


default search action
7. FPS 2014: Montreal, QC, Canada
- Frédéric Cuppens, Joaquín García-Alfaro
, Nur Zincir-Heywood, Philip W. L. Fong:
Foundations and Practice of Security - 7th International Symposium, FPS 2014, Montreal, QC, Canada, November 3-5, 2014. Revised Selected Papers. Lecture Notes in Computer Science 8930, Springer 2015, ISBN 978-3-319-17039-8
Attacks and Vulnerabilities
- Brent Carrara, Carlisle Adams:
On Acoustic Covert Channels Between Air-Gapped Systems. 3-16 - Thomas Korak:
Location-Dependent EM Leakage of the ATxmega Microcontroller. 17-32
Privacy
- Naelah Alkhojandi, Ali Miri:
Privacy-Preserving Public Auditing in Cloud Computing with Data Deduplication. 35-48 - Hiep H. Nguyen, Abdessamad Imine, Michaël Rusinowitch:
A Maximum Variance Approach for Graph Anonymization. 49-64 - Vinh-Thong Ta
, Thibaud Antignac:
Privacy by Design: On the Conformance Between Protocols and Architectures. 65-81
Software Security and Malware Analysis
- Joe Portner, Joel Kerr, Bill Chu:
Moving Target Defense Against Cross-Site Scripting Attacks (Position Paper). 85-91 - Lionel Rivière, Marie-Laure Potet, Thanh-Ha Le, Julien Bringer, Hervé Chabanne
, Maxime Puys
:
Combining High-Level and Low-Level Approaches to Evaluate Software Implementations Robustness Against Multiple Fault Injection Attacks. 92-111 - Guillaume Bonfante, Jean-Yves Marion, Thanh Dinh Ta:
Malware Message Classification by Dynamic Analysis. 112-128
Network Security and Protocols
- Myria Bouhaddi
, Mohammed Said Radjef
, Kamel Adi:
A Game Approach for an Efficient Intrusion Detection System in Mobile Ad Hoc Networks. 131-146 - Diego A. Ortiz-Yepes:
Optimizing TLS for Low Bandwidth Environments. 147-167 - Serguei A. Mokhov
, Michael J. Assels, Joey Paquet, Mourad Debbabi
:
Automating MAC Spoofer Evidence Gathering and Encoding for Investigations. 168-183
Access Control Models and Policy Analysis
- Daniel Servos
, Sylvia L. Osborn:
HGABAC: Towards a Formal Model of Hierarchical Attribute-Based Access Control. 187-204 - Luigi Logrippo:
Logical Method for Reasoning About Access Control and Data Flow Control Models. 205-220 - Ahmed Khoumsi, Wadie Krombi, Mohammed Erradi:
A Formal Approach to Verify Completeness and Detect Anomalies in Firewall Security Policies. 221-236
Protocol Verification
- Fabio Martinelli, Francesco Santini
:
Debating Cybersecurity or Securing a Debate? - (Position Paper). 239-246 - Ali Kassem, Pascal Lafourcade
, Yassine Lakhnech:
Formal Verification of e-Reputation Protocols. 247-261 - Raphaël Jamet, Pascal Lafourcade
:
(In)Corruptibility of Routing Protocols. 262-276
Cryptographic Technologies
- Wen Wen, Binod Vaidya, Dimitrios Makrakis, Carlisle Adams:
Decentralized CRT-Based Efficient Verifiable (n, t, n) Multi-secret Sharing Scheme. 279-293 - Peeter Laud
, Jan Willemson:
Composable Oblivious Extended Permutations. 294-310 - Tim Waage, Lena Wiese
:
Benchmarking Encrypted Data Storage in HBase and Cassandra with YCSB. 311-325
Short Papers
- Fariba Haddadi, Nur Zincir-Heywood
:
Data Confirmation for Botnet Traffic Analysis. 329-336 - Mariem Graa, Nora Cuppens-Boulahia, Frédéric Cuppens, Ana R. Cavalli:
Detection of Illegal Control Flow in Android System: Protecting Private Data Used by Smartphone Apps. 337-346 - Negar Mosharraf, Anura P. Jayasumana, Indrakshi Ray:
A Responsive Defense Mechanism Against DDoS Attacks. 347-355 - Sachini S. Weerawardhana, Subhojeet Mukherjee, Indrajit Ray, Adele E. Howe:
Automated Extraction of Vulnerability Information for Home Computer Security. 356-366 - Mohamed H. E. Aouadi, Khalifa Toumi, Ana R. Cavalli:
A Formal Approach to Automatic Testing of Security Policies Specified in XACML. 367-374

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.