Home // SECURWARE
SECURWARE 2014, The Eighth International Conference on Emerging Security Information, Systems and Technologies
Type: conference
Notes: IARIA Conference.
Editors:
Rainer Falk, Siemens AG - München, Germany
Carlos Becker Westphall, Federal University of Santa Catarina, Brazil
ISSN: 2162-2116
ISBN: 978-1-61208-376-6
Location: Lisbon, Portugal
Dates: from November 16, 2014 to November 20, 2014
Articles: there are 34 articles
Embedded Web Device Security
Michael Riegler and Johannes Sametinger
keywords: web; embedded devices; web security; industrial control systems.
Design Issues in the Construction of a Cryptographically Secure Instant Message Service for Android Smartphones
Alexandre Braga and Daniela Schwab
keywords: Cryptography; Security; Android; Instant Message.
Resisting Flooding Attacks on AODV
Mohamed A. Abdelshafy and Peter J.B. King
keywords: MANET, Routing, AODV, Security, Attack, Flooding
The Policy-Based AS_PATH Verification to Monitor AS Path Hijacking
Je-Kuk Yun, Beomseok Hong, and Yanggon Kim
keywords: border gateway protocol; interdomain routing; network security; networks; AS path hijacking.
A New Property Coding in Text Steganography of Microsoft Word Documents
Ivan Stojanov, Aleksandra Mileva, and Igor Stojanovic
keywords: Data Hiding; Microsoft Word
Audio Steganograpgy by Phase Modification
Fatiha Djebbar and Beghdad Ayad
keywords: Information hiding; Phase Coding; Steganalysis
Current Issues in Cloud Computing Security and Management
Pedro Artur Figueiredo Vitti, Daniel Ricardo dos Santos, Carlos Becker Westphall, Carla Merkle Westphall, and Kleber Magno Maciel Vieira
keywords: cloud computing; security management; monitoring; security metrics
N-Gram-Based User Behavioral Model for Continuous User Authentication
Leslie Milton, Bryan Robbins, and Atif Memon
keywords: behavioral modeling; continuous authentication; software security; n-grams
GAIA-MLIS: A Maturity Model for Information Security
Roger William Coelho, Gilberto Fernandes Junior, and Mario Lemes Proença Junior
keywords: Maturity Level; Information Security; IT Governance.
Security of Vehicular Networks: Static and Dynamic Control of Cyber-Physical Objects
Vladimir Muliukha, Vladimir Zaborovsky, and Sergey Popov
keywords: Security; Vehicular network; Cyber-physics objects; Dynamic access control; Virtual connections
Digital Signature of Network Segment Using Genetic Algorithm and Ant Colony Optimization Metaheuristics
Paulo R. G. Hernandes Jr., Luiz F. Carvalho, Gilberto Fernandes Jr., and Mario L. Proença Jr.
keywords: Characterization; Traffic Monitoring; Network Management; Genetic Algorithm, sFlow
DeadDrop-in-a-Flash: Information Hiding at SSD NAND Flash Memory Physical Layer
Avinash Srinivasan, Jie Wu, Panneer Santhalingam, and Jeffrey Zamanski
keywords: Anti-forensics; Covert Communication; Information Hiding; Security; Solid State Drives.
Saving Privacy in Trust-Based User-Centric Distributed Systems
Alessandro Aldini
keywords: Cooperation incentives; trust; privacy; remuneration; user-centric networks; model checking.
Enhancing Privacy on Identity Providers
Rafael Weingärtner and Carla Merkle Westphall
keywords: Cloud Computing; Security; Privacy; Federation; Identity providers;
Enforcing Security Policies on Choreographed Services Using Rewriting Techniques
Karim Dahmani and Mahjoub Langar
keywords: Web Service Composition Security; Instrumentation; Choreography; Formal Verification; End-Point Calculus.
