- Full Papers
A Distributed Client-Puzzle Mechanism to Mitigate Bandwidth Attacks
Mazdak Alimadadi and Mehran S. Fallah
A Grid-Based Clustering for Low-Overhead Anomaly Intrusion Detection
Zhong Yang, Yamaki Hirohumi, and Takakura Hiroki
A Holistic Methodology for Evaluating Wireless Intrusion Detection Systems
Khalid Nasr, Anas Abou El Kalam, and Christian Fraboul
A Misuse-Based Network Intrusion Detection System Using Temporal Logic and Stream Processing
Abdulbasit Ahmed, Alexei Lisitsa, and Clare Dixon
A Novel Semi-Supervised Approach for Network Traffic Clustering
Yu Wang, Yang Xiang, Jun Zhang, and Shun-Zheng Yu
A Secure, Constraint-Aware Role-Based Access Control Interoperation Framework
Nathalie Baracaldo, Amirreza Masoumzadeh, and James Joshi
Attack-resilient Compliance Monitoring for Large Distributed Infrastructure Systems
Mirko Montanari and Roy Campbell
Automated Signatures Extraction of Polymorphic Viruses using Abstract Interpretation
Renaud Tabary, Serge Chaumette, and Olivier Ly
CloudSec: A Security Monitoring Appliance for Virtual Machines in the IaaS Cloud Model
Amani Ibrahim, James Hamlyn-Harris, John Grundy, and Mohamed Almorsy
DANAK: Finding the Odd!
Cynthia Wagner, Jérôme François, Radu State, and Thomas Engel
Defeating Pharming Attacks at the Client-Side
Sophie Gastellier-Prevost and Maryline Laurent
Designing Secure RFID Authentication Protocols is (Still) a Non-Trivial Task
Panagiotis Rizomiliotis, Evangelos Rekleitis, and Stefanos Gritzalis
Detecting Infection Onset With Behavior-Based Policies
Kui Xu, Danfeng Yao, Qiang Ma, and Alexander Crowell
Exploring Twisted Paths: Analyzing Authorization Processes in Organizations
Steffen Bartsch
FORTUNA - A Probabilistic Framework for Early Design Stages of Hardware-Based Secure Systems
Roberto Gallo, Ricardo Dahab, and Henrique Kawakami
Improving P2P IPTV Random Peers Search Through User Similarity
Alessio Bonti and Wen Shi
KL-F: Karhunen-Loève Based fragile watermarking
Marco Botta, Davide Cavagnino, and Victor Pomponiu
Make Mine a Quadruple: Strengthening the Security of Graphical One-Time PIN authentication
Ravi Jhawar, Philip Inglesant, Martina Angela Sasse, and Nicolas Courtois
Model-based Safety Analysis of SELinux Security Policies
Peter Amthor and Winfried Kühnhauser
Modeling Worms Propagation on Probability
Yini Wang, Sheng Wen, and Yang Xiang
Privacy-enhanced Identity via Browser Extensions and Linking Services
Renato Accornero, Daniele Rispoli, and Francesco Bergadano
Reactive Non-Interference for a Browser Model
Nataliia Bielova, Dominique Devriese, Fabio Massacci, and Frank Piessens
Removing the Blinders: Using Information to Mitigate Adversaries in Adaptive Overlays
David Zage, Charles Killian, and Cristina Nita-Rotaru
Scalable Consistency-based Hardware Trojan Detection and Diagnosis
Sheng Wei and Miodrag Potkonjak
Towards Ground Truthing Observations in Gray-Box Anomaly Detection
Jiang Ming, Haibin Zhang, and Debin Gao
Towards Safe and Optimal Filtering Rule Reordering for Complex Packet Filters
Nizar Ben Neji and Adel Bouhoula
Tracking End-Users in Web Databases
Boris Rozenberg, Ehud Gudes, Yaron Gonen, Erez Shmueli, and Nurit Gal-Oz
Truly–protect: A VM–based Software Protection
