default search action
SEC 2012: Crete, Greece
- Dimitris Gritzalis, Steven Furnell, Marianthi Theoharidou:
Information Security and Privacy Research - 27th IFIP TC 11 Information Security and Privacy Conference, SEC 2012, Heraklion, Crete, Greece, June 4-6, 2012. Proceedings. IFIP Advances in Information and Communication Technology 376, Springer 2012, ISBN 978-3-642-30435-4
Attacks and Malicious Code
- Michael Roland, Josef Langer, Josef Scharinger:
Relay Attacks on Secure Element-Enabled Mobile Devices - Virtual Pickpocketing Revisited. 1-12 - Alessandro Armando, Alessio Merlo, Mauro Migliardi, Luca Verderame:
Would You Mind Forking This Process? A Denial of Service Attack on Android (and Some Countermeasures). 13-24 - Bernhard J. Berger, Karsten Sohr:
An Approach to Detecting Inter-Session Data Flow Induced by Object Pooling. 25-36 - Guillaume Barbu, Christophe Giraud, Vincent Guerin:
Embedded Eavesdropping on Java Card. 37-48
Security Architectures
- Sofia-Anna Menesidou, Vasilios Katos:
Authenticated Key Exchange (AKE) in Delay Tolerant Networks. 49-60 - Alexandre B. Augusto, Manuel Eduardo Correia:
OFELIA - A Secure Mobile Attribute Aggregation Infrastructure for User-Centric Identity Management. 61-74 - Andreas Leicher, Andreas U. Schmidt, Yogendra Shah:
Smart OpenID: A Smart Card Based OpenID Protocol. 75-86 - David Zhao, Issa Traoré, Ali A. Ghorbani, Bassam Sayed, Sherif Saad, Wei Lu:
Peer to Peer Botnet Detection Based on Flow Intervals. 87-102
System Security
- Eleni Gessiou, Vasilis Pappas, Elias Athanasopoulos, Angelos D. Keromytis, Sotiris Ioannidis:
Towards a Universal Data Provenance Framework Using Dynamic Instrumentation. 103-114 - Baozeng Ding, Fufeng Yao, Yanjun Wu, Yeping He:
Improving Flask Implementation Using Hardware Assisted In-VM Isolation. 115-125 - Francesco Gadaleta, Nick Nikiforakis, Jan Tobias Mühlberg, Wouter Joosen:
HyperForce: Hypervisor-enForced Execution of Security-Critical Code. 126-137 - Feifei Wang, Ping Chen, Bing Mao, Li Xie:
RandHyp: Preventing Attacks via Xen Hypercall Interface. 138-149
Access Control
- John C. John, Shamik Sural, Vijayalakshmi Atluri, Jaideep Vaidya:
Role Mining under Role-Usage Cardinality Constraint. 150-161 - Ruben Rios, Jose Antonio Onieva, Javier López:
HIDE_DHCP: Covert Communications through Network Configuration Messages. 162-173 - Frédéric Cuppens, Nora Cuppens-Boulahia, Joaquín García-Alfaro, Tarik Moataz, Xavier Rimasson:
Handling Stateful Firewall Anomalies. 174-186 - Hemanth Khambhammettu, Sofiene Boulares, Kamel Adi, Luigi Logrippo:
A Framework for Threat Assessment in Access Control Systems. 187-198
Database Security
- Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati:
Support for Write Privileges on Outsourced Data. 199-210 - Weihan Li, Brajendra Panda, Qussai Yaseen:
Malicious Users' Transactions: Tackling Insider Threat. 211-222
Privacy Attitudes and Properties
- George Drosatos, Aimilia Tasidou, Pavlos S. Efraimidis:
Privacy-Preserving Television Audience Measurement Using Smart TVs. 223-234 - Christian Banse, Dominik Herrmann, Hannes Federrath:
Tracking Users on the Internet with Behavioral Patterns: Evaluation of Its Practical Feasibility. 235-248 - Alexios Mylonas, Vasilis Meletiadis, Bill Tsoumas, Lilian Mitrou, Dimitris Gritzalis:
Smartphone Forensics: A Proactive Investigation Scheme for Evidence Acquisition. 249-260
Social Networks and Social Engineering
- Shuhao Li, Xiao-chun Yun, Zhiyu Hao, Yongzheng Zhang, Xiang Cui, Yipeng Wang:
Modeling Social Engineering Botnet Dynamics across Multiple Social Networks. 261-272 - Giampaolo Bella, Lizzie Coles-Kemp:
Layered Analysis of Security Ceremonies. 273-286
Applied Cryptography, Anonymity and Trust
- Joan Boyar, René Peralta:
A Small Depth-16 Circuit for the AES S-Box. 287-298 - Maria Christofi, Aline Gouget:
Formal Verification of the mERA-Based eServices with Trusted Third Party Protocol. 299-314
Usable Security
- Amir Herzberg, Ronen Margulies:
My Authentication Album: Adaptive Images-Based Login Mechanism. 315-326 - Shuzhe Yang, Gökhan Bal:
Balancing Security and Usability of Local Security Mechanisms for Mobile Devices. 327-338 - Ella Kolkowska, Bart De Decker:
Analyzing Value Conflicts for a Work-Friendly ISS Policy Implementation. 339-351 - Gurpreet Dhillon, Tiago Oliveira, Santa R. Susarapu, Mário M. Caldeira:
When Convenience Trumps Security: Defining Objectives for Security and Usability of Systems. 352-363
Security and Trust Models
- Olga Gadyatskaya, Fabio Massacci, Anton Philippov:
Security-by-Contract for the OSGi Platform. 364-375 - Hyundo Park, Sung-Oh David Jung, Heejo Lee, Hoh Peter In:
Cyber Weather Forecasting: Forecasting Unknown Internet Worms Using Randomness Analysis. 376-387 - Yulong Zhang, Min Li, Kun Bai, Meng Yu, Wanyu Zang:
Incentive Compatible Moving Target Defense against VM-Colocation Attacks in Clouds. 388-399 - Han Jiao, Jixue Liu, Jiuyong Li, Chengfei Liu:
Give Rookies A Chance: A Trust-Based Institutional Online Supplier Recommendation Framework. 400-411
Security Economics
- Giuseppe D'Acquisto, Marta Flamini, Maurizio Naldi:
A Game-Theoretic Formulation of Security Investment Decisions under Ex-ante Regulation. 412-423 - Yolanta Beres, Jonathan Griffin:
Optimizing Network Patching Policy Decisions. 424-442 - Marianthi Theoharidou, Alexios Mylonas, Dimitris Gritzalis:
A Risk Assessment Method for Smartphones. 443-456 - Ronald Dodge, Kathryn Coronges, Ericka Rovira:
Empirical Benefits of Training to Phishing Susceptibility. 457-464
Authentication and Delegation
- Hataichanok Saevanee, Nathan L. Clarke, Steven M. Furnell:
Multi-modal Behavioural Biometric Authentication for Mobile Devices. 465-474 - Christoforos Ntantogian, Christos Xenakis, Ioannis Stavrakakis:
Analysis and Modeling of False Synchronizations in 3G-WLAN Integrated Networks. 475-488 - Yongge Wang:
Password Protected Smart Card and Memory Stick Authentication against Off-Line Dictionary Attacks. 489-500 - Shaoying Cai, Yingjiu Li, Yunlei Zhao:
Distributed Path Authentication for Dynamic RFID-Enabled Supply Chains. 501-512 - Vrizlynn L. L. Thing, Hwei-Ming Ying:
Enhanced Dictionary Based Rainbow Table. 513-524
Short Papers
- Sarah Nait Bahloul, Emmanuel Coquery, Mohand-Said Hacid:
Authorization Policies for Materialized Views. 525-530 - Yongdong Wu, Zhigang Zhao:
Enhancing the Security of On-line Transactions with CAPTCHA Keyboard. 531-536 - Xin Kang, Yongdong Wu:
Fighting Pollution Attack in Peer-to-Peer Streaming Networks: A Trust Management Approach. 537-542 - Ioannis Psaroudakis, Vasilios Katos, Pavlos S. Efraimidis:
A Framework for Anonymizing GSM Calls over a Smartphone VoIP Network. 543-548 - Marco Prandini, Marco Ramilli:
A Browser-Based Distributed System for the Detection of HTTPS Stripping Attacks against Web Pages. 549-554 - Milica Milutinovic, Vincent Naessens, Bart De Decker:
Privacy-Preserving Mechanisms for Organizing Tasks in a Pervasive eHealth System. 555-560 - Yannis Soupionis, Miltiadis Kandias:
Web Services Security Assessment: An Authentication-Focused Approach. 561-566 - Nineta Polemi, Theodoros Ntouskas:
Open Issues and Proposals in the IT Security Management of Commercial Ports: The S-PORT National Case. 567-572 - Nor Badrul Anuar, Maria Papadaki, Steven Furnell, Nathan L. Clarke:
A Response Strategy Model for Intrusion Response Systems. 573-578 - Massimo Ficco, Massimiliano Rak:
Intrusion Tolerance of Stealth DoS Attacks to Web Services. 579-584 - Christos Grompanopoulos, Ioannis Mavridis:
Towards Use-Based Usage Control. 585-590
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.