Obtaining Strong Identifiers Through Attribute Aggregation
Walter Priesnitz Filho and Carlos Nuno da Cruz Ribeiro
keywords: Privacy; Identity Management Systems; Attribute Aggregation
Wi-Fi Intruder Detection
Rui Fernandes, Tiago Varum, Nuno Matos, and Pedro Pinho
keywords: Wi-Fi; RF Signature; Wavelet Transform; Intruder Detection; RSSI, Security; Wireless.
Adding Secure Deletion to an Encrypted File System on Android Smartphones
Alexandre Braga and Alfredo Colito
keywords: secure delete; secure storage; encrypted file system; flash memory; mobile devices; Android
Performance Impacts in Database Privacy-Preserving Biometric Authentication
Jana Dittmann, Veit Köppen, Christian Krätzer, Martin Leuckert, Gunter Saake, and Claus Vielhauer
keywords: Database Security, Homomorphic Encryption, Privacy, Multi-Computer Scenarios, Database Performance
Data Quality and Security Evaluation Tool for Nanoscale Sensors
Leon Reznik and Sergey Lyshevski
keywords: data quality; computer security evaluation; data accuracy; data fusion.
AndroSAT: Security Analysis Tool for Android Applications
Saurabh Oberoi, Weilong Song, and Amr Youssef
keywords: Android Security; Static Analysis; Dynamic Analysis
Involvers’ Behavior-based Modeling in Cyber Targeted Attack
Youngsoo Kim and Ikkyun Kim
keywords: APT; Targeted Attacks; Behavior-based Modeling; Malicious Codes; 3.20 DarkSeoul
Test Case Generation Assisted by Control Dependence Analysis
Puhan Zhang, Qi Wang, Guowei Dong, Bin Liang, and Wenchang Shi
keywords: test case generation; control dependence; implicit information flow; symbolic execution
Implementation Issues in the Construction of Standard and Non-Standard Cryptography on Android Devices
Alexandre Braga and Eduardo Morais
keywords: Cryptography; Surveillance; Security; Android
Threshold Proxy Signature Based on Position
Qingshui Xue, Fengying Li, and Zhenfu Cao
keywords: position, threshold proxy signature, proxy signature, UC security, model, scheme
Linearity Measures for Multivariate Public Key Cryptography
Simona Samardjiska and Danilo Gligoroski
keywords: Strong (s, t)-linearity; (s, t)-linearity; MinRank; good keys; separation keys.
Managed Certificate Whitelisting - A Basis for Internet of Things Security in Industrial Automation Applications
Rainer Falk and Steffen Fries
keywords: Digital certificate, certificate whitelisting, credential management, PKI, device authentication, Internet of Things
Challenges for Evolving Large-Scale Security Architectures
Geir Køien
keywords: Evolving Security; System Security; Security Architecture; Long-term security planning.
A Backtracking Symbolic Execution Engine with Sound Path Merging
Andreas Ibing
keywords: static analysis, symbolic execution
Security Extensions for Mobile Commerce Objects
Nazri Bin Abdullah, Ioannis Kounelis, and Sead Muftic
keywords: mobile commerce; m–commerce; m-objects; security; privacy
Attack Surface Reduction for Web Services based on Authorization Patterns
Roland Steinegger, Johannes Schäfer, Max Vogler, and Sebastian Abeck
keywords: security pattern, attack surface, authorization, web service, rest
Evaluation of Vehicle Diagnostics Security – Implementation of a Reproducible Security Access
Martin Ring, Tobias Rensen, and Reiner Kriesten
keywords: security access; safety; diagnostics security; data busses; communication standard.
An AMI Threat Detection Mechanism Based on SDN Networks
Po-Wen Chi, Chien-Ting Kuo, He-Ming Ruan, Shih-Jen Chen, and Chin-Laung Lei
keywords: AMI; SDN; Specification-based detection
Ghost Map: Proving Software Correctness using Games
Ronald Watro, Kerry Moffitt, Talib Hussain, Daniel Wyschogrod, John Ostwald, Derrick Kong, Clint Bowers, Eric Church, Joshua Guttman, and Qinsi Wang
keywords: games; static analyses; formal verification; crowd souring; games; model checking