Home // SECURWARE

SECURWARE 2019, The Thirteenth International Conference on Emerging Security Information, Systems and Technologies

Type: conference

Notes: IARIA Conference.

Editors:
Stefan Rass, Universitaet Klagenfurt, Austria
George Yee, Carleton University, Canada

ISSN: 2162-2116

ISBN: 978-1-61208-746-7

Location: Nice, France

Dates: from October 27, 2019 to October 31, 2019

Articles: there are 20 articles

On the Compositionality of Dynamic Leakage and Its Application to the Quantification Problem
Bao Trung Chu, Kenji Hashimoto, and Hiroyuki Seki
keywords: Dynamic leakage; Composition; Quantitative Infor- mation Flow; BDD; d-DNNF.

An Evaluation on Feasibility of a Communication Classifying System
Yuya Sato, Hirokazu Hasegawa, and Hiroki Takakura
keywords: Targeted Attacks, Network Separation, Access Control

Privacy Preserved Authentication: A Neural Network Approach
Ray Hashemi, Amar Rasheed, Azita Bahrami, and Jeffrey Young
keywords: Anonymous Authentication; Encryption; Neural Network; Dynamic Authentication; Neural Network-based Authentication; Continuous Attesting Authenticity;

End-to-End Application Security over Intermediaries on the Example of Power System Communication
Steffen Fries and Rainer Falk
keywords: security; device authentication; end-to-end security; multi-hop security; IEC 62351 Publish/Subscribe

Reducing the Attack Surface for Private Data
George O. M. Yee
keywords: privacy, private data, breaches, attack surface identification, attack surface reduction

Implementation of MQTT/CoAP Honeypots and Analysis of Observed Data
Hajime Shimada, Katsutaka Ito, Hirokazu Hasegawa, and Yukiko Yamaguchi
keywords: Honeypod; Internet of Things; MQTT; CoAP.

VAULT: A Privacy Approach Towards High-Utility Time Series Data
Christoph Stach
keywords: Privacy; Time Series; Projection; Selection; Aggregation; Interpolation; Smoothing; Information Emphasization; Noise

Towards Empirically Assessing Behavior Stimulation Approaches for Android Malware
Aleieldin Salem, Michael Hesse, Jona Neumeier, and Alexander Prestschner
keywords: Android Security; Application Analysis; Malware Detection

Amplifying Side Channel Leakage by Hardware Modification of Xilinx Zynq-7 FPGA Evaluation Boards
Nadir Khan, Sven Nitzsche, Raffaela Frank, Lars Bauer, Jörg Henkel, and Jürgen Becker
keywords: FPGA; Side Channel Attack; Test Vector Leakage Assessment; Advanced Encryption Standard; Power Analysis

Multiple Image Fusion Encryption (MIFE) using Discrete Cosine Transformation (DCT) and Chaotic Generators
Lee Mariel Heucheun Yepdia, Alain Tiedeu, and Zied Lachiri
keywords: Spectral fusion;chaotic generators;image encryption

A Taxonomy of Metrics for Cryptographic Systems
Kimmo Halunen, Mikko Kiviharju, Jani Suomalainen, Visa Vallivaara, Markku Kylänpää, and Outi-Marja Latvala
keywords: Cryptography; Security metrics; Taxonomy; Competitions; Cryptographic systems

Comparison and Analysis of System Designs for Privacy-Preserving Genome Sequences Search
Yuki Yamada and Masato Oguchi
keywords: Homomorphic Encryption, Genome Sequence, Secure Search, Privacy, Cloud Computing

Statistical Measurement of Production Environment Influence on Code Reuse Availability
Etienne Louboutin, Jean-Christophe Bach, and Fabien Dagnat
keywords: Return-Oriented-Programming; ROP; Code reuse exploits

Zero Stars: Analysis of Cybersecurity Risk of Small COTS UAVs
Dillon M. Pettit, Rich Dill, and Scott Graham
keywords: UAV; cybersecurity; quantitative; risk assessment;COTS

A Study about FP-growth on a Distributed System Using Homomorphic Encryption
Mayuko Tanemura and Masato Oguchi
keywords: Fully Homomorphic Encryption; Data Mining; Distributed System.

IoTAMU: Protecting Smart Home Networks via Obfuscation and Encryption
Youngjun Park, Richard Dill, and Barry Mullins
keywords: Internet of Things (IoT); data security; network obfuscation; Wi-Fi camera

IoTAG: An Open Standard for IoT Device IdentificAtion and RecoGnition
Sebastian Fischer, Katrin Neubauer, Lukas Hinterberger, Bernhard Weber, and Rudolf Hackenberg
keywords: Internet of Things; device identification; open standard; IoTAG; security rating.

Automotive Network Protocol Detection for Supporting Penetration Testing
Florian Sommer, Jürgen Dürrwang, Marius Wolf, Hendrik Juraschek, Richard Ranert, and Reiner Kriesten
keywords: Automotive Security; Penetration Testing; Automation; Network Protocols.

Aggregation-Based Certificate Transparency Gossip
Rasmus Dahlberg, Tobias Pulls, Jonathan Vestin, Toke Høiland-Jørgensen, and Andreas Kassler
keywords: Certificate Transparency, Gossip, P4, XDP

Surveying the Incorporation of IoT Devices into Cybersecurity Risk Management Frameworks
Aaron Pendleton, Dillon Pettit, and Richard Dill
keywords: IoT, RMF, cybersecurity, risk, ICS