Amir Averbuch, Michael Kiperberg, and Nezer Jacob Zaidenberg
- Short Papers
A Microcontroller SRAM-PUF
Christoph Boehm, Maximilian Hofer, and Wolfgang Pribyl
A Privacy-Preserving eID based Single Sign-On Solution
Arne Tauber, Thomas Zefferer, and Bernd Zwattendorfer
A Propagation Model of A Vulnerability Mitigation Computer Worm - Seawave
Ziyad Al-Salloum and Stephen Wolthusen
A Trustful Authentication and Key Exchange Scheme (TAKES) for Ad Hoc Networks
Tony Cheneau, Andrei Sambra, and Maryline Laurent
Analysis of Prefix Hijacking Based on AS Hierarchical Model
Bo-Feng Zhang, Yuan Li, Yu-Jing Liu, and Jin-Shu Su
Automatic Security Verification for 3-Party Authentication and Key Exchange Protocols
Haruki Ota, Shinsaku Kiyomoto, and Yutaka Miyake
Avoiding DDoS with Active Management of Backlog Queues
Martine Bellaiche, and Jean-Charles Grégoire
Channel State Information based Key Generation vs. Side-Channel Analysis Key Information Leakage
Huiyun Li, Qi Zhang, and Hai Yuan
Data Control in Social Networks
Robert Koch, Dominik Holzapfel, and Gabi Dreo Rodosek
Enhancement of ZigBee and Wi-Fi security by a robust and fast chaotic algorithm
Bassem Bakhache, Joseph Ghazal, and Safwan El-Assad
Evaluating Usability and Security in Authentication Mechanisms – A Conceptual Framework
Martin Mihajlov, Borka Jerman-Blazic, and Saso Josimovski
Flooding Attacks Against Network Coding and Countermeasures
Yuan Yuan Zhang, Wassim Znaidi, Cédric Lauradoux, and Marine Minier
Measuring the Revised Guessability of Graphical Passwords
Rosanne English and Ron Poet
Modelling Self-protected Networks and Dynamic Systems
Marta Fernández-Diego and Julián Marcelo-Cocho
On the Security of the ECKE-1N and EECKE-1N Elliptic-Curve Key Agreement Protocols
Maurizio Adriano Strangio
R5N : Randomized Recursive Routing for Restricted-Route Networks
Nathan Evans and Christian Grothoff
RCHB: A Light-weight, Provably-secure Variant of the HB Protocol Using Rotation and Complementation
Samia Ali
Reconstructing Security Types for Automated Policy Enforcement in FABLE
Arash Afshar, and Mehran S. Fallah
Secure Conjunctive Keyword Searches For Unstructured Text
Florian Kerschbaum
Semi-supervised Learning for Packed Executable Detection
Xabier Ugarte-Pedrero, Igor Santos, Pablo Bringas, Mikel Gastesi, and José Miguel Esparza
SMS Linguistic Profiling Authentication on Mobile Devices
Hataichanok Saevanee, Nathan Clarke, and Steven Furnell
STORK e-Privacy and Security
Vasilis Koulolias, Athanasios Kountzeris, Alberto Crespo, Herbert Leitold, and Marc Stern
Taxonomic Analysis of Classification Schemes in Vulnerability Databases
Anshu Tripathi and Umesh Kumar Singh
The Power of Credit Card Numbers and Long CVVs
Valentim Oliveira and Tito Silva
Towards a Metric for Recognition-Based Graphical Password Security
Rosanne English and Ron Poet
Towards Improving Security Testability of AADL Architecture Models
Ayda Saidane and Nicolas Guelfi
Trustable Outsourcing of Business Processes to Cloud Computing Environments
Sami Alsouri, Stefan Katzenbeisser, and Sebastian Biedermann
Usability of Internet Security Software: Have They Got it Right?
Patryk Szewczyk
User-Representative Feature Selection for Keystroke Dynamics
Eesa Al Soalmi, Colin Boyd, and Irfan Ahmed