, Hiroshi Maruyama:
Privacy-Preserving Publishing of Pseudonym-Based Trajectory Location Data Set. 615-624
RaSIEM 2013
- Valerio Vianello, Vincenzo Gulisano, Ricardo Jiménez-Peris, Marta Patiño-Martínez, Rubén Torres, Rodrigo Diaz, Elsa Prieto:
A Scalable SIEM Correlation Engine and Its Application to the Olympic Games IT Infrastructure. 625-629 - Kahina Lazri, Sylvie Laniepce, Jalel Ben-Othman:
Reconsidering Intrusion Monitoring Requirements in Shared Cloud Platforms. 630-637 - Igor V. Kotenko, Olga Polubelova, Igor Saenko, Elena Doynikova:
The Ontology of Metrics for Security Evaluation and Decision Support in SIEM Systems. 638-645 - Cesario Di Sarno, Valerio Formicola, Mario Sicuranza, Giovanni Paragliola:
Addressing Security Issues of Electronic Health Record Systems through Enhanced SIEM Technology. 646-653 - Stefan Asanger, Andrew Hutchison:
Experiences and Challenges in Enhancing Security Information and Event Management Capability Using Unsupervised Anomaly Detection. 654-661 - Roland Rieke, Maria Zhdanova, Jürgen Repp, Romain Giot, Chrystel Gaber:
Fraud Detection in Mobile Payments Utilizing Process Behavior Analysis. 662-669
ECTCM 2013
- Fabrizio Baiardi, Fabio Corò, Federico Tonelli, Luca Guidi:
GVScan: Scanning Networks for Global Vulnerabilities. 670-677 - Ge Zhang, Simone Fischer-Hübner:
Counteract DNS Attacks on SIP Proxies Using Bloom Filters. 678-684 - Harald Lampesberger:
A Grammatical Inference Approach to Language-Based Anomaly Detection in XML. 685-693 - Mark Scanlon, M. Tahar Kechadi:
Universal Peer-to-Peer Network Investigation Framework. 694-700 - Jean-François Lalande, Steffen Wendzel:
Hiding Privacy Leaks in Android Applications Using Low-Attention Raising Covert Channels. 701-710 - Thomas Eder, Michael Rodler, Dieter Vymazal, Markus Zeilinger:
ANANAS - A Framework for Analyzing Android Applications. 711-719 - Bianca Danczul, Jürgen Fuß, Stefan Gradinger, Bernhard Greslehner, Wolfgang Kastl, Florian Wex:
Cuteforce Analyzer: A Distributed Bruteforce Attack on PDF Encryption with GPUs and FPGAs. 720-725 - Mirko Haustein, Herbert Sighart, Dennis Titze, Peter Schoo:
Collaboratively Exchanging Warning Messages between Peers While under Attack. 726-731
RAMSS 2013
- Paolo Rocchi, Gurami Tsitsiashvili:
Some General Properties of Multi-state Physical Models. 732-736 - Ilia Frenkel, Lev Khvatskin, Svetlana Daichman, Anatoly Lisnianski:
Assessing Water Cooling System Performance: Lz-Transform Method. 737-742 - Christos Koukouvinos, Christina Parpoula, Dimitris E. Simos:
Genetic Algorithm and Data Mining Techniques for Design Selection in Databases. 743-746 - Andreas Makrides, Alex Karagrigoriou:
Statistical Inference for Multi-state Systems: The Weibull Case. 747-752
SecATM 2013
- Woohyun Shim, Fabio Massacci, Martina de Gramatica, Alessandra Tedeschi, Alessandro Pollini:
Evaluation of Airport Security Training Programs: Perspectives and Issues. 753-758 - Roberta Cardinali, Enrico Anniballi, Carlo Bongioanni, Antonio Macera, Fabiola Colone, Pierfrancesco Lombardo:
ARGUS 3D: Security Enhancements through Innovative Radar Technologies. 759-765 - Christian Raspotnig, Vikash Katta, Péter Kárpáti, Andreas L. Opdahl:
Enhancing CHASSIS: A Method for Combining Safety and Security. 766-773 - Howard Chivers, John Hird:
Security Blind Spots in the ATM Safety Culture. 774-779 - Vikash Katta, Christian Raspotnig, Péter Kárpáti, Tor Stålhane:
Requirements Management in a Combined Process for Safety and Security Assessments. 780-786 - Rainer Koelle, Walter Strijland, Stefan Roels:
Towards Harmonising the Legislative, Regulatory, and Standards-Based Framework for ATM Security: Developing a Software Support Tool. 787-793 - Martin Gilje Jaatun, Tor Erlend Fægri:
Sink or SWIM: Information Security Requirements in the Sky. 794-801 - Martin Hawley, Paul Howard, Rainer Koelle, Peter Saxton:
Collaborative Security Management: Developing Ideas in Security Management for Air Traffic Control. 802-806 - Antonio Marotta, Gabriella Carrozza, Luigi Battaglia, Patrizia Montefusco, Vittorio Manetti:
Applying the SecRAM Methodology in a CLOUD-Based ATM Environment. 807-813 - Franco Bergomi, Stéphane Paul, Bjørnar Solhaug, Raphaël Vignon-Davillier:
Beyond Traceability: Compared Approaches to Consistent Security Risk Assessments. 814-820
ARES-IND 2013
- Esma Aïmeur, Manuel Lafond:
The Scourge of Internet Personal Data Collection. 821-828 - Beatriz Gallego-Nicasio Crespo:
User Interface Harmonization for IT Security Management: User-Centered Design in the PoSecCo Project. 829-835 - Andrzej Dziech, Jaroslaw Bialas, Andrzej Glowacz, Pawel Korus, Mikolaj Leszczuk, Andrzej Matiolanski, Remigiusz Baran:
Overview of Recent Advances in CCTV Processing Chain in the INDECT and INSIGMA Projects. 836-843 - Gunnar Schomaker, Andreas Herrholz, Guillaume Duc, Renaud Pacalet, Salvatore Raho, Miltos D. Grammatikakis, Marcello Coppola, Ignacio Garcia Vega:
TRESCCA - Trustworthy Embedded Systems for Secure Cloud Computing. 844-845
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.