default search action
13th ICISS 2017: Mumbai, India
- Rudrapatna K. Shyamasundar, Virendra Singh, Jaideep Vaidya:
Information Systems Security - 13th International Conference, ICISS 2017, Mumbai, India, December 16-20, 2017, Proceedings. Lecture Notes in Computer Science 10717, Springer 2017, ISBN 978-3-319-72597-0
Invited Papers
- Stefano Zatti:
The Protection of Space Missions: Threats and Cyber Threats. 3-8 - Luigi V. Mancini, Andrea Monti, Agostino Panico:
SOF on Trial. The Technical and Legal Value of Battlefield Digital Forensics in Court. 9-26
Privacy/Cryptography
- Mahender Kumar, Chittaranjan Padmanabha Katti, Prem Chandra Saxena:
A Secure Anonymous E-Voting System Using Identity-Based Blind Signature Scheme. 29-49 - Sanjeet Kumar Nayak, Somanath Tripathy:
SEMFS: Secure and Efficient Multi-keyword Fuzzy Search for Cloud Storage. 50-67 - Dileep Kumar Koshley, Sapana Rani, Raju Halder:
Towards Generalization of Privacy Policy Specification and Property-Based Information Leakage. 68-87 - Payal Chaudhari, Manik Lal Das, Dipankar Dasgupta:
Privacy-Preserving Proxy Re-encryption with Fine-Grained Access Control. 88-103
Systems Security
- Amrita Milind Honap, Wonjun Lee:
Hiding Kernel Level Rootkits Using Buffer Overflow and Return Oriented Programming. 107-126 - Anis Bkakria, Mariem Graa, Nora Cuppens-Boulahia, Frédéric Cuppens, Jean-Louis Lanet:
Experimenting Similarity-Based Hijacking Attacks Detection and Response in Android Systems. 127-145 - Mamoru Mimura, Hidema Tanaka:
Heavy Log Reader: Learning the Context of Cyber Attacks Automatically with Paragraph Vector. 146-163 - Jay Dave, Shweta Saharan, Parvez Faruki, Vijay Laxmi, Manoj Singh Gaur:
Secure Random Encryption for Deduplicated Storage. 164-176
Security Analysis
- Varun Garg, Anish Mathuria:
On Automated Detection of Multi-Protocol Attacks Using AVISPA. 179-193 - Sandeep Rai, Rushang Dhanesha, Sreyans Nahata, Bernard Menezes:
Malicious Application Detection on Android Smartphones with Enhanced Static-Dynamic Analysis. 194-208 - Ganesh Ram Santhanam, Benjamin Holland, Suresh C. Kothari, Nikhil Ranade:
Human-on-the-Loop Automation for Detecting Software Side-Channel Vulnerabilities. 209-230 - Nachiket Trivedi, Manik Lal Das:
MalDetec: A Non-root Approach for Dynamic Malware Detection in Android. 231-240
Identity Management and Access Control
- Marco Lobe Kome, Mariem Graa, Nora Cuppens-Boulahia, Frédéric Cuppens, Vincent Frey:
DIscovery and REgistration Protocol - For Device and Person Identity Management in IoT. 243-262 - Akash Agrawall, Shubh Maheshwari, Projit Bandyopadhyay, Venkatesh Choppella:
Modelling and Mitigation of Cross-Origin Request Attacks on Federated Identity Management Using Cross Origin Request Policy. 263-282 - Ajinkya Rajput, K. Gopinath:
Towards a More Secure Aadhaar. 283-300
Security Attacks and Detection
- Vineet Kumar, Aneek Roy, Sourya Sengupta, Sourav Sen Gupta:
Parallelized Common Factor Attack on RSA. 303-312 - Moumita Das, Ansuman Banerjee, Nitesh K. Singh, Bhaskar Sardar:
Performance Attacks on Branch Predictors in Embedded Processors with SMT Support. 313-322 - Routhu Srinivasa Rao, Alwyn Roshan Pais:
An Enhanced Blacklist Method to Detect Phishing Websites. 323-333 - Mayukh Rath, Shivali Agarwal, R. K. Shyamasundar:
Semi Supervised NLP Based Classification of Malware Documents. 334-344
Network Security
- Mohsin Khan, Kimmo Järvinen, Philip Ginzboorg, Valtteri Niemi:
On De-synchronization of User Pseudonyms in Mobile Networks. 347-366 - Son Duc Nguyen, Mamoru Mimura, Hidema Tanaka:
Leveraging Man-in-the-middle DoS Attack with Internal TCP Retransmissions in Virtual Network. 367-386 - Lyes Bayou, David Espes, Nora Cuppens-Boulahia, Frédéric Cuppens:
wIDS: A Multilayer IDS for Wireless-Based SCADA Systems. 387-404 - Bold Munkhbaatar, Mamoru Mimura, Hidema Tanaka:
Dark Domain Name Attack: A New Threat to Domain Name System. 405-414
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.