Accepted Papers

(in alphabetical order of title)

Full Papers
A Distributed Client-Puzzle Mechanism to Mitigate Bandwidth Attacks
Mazdak Alimadadi and Mehran S. Fallah

A Grid-Based Clustering for Low-Overhead Anomaly Intrusion Detection
Zhong Yang, Yamaki Hirohumi, and Takakura Hiroki

A Holistic Methodology for Evaluating Wireless Intrusion Detection Systems
Khalid Nasr, Anas Abou El Kalam, and Christian Fraboul

A Misuse-Based Network Intrusion Detection System Using Temporal Logic and Stream Processing
Abdulbasit Ahmed, Alexei Lisitsa, and Clare Dixon

A Novel Semi-Supervised Approach for Network Traffic Clustering
Yu Wang, Yang Xiang, Jun Zhang, and Shun-Zheng Yu

A Secure, Constraint-Aware Role-Based Access Control Interoperation Framework
Nathalie Baracaldo, Amirreza Masoumzadeh, and James Joshi

Attack-resilient Compliance Monitoring for Large Distributed Infrastructure Systems
Mirko Montanari and Roy Campbell

Automated Signatures Extraction of Polymorphic Viruses using Abstract Interpretation
Renaud Tabary, Serge Chaumette, and Olivier Ly

CloudSec: A Security Monitoring Appliance for Virtual Machines in the IaaS Cloud Model
Amani Ibrahim, James Hamlyn-Harris, John Grundy, and Mohamed Almorsy

DANAK: Finding the Odd!
Cynthia Wagner, Jérôme François, Radu State, and Thomas Engel

Defeating Pharming Attacks at the Client-Side
Sophie Gastellier-Prevost and Maryline Laurent

Designing Secure RFID Authentication Protocols is (Still) a Non-Trivial Task
Panagiotis Rizomiliotis, Evangelos Rekleitis, and Stefanos Gritzalis

Detecting Infection Onset With Behavior-Based Policies
Kui Xu, Danfeng Yao, Qiang Ma, and Alexander Crowell

Exploring Twisted Paths: Analyzing Authorization Processes in Organizations
Steffen Bartsch

FORTUNA - A Probabilistic Framework for Early Design Stages of Hardware-Based Secure Systems
Roberto Gallo, Ricardo Dahab, and Henrique Kawakami

Improving P2P IPTV Random Peers Search Through User Similarity
Alessio Bonti and Wen Shi

KL-F: Karhunen-Loève Based fragile watermarking
Marco Botta, Davide Cavagnino, and Victor Pomponiu

Make Mine a Quadruple: Strengthening the Security of Graphical One-Time PIN authentication
Ravi Jhawar, Philip Inglesant, Martina Angela Sasse, and Nicolas Courtois

Model-based Safety Analysis of SELinux Security Policies
Peter Amthor and Winfried Kühnhauser

Modeling Worms Propagation on Probability
Yini Wang, Sheng Wen, and Yang Xiang

Privacy-enhanced Identity via Browser Extensions and Linking Services
Renato Accornero, Daniele Rispoli, and Francesco Bergadano

Reactive Non-Interference for a Browser Model
Nataliia Bielova, Dominique Devriese, Fabio Massacci, and Frank Piessens

Removing the Blinders: Using Information to Mitigate Adversaries in Adaptive Overlays
David Zage, Charles Killian, and Cristina Nita-Rotaru

Scalable Consistency-based Hardware Trojan Detection and Diagnosis
Sheng Wei and Miodrag Potkonjak

Towards Ground Truthing Observations in Gray-Box Anomaly Detection
Jiang Ming, Haibin Zhang, and Debin Gao

Towards Safe and Optimal Filtering Rule Reordering for Complex Packet Filters
Nizar Ben Neji and Adel Bouhoula

Tracking End-Users in Web Databases
Boris Rozenberg, Ehud Gudes, Yaron Gonen, Erez Shmueli, and Nurit Gal-Oz

Truly–protect: A VM–based Software Protection
Amir Averbuch, Michael Kiperberg, and Nezer Jacob Zaidenberg

