IFIP SEC 2018 Accepted Papers
-
Milan Brož, Mikuláš Patočka and Vashek Matyáš.
Practical Cryptographic Data Integrity Protection with Full Disk Encryption (paper 4), abstract
- Niklas Paul, Welderufael B. Tesfay, Dennis-Kenji Kipker, Mattea Stelter and Sebastian Pape.
Assessing Privacy Policies of Internet of Things Services (paper 11), abstract
-
Sergej Proskurin, Julian Kirsch and Apostolis Zarras.
Follow the WhiteRabbit: Towards Consolidation of On-the-Fly Virtualization and Virtual Machine Introspection (paper 12), abstract
- Johannes Feichtner.
Hunting Password Leaks in Android Applications (paper 13), abstract
- David Harborth and Sebastian Pape.
JonDonym Users' Information Privacy Concerns (paper 23), abstract
- Juan D. Parra Rodriguez, Eduard Brehm and Joachim Posegga.
When Your Browser Becomes The Paper Boy: An Anonymous Browser Network (paper 28), abstract
- Paolo D'Arco and Roberto De Prisco.
Design Weaknesses in Recent Ultralightweight RFID Authentication Protocols (paper 29), abstract
- Bruno Bierbaumer, Julian Kirsch, Thomas Kittel, Aurélien Francillon and Apostolis Zarras.
Smashing the Stack Protector for Fun and Profit (paper 30), abstract
- Richard Baker and Ivan Martinovic.
EMPower : Detecting Malicious Power Line Networks from EM Emissions (paper 32), abstract
-
Wei Chen, Yuhui Lin, Vashti Galpin, Vivek Nigam, Myungjin Lee and David Aspinall.
Formal Analysis of Sneak-Peek: A Data Centre Attack and its Mitigations (paper 36), abstract
- Gheorghe Florin Gheorghe Hăjmăşan,
Alexandra Mondoc, Radu Marian Portase and
Octavian Creț.
Performance Improvements in Behavior Based Malware Detection Solutions (paper 38), abstract
-
Yuri Gil Dantas, Richard Gay, Tobias Hamann, Heiko Mantel and Johannes Schickel.
An Evaluation of Bucketing in Systems with Non-Deterministic Timing Behavior (paper 46), abstract
-
Nils Wisiol and Marian Margraf.
Attacking RO-PUFs with Enhanced Challenge-Response Pairs (paper 47), abstract
-
Weizhi Meng, Fei Fei, Lijun Jiang, Zhe Liu, Chunhua Su and Jinguang Han.
CPMap: Design of Click-Points Map-based Graphical Password Authentication (paper 48), abstract
- Mariem Graa, Ivan Marco Lobe Kome,
Nora Cuppens-Boulahia,
Frédéric Cuppens
and Vincent Frey.
Detection and response to Data Exfiltration from Internet of Things Android Devices (paper 49), abstract
- Pardon Blessings Maoneke, Stephen Flowerday and Naomi Isabirye.
The Influence of Native Language on Password Composition and Security: A Socioculture Theoretical View (paper 58), abstract
-
Alexander Marsalek, Christian Kollmann and Thomas Zefferer.
A Security Analysis of FirstCoin (paper 59), abstract
-
Keeyoung Kim and Simon Woo.
When George Clooney is not George Clooney: Using GenAttack to Deceive Amazon's and Naver's Celebrity Recognition APIs (paper 61), abstract
- Jukka Ruohonen, Joonas Salovaara and Ville Leppänen.
On the Integrity of Cross-Origin JavaScripts (paper 62), abstract
- Christopher Gutierrez, Mohammed Almeshekah, Eugene Spafford and Saurabh Bagchi.
A Hypergame Analysis for ErsatzPasswords (paper 68), abstract
- Ganbayar Uuganbayar, Artsiom Yautsiukhin and Fabio Martinelli.
Optimal Security Configuration for Cyber Insurance (paper 69), abstract
- Clemens Sauerwein, Christian Sillaber, Michael Huber, Andrea Mussmann and Ruth Breu.
The Tweet Advantage: An Empirical Analysis of 0-Day Vulnerability Information Shared on Twitter (paper 74), abstract
- Choongin Lee, Jeonghan Bae and Heejo Lee.
PRETT: Protocol Reverse Engineering Using Binary Tokens and Network Traces (paper 76), abstract
-
Giacomo Giorgi, Fabio Martinelli, Andrea Saracino and Mina Sheikhalishahi.
Walking Through the Deep: Gait Analysis for User Authentication through Deep Learning (paper 78), abstract
-
Mayank Agarwal, Rami Puzis, Jawad Haj-Yahya, Polina Zilberman and Yuval Elovici.
Anti-forensic = Suspicious: Detection of Stealthy Malware that Hides its Network Traffic (paper 80), abstract
-
Ioanna Topa and Karyda Maria.
Usability Characteristics of Security and Privacy Tools: the User's Perspective (paper 88), abstract
- Jens Lindemann and Mathias Fischer.
Efficient Identification of Applications in Co-Resident VMs via a Memory Side-Channel (paper 89), abstract