Home // SECURWARE
SECURWARE 2017, The Eleventh International Conference on Emerging Security Information, Systems and Technologies
Type: conference
Notes: IARIA Conference.
Editors:
Carla Merkle Westphall, Federal University of Santa Catarina, Brazil
Hans-Joachim Hof, Technical University of Ingolstadt, Germany
Aspen Olmsted, College of Charleston, USA
Stefan Schauer, Scientist, Austrian Institute of Technology, Center of
Digital Safety and Security, Vienna, Austria
Martin Latzenhofer, Scientist, Austrian Institute of Technology, Center
of Digital Safety and Security, Vienna, Austria
Aysajan Abidin, KU Leuven, Belgium
George Yee, Carleton University & Aptusinnova Inc., Ottawa, Canada
ISSN: 2162-2116
ISBN: 978-1-61208-582-1
Location: Rome, Italy
Dates: from September 10, 2017 to September 14, 2017
Articles: there are 32 articles
A Novel Central Arbiter to Mitigate Denial of Service Attacks on Duplicate Address Detection in IPv6 Networks
Shailendra Singh Tomar, Anil Rawat, Prakash D. Vyavahare, and Sanjiv Tokekar
keywords: IPv6; DAD; DoS Attack; Central Arbiter Approach; SDN; NDP
A Context-Aware Malware Detection Based on Low-Level Hardware Indicators as a Last Line of Defense
Alireza Sadighian, Jean-Marc Robert, Saeed Sarencheh, and Souradeep Basu
keywords: Malware Detection; Low-level Indicators; Context- Aware; Machine Learning; Time-Series Analysis; Ontologies
Clustering based Evolving Neural Network Intrusion Detection for MCPS Traffic Security
Nishat I Mowla, Inshil Doh, and Kijoon Chae
keywords: Intrusion Detection; Machine Intelligence; Clustering; Neural Networks; Medical Cyber Physical Systems.
An Empirical Study of Root-Cause Analysis in Information Security Management
Gaute Wangen, Niclas Hellesen, Henrik Torres, and Erlend Brækken
keywords: Information Security; Root cause analysis; Risk Management; Case study.
Library-Level Policy Enforcement
Marinos Tsantekidis and Vassilis Prevelakis
keywords: policies; library calls; argument examination; wrapper functions
Netflow Based HTTP Get Flooding Attack Analysis
Jungtae Kim, Jong-Hyun Kim, Ikkyun Kim, and Koohong Kang
keywords: HTTP Get Flooding, Netflow, DDoS Attack
Secure Software Development – Models, Tools, Architectures and Algorithms
Aspen Olmsted
keywords: Cyber-security; Software Engineering; CRM
Security Vulnerabilities in Hotpatching in Mobile Applications
Sarah Ford and Aspen Olmsted
keywords: Javascript; iOS; patching; mobile computing; open-source tools; Apple; security
Secure Development of Healthcare Medical Billing Software
Paige Peck and Aspen Olmsted
keywords: Healthcare billing software; Current Procedural Terminology; CPT codes; Healthcare Common Procedure Coding System; HCPCS codes; Salesforce Cloud development
Attack Maze for Network Vulnerability Analysis
Stanley Chow
keywords: Network security; vulnerability analysis; scalable; vulnerability; exploit; maximum incursion; cyber security; metric; security metric; mission dependency
A Survey on Open Automotive Forensics
Robert Altschaffel, Kevin Lamshöft, Stefan Kiltz, and Jana Dittmann
keywords: automotive; computer forensics; embedded systems; forensic processes; safety & security.
A Method for Preventing Slow HTTP DoS attacks
Koichi Ozaki, Astushi Kanai, and Shigeaki Tanimoto
keywords: Slow HTTP DoS Attack; session time; packet interval.
Mutual Authentication Scheme for Lightweight IoT Devices
Seungyong Yoon and Jeongnyeo Kim
keywords: IoT, security, authentication
Identifying and Managing Risks in Interconnected Utility Networks
Stefan Schauer, Sandra König, Martin Latzenhofer, and Stefan Rass
keywords: risk management; interconnected utility networks; game theory; ISO 31000
Protecting Eavesdropping over Multipath TCP Communication Based on Not-Every-Not-Any Protection
Toshihiko Kato, Shihan Cheng, Ryo Yamamoto, Satoshi Ohzahata, and Nobuo Suzuki
keywords: Multipath TCP; Eavesdropping; Data Dispersion; Data Scrambling.
