Home // SECURWARE
SECURWARE 2019, The Thirteenth International Conference on Emerging Security Information, Systems and Technologies
Type: conference
Notes: IARIA Conference.
Editors:
Stefan Rass, Universitaet Klagenfurt, Austria
George Yee, Carleton University, Canada
ISSN: 2162-2116
ISBN: 978-1-61208-746-7
Location: Nice, France
Dates: from October 27, 2019 to October 31, 2019
Articles: there are 20 articles
On the Compositionality of Dynamic Leakage and Its Application to the Quantification Problem
Bao Trung Chu, Kenji Hashimoto, and Hiroyuki Seki
keywords: Dynamic leakage; Composition; Quantitative Infor- mation Flow; BDD; d-DNNF.
An Evaluation on Feasibility of a Communication Classifying System
Yuya Sato, Hirokazu Hasegawa, and Hiroki Takakura
keywords: Targeted Attacks, Network Separation, Access Control
Privacy Preserved Authentication: A Neural Network Approach
Ray Hashemi, Amar Rasheed, Azita Bahrami, and Jeffrey Young
keywords: Anonymous Authentication; Encryption; Neural Network; Dynamic Authentication; Neural Network-based Authentication; Continuous Attesting Authenticity;
End-to-End Application Security over Intermediaries on the Example of Power System Communication
Steffen Fries and Rainer Falk
keywords: security; device authentication; end-to-end security; multi-hop security; IEC 62351 Publish/Subscribe
Reducing the Attack Surface for Private Data
George O. M. Yee
keywords: privacy, private data, breaches, attack surface identification, attack surface reduction
Implementation of MQTT/CoAP Honeypots and Analysis of Observed Data
Hajime Shimada, Katsutaka Ito, Hirokazu Hasegawa, and Yukiko Yamaguchi
keywords: Honeypod; Internet of Things; MQTT; CoAP.
VAULT: A Privacy Approach Towards High-Utility Time Series Data
Christoph Stach
keywords: Privacy; Time Series; Projection; Selection; Aggregation; Interpolation; Smoothing; Information Emphasization; Noise
Towards Empirically Assessing Behavior Stimulation Approaches for Android Malware
Aleieldin Salem, Michael Hesse, Jona Neumeier, and Alexander Prestschner
keywords: Android Security; Application Analysis; Malware Detection
Amplifying Side Channel Leakage by Hardware Modification of Xilinx Zynq-7 FPGA Evaluation Boards
Nadir Khan, Sven Nitzsche, Raffaela Frank, Lars Bauer, Jörg Henkel, and Jürgen Becker
keywords: FPGA; Side Channel Attack; Test Vector Leakage Assessment; Advanced Encryption Standard; Power Analysis
Multiple Image Fusion Encryption (MIFE) using Discrete Cosine Transformation (DCT) and Chaotic Generators
Lee Mariel Heucheun Yepdia, Alain Tiedeu, and Zied Lachiri
keywords: Spectral fusion;chaotic generators;image encryption
A Taxonomy of Metrics for Cryptographic Systems
Kimmo Halunen, Mikko Kiviharju, Jani Suomalainen, Visa Vallivaara, Markku Kylänpää, and Outi-Marja Latvala
keywords: Cryptography; Security metrics; Taxonomy; Competitions; Cryptographic systems
Comparison and Analysis of System Designs for Privacy-Preserving Genome Sequences Search
Yuki Yamada and Masato Oguchi
keywords: Homomorphic Encryption, Genome Sequence, Secure Search, Privacy, Cloud Computing
Statistical Measurement of Production Environment Influence on Code Reuse Availability
Etienne Louboutin, Jean-Christophe Bach, and Fabien Dagnat
keywords: Return-Oriented-Programming; ROP; Code reuse exploits
Zero Stars: Analysis of Cybersecurity Risk of Small COTS UAVs
Dillon M. Pettit, Rich Dill, and Scott Graham
keywords: UAV; cybersecurity; quantitative; risk assessment;COTS
A Study about FP-growth on a Distributed System Using Homomorphic Encryption
Mayuko Tanemura and Masato Oguchi
keywords: Fully Homomorphic Encryption; Data Mining; Distributed System.
IoTAMU: Protecting Smart Home Networks via Obfuscation and Encryption
Youngjun Park, Richard Dill, and Barry Mullins
keywords: Internet of Things (IoT); data security; network obfuscation; Wi-Fi camera
IoTAG: An Open Standard for IoT Device IdentificAtion and RecoGnition
Sebastian Fischer, Katrin Neubauer, Lukas Hinterberger, Bernhard Weber, and Rudolf Hackenberg
keywords: Internet of Things; device identification; open standard; IoTAG; security rating.
Automotive Network Protocol Detection for Supporting Penetration Testing
Florian Sommer, Jürgen Dürrwang, Marius Wolf, Hendrik Juraschek, Richard Ranert, and Reiner Kriesten
keywords: Automotive Security; Penetration Testing; Automation; Network Protocols.
Aggregation-Based Certificate Transparency Gossip
Rasmus Dahlberg, Tobias Pulls, Jonathan Vestin, Toke Høiland-Jørgensen, and Andreas Kassler
keywords: Certificate Transparency, Gossip, P4, XDP
Surveying the Incorporation of IoT Devices into Cybersecurity Risk Management Frameworks
Aaron Pendleton, Dillon Pettit, and Richard Dill
keywords: IoT, RMF, cybersecurity, risk, ICS