Default Cover Image

2014 Ninth International Conference on Availability, Reliability and Security (ARES)

Sept. 8 2014 to Sept. 12 2014

Fribourg, Switzerland

Table of Contents

Title Page iFreely available from IEEE.pp. i-i
Title Page iiiFreely available from IEEE.pp. iii-iii
Copyright PageFreely available from IEEE.pp. iv-iv
Table of ContentsFreely available from IEEE.pp. v-xi
ARES 2014 Organizing CommitteeFreely available from IEEE.pp. xiii-xv
Welcome Message from ARES Workshop ChairFreely available from IEEE.pp. xvi-xvi
Welcome Message from the ARES-IND 2014 Workshop OrganizersFreely available from IEEE.pp. xvii-xvii
ARES-IND 2014 Workshop Program CommitteeFreely available from IEEE.pp. xviii-xviii
Welcome Message from the FARES 2014 Workshop OrganizersFreely available from IEEE.pp. xix-xix
ECTCM 2014 Workshop Program CommitteeFreely available from IEEE.pp. xxi-xxi
Welcome Message from the IWSMA 2014 Workshop OrganizersFreely available from IEEE.pp. xxii-xxii
IWSMA 2014 Workshop Program CommitteeFreely available from IEEE.pp. xxiii-xxiii
Welcome Message from the RAMSS 2014 Workshop OrganizersFreely available from IEEE.pp. xxiv-xxiv
RAMSS 2014 Workshop Program CommitteeFreely available from IEEE.pp. xxv-xxv
Welcome Message from the RISI 2014 Workshop OrganizersFreely available from IEEE.pp. xxvi-xxvii
RISI 2014 Workshop Program CommitteeFreely available from IEEE.pp. xxviii-xxviii
Welcome Message from the SAW 2014 Workshop OrganizersFreely available from IEEE.pp. xxix-xxix
SAW 2014 Workshop Program CommitteeFreely available from IEEE.pp. xxx-xxx
Welcome Message from the SecATM 2014 Workshop OrganizersFreely available from IEEE.pp. xxxi-xxxi
SecATM 2014 Workshop Program CommitteeFreely available from IEEE.pp. xxxii-xxxii
Welcome Message from the WSDF 2014 Workshop OrganizersFreely available from IEEE.pp. xxxiii-xxxiii
WSDF 2014 Workshop Program CommitteeFreely available from IEEE.pp. xxxiv-xxxiv
A New Access Control Scheme for Facebook-Style Social NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 1-10
No Smurfs: Revealing Fraud Chains in Mobile Money TransfersFull-text access may be available. Sign in or learn about subscription options.pp. 11-20
BitTorrent Sync: Network Investigation MethodologyFull-text access may be available. Sign in or learn about subscription options.pp. 21-29
Divide-and-Conquer: Why Android Malware Cannot Be StoppedFull-text access may be available. Sign in or learn about subscription options.pp. 30-39
DroidForce: Enforcing Complex, Data-centric, System-wide Policies in AndroidFull-text access may be available. Sign in or learn about subscription options.pp. 40-49
Lobotomy: An Architecture for JIT Spraying MitigationFull-text access may be available. Sign in or learn about subscription options.pp. 50-58
A Formal Model and Analysis of the MQ Telemetry Transport ProtocolFull-text access may be available. Sign in or learn about subscription options.pp. 59-68
Practical Attack on Bilinear Pairings to Disclose the Secrets of Embedded DevicesFull-text access may be available. Sign in or learn about subscription options.pp. 69-77
Rethread: A Low-Cost Transient Fault Recovery Scheme for Multithreaded ProcessorsFull-text access may be available. Sign in or learn about subscription options.pp. 88-93
Visualizing Transaction Context in Trust and Reputation SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 94-103
Enhanced Configuration Generation Approach for Highly Available COTS Based SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 104-113
Phishdentity: Leverage Website Favicon to Offset Polymorphic Phishing WebsiteFull-text access may be available. Sign in or learn about subscription options.pp. 114-119
EM Leakage of RFID Devices -- Comparison of Two Measurement ApproachesFull-text access may be available. Sign in or learn about subscription options.pp. 120-125
Supporting Security Automation for Multi-chassis Link Aggregation Groups via the Interconnected-Asset OntologyFull-text access may be available. Sign in or learn about subscription options.pp. 126-133
Concurrent Queries in Location Based ServicesFull-text access may be available. Sign in or learn about subscription options.pp. 134-139
An Enhanced Linkable Anonymous Access Protocol of the Distributed Electronic Patient RecordsFull-text access may be available. Sign in or learn about subscription options.pp. 146-151
Privacy Dashboards: Reconciling Data-Driven Business Models and PrivacyFull-text access may be available. Sign in or learn about subscription options.pp. 152-157
Continuous and Non-intrusive Reauthentication of Web Sessions Based on Mouse DynamicsFull-text access may be available. Sign in or learn about subscription options.pp. 166-171
What Does the Fox Say? On the Security Architecture of Firefox OSFull-text access may be available. Sign in or learn about subscription options.pp. 172-177
Network Security Analysis Using Behavior History GraphFull-text access may be available. Sign in or learn about subscription options.pp. 199-206
A Usable Android Application Implementing Distributed Cryptography for Election AuthoritiesFull-text access may be available. Sign in or learn about subscription options.pp. 207-216
Complete SIP Message Obfuscation: PrivaSIP over TorFull-text access may be available. Sign in or learn about subscription options.pp. 217-226
Privacy Preservation in Location-Based Mobile Applications: Research DirectionsFull-text access may be available. Sign in or learn about subscription options.pp. 227-233
Challenges of Composing XACML PoliciesFull-text access may be available. Sign in or learn about subscription options.pp. 234-241
