Security and Privacy in Communication Networks: 13th International Conference, SecureComm 2017, Niagara Falls, ON, Canada, October 22–25, 2017, Proceedings
Название: Security and Privacy in Communication Networks: 13th International Conference, SecureComm 2017, Niagara Falls, ON, Canada, October 22–25, 2017, Proceedings Автор: Xiaodong Lin, Ali Ghorbani Издательство: Springer International Publishing Год: 2018 ISBN: 9783319788135 Формат: pdf Страниц: XIV, 855 Размер: 23,4 mb Язык: English
The 31 revised regular papers and 15 short papers were carefully reviewed and selected from 105 submissions. The topics range from security and privacy in machine learning to differential privacy, which are currently hot research topics in cyber security research.
Gray-Box Software Integrity Checking via Side-Channels Liu, Hong (et al.) Pages 3-23
Enhancing Android Security Through App Splitting Davidson, Drew (et al.) Pages 24-44
Very Short Intermittent DDoS Attacks in an Unsaturated System Shan, Huasong (et al.) Pages 45-66
Outsourced k-Means Clustering over Encrypted Data Under Multiple Keys in Spark Framework Rong, Hong (et al.) Pages 67-87
Guilt-by-Association: Detecting Malicious Entities via Graph Mining Najafi, Pejman (et al.) Pages 88-107
Twisting Lattice and Graph Techniques to Compress Transactional Ledgers G?raud, R?mi (et al.) Pages 108-127
Privacy-Preserving Relevance Ranking Scheme and Its Application in Multi-keyword Searchable Encryption Shen, Peisong (et al.) Pages 128-146
Exploring the Network of Real-World Passwords: Visualization and Estimation Guo, Xiujia (et al.) Pages 147-166
ThiefTrap – An Anti-theft Framework for Android Gro?, Sascha (et al.) Pages 167-184
BluePass: A Secure Hand-Free Password Manager Li, Yue (et al.) Pages 185-205
Lambda Obfuscation Lan, Pengwei (et al.) Pages 206-224
Turing Obfuscation Wang, Yan (et al.) Pages 225-244
All Your Accounts Are Belong to Us Bulakh, Vlad (et al.) Pages 245-269
SDN-Based Kernel Modular Countermeasure for Intrusion Detection Chin, Tommy (et al.) Pages 270-290
LinkFlow: Efficient Large-Scale Inter-app Privacy Leakage Detection He, Yi (et al.) Pages 291-311
Exposing LTE Security Weaknesses at Protocol Inter-layer, and Inter-radio Interactions Raza, Muhammad Taqi (et al.) Pages 312-338
Achieve Efficient and Privacy-Preserving Proximity Detection Scheme for Social Applications Wang, Fengwei (et al.) Pages 339-355
Disrupting SDN via the Data Plane: A Low-Rate Flow Table Overflow Attack Cao, Jiahao (et al.) Pages 356-376
VCIDS: Collaborative Intrusion Detection of Sensor and Actuator Attacks on Connected Vehicles Guo, Pinyao (et al.) Pages 377-396
Understanding Adversarial Strategies from Bot Recruitment to Scheduling Chang, Wentao (et al.) Pages 397-417
Mending Wall: On the Implementation of Censorship in India Gosain, Devashish (et al.) Pages 418-437
A Deep Learning Based Online Malicious URL and DNS Detection Scheme Jiang, Jianguo (et al.) Pages 438-448
Visual Analysis of Android Malware Behavior Profile Based on PMCGdroid: A Pruned Lightweight APP Call Graph Zhang, Yan (et al.) Pages 449-468
Inferring Implicit Assumptions and Correct Usage of Mobile Payment Protocols Ye, Quanqi (et al.) Pages 469-488
HSTS Measurement and an Enhanced Stripping Attack Against HTTPS Li, Xurong (et al.) Pages 489-509
Defining and Detecting Environment Discrimination in Android Apps Hong, Yunfeng (et al.) Pages 510-529
Query Recovery Attacks on Searchable Encryption Based on Partial Knowledge Wang, Guofeng (et al.) Pages 530-549
H2 DoS: An Application-Layer DoS Attack Towards HTTP/2 Protocol Ling, Xiang (et al.) Pages 550-570
Optimizing TLB for Access Pattern Privacy Protection in Data Outsourcing Liu, Yao (et al.) Pages 571-584
An Efficient Trustzone-Based In-application Isolation Schema for Mobile Authenticators Zhang, Yingjun (et al.) Pages 585-605
A Program Manipulation Middleware and Its Applications on System Security Chen, Ting (et al.) Pages 606-626
Cross-site Input Inference Attacks on Mobile Web Users Zhao, Rui (et al.) Pages 629-643
BKI: Towards Accountable and Decentralized Public-Key Infrastructure with Blockchain Wan, Zhiguo (et al.) Pages 644-658
FRProtector: Defeating Control Flow Hijacking Through Function-Level Randomization and Transfer Protection Fu, Jianming (et al.) Pages 659-672
VaultIME: Regaining User Control for Password Managers Through Auto-Correction Guan, Le (et al.) Pages 673-686
TopHat : Topology-Based Host-Level Attribution for Multi-stage Attacks in Enterprise Systems Using Software Defined Networks Kannan, Subramaniyam (et al.) Pages 687-703
JSForce: A Forced Execution Engine for Malicious javascript Detection Hu, Xunchao (et al.) Pages 704-720
ROPOB: Obfuscating Binary Code via Return Oriented Programming Mu, Dongliang (et al.) Pages 721-737
DiffGuard: Obscuring Sensitive Information in Canary Based Protections Zhu, Jun (et al.) Pages 738-751
A Sudoku Matrix-Based Method of Pitch Period Steganography in Low-Rate Speech Coding Yang, Zhongliang (et al.) Pages 752-762
A Framework for Formal Analysis of Privacy on SSO Protocols Wang, Kailong (et al.) Pages 763-777
A Hypervisor Level Provenance System to Reconstruct Attack Story Caused by Kernel Malware Wang, Chonghua (et al.) Pages 778-792
An On-Demand Defense Scheme Against DNS Cache Poisoning Attacks Wang, Zheng (et al.) Pages 793-807
MPOPE: Multi-provider Order-Preserving Encryption for Cloud Data Privacy Liang, Jinwen (et al.) Pages 808-822
SLIM: Secure and Lightweight Identity Management in VANETs with Minimum Infrastructure Reliance Kang, Jian (et al.) Pages 823-837
A-Tor: Accountable Anonymity in Tor Cai, Quanwei (et al.) Pages 838-851
Внимание
Уважаемый посетитель, Вы зашли на сайт как незарегистрированный пользователь.
Мы рекомендуем Вам зарегистрироваться либо войти на сайт под своим именем.
Информация
Посетители, находящиеся в группе Гости, не могут оставлять комментарии к данной публикации.