Short Papers
A Microcontroller SRAM-PUF
Christoph Boehm, Maximilian Hofer, and Wolfgang Pribyl

A Privacy-Preserving eID based Single Sign-On Solution
Arne Tauber, Thomas Zefferer, and Bernd Zwattendorfer

A Propagation Model of A Vulnerability Mitigation Computer Worm - Seawave
Ziyad Al-Salloum and Stephen Wolthusen

A Trustful Authentication and Key Exchange Scheme (TAKES) for Ad Hoc Networks
Tony Cheneau, Andrei Sambra, and Maryline Laurent

Analysis of Prefix Hijacking Based on AS Hierarchical Model
Bo-Feng Zhang, Yuan Li, Yu-Jing Liu, and Jin-Shu Su

Automatic Security Verification for 3-Party Authentication and Key Exchange Protocols
Haruki Ota, Shinsaku Kiyomoto, and Yutaka Miyake

Avoiding DDoS with Active Management of Backlog Queues
Martine Bellaiche, and Jean-Charles Grégoire

Channel State Information based Key Generation vs. Side-Channel Analysis Key Information Leakage
Huiyun Li, Qi Zhang, and Hai Yuan

Data Control in Social Networks
Robert Koch, Dominik Holzapfel, and Gabi Dreo Rodosek

Enhancement of ZigBee and Wi-Fi security by a robust and fast chaotic algorithm
Bassem Bakhache, Joseph Ghazal, and Safwan El-Assad

Evaluating Usability and Security in Authentication Mechanisms – A Conceptual Framework
Martin Mihajlov, Borka Jerman-Blazic, and Saso Josimovski

Flooding Attacks Against Network Coding and Countermeasures
Yuan Yuan Zhang, Wassim Znaidi, Cédric Lauradoux, and Marine Minier

Measuring the Revised Guessability of Graphical Passwords
Rosanne English and Ron Poet

Modelling Self-protected Networks and Dynamic Systems
Marta Fernández-Diego and Julián Marcelo-Cocho

On the Security of the ECKE-1N and EECKE-1N Elliptic-Curve Key Agreement Protocols
Maurizio Adriano Strangio

R5N : Randomized Recursive Routing for Restricted-Route Networks
Nathan Evans and Christian Grothoff

RCHB: A Light-weight, Provably-secure Variant of the HB Protocol Using Rotation and Complementation
Samia Ali

Reconstructing Security Types for Automated Policy Enforcement in FABLE
Arash Afshar, and Mehran S. Fallah

Secure Conjunctive Keyword Searches For Unstructured Text
Florian Kerschbaum

Semi-supervised Learning for Packed Executable Detection
Xabier Ugarte-Pedrero, Igor Santos, Pablo Bringas, Mikel Gastesi, and José Miguel Esparza

SMS Linguistic Profiling Authentication on Mobile Devices
Hataichanok Saevanee, Nathan Clarke, and Steven Furnell

STORK e-Privacy and Security
Vasilis Koulolias, Athanasios Kountzeris, Alberto Crespo, Herbert Leitold, and Marc Stern

Taxonomic Analysis of Classification Schemes in Vulnerability Databases
Anshu Tripathi and Umesh Kumar Singh

The Power of Credit Card Numbers and Long CVVs
Valentim Oliveira and Tito Silva

Towards a Metric for Recognition-Based Graphical Password Security
Rosanne English and Ron Poet

Towards Improving Security Testability of AADL Architecture Models
Ayda Saidane and Nicolas Guelfi

Trustable Outsourcing of Business Processes to Cloud Computing Environments
Sami Alsouri, Stefan Katzenbeisser, and Sebastian Biedermann

Usability of Internet Security Software: Have They Got it Right?
Patryk Szewczyk

User-Representative Feature Selection for Keystroke Dynamics
Eesa Al Soalmi, Colin Boyd, and Irfan Ahmed

 

The 5th International Conference on Network and System Security
Copyright © 2011 NSS 2011. All rights reserved.

Locations of visitors to this page