Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
ARES
ARES 2014
Generate Citations
2014 Ninth International Conference on Availability, Reliability and Security (ARES)
Sept. 8 2014 to Sept. 12 2014
Fribourg, Switzerland
Table of Contents
Title Page i
Freely available from IEEE.
pp. i-i
Title Page iii
Freely available from IEEE.
pp. iii-iii
Copyright Page
Freely available from IEEE.
pp. iv-iv
Table of Contents
Freely available from IEEE.
pp. v-xi
Welcome Message from ARES Program Committee Co-Chairs and General Chair
Freely available from IEEE.
pp. xii-xii
ARES 2014 Organizing Committee
Freely available from IEEE.
pp. xiii-xv
Welcome Message from ARES Workshop Chair
Freely available from IEEE.
pp. xvi-xvi
Welcome Message from the ARES-IND 2014 Workshop Organizers
Freely available from IEEE.
pp. xvii-xvii
ARES-IND 2014 Workshop Program Committee
Freely available from IEEE.
pp. xviii-xviii
Welcome Message from the FARES 2014 Workshop Organizers
Freely available from IEEE.
pp. xix-xix
Welcome Message from the ECTCM 2014 Workshop Organizers
Freely available from IEEE.
pp. xx-xx
ECTCM 2014 Workshop Program Committee
Freely available from IEEE.
pp. xxi-xxi
Welcome Message from the IWSMA 2014 Workshop Organizers
Freely available from IEEE.
pp. xxii-xxii
IWSMA 2014 Workshop Program Committee
Freely available from IEEE.
pp. xxiii-xxiii
Welcome Message from the RAMSS 2014 Workshop Organizers
Freely available from IEEE.
pp. xxiv-xxiv
RAMSS 2014 Workshop Program Committee
Freely available from IEEE.
pp. xxv-xxv
Welcome Message from the RISI 2014 Workshop Organizers
Freely available from IEEE.
pp. xxvi-xxvii
RISI 2014 Workshop Program Committee
Freely available from IEEE.
pp. xxviii-xxviii
Welcome Message from the SAW 2014 Workshop Organizers
Freely available from IEEE.
pp. xxix-xxix
SAW 2014 Workshop Program Committee
Freely available from IEEE.
pp. xxx-xxx
Welcome Message from the SecATM 2014 Workshop Organizers
Freely available from IEEE.
pp. xxxi-xxxi
SecATM 2014 Workshop Program Committee
Freely available from IEEE.
pp. xxxii-xxxii
Welcome Message from the WSDF 2014 Workshop Organizers
Freely available from IEEE.
pp. xxxiii-xxxiii
WSDF 2014 Workshop Program Committee
Freely available from IEEE.
pp. xxxiv-xxxiv
A New Access Control Scheme for Facebook-Style Social Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-10
by
Jun Pang
,
Yang Zhang
No Smurfs: Revealing Fraud Chains in Mobile Money Transfers
Full-text access may be available. Sign in or learn about subscription options.
pp. 11-20
by
Maria Zhdanova
,
Jurgen Repp
,
Roland Rieke
,
Chrystel Gaber
,
Baptiste Hemery
BitTorrent Sync: Network Investigation Methodology
Full-text access may be available. Sign in or learn about subscription options.
pp. 21-29
by
Mark Scanlon
,
Jason Farina
,
M-Tahar Kechadi
Divide-and-Conquer: Why Android Malware Cannot Be Stopped
Full-text access may be available. Sign in or learn about subscription options.
pp. 30-39
by
Dominik Maier
,
Tilo Muller
,
Mykola Protsenko
DroidForce: Enforcing Complex, Data-centric, System-wide Policies in Android
Full-text access may be available. Sign in or learn about subscription options.
pp. 40-49
by
Siegfried Rasthofer
,
Steven Arzt
,
Enrico Lovat
,
Eric Bodden
Lobotomy: An Architecture for JIT Spraying Mitigation
Full-text access may be available. Sign in or learn about subscription options.
pp. 50-58
by
Martin Jauernig
,
Matthias Neugschwandtner
,
Christian Platzer
,
Paolo Milani Comparetti
A Formal Model and Analysis of the MQ Telemetry Transport Protocol
Full-text access may be available. Sign in or learn about subscription options.
