Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
ARES
ARES 2015
Generate Citations
2015 10th International Conference on Availability, Reliability and Security (ARES)
Aug. 24 2015 to Aug. 27 2015
Toulouse, France
Table of Contents
[Title page i]
Freely available from IEEE.
pp. i-i
[Title page iii]
Freely available from IEEE.
pp. iii-iii
[Copyright notice]
Freely available from IEEE.
pp. iv-iv
Table of contents
Freely available from IEEE.
pp. v-xiii
Welcome Message from ARES Program Committee Co-Chair and General Chair
Freely available from IEEE.
pp. xiv-xiv
ARES 2015 Program Committee and Local Organizing Committee
Freely available from IEEE.
pp. xv-xvii
Welcome Message from the ARES 2015 Workshop Chair
Freely available from IEEE.
pp. xviii-xviii
Welcome Message from the FARES 2015 Workshop Organizers
Freely available from IEEE.
pp. xix-xix
Welcome Message from the WSDF 2015 Workshop Organizers
Freely available from IEEE.
pp. xx-xx
WSDF 2015 Program Committee
Freely available from IEEE.
pp. xxi-xxi
Welcome Message from the IWSMA 2015 Workshop Organizers
Freely available from IEEE.
pp. xxii-xxii
IWSMA 2015 Program Committee
Freely available from IEEE.
pp. xxiii-xxiii
Welcome Message from the IWCC 2015 Workshop Organizers
Freely available from IEEE.
pp. xxiv-xxiv
IWCC 2015 Program Committee
Freely available from IEEE.
pp. xxv-xxv
Welcome Message from the SAW 2015 Workshop Organizers
Freely available from IEEE.
pp. xxvi-xxvi
SAW 2015 Program Committee
Freely available from IEEE.
pp. xxvii-xxvii
Welcome Message from the ASSD 2015 Workshop Organizers
Freely available from IEEE.
pp. xxviii-xxviii
ASSD 2015 Program Committee
Freely available from IEEE.
pp. xxix-xxix
Welcome Message from the WCSF 2015 Workshop Organizers
Freely available from IEEE.
pp. xxx-xxx
WCSF 2015 Program Committee
Freely available from IEEE.
pp. xxxi-xxxi
Welcome Message from the MFSec 2015 Workshop Organizers
Freely available from IEEE.
pp. xxxii-xxxii
MFSec 2015 Program Committee
Freely available from IEEE.
pp. xxxiii-xxxiii
Welcome Message from the ARES EU Projects Symposium
Freely available from IEEE.
pp. xxxiv-xxxiv
Welcome Message from the AU2EU 2015 Workshop Organizers
Freely available from IEEE.
pp. xxxv-xxxv
AU2EU 2015 Program Committee
Freely available from IEEE.
pp. xxxvi-xxxvi
Welcome Message from the FCCT 2015 Workshop Organizers
Freely available from IEEE.
pp. xxxvii-xxxvii
FCCT 2015 Program Committee
Freely available from IEEE.
pp. xxxviii-xxxviii
Welcome Message from the STAM 2015 Workshop Organizers
Freely available from IEEE.
pp. xxxix-xxxix
STAM 2015 Program Committee
Freely available from IEEE.
pp. xl-xl
Structural Weaknesses in the Open Smart Grid Protocol
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-10
by
Klaus Kursawe
,
Christiane Peters
A Novel Security-Enhanced Agile Software Development Process Applied in an Industrial Setting
Full-text access may be available. Sign in or learn about subscription options.
pp. 11-19
by
Dejan Baca
,
Martin Boldt
,
Bengt Carlsson
,
Andreas Jacobsson
Optimizing IT Service Costs with Respect to the Availability Service Level Objective
Full-text access may be available. Sign in or learn about subscription options.
pp. 20-29
by
Sascha Bosse
,
Matthias Splieth
,
Klaus Turowski
PALPAS -- PAssword Less PAssword Synchronization
Full-text access may be available. Sign in or learn about subscription options.
pp. 30-39
by
Moritz Horsch
,
Andreas Hulsing
,
Johannes Buchmann
Advanced Identity and Access Policy Management Using Contextual Data
Full-text access may be available. Sign in or learn about subscription options.