EmailCloak: A Practical and Flexible Approach to Improve Email PrivacyFull-text access may be available. Sign in or learn about subscription options.pp. 242-250
Quality Matters: Systematizing Quality Deficiencies in the Documentation of Business Security RequirementsFull-text access may be available. Sign in or learn about subscription options.pp. 251-258
Evaluating the Effectiveness of ISO 27001: 2013 Based on Annex AFull-text access may be available. Sign in or learn about subscription options.pp. 259-264
Defining Malicious BehaviorFull-text access may be available. Sign in or learn about subscription options.pp. 273-278
The SMM Rootkit Revisited: Fun with USBFull-text access may be available. Sign in or learn about subscription options.pp. 279-286
Towards a Hardware Trojan Detection CycleFull-text access may be available. Sign in or learn about subscription options.pp. 287-294
PhiGARo: Automatic Phishing Detection and Incident Response FrameworkFull-text access may be available. Sign in or learn about subscription options.pp. 295-302
Network Security Monitoring in a Small-Scale Smart-Grid LaboratoryFull-text access may be available. Sign in or learn about subscription options.pp. 310-316
A Resource-Optimized Approach to Efficient Early Detection of Mobile MalwareFull-text access may be available. Sign in or learn about subscription options.pp. 333-340
An Improved Role-Based Access to Android Applications with JCHRFull-text access may be available. Sign in or learn about subscription options.pp. 341-348
Qualified Electronic Signature via SIM Card Using JavaCard 3 Connected Edition PlatformFull-text access may be available. Sign in or learn about subscription options.pp. 349-355
Stochastic Model for Medical Image SegmentationFull-text access may be available. Sign in or learn about subscription options.pp. 362-369
Fast Monte Carlo Simulation Methods Adapted to Simple Petri Net ModelsFull-text access may be available. Sign in or learn about subscription options.pp. 370-379
Monte-Carlo Based Reliability Modelling of a Gas Network Using Graph Theory ApproachFull-text access may be available. Sign in or learn about subscription options.pp. 380-386
On Availability Comparison of Reservation Modes for Multi-state Air Conditioning Systems Using Markov ApproachFull-text access may be available. Sign in or learn about subscription options.pp. 393-396
Semi-Markov Modelling for Multi-state SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 397-402
Statistical Inference for Heavy-Tailed Distributions in Technical SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 412-419
A Comparative Study of Control Charts for Zero-Inflated Binomial ProcessesFull-text access may be available. Sign in or learn about subscription options.pp. 420-425
Practical Applications of Advanced Statistical Models in Reliability Data AnalysisFull-text access may be available. Sign in or learn about subscription options.pp. 426-429
On Sensitivity of Reliability Models to the Shape of Life and Repair Time DistributionsFull-text access may be available. Sign in or learn about subscription options.pp. 430-437
Organizing On-Site Volunteers: An App-Based ApproachFull-text access may be available. Sign in or learn about subscription options.pp. 438-439
Visualization of Recovery Situation in Disaster Area by Using Web Reservation DataFull-text access may be available. Sign in or learn about subscription options.pp. 440-446
A k-anonymity method based on search engine query statistics for disaster impact statementsFull-text access may be available. Sign in or learn about subscription options.pp. 447-454
Risk-Aware Design and Management of Resilient NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 468-475
Vulnerability-Based Security Pattern Categorization in Search of Missing PatternsFull-text access may be available. Sign in or learn about subscription options.pp. 476-483
Building Sustainable Software by Preemptive Architectural Design Using Tactic-Equipped PatternsFull-text access may be available. Sign in or learn about subscription options.pp. 484-489
Using Assurance Cases to Develop Iteratively Security Features Using ScrumFull-text access may be available. Sign in or learn about subscription options.pp. 490-497
Visualization of Security Metrics for Cyber Situation AwarenessFull-text access may be available. Sign in or learn about subscription options.pp. 506-513
A Relative Cost-Benefit Approach for Evaluating Alternative Airport Security PoliciesFull-text access may be available. Sign in or learn about subscription options.pp. 514-522
Mathematical Modelling in Air Traffic Management SecurityFull-text access may be available. Sign in or learn about subscription options.pp. 523-529
The Social Acceptance of the Passivation of Misused AircraftFull-text access may be available. Sign in or learn about subscription options.pp. 530-536
EMFASE -- An Empirical Framework for Security Design and Economic Trade-offFull-text access may be available. Sign in or learn about subscription options.pp. 537-543
Security Situation Management: Towards Developing a Time-Critical Decision Making Capability for SESARFull-text access may be available. Sign in or learn about subscription options.pp. 544-551
Design-In Security for Air Traffic ControlFull-text access may be available. Sign in or learn about subscription options.pp. 552-555
Learn to SWIMFull-text access may be available. Sign in or learn about subscription options.pp. 556-560
Real-Time Screen Watermarking Using Overlaying LayerFull-text access may be available. Sign in or learn about subscription options.pp. 561-570
Showing 100 out of 104