pp. 59-68
by
Benjamin Aziz
Practical Attack on Bilinear Pairings to Disclose the Secrets of Embedded Devices
Full-text access may be available. Sign in or learn about subscription options.
pp. 69-77
by
Thomas Unterluggauer
,
Erich Wenger
A Model-Based Security Toolkit for the Internet of Things
Full-text access may be available. Sign in or learn about subscription options.
pp. 78-87
by
Ricardo Neisse
,
Igor Nai Fovino
,
Gianmarco Baldini
,
Vera Stavroulaki
,
Panagiotis Vlacheas
,
Raffaele Giaffreda
Rethread: A Low-Cost Transient Fault Recovery Scheme for Multithreaded Processors
Full-text access may be available. Sign in or learn about subscription options.
pp. 88-93
by
Jian Fu
,
Qiang Yang
,
Raphael Poss
,
Chris R. Jesshope
,
Chunyuan Zhang
Visualizing Transaction Context in Trust and Reputation Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 94-103
by
Johannes Sanger
,
Gunther Pernul
Enhanced Configuration Generation Approach for Highly Available COTS Based Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 104-113
by
Parsa Pourali
,
Ferhat Khendek
,
Maria Toeroe
Phishdentity: Leverage Website Favicon to Offset Polymorphic Phishing Website
Full-text access may be available. Sign in or learn about subscription options.
pp. 114-119
by
Jeffrey Choo Soon Fatt
,
Chiew Kang Leng
,
Sze San Nah
EM Leakage of RFID Devices -- Comparison of Two Measurement Approaches
Full-text access may be available. Sign in or learn about subscription options.
pp. 120-125
by
Thomas Korak
,
Thomas Plos
Supporting Security Automation for Multi-chassis Link Aggregation Groups via the Interconnected-Asset Ontology
Full-text access may be available. Sign in or learn about subscription options.
pp. 126-133
by
Henk Birkholz
,
Ingo Sieverdingbeck
Concurrent Queries in Location Based Services
Full-text access may be available. Sign in or learn about subscription options.
pp. 134-139
by
Emad Elabd
,
Mohand-Said Hacid
Palpable Privacy through Declarative Information Flows Tracking for Smart Buildings
Full-text access may be available. Sign in or learn about subscription options.
pp. 140-145
by
Francois Lesueur
,
Sabina Surdu
,
Romuald Thion
,
Yann Gripay
,
Meriam Ben Ghorbel-Talbi
An Enhanced Linkable Anonymous Access Protocol of the Distributed Electronic Patient Records
Full-text access may be available. Sign in or learn about subscription options.
pp. 146-151
by
Rima Addas
,
Ning Zhang
Privacy Dashboards: Reconciling Data-Driven Business Models and Privacy
Full-text access may be available. Sign in or learn about subscription options.
pp. 152-157
by
Christian Zimmermann
,
Rafael Accorsi
,
Gunter Muller
Healthcare Services in the Cloud -- Obstacles to Adoption, and a Way Forward
Full-text access may be available. Sign in or learn about subscription options.
pp. 158-165
by
Karin Bernsmed
,
Daniela Soares Cruzes
,
Martin Gilje Jaatun
,
Borge Haugset
,
Erlend Andreas Gjaere
Continuous and Non-intrusive Reauthentication of Web Sessions Based on Mouse Dynamics
Full-text access may be available. Sign in or learn about subscription options.
pp. 166-171
by
Eric Medvet
,
Alberto Bartoli
,
Francesca Boem
,
Fabiano Tarlao
What Does the Fox Say? On the Security Architecture of Firefox OS
Full-text access may be available. Sign in or learn about subscription options.
pp. 172-177
by
Marta Piekarska
,
Bhargava Shastry
,
Ravishankar Borgaonkar
Verifying Implementation of Security Design Patterns Using a Test Template
Full-text access may be available. Sign in or learn about subscription options.
pp. 178-183
by
Masatoshi Yoshizawa
,
Takanori Kobashi
,
Hironori Washizaki
,
Yoshiaki Fukazawa
,
Takao Okubo
,
Haruhiko Kaiya
,
Nobukazu Yoshioka
AES-SEC: Improving Software Obfuscation through Hardware-Assistance
Full-text access may be available. Sign in or learn about subscription options.
