IFIP TC6 Open Digital Library

SEC 2013: Auckland, New Zealand

Security and Privacy Protection in Information Processing Systems - 28th IFIP TC 11 International Conference, SEC 2013, Auckland, New Zealand, July 8-10, 2013. Proceedings

Lech J. Janczewski, Henry B. Wolfe, Sujeet Shenoi

Springer, IFIP Advances in Information and Communication Technology 405, ISBN: 978-3-642-39217-7



Contents

Malware

Exploring Timeline-Based Malware Classification.

Rafiqul Islam, Irfan Altas, Md. Saiful Islam 0003

 1-13

Screening Smartphone Applications Using Behavioral Signatures.

Suyeon Lee, Jehyun Lee, Heejo Lee

 14-27

Game Theoretic Approach for Cost-Benefit Analysis of Malware Proliferation Prevention.

Theodoros Spyridopoulos, George C. Oikonomou, Theo Tryfonas, Mengmeng Ge

 28-41

Authentication and Authorization

Evolving a Secure Internet.

William J. Caelli, Lam-for Kwok, Dennis Longley

 42-54

Enhancing Click-Draw Based Graphical Passwords Using Multi-Touch on Mobile Phones.

Yuxin Meng, Wenjuan Li, Lam-for Kwok

 55-68

Applying DAC Principles to the RDF Graph Data Model.

Sabrina Kirrane, Alessandra Mileo, Stefan Decker

 69-82

A Lightweight Gait Authentication on Mobile Phone Regardless of Installation Error.

Thang Hoang, Deokjai Choi, Quang Viet Vo, Huy Anh Nguyen, Thuc Dinh Nguyen

 83-101

A Vulnerability in the Song Authentication Protocol for Low-Cost RFID Tags.

Sarah Abughazalah, Konstantinos Markantonakis, Keith Mayes

 102-110

Network Security/ Cryptography

Extraction of ABNF Rules from RFCs to Enable Automated Test Data Generation.

Markus Gruber, Phillip Wieser, Stefan Nachtnebel, Christian Schanes, Thomas Grechenig

 111-124

Key Derivation Function: The SCKDF Scheme.

Chuah Chai Wen, Ed Dawson, Leonie Simpson

 125-138

Sustainable Pseudo-random Number Generator.

Huafei Zhu, Wee Siong Ng, See-Kiong Ng

 139-147

Software Security

Improving Mobile Device Security with Operating System-Level Virtualization.

Sascha Wessel, Frederic Stumpf, Ilja Herdt, Claudia Eckert

 148-161

Generating Realistic Application Workloads for Mix-Based Systems for Controllable, Repeatable and Usable Experimentation.

Karl-Peter Fuchs, Dominik Herrmann, Hannes Federrath

 162-175

An Empirical Evaluation of the Android Security Framework.

Alessandro Armando, Alessio Merlo, Luca Verderame

 176-189

A Security Engineering Process Approach for the Future Development of Complex Aircraft Cabin Systems.

Hartmut Hintze, Benjamin Wiegraefe, Ralf God

 190-202

Mobile Device Encryption Systems.

Peter Teufl, Thomas Zefferer, Christof Stromberger

 203-216

Smartphone Volatile Memory Acquisition for Security Analysis and Forensics Investigation.

Vrizlynn L. L. Thing, Zheng-Leong Chua

 217-230

Program Transformation for Non-interference Verification on Programs with Pointers.

Mounir Assaf, Julien Signoles, Frédéric Tronel, Eric Totel

 231-244

Policy Compliance and Obligations

A Viable System Model for Information Security Governance: Establishing a Baseline of the Current Information Security Operations System.

Ezzat Alqurashi, Gary Wills, Lester Gilbert

 245-256

A Review of the Theory of Planned Behaviour in the Context of Information Security Policy Compliance.

Teodor Sommestad, Jonas Hallberg

 257-271

Privacy Protection

Enforcement of Privacy Requirements.

Padmanabhan Krishnan, Kostyantyn Vorobyov

 272-285

Towards Security-Enhanced and Privacy-Preserving Mashup Compositions.

Heidelinde Hobel, Johannes Heurix, Amin Anjomshoaa, Edgar Weippl

 286-299

On Privacy-Preserving Ways to Porting the Austrian eID System to the Public Cloud.

Bernd Zwattendorfer, Daniel Slamanig

 300-314

Risk Analysis and Security Metrics

Using the Conflicting Incentives Risk Analysis Method.

Lisa Rajbhandari, Einar Snekkenes

 315-329

Performance Analysis of Scalable Attack Representation Models.

Jin B. Hong, Dong Seong Kim

 330-343

ADAPT: A Game Inspired Attack-Defense and Performance Metric Taxonomy.

Chris B. Simmons, Sajjan G. Shiva, Harkeerat Singh Bedi, Vivek Shandilya

 344-365

Social Engineering

Phishing for the Truth: A Scenario-Based Experiment of Users' Behavioural Response to Emails.

Kathryn Parsons, Agata McCormac, Malcolm Robert Pattinson, Marcus A. Butavicius, Cate Jerram

 366-378

Phishing and Organisational Learning.

Wayne D. Kearney, Hennie A. Kruger

 379-390

A Case for Societal Digital Security Culture.

Lotfi Ben Othmane, Harold Weffers, Rohit Ranchal, Pelin Angin, Bharat K. Bhargava, Mohd Murtadha Mohamad

 391-404

Security Management/Forensic

Secure Outsourcing: An Investigation of the Fit between Clients and Providers.

Gurpreet Dhillon, Romilla Chowdhuri, Filipe de Sá-Soares

 405-418

Performance Analysis of File Carving Tools.

Thomas Laurenson

 419-433