pp. 40-49
by
Matthias Hummer
,
Michael Kunz
,
Michael Netter
,
Ludwig Fuchs
,
Gunther Pernul
Publicly Verifiable Private Aggregation of Time-Series Data
Full-text access may be available. Sign in or learn about subscription options.
pp. 50-59
by
Bence Gabor Bakondi
,
Andreas Peter
,
Maarten Everts
,
Pieter Hartel
,
Willem Jonker
Accountable Redactable Signatures
Full-text access may be available. Sign in or learn about subscription options.
pp. 60-69
by
Henrich C. Pohls
,
Kai Samelin
The Role and Security of Firewalls in IaaS Cloud Computing
Full-text access may be available. Sign in or learn about subscription options.
pp. 70-79
by
Jordan Cropper
,
Johanna Ullrich
,
Peter Fruhwirt
,
Edgar Weippl
Empirical Evaluation of the A3 Environment: Evaluating Defenses Against Zero-Day Attacks
Full-text access may be available. Sign in or learn about subscription options.
pp. 80-89
by
Shane S. Clark
,
Aaron Paulos
,
Brett Benyo
,
Partha Pal
,
Richard Schantz
Uncovering Use-After-Free Conditions in Compiled Code
Full-text access may be available. Sign in or learn about subscription options.
pp. 90-99
by
David Dewey
,
Bradley Reaves
,
Patrick Traynor
All-Solution Satisfiability Modulo Theories: Applications, Algorithms and Benchmarks
Full-text access may be available. Sign in or learn about subscription options.
pp. 100-109
by
Quoc-Sang Phan
,
Pasquale Malacaria
Fair Fingerprinting Protocol for Attesting Software Misuses
Full-text access may be available. Sign in or learn about subscription options.
pp. 110-119
by
Raphael C.S. Machado
,
Davidson R. Boccardo
,
Vinícius G. Pereira de Sá
,
Jayme L. Szwarcfiter
A Lightweight Framework for Cold Boot Based Forensics on Mobile Devices
Full-text access may be available. Sign in or learn about subscription options.
pp. 120-128
by
Benjamin Taubmann
,
Manuel Huber
,
Sascha Wessel
,
Lukas Heim
,
Hans Peter Reiser
,
Georg Sigl
Dynamic Self-Protection and Tamperproofing for Android Apps Using Native Code
Full-text access may be available. Sign in or learn about subscription options.
pp. 129-138
by
Mykola Protsenko
,
Sebastien Kreuter
,
Tilo Muller
Don't Brick Your Car: Firmware Confidentiality and Rollback for Vehicles
Full-text access may be available. Sign in or learn about subscription options.
pp. 139-148
by
Hafizah Mansor
,
Konstantinos Markantonakis
,
Raja Naeem Akram
,
Keith Mayes
Modeling Fraud Prevention of Online Services Using Incident Response Trees and Value at Risk
Full-text access may be available. Sign in or learn about subscription options.
pp. 149-158
by
Dan Gorton
The Effects of Cultural Dimensions on the Development of an ISMS Based on the ISO 27001
Full-text access may be available. Sign in or learn about subscription options.
pp. 159-167
by
Bahareh Shojaie
,
Hannes Federrath
,
Iman Saberi
On the Isofunctionality of Network Access Control Lists
Full-text access may be available. Sign in or learn about subscription options.
pp. 168-173
by
Malek Belhaouane
,
Joaquin Garcia-Alfaro
,
Herve Debar
Trust me, I'm a Root CA! Analyzing SSL Root CAs in Modern Browsers and Operating Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 174-179
by
Tariq Fadai
,
Sebastian Schrittwieser
,
Peter Kieseberg
,
Martin Mulazzani
A Time Series Approach for Inferring Orchestrated Probing Campaigns by Analyzing Darknet Traffic
Full-text access may be available. Sign in or learn about subscription options.
pp. 180-185
by
Elias Bou-Harb
,
Mourad Debbabi
,
Chadi Assi
On Reconnaissance with IPv6: A Pattern-Based Scanning Approach
Full-text access may be available. Sign in or learn about subscription options.