pp. 184-191
by
Sebastian Schrittwieser
,
Stefan Katzenbeisser
,
Georg Merzdovnik
,
Peter Kieseberg
,
Edgar Weippl
Fighting Botnets with Cyber-Security Analytics: Dealing with Heterogeneous Cyber-Security Information in New Generation SIEMs
Full-text access may be available. Sign in or learn about subscription options.
pp. 192-198
by
Beatriz Gallego-Nicasio Crespo
,
Alan Garwood
Network Security Analysis Using Behavior History Graph
Full-text access may be available. Sign in or learn about subscription options.
pp. 199-206
by
Mirko Sailio
,
Matti Mantere
,
Sami Noponen
A Usable Android Application Implementing Distributed Cryptography for Election Authorities
Full-text access may be available. Sign in or learn about subscription options.
pp. 207-216
by
Stephan Neumann
,
Oksana Kulyk
,
Melanie Volkamer
Complete SIP Message Obfuscation: PrivaSIP over Tor
Full-text access may be available. Sign in or learn about subscription options.
pp. 217-226
by
Georgios Karopoulos
,
Alexandros Fakis
,
Georgios Kambourakis
Privacy Preservation in Location-Based Mobile Applications: Research Directions
Full-text access may be available. Sign in or learn about subscription options.
pp. 227-233
by
Asma Patel
,
Esther Palomar
Challenges of Composing XACML Policies
Full-text access may be available. Sign in or learn about subscription options.
pp. 234-241
by
Bernard Stepien
,
Amy Felty
,
Stan Matwin
EmailCloak: A Practical and Flexible Approach to Improve Email Privacy
Full-text access may be available. Sign in or learn about subscription options.
pp. 242-250
by
Italo Dacosta
,
Andreas Put
,
Bart De Decker
Quality Matters: Systematizing Quality Deficiencies in the Documentation of Business Security Requirements
Full-text access may be available. Sign in or learn about subscription options.
pp. 251-258
by
Christian Sillaber
,
Ruth Breu
Evaluating the Effectiveness of ISO 27001: 2013 Based on Annex A
Full-text access may be available. Sign in or learn about subscription options.
pp. 259-264
by
Bahareh Shojaie
,
Hannes Federrath
,
Iman Saberi
A Proposal for a Unified Identity Card for Use in an Academic Federation Environment
Full-text access may be available. Sign in or learn about subscription options.
pp. 265-272
by
Felipe Coral Sasso
,
Ricardo Alexandre Reinaldo De Moraes
,
Jean Everson Martina
Defining Malicious Behavior
Full-text access may be available. Sign in or learn about subscription options.
pp. 273-278
by
Hermann Dornhackl
,
Konstantin Kadletz
,
Robert Luh
,
Paul Tavolato
The SMM Rootkit Revisited: Fun with USB
Full-text access may be available. Sign in or learn about subscription options.
pp. 279-286
by
Joshua Schiffman
,
David Kaplan
Towards a Hardware Trojan Detection Cycle
Full-text access may be available. Sign in or learn about subscription options.
pp. 287-294
by
Adrian Dabrowski
,
Heidelinde Hobel
,
Johanna Ullrich
,
Katharina Krombholz
,
Edgar Weippl
PhiGARo: Automatic Phishing Detection and Incident Response Framework
Full-text access may be available. Sign in or learn about subscription options.
pp. 295-302
by
Martin Husak
,
Jakub Cegan
Performance Measures of Behavior-Based Signatures: An Anti-malware Solution for Platforms with Limited Computing Resource
Full-text access may be available. Sign in or learn about subscription options.
pp. 303-309
by
Kelly Hughes
,
Yanzhen Qu
Network Security Monitoring in a Small-Scale Smart-Grid Laboratory
Full-text access may be available. Sign in or learn about subscription options.
pp. 310-316
by
Matti Mantere
,
Sami Noponen
,
Pia Olli
,
Jarno Salonen
Increasing the Resilience and Trustworthiness of OpenID Identity Providers for Future Networks and Services
Full-text access may be available. Sign in or learn about subscription options.