Visual Risk Specification and Aggregation
Jasmin Wachter, Thomas Grafenauer, and Stefan Rass
keywords: uncertainty representation; expert elicitation; risk assessment; opinion pooling
Addressing Complex Problem Situations in Critical Infrastructures using Soft Systems Analysis: The CS-AWARE Approach
Thomas Schaberreiter, Chris Wills, Gerald Quirchmayr, and Juha Röning
keywords: Cybersecurity; Critical Infrastructures; System Analysis; Soft Systems Methodology; Socio-technological Analysis; Cyber Situational Awareness; Information Sharing.
Stochastic Dependencies Between Critical Infrastructures
Sandra König and Stefan Rass
keywords: critical infrastructure; stochastic dependencies; Markov chain; risk propagation
Assessing Security Protection for Sensitive Data
George O. M. Yee
keywords: assessment, security, protection, sensitive data, vulnerability
RMDM – A Conceptual ICT Risk-Meta-Data-Model - Applied to COBIT for Risk as underlying Risk Model
Martin Latzenhofer and Gerald Quirchmayr
keywords: information and communication technology risk management; ICT risk-meta-data-model; COBIT for Risk; metamodeling; data model; UML
Recommendations for Risk Analysis in Higher Education Institutions
Lidia Prudente Tixteco, María del Carmen Prudente Tixteco, Gabriel Sánchez Pérez, Linda Karina Toscano Medina, José de Jesús Vázquez Gómez, and Arturo De la Cruz Tellez
keywords: risk analysis; higher education institutions; information systems
Extending Vehicle Attack Surface Through Smart Devices
Rudolf Hackenberg, Nils Weiss, Sebastian Renner, and Enrico Pozzobon
keywords: On-Board-Diagnostics; Cellular Network; Automotive Security
An Analysis of Automotive Security Based on a Reference Model for Automotive Cyber Systems
Jasmin Brückmann, Tobias Braun, and Hans-Joachim Hof
keywords: Automotive Security; Automotive Cyber System; Cyber-Phyiscal System;
Policy-Aware Provisioning Plan Generation for TOSCA-based Applications
Kálmán Képes, Uwe Breitenbücher, Markus Philipp Fischer, Frank Leymann, and Michael Zimmermann
keywords: Cloud Computing, Application Provisioning, Security, Policies, Automation
Towards an Approach for Automatically Checking Compliance Rules in Deployment Models
Markus Fischer, Uwe Breitenbücher, Kálmán Képes, and Frank Leymann
keywords: Cloud Computing; Compliance; Security; Policies;
Investigating SLA Confidentiality Requirements: A Holistic Perspective for the Government Agencies
Yudhistira Nugraha and Andrew Martin
keywords: Security, Trust, Assurance, Confidentiality Requirements, Service Level Agreement (SLA), Service Provision
Large-Scale Analysis of Domain Blacklists
Tran Phuong Thao, Tokunbo Makanju, Jumpei Urakawa, Akira Yamada, Kosuke Murakami, and Ayumu Kubota
keywords: Web Security; Large-Scale Analysis; Empirical Analysis; Blacklist; Malicious Domain
Hugin: A Scalable Hybrid Android Malware Detection System
Dominik Teubert, Johannes Krude, Samuel Schueppen, and Ulrike Meyer
keywords: mobile malware detection; app vetting; machine-learning
Towards Protected Firmware Verification in Low-power Devices
Yong-Hyuk Moon and Jeong-Nyeo Kim
keywords: firmware verification, memory protection, device security
A System to Save the Internet from the Malicious Internet of Things at Home
Lukas Braun and Hans-Joachim Hof
keywords: secure smart home; Internet of Things security; IoT security; network security; smart home; IoT
Frictionless Authentication System: Security & Privacy Analysis and Potential Solutions
Mustafa Mustafa, Aysajan Abidin, and Enrique Argones Rúa
keywords: Frictionless authentication; Threat analysis; Security and privacy requirements; Threshold signature; Fuzzy extractors.
Frictionless Authentication Systems: Emerging Trends, Research Challenges and Opportunities
Tim Van hamme, Vera Rimmer, Davy Preuveneers, Wouter Joosen, Mustafa Mustafa, Aysajan Abidin, and Enrique Argones Rúa
keywords: Frictionless authentication; Behaviometrics; Security; Privacy; Usability.