pp. 186-192
by
Johanna Ullrich
,
Peter Kieseberg
,
Katharina Krombholz
,
Edgar Weippl
Hardware Security Evaluation Using Assurance Case Models
Full-text access may be available. Sign in or learn about subscription options.
pp. 193-198
by
Henrique Kawakami
,
Roberto Gallo
,
Ricardo Dahab
,
Erick Nascimento
Physically Secure Code and Data Storage in Autonomously Booting Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 199-204
by
Johannes Gotzfried
,
Johannes Hampel
,
Tilo Muller
Error/Intrusion Target Identification on the Physical Layer over a BICM Scheme
Full-text access may be available. Sign in or learn about subscription options.
pp. 205-210
by
Sihem Chaabouni
,
Amel Meddeb-Makhlouf
Towards Abuse Detection and Prevention in IaaS Cloud Computing
Full-text access may be available. Sign in or learn about subscription options.
pp. 211-217
by
Jens Lindemann
A Model Implementing Certified Reputation and Its Application to TripAdvisor
Full-text access may be available. Sign in or learn about subscription options.
pp. 218-223
by
Francesco Buccafurri
,
Gianluca Lax
,
Serena Nicolazzo
,
Antonino Nocera
Efficiency Evaluation of Cryptographic Protocols for Boardroom Voting
Full-text access may be available. Sign in or learn about subscription options.
pp. 224-229
by
Oksana Kulyk
,
Stephan Neumann
,
Jurlind Budurushi
,
Melanie Volkamer
,
Rolf Haenni
,
Reto Koenig
,
Philemon Von Bergen
QR Code Security -- How Secure and Usable Apps Can Protect Users Against Malicious QR Codes
Full-text access may be available. Sign in or learn about subscription options.
pp. 230-237
by
Katharina Krombholz
,
Peter Fruhwirt
,
Thomas Rieder
,
Ioannis Kapsalis
,
Johanna Ullrich
,
Edgar Weippl
Event Prediction with Community Leaders
Full-text access may be available. Sign in or learn about subscription options.
pp. 238-243
by
Jun Pang
,
Yang Zhang
Privacy and Trust in Smart Camera Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 244-248
by
Michael Loughlin
,
Asma Adnane
Towards the Forensic Identification and Investigation of Cloud Hosted Servers through Non-Invasive Wiretaps
Full-text access may be available. Sign in or learn about subscription options.
pp. 249-257
by
Hessel Schut
,
Mark Scanlon
,
Jason Farina
,
Nhien-An Le-Khac
Security Monitoring of HTTP Traffic Using Extended Flows
Full-text access may be available. Sign in or learn about subscription options.
pp. 258-265
by
Martin Husak
,
Petr Velan
,
Jan Vykopal
Towards a Process-Centered Resilience Framework
Full-text access may be available. Sign in or learn about subscription options.
pp. 266-273
by
Richard M. Zahoransky
,
Christian Brenig
,
Thomas Koslowski
Complexity Estimates of a SHA-1 Near-Collision Attack for GPU and FPGA
Full-text access may be available. Sign in or learn about subscription options.
pp. 274-280
by
Jurgen Fuss
,
Stefan Gradinger
,
Bernhard Greslehner-Nimmervoll
,
Robert Kolmhofer
Impacts of Tourist Accommodations as Temporal Shelter on Evacuee Overflow for the Reassignment of Shelters Jurisdiction
Full-text access may be available. Sign in or learn about subscription options.
pp. 281-286
by
Yu Ichifuji
,
Noriaki Koide
,
Noboru Sonehara
Cold Boot Attacks on DDR2 and DDR3 SDRAM
Full-text access may be available. Sign in or learn about subscription options.
pp. 287-292
by
Simon Lindenlauf
,
Hans Hofken
,
Marko Schuba
Behavioural Evidence Analysis Applied to Digital Forensics: An Empirical Analysis of Child Pornography Cases Using P2P Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 293-302
by
Noora Al Mutawa
,
Joanne Bryce
,
Virginia N.L. Franqueira
,
Andrew Marrington
Watch What You Wear: Preliminary Forensic Analysis of Smart Watches
Full-text access may be available. Sign in or learn about subscription options.
pp. 303-311
by
Ibrahim Baggili
,
Jeff Oduro
,
Kyle Anthony
,
Frank Breitinger
,
Glenn McGee
Challenges of Data Provenance for Cloud Forensic Investigations
Full-text access may be available. Sign in or learn about subscription options.
pp. 312-317
by
Victoria M. Katilu
,
Virginia N.L. Franqueira
,
Olga Angelopoulou
Composition-Malware: Building Android Malware at Run Time
Full-text access may be available. Sign in or learn about subscription options.
pp. 318-326
by
Gerardo Canfora
,
Francesco Mercaldo
,
Giovanni Moriano
,
Corrado Aaron Visaggio
Network Security Challenges in Android Applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 327-332
by
Damjan Buhov
,
Markus Huber
,
Georg Merzdovnik
,
Edgar Weippl
,
Vesna Dimitrova
Effectiveness of Opcode ngrams for Detection of Multi Family Android Malware
Full-text access may be available. Sign in or learn about subscription options.
pp. 333-340
by
Gerardo Canfora
,
Andrea De Lorenzo
,
Eric Medvet
,
Francesco Mercaldo
,
Corrado Aaron Visaggio
A Model for Specification and Validation of a Trust Management Based Security Scheme in a MANET Environment
Full-text access may be available. Sign in or learn about subscription options.
pp. 341-350
by
Aida Ben Chehida Douss
,
Ryma Abassi
,
Sihem Guemara El Fatmi
Risk Assessment of Public Safety and Security Mobile Service
Full-text access may be available. Sign in or learn about subscription options.
pp. 351-359
by
Matti J. Peltola
,
Pekka Kekolahti
Trust Negotiation Based Approach to Enforce MANET Routing Security
Full-text access may be available. Sign in or learn about subscription options.
pp. 360-366
by
Aida Ben Chehida Douss
,
Samiha Ayed
,
Ryma Abassi
,
Nora Cuppens
,
Sihem Ghemara El Fatmi
Intensifying State Surveillance of Electronic Communications: A Legal Solution in Addressing Extremism or Not?
Full-text access may be available. Sign in or learn about subscription options.
pp. 367-373
by
Murdoch Watney
Malicious Insiders with Ties to the Internet Underground Community
Full-text access may be available. Sign in or learn about subscription options.
pp. 374-381
by
Jason W. Clark
,
Matt Collins
,
Jeremy Strozer
An Empirical Study of Click Fraud in Mobile Advertising Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 382-388
by
Geumhwan Cho
,
Junsung Cho
,
Youngbae Song
,
Hyoungshick Kim
Network-Based HTTPS Client Identification Using SSL/TLS Fingerprinting
Full-text access may be available. Sign in or learn about subscription options.
pp. 389-396
by
Martin Husak
,
Milan Cermak
,
Toma Jirsik
,
Pavel Celeda
Deploying Honeypots and Honeynets: Issue of Privacy
Full-text access may be available. Sign in or learn about subscription options.
pp. 397-403
by
Pavol Sokol
,
Martin Husak
,
Frantiek Liptak
Gradually Improving the Forensic Process
Full-text access may be available. Sign in or learn about subscription options.
pp. 404-410
by
Sebastian Neuner
,
Martin Mulazzani
,
Sebastian Schrittwieser
,
Edgar Weippl
A Landmark Calibration Based IP Geolocation Approach
Full-text access may be available. Sign in or learn about subscription options.
pp. 411-416
by
Jingning Chen
,
Fenlin Liu
,
Xiangyang Luo
,
Fan Zhao
,
Guang Zhu
Markov Process Based Retrieval for Encrypted JPEG Images
Full-text access may be available. Sign in or learn about subscription options.
pp. 417-421
by
Hang Cheng
,
Xinpeng Zhang
,
Jiang Yu
,
Fengyong Li
Countermeasures for Covert Channel-Internal Control Protocols
Full-text access may be available. Sign in or learn about subscription options.
pp. 422-428
by
Jaspreet Kaur
,
Steffen Wendzel
,
Michael Meier
Novel Method of Hiding Information in IP Telephony Using Pitch Approximation
Full-text access may be available. Sign in or learn about subscription options.
pp. 429-435
by
Artur Janicki
Steg