pp. 317-324
by
Diego Kreutz
,
Eduardo Feitosa
,
Hugo Cunha
,
Heiko Niedermayer
,
Holger Kinkelin
A Trust Management Based Security Mechanism against Collusion Attacks in a MANET Environment
Full-text access may be available. Sign in or learn about subscription options.
pp. 325-332
by
Aida Ben Chehida Douss
,
Ryma Abassi
,
Sihem Guemara El Fatmi
A Resource-Optimized Approach to Efficient Early Detection of Mobile Malware
Full-text access may be available. Sign in or learn about subscription options.
pp. 333-340
by
Jelena Milosevic
,
Andreas Dittrich
,
Alberto Ferrante
,
Miroslaw Malek
An Improved Role-Based Access to Android Applications with JCHR
Full-text access may be available. Sign in or learn about subscription options.
pp. 341-348
by
Stefano Bistarelli
,
Gianpiero Costantino
,
Fabio Martinelli
,
Francesco Santini
Qualified Electronic Signature via SIM Card Using JavaCard 3 Connected Edition Platform
Full-text access may be available. Sign in or learn about subscription options.
pp. 349-355
by
Jakub Breier
,
Adam Pomothy
Analysis of Algorithms for Computation of Direct Partial Logic Derivatives in Multiple-Valued Decision Diagrams
Full-text access may be available. Sign in or learn about subscription options.
pp. 356-361
by
Jozef Kostolny
,
Miroslav Kvassay
,
Elena Zaitseva
Stochastic Model for Medical Image Segmentation
Full-text access may be available. Sign in or learn about subscription options.
pp. 362-369
by
Zeev Barzily
,
Mingyue Ding
,
Zeev Volkovich
Fast Monte Carlo Simulation Methods Adapted to Simple Petri Net Models
Full-text access may be available. Sign in or learn about subscription options.
pp. 370-379
by
M. Estecahandy
,
S. Collas
,
L. Bordes
,
C. Paroissin
Monte-Carlo Based Reliability Modelling of a Gas Network Using Graph Theory Approach
Full-text access may be available. Sign in or learn about subscription options.
pp. 380-386
by
Pavel Praks
,
Vytis Kopustinskas
Performance Determination for MSS Manufacturing System by Lz-Transform and Stochastic Processes Approach
Full-text access may be available. Sign in or learn about subscription options.
pp. 387-392
by
Ilia Frenkel
,
Svetlana Daichman
,
Lev Khvatskin
,
Neta Avraham
,
Oshrit Zihry
,
Anatoly Lisnianski
On Availability Comparison of Reservation Modes for Multi-state Air Conditioning Systems Using Markov Approach
Full-text access may be available. Sign in or learn about subscription options.
pp. 393-396
by
Lev Khvatskin
,
Ilia Frenkel
Semi-Markov Modelling for Multi-state Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 397-402
by
Vlad Stefan Barbu
,
Alex Karagrigoriou
,
Andreas Makrides
Optimizing the Availability and the Operational Cost of a Periodically Inspected Multi-state Deteriorating System with Condition Based Maintenance Policies
Full-text access may be available. Sign in or learn about subscription options.
pp. 403-411
by
S. Malefaki
,
V.P. Koutras
,
A.N. Platis
Statistical Inference for Heavy-Tailed Distributions in Technical Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 412-419
by
Alex Karagrigoriou
,
Ilia Vonta
A Comparative Study of Control Charts for Zero-Inflated Binomial Processes
Full-text access may be available. Sign in or learn about subscription options.
pp. 420-425
by
Athanasios C. Rakitzis
,
Petros E. Maravelakis
,
Philippe C. Castagliola
Practical Applications of Advanced Statistical Models in Reliability Data Analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 426-429
by
Vasiliy Krivtsov
,
Olexandr Yevkin
On Sensitivity of Reliability Models to the Shape of Life and Repair Time Distributions
Full-text access may be available. Sign in or learn about subscription options.
pp. 430-437
by
Vladimir Rykov
,
Dmitry Efrosinin
,
Vladimir Vishnevsiy
Organizing On-Site Volunteers: An App-Based Approach
Full-text access may be available. Sign in or learn about subscription options.
