


default search action
SEC 2018: Poznan, Poland
- Lech Jan Janczewski, Miroslaw Kutylowski:

ICT Systems Security and Privacy Protection - 33rd IFIP TC 11 International Conference, SEC 2018, Held at the 24th IFIP World Computer Congress, WCC 2018, Poznan, Poland, September 18-20, 2018, Proceedings. IFIP Advances in Information and Communication Technology 529, Springer 2018, ISBN 978-3-319-99827-5
Authentication
- Paolo D'Arco

, Roberto De Prisco
:
Design Weaknesses in Recent Ultralightweight RFID Authentication Protocols. 3-17 - Weizhi Meng, Fei Fei, Lijun Jiang, Zhe Liu, Chunhua Su, Jinguang Han:

CPMap: Design of Click-Points Map-Based Graphical Password Authentication. 18-32 - Pardon Blessings Maoneke

, Stephen Flowerday, Naomi Isabirye
:
The Influence of Native Language on Password Composition and Security: A Socioculture Theoretical View. 33-46 - Christopher N. Gutierrez

, Mohammed H. Almeshekah, Saurabh Bagchi, Eugene H. Spafford
:
A Hypergame Analysis for ErsatzPasswords. 47-61 - Giacomo Giorgi, Fabio Martinelli, Andrea Saracino, Mina Sheikhalishahi:

Walking Through the Deep: Gait Analysis for User Authentication Through Deep Learning. 62-76
Failures of Security Management
- Milan Broz, Mikulás Patocka, Vashek Matyás:

Practical Cryptographic Data Integrity Protection with Full Disk Encryption. 79-93 - Juan D. Parra Rodriguez, Eduard Brehm, Joachim Posegga:

When Your Browser Becomes the Paper Boy - An Anonymous Browser Network. 94-107 - Richard Baker

, Ivan Martinovic:
EMPower: Detecting Malicious Power Line Networks from EM Emissions. 108-121 - Nils Wisiol, Marian Margraf:

Attacking RO-PUFs with Enhanced Challenge-Response Pairs. 122-126 - Alexander Marsalek, Christian Kollmann, Thomas Zefferer

:
A Security Analysis of FirstCoin. 127-140 - Choong In Lee, Jeonghan Bae, Heejo Lee:

PRETT: Protocol Reverse Engineering Using Binary Tokens and Network Traces. 141-155 - Niklas Paul

, Welderufael B. Tesfay
, Dennis-Kenji Kipker
, Mattea Stelter
, Sebastian Pape
:
Assessing Privacy Policies of Internet of Things Services. 156-169 - David Harborth

, Sebastian Pape
:
JonDonym Users' Information Privacy Concerns. 170-184
Security Management / Forensic
- Fabio Martinelli, Ganbayar Uuganbayar, Artsiom Yautsiukhin

:
Optimal Security Configuration for Cyber Insurance. 187-200 - Clemens Sauerwein, Christian Sillaber, Michael M. Huber, Andrea Mussmann, Ruth Breu:

The Tweet Advantage: An Empirical Analysis of 0-Day Vulnerability Information Shared on Twitter. 201-215 - Mayank Agarwal

, Rami Puzis
, Jawad Haj-Yahya
, Polina Zilberman
, Yuval Elovici:
Anti-forensic = Suspicious: Detection of Stealthy Malware that Hides Its Network Traffic. 216-230 - Ioanna Topa, Maria Karyda:

Usability Characteristics of Security and Privacy Tools: The User's Perspective. 231-244 - Jens Lindemann

, Mathias Fischer:
Efficient Identification of Applications in Co-resident VMs via a Memory Side-Channel. 245-259
Software Security / Attacks
- Sergej Proskurin

, Julian Kirsch, Apostolis Zarras
:
Follow the WhiteRabbit: Towards Consolidation of On-the-Fly Virtualization and Virtual Machine Introspection. 263-277 - Johannes Feichtner:

Hunting Password Leaks in Android Applications. 278-292 - Bruno Bierbaumer, Julian Kirsch, Thomas Kittel, Aurélien Francillon, Apostolis Zarras

:
Smashing the Stack Protector for Fun and Profit. 293-306 - Wei Chen, Yuhui Lin, Vashti Galpin

, Vivek Nigam, Myungjin Lee, David Aspinall:
Formal Analysis of Sneak-Peek: A Data Centre Attack and Its Mitigations. 307-322 - Yuri Gil Dantas, Richard Gay, Tobias Hamann, Heiko Mantel, Johannes Schickel:

An Evaluation of Bucketing in Systems with Non-deterministic Timing Behavior. 323-338 - Mariem Graa, Ivan Marco Lobe Kome, Nora Cuppens-Boulahia, Frédéric Cuppens, Vincent Frey:

Detection and Response to Data Exfiltration from Internet of Things Android Devices. 339-354 - Keeyoung Kim, Simon S. Woo:

When George Clooney Is Not George Clooney: Using GenAttack to Deceive Amazon's and Naver's Celebrity Recognition APIs. 355-369 - Gheorghe Hajmasan

, Alexandra Mondoc
, Radu Portase
, Octavian Cret
:
Performance Improvements in Behavior Based Malware Detection Solutions. 370-384 - Jukka Ruohonen

, Joonas Salovaara, Ville Leppänen
:
On the Integrity of Cross-Origin JavaScripts. 385-398

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














