


default search action
SEC 2018: Poznan, Poland
- Lech Jan Janczewski, Miroslaw Kutylowski:
ICT Systems Security and Privacy Protection - 33rd IFIP TC 11 International Conference, SEC 2018, Held at the 24th IFIP World Computer Congress, WCC 2018, Poznan, Poland, September 18-20, 2018, Proceedings. IFIP Advances in Information and Communication Technology 529, Springer 2018, ISBN 978-3-319-99827-5
Authentication
- Paolo D'Arco
, Roberto De Prisco
:
Design Weaknesses in Recent Ultralightweight RFID Authentication Protocols. 3-17 - Weizhi Meng, Fei Fei, Lijun Jiang, Zhe Liu, Chunhua Su, Jinguang Han:
CPMap: Design of Click-Points Map-Based Graphical Password Authentication. 18-32 - Pardon Blessings Maoneke
, Stephen Flowerday, Naomi Isabirye
:
The Influence of Native Language on Password Composition and Security: A Socioculture Theoretical View. 33-46 - Christopher N. Gutierrez
, Mohammed H. Almeshekah, Saurabh Bagchi, Eugene H. Spafford
:
A Hypergame Analysis for ErsatzPasswords. 47-61 - Giacomo Giorgi, Fabio Martinelli, Andrea Saracino, Mina Sheikhalishahi:
Walking Through the Deep: Gait Analysis for User Authentication Through Deep Learning. 62-76
Failures of Security Management
- Milan Broz, Mikulás Patocka, Vashek Matyás:
Practical Cryptographic Data Integrity Protection with Full Disk Encryption. 79-93 - Juan D. Parra Rodriguez, Eduard Brehm, Joachim Posegga:
When Your Browser Becomes the Paper Boy - An Anonymous Browser Network. 94-107 - Richard Baker
, Ivan Martinovic:
EMPower: Detecting Malicious Power Line Networks from EM Emissions. 108-121 - Nils Wisiol, Marian Margraf:
Attacking RO-PUFs with Enhanced Challenge-Response Pairs. 122-126 - Alexander Marsalek, Christian Kollmann, Thomas Zefferer
:
A Security Analysis of FirstCoin. 127-140 - Choong In Lee, Jeonghan Bae, Heejo Lee:
PRETT: Protocol Reverse Engineering Using Binary Tokens and Network Traces. 141-155 - Niklas Paul
, Welderufael B. Tesfay
, Dennis-Kenji Kipker
, Mattea Stelter
, Sebastian Pape
:
Assessing Privacy Policies of Internet of Things Services. 156-169 - David Harborth
, Sebastian Pape
:
JonDonym Users' Information Privacy Concerns. 170-184
Security Management / Forensic
- Fabio Martinelli, Ganbayar Uuganbayar, Artsiom Yautsiukhin
:
Optimal Security Configuration for Cyber Insurance. 187-200 - Clemens Sauerwein, Christian Sillaber, Michael M. Huber, Andrea Mussmann, Ruth Breu:
The Tweet Advantage: An Empirical Analysis of 0-Day Vulnerability Information Shared on Twitter. 201-215 - Mayank Agarwal
, Rami Puzis
, Jawad Haj-Yahya
, Polina Zilberman
, Yuval Elovici:
Anti-forensic = Suspicious: Detection of Stealthy Malware that Hides Its Network Traffic. 216-230 - Ioanna Topa, Maria Karyda:
Usability Characteristics of Security and Privacy Tools: The User's Perspective. 231-244 - Jens Lindemann
, Mathias Fischer:
Efficient Identification of Applications in Co-resident VMs via a Memory Side-Channel. 245-259
Software Security / Attacks
- Sergej Proskurin
, Julian Kirsch, Apostolis Zarras
:
Follow the WhiteRabbit: Towards Consolidation of On-the-Fly Virtualization and Virtual Machine Introspection. 263-277 - Johannes Feichtner:
Hunting Password Leaks in Android Applications. 278-292 - Bruno Bierbaumer, Julian Kirsch, Thomas Kittel, Aurélien Francillon, Apostolis Zarras
:
Smashing the Stack Protector for Fun and Profit. 293-306 - Wei Chen, Yuhui Lin, Vashti Galpin
, Vivek Nigam, Myungjin Lee, David Aspinall:
Formal Analysis of Sneak-Peek: A Data Centre Attack and Its Mitigations. 307-322 - Yuri Gil Dantas, Richard Gay, Tobias Hamann, Heiko Mantel, Johannes Schickel:
An Evaluation of Bucketing in Systems with Non-deterministic Timing Behavior. 323-338 - Mariem Graa, Ivan Marco Lobe Kome, Nora Cuppens-Boulahia, Frédéric Cuppens, Vincent Frey:
Detection and Response to Data Exfiltration from Internet of Things Android Devices. 339-354 - Keeyoung Kim, Simon S. Woo:
When George Clooney Is Not George Clooney: Using GenAttack to Deceive Amazon's and Naver's Celebrity Recognition APIs. 355-369 - Gheorghe Hajmasan
, Alexandra Mondoc
, Radu Portase
, Octavian Cret
:
Performance Improvements in Behavior Based Malware Detection Solutions. 370-384 - Jukka Ruohonen
, Joonas Salovaara, Ville Leppänen
:
On the Integrity of Cross-Origin JavaScripts. 385-398

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.