pp. 438-439
by
Stefan Sackmann
,
Marlen Hofmann
,
Hans J. Betke
Visualization of Recovery Situation in Disaster Area by Using Web Reservation Data
Full-text access may be available. Sign in or learn about subscription options.
pp. 440-446
by
Yu Ichifuji
,
Noboru Sonehara
A k-anonymity method based on search engine query statistics for disaster impact statements
Full-text access may be available. Sign in or learn about subscription options.
pp. 447-454
by
Hidenobu Oguri
,
Noboru Sonehara
A System for Anonymizing Temporal Phrases of Message Posted in Online Social Networks and for Detecting Disclosure
Full-text access may be available. Sign in or learn about subscription options.
pp. 455-460
by
Hoang-Quoc Nguyen-Son
,
Minh-Triet Tran
,
Hiroshi Yoshiura
,
Sonehara Noboru
,
Isao Echizen
Effects of External Information on Anonymity and Role of Transparency with Example of Social Network De-anonymisation
Full-text access may be available. Sign in or learn about subscription options.
pp. 461-467
by
Haruno Kataoka
,
Yohei Ogawa
,
Isao Echizen
,
Tetsuji Kuboyama
,
Hiroshi Yoshiura
Risk-Aware Design and Management of Resilient Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 468-475
by
Piotr Cholda
Vulnerability-Based Security Pattern Categorization in Search of Missing Patterns
Full-text access may be available. Sign in or learn about subscription options.
pp. 476-483
by
Priya Anand
,
Jungwoo Ryoo
,
Rick Kazman
Building Sustainable Software by Preemptive Architectural Design Using Tactic-Equipped Patterns
Full-text access may be available. Sign in or learn about subscription options.
pp. 484-489
by
Dae-Kyoo Kim
,
Jungwoo Ryoo
,
Suntae Kim
Using Assurance Cases to Develop Iteratively Security Features Using Scrum
Full-text access may be available. Sign in or learn about subscription options.
pp. 490-497
by
Lotfi ben Othmane
,
Pelin Angin
,
Bharat Bhargava
LiSTT: An Investigation into Unsound-Incomplete Yet Practical Result Yielding Static Taintflow Analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 498-505
by
Sanjay Rawat
,
Laurent Mounier
,
Marie-Laure Potet
Visualization of Security Metrics for Cyber Situation Awareness
Full-text access may be available. Sign in or learn about subscription options.
pp. 506-513
by
Igor Kotenko
,
Evgenia Novikova
A Relative Cost-Benefit Approach for Evaluating Alternative Airport Security Policies
Full-text access may be available. Sign in or learn about subscription options.
pp. 514-522
by
Woohyun Shim
,
Fabio Massacci
,
Alessandra Tedeschi
,
Alessandro Pollini
Mathematical Modelling in Air Traffic Management Security
Full-text access may be available. Sign in or learn about subscription options.
pp. 523-529
by
Denis Kolev
,
Evgeniy Morozov
The Social Acceptance of the Passivation of Misused Aircraft
Full-text access may be available. Sign in or learn about subscription options.
pp. 530-536
by
Ana P.G. Martins
EMFASE -- An Empirical Framework for Security Design and Economic Trade-off
Full-text access may be available. Sign in or learn about subscription options.
pp. 537-543
by
Fabio Massacci
,
Federica Paci
,
Bjornar Solhaug
,
Alessandra Tedeschi
Security Situation Management: Towards Developing a Time-Critical Decision Making Capability for SESAR
Full-text access may be available. Sign in or learn about subscription options.
pp. 544-551
by
Rainer Koelle
Design-In Security for Air Traffic Control
Full-text access may be available. Sign in or learn about subscription options.
pp. 552-555
by
Martin Hawley
,
Karol Gotz
,
John Hird
,
Chris Machin
Learn to SWIM
Full-text access may be available. Sign in or learn about subscription options.
pp. 556-560
by
Matias Krempel
,
Martin Gilje Jaatun
Real-Time Screen Watermarking Using Overlaying Layer
Full-text access may be available. Sign in or learn about subscription options.
pp. 561-570
by
Maciej Piec
,
Andreas Rauber
Showing 100 out of 104
Load More
Load All