SEC 2013: Auckland, New Zealand
Security and Privacy Protection in Information Processing Systems - 28th IFIP TC 11 International Conference, SEC 2013, Auckland, New Zealand, July 8-10, 2013. Proceedings
Lech J. Janczewski, Henry B. Wolfe, Sujeet Shenoi
Springer, IFIP Advances in Information and Communication Technology 405, ISBN: 978-3-642-39217-7
Contents
Malware
Exploring Timeline-Based Malware Classification.
Rafiqul Islam, Irfan Altas, Md. Saiful Islam 0003
1-13
Screening Smartphone Applications Using Behavioral Signatures.
Suyeon Lee, Jehyun Lee, Heejo Lee
14-27
Game Theoretic Approach for Cost-Benefit Analysis of Malware Proliferation Prevention.
Theodoros Spyridopoulos, George C. Oikonomou, Theo Tryfonas, Mengmeng Ge
28-41
Authentication and Authorization
Enhancing Click-Draw Based Graphical Passwords Using Multi-Touch on Mobile Phones.
Yuxin Meng, Wenjuan Li, Lam-for Kwok
55-68
Applying DAC Principles to the RDF Graph Data Model.
Sabrina Kirrane, Alessandra Mileo, Stefan Decker
69-82
A Lightweight Gait Authentication on Mobile Phone Regardless of Installation Error.
Thang Hoang, Deokjai Choi, Quang Viet Vo, Huy Anh Nguyen, Thuc Dinh Nguyen
83-101
A Vulnerability in the Song Authentication Protocol for Low-Cost RFID Tags.
Sarah Abughazalah, Konstantinos Markantonakis, Keith Mayes
102-110
Network Security/ Cryptography
Extraction of ABNF Rules from RFCs to Enable Automated Test Data Generation.
Markus Gruber, Phillip Wieser, Stefan Nachtnebel, Christian Schanes, Thomas Grechenig
111-124
Software Security
Improving Mobile Device Security with Operating System-Level Virtualization.
Sascha Wessel, Frederic Stumpf, Ilja Herdt, Claudia Eckert
148-161
Karl-Peter Fuchs, Dominik Herrmann, Hannes Federrath
162-175
An Empirical Evaluation of the Android Security Framework.
Alessandro Armando, Alessio Merlo, Luca Verderame
176-189
Hartmut Hintze, Benjamin Wiegraefe, Ralf God
190-202
Smartphone Volatile Memory Acquisition for Security Analysis and Forensics Investigation.
Vrizlynn L. L. Thing, Zheng-Leong Chua
217-230
Program Transformation for Non-interference Verification on Programs with Pointers.
Mounir Assaf, Julien Signoles, Frédéric Tronel, Eric Totel
231-244
Policy Compliance and Obligations
Ezzat Alqurashi, Gary Wills, Lester Gilbert
245-256
Teodor Sommestad, Jonas Hallberg
257-271
Privacy Protection
Towards Security-Enhanced and Privacy-Preserving Mashup Compositions.
Heidelinde Hobel, Johannes Heurix, Amin Anjomshoaa, Edgar Weippl
286-299
On Privacy-Preserving Ways to Porting the Austrian eID System to the Public Cloud.
Bernd Zwattendorfer, Daniel Slamanig
300-314
Risk Analysis and Security Metrics
ADAPT: A Game Inspired Attack-Defense and Performance Metric Taxonomy.
Chris B. Simmons, Sajjan G. Shiva, Harkeerat Singh Bedi, Vivek Shandilya
344-365
Social Engineering
Phishing for the Truth: A Scenario-Based Experiment of Users' Behavioural Response to Emails.
Kathryn Parsons, Agata McCormac, Malcolm Robert Pattinson, Marcus A. Butavicius, Cate Jerram
366-378
A Case for Societal Digital Security Culture.
Lotfi Ben Othmane, Harold Weffers, Rohit Ranchal, Pelin Angin, Bharat K. Bhargava, Mohd Murtadha Mohamad
391-404
Security Management/Forensic
Secure Outsourcing: An Investigation of the Fit between Clients and Providers.
Gurpreet Dhillon, Romilla Chowdhuri, Filipe de Sá-Soares
405-418