default search action
9. ARES 2014: Fribourg, Switzerland
- Ninth International Conference on Availability, Reliability and Security, ARES 2014, Fribourg, Switzerland, September 8-12, 2014. IEEE Computer Society 2014
ARES Conference 2014 Program: Full Papers
ARES Full I: Best Paper Session
- Jun Pang, Yang Zhang:
A New Access Control Scheme for Facebook-Style Social Networks. 1-10 - Maria Zhdanova, Jürgen Repp, Roland Rieke, Chrystel Gaber, Baptiste Hemery:
No Smurfs: Revealing Fraud Chains in Mobile Money Transfers. 11-20 - Mark Scanlon, Jason Farina, M. Tahar Kechadi:
BitTorrent Sync: Network Investigation Methodology. 21-29
ARES Full II: Mobile Security and Attack Prevention
- Dominik Christian Maier, Tilo Müller, Mykola Protsenko:
Divide-and-Conquer: Why Android Malware Cannot Be Stopped. 30-39 - Siegfried Rasthofer, Steven Arzt, Enrico Lovat, Eric Bodden:
DroidForce: Enforcing Complex, Data-centric, System-wide Policies in Android. 40-49 - Martin Jauernig, Matthias Neugschwandtner, Christian Platzer, Paolo Milani Comparetti:
Lobotomy: An Architecture for JIT Spraying Mitigation. 50-58
ARES Full III: Secure Protocols
- Benjamin Aziz:
A Formal Model and Analysis of the MQ Telemetry Transport Protocol. 59-68 - Thomas Unterluggauer, Erich Wenger:
Practical Attack on Bilinear Pairings to Disclose the Secrets of Embedded Devices. 69-77 - Ricardo Neisse, Igor Nai Fovino, Gianmarco Baldini, Vera Stavroulaki, Panagiotis Vlacheas, Raffaele Giaffreda:
A Model-Based Security Toolkit for the Internet of Things. 78-87
ARES Full IV: Trust and Availability
- Jian Fu, Qiang Yang, Raphael Poss, Chris R. Jesshope, Chunyuan Zhang:
Rethread: A Low-Cost Transient Fault Recovery Scheme for Multithreaded Processors. 88-93 - Johannes Sänger, Günther Pernul:
Visualizing Transaction Context in Trust and Reputation Systems. 94-103 - Parsa Pourali, Ferhat Khendek, Maria Toeroe:
Enhanced Configuration Generation Approach for Highly Available COTS Based Systems. 104-113 - Jeffrey Choo Soon Fatt, Kang-Leng Chiew, San-Nah Sze:
Phishdentity: Leverage Website Favicon to Offset Polymorphic Phishing Website. 114-119
ARES Conference 2014 Program: Short Papers
ARES Short I: Ontologies and Integrated Devices
- Thomas Korak, Thomas Plos:
EM Leakage of RFID Devices - Comparison of Two Measurement Approaches. 120-125 - Henk Birkholz, Ingo Sieverdingbeck:
Supporting Security Automation for Multi-chassis Link Aggregation Groups via the Interconnected-Asset Ontology. 126-133 - Emad Elabd, Mohand-Said Hacid:
Concurrent Queries in Location Based Services. 134-139
ARES Short II: Security and Privacy
- François Lesueur, Sabina Surdu, Romuald Thion, Yann Gripay, Meriam Ben-Ghorbel-Talbi:
Palpable Privacy through Declarative Information Flows Tracking for Smart Buildings. 140-145 - Rima Addas, Ning Zhang:
An Enhanced Linkable Anonymous Access Protocol of the Distributed Electronic Patient Records. 146-151 - Christian Zimmermann, Rafael Accorsi, Günter Müller:
Privacy Dashboards: Reconciling Data-Driven Business Models and Privacy. 152-157 - Karin Bernsmed, Daniela S. Cruzes, Martin Gilje Jaatun, Børge Haugset, Erlend Andreas Gjære:
Healthcare Services in the Cloud - Obstacles to Adoption, and a Way Forward. 158-165
ARES Short III: Software Security and Authentication
- Eric Medvet, Alberto Bartoli, Francesca Boem, Fabiano Tarlao:
Continuous and Non-intrusive Reauthentication of Web Sessions Based on Mouse Dynamics. 166-171 - Marta Piekarska, Bhargava Shastry, Ravishankar Borgaonkar:
What Does the Fox Say? On the Security Architecture of Firefox OS. 172-177 - Masatoshi Yoshizawa, Takanori Kobashi, Hironori Washizaki, Yoshiaki Fukazawa, Takao Okubo, Haruhiko Kaiya, Nobukazu Yoshioka:
Verifying Implementation of Security Design Patterns Using a Test Template. 178-183 - Sebastian Schrittwieser, Stefan Katzenbeisser, Georg Merzdovnik, Peter Kieseberg, Edgar R. Weippl:
AES-SEC: Improving Software Obfuscation through Hardware-Assistance. 184-191
ARES Industrial Track
- Beatriz Gallego-Nicasio Crespo, Alan Garwood:
Fighting Botnets with Cyber-Security Analytics: Dealing with Heterogeneous Cyber-Security Information in New Generation SIEMs. 192-198 - Mirko Sailio, Matti Mantere, Sami Noponen:
Network Security Analysis Using Behavior History Graph. 199-206
The Ninth International Workshop on Frontiers in Availability, Reliability, and Security (FARES 2014)
- Stephan Neumann, Oksana Kulyk, Melanie Volkamer:
A Usable Android Application Implementing Distributed Cryptography for Election Authorities. 207-216 - Georgios Karopoulos, Alexandros Fakis, Georgios Kambourakis:
Complete SIP Message Obfuscation: PrivaSIP over Tor. 217-226 - Asma Patel, Esther Palomar:
Privacy Preservation in Location-Based Mobile Applications: Research Directions. 227-233 - Bernard Stepien, Amy P. Felty, Stan Matwin:
Challenges of Composing XACML Policies. 234-241 - Italo Dacosta, Andreas Put, Bart De Decker:
EmailCloak: A Practical and Flexible Approach to Improve Email Privacy. 242-250 - Christian Sillaber, Ruth Breu:
Quality Matters: Systematizing Quality Deficiencies in the Documentation of Business Security Requirements. 251-258 - Bahareh Shojaie, Hannes Federrath, Iman Saberi:
Evaluating the Effectiveness of ISO 27001: 2013 Based on Annex A. 259-264 - Felipe Coral Sasso, Ricardo Alexandre Reinaldo De Moraes, Jean Everson Martina:
A Proposal for a Unified Identity Card for Use in an Academic Federation Environment. 265-272 - Hermann Dornhackl, Konstantin Kadletz, Robert Luh, Paul Tavolato:
Defining Malicious Behavior. 273-278
The Second International Workshop on Emerging Cyberthreats and Countermeasures (ECTCM 2014)
- Joshua Schiffman, David Kaplan:
The SMM Rootkit Revisited: Fun with USB. 279-286 - Adrian Dabrowski, Heidelinde Hobel, Johanna Ullrich, Katharina Krombholz, Edgar R. Weippl:
Towards a Hardware Trojan Detection Cycle. 287-294 - Martin Husák, Jakub Cegan:
PhiGARo: Automatic Phishing Detection and Incident Response Framework. 295-302 - Kelly Hughes, Yanzhen Qu:
Performance Measures of Behavior-Based Signatures: An Anti-malware Solution for Platforms with Limited Computing Resource. 303-309 - Matti Mantere, Sami Noponen, Pia Olli, Jarno Salonen:
Network Security Monitoring in a Small-Scale Smart-Grid Laboratory. 310-316 - Diego Kreutz, Eduardo Feitosa, Hugo Cunha, Heiko Niedermayer, Holger Kinkelin:
Increasing the Resilience and Trustworthiness of OpenID Identity Providers for Future Networks and Services. 317-324
The Second International Workshop on Security of Mobile Applications (IWSMA 2014)
- Aida Ben Chehida Douss, Ryma Abassi, Sihem Guemara El Fatmi:
A Trust Management Based Security Mechanism against Collusion Attacks in a MANET Environment. 325-332 - Jelena Milosevic, Andreas Dittrich, Alberto Ferrante, Miroslaw Malek:
A Resource-Optimized Approach to Efficient Early Detection of Mobile Malware. 333-340 - Stefano Bistarelli, Gianpiero Costantino, Fabio Martinelli, Francesco Santini:
An Improved Role-Based Access to Android Applications with JCHR. 341-348 - Jakub Breier, Adam Pomothy:
Qualified Electronic Signature via SIM Card Using JavaCard 3 Connected Edition Platform. 349-355
The Second International Workshop on Statistical Methods in Reliability Assessment of Complex Industrial Multi-state Systems (RAMSS 2014)
- Jozef Kostolny, Miroslav Kvassay, Elena N. Zaitseva:
Analysis of Algorithms for Computation of Direct Partial Logic Derivatives in Multiple-Valued Decision Diagrams. 356-361 - Zeev Barzily, Mingyue Ding, Zeev Volkovich:
Stochastic Model for Medical Image Segmentation. 362-369 - Maïder Estecahandy, Stéphane Collas, Laurent Bordes, Christian Paroissin:
Fast Monte Carlo Simulation Methods Adapted to Simple Petri Net Models. 370-379 - Pavel Praks, Vytis Kopustinskas:
Monte-Carlo Based Reliability Modelling of a Gas Network Using Graph Theory Approach. 380-386 - Ilia Frenkel, Svetlana Daichman, Lev Khvatskin, Neta Avraham, Oshrit Zihry, Anatoly Lisnianski:
Performance Determination for MSS Manufacturing System by Lz-Transform and Stochastic Processes Approach. 387-392 - Lev Khvatskin, Ilia Frenkel:
On Availability Comparison of Reservation Modes for Multi-state Air Conditioning Systems Using Markov Approach. 393-396 - Vlad Stefan Barbu, Alex Karagrigoriou, Andreas Makrides:
Semi-Markov Modelling for Multi-state Systems. 397-402 - Sonia Malefaki, Vasilis P. Koutras, Agapios N. Platis:
Optimizing the Availability and the Operational Cost of a Periodically Inspected Multi-state Deteriorating System with Condition Based Maintenance Policies. 403-411 - Alex Karagrigoriou, Ilia Vonta:
Statistical Inference for Heavy-Tailed Distributions in Technical Systems. 412-419 - Athanasios C. Rakitzis, Petros E. Maravelakis, Philippe Castagliola:
A Comparative Study of Control Charts for Zero-Inflated Binomial Processes. 420-425 - Vasiliy V. Krivtsov, Olexandr Yevkin:
Practical Applications of Advanced Statistical Models in Reliability Data Analysis. 426-429 - Vladimir Rykov, Dmitry Efrosinin, Vladimir M. Vishnevskiy:
On Sensitivity of Reliability Models to the Shape of Life and Repair Time Distributions. 430-437
The Fourth International Workshop on Resilience and IT-Risk in Social Infrastructures (RISI 2014)
RISI I: Information and Participation for Response and Recovery
- Stefan Sackmann, Marlen Hofmann, Hans Betke:
Organizing On-Site Volunteers: An App-Based Approach. 438-439 - Yu Ichifuji, Noboru Sonehara:
Visualization of Recovery Situation in Disaster Area by Using Web Reservation Data. 440-446
RISI II: k-Anonymization for Information Sharing
- Hidenobu Oguri, Noboru Sonehara:
A k-anonymity method based on search engine query statistics for disaster impact statements. 447-454 - Hoang-Quoc Nguyen-Son, Minh-Triet Tran, Hiroshi Yoshiura, Noboru Sonehara, Isao Echizen:
A System for Anonymizing Temporal Phrases of Message Posted in Online Social Networks and for Detecting Disclosure. 455-460 - Haruno Kataoka, Yohei Ogawa, Isao Echizen, Tetsuji Kuboyama, Hiroshi Yoshiura:
Effects of External Information on Anonymity and Role of Transparency with Example of Social Network De-anonymisation. 461-467
RISI III : Resilient Networks
- Piotr Cholda:
Risk-Aware Design and Management of Resilient Networks. 468-475
The First International Software Assurance Workshop (SAW 2014)
SAW I: Secure Software Architectures
- Priya Anand, Jungwoo Ryoo, Rick Kazman:
Vulnerability-Based Security Pattern Categorization in Search of Missing Patterns. 476-483 - Dae-Kyoo Kim, Jungwoo Ryoo, Suntae Kim:
Building Sustainable Software by Preemptive Architectural Design Using Tactic-Equipped Patterns. 484-489 - Lotfi Ben Othmane, Pelin Angin, Bharat K. Bhargava:
Using Assurance Cases to Develop Iteratively Security Features Using Scrum. 490-497
SAW II: Software Security Analysis
- Sanjay Rawat, Laurent Mounier, Marie-Laure Potet:
LiSTT: An Investigation into Unsound-Incomplete Yet Practical Result Yielding Static Taintflow Analysis. 498-505 - Igor V. Kotenko, Evgenia Novikova:
Visualization of Security Metrics for Cyber Situation Awareness. 506-513
International Workshop on Security in ATM and Other Critical Infrastructures (SecATM 2014)
- Woohyun Shim, Fabio Massacci, Alessandra Tedeschi, Alessandro Pollini:
A Relative Cost-Benefit Approach for Evaluating Alternative Airport Security Policies. 514-522 - Denis Kolev, Evgeniy Morozov:
Mathematical Modelling in Air Traffic Management Security. 523-529 - Ana P. G. Martins:
The Social Acceptance of the Passivation of Misused Aircraft. 530-536 - Fabio Massacci, Federica Paci, Bjørnar Solhaug, Alessandra Tedeschi:
EMFASE - An Empirical Framework for Security Design and Economic Trade-off. 537-543 - Rainer Koelle:
Security Situation Management: Towards Developing a Time-Critical Decision Making Capability for SESAR. 544-551 - Martin Hawley, Karol Gotz, John Hird, Chris Machin:
Design-In Security for Air Traffic Control. 552-555 - Matias Krempel, Martin Gilje Jaatun:
Learn to SWIM. 556-560
The Seventh International Workshop on Digital Forensics (WSDF 2014)
- Maciej Piec, Andreas Rauber:
Real-Time Screen Watermarking Using Overlaying Layer. 561-570 - Oren Halvani, Martin Steinebach:
An Efficient Intrinsic Authorship Verification Scheme Based on Ensemble Learning. 571-578 - Martin Steinebach, Huajian Liu, York Yannikos:
Efficient Cropping-Resistant Robust Image Hashing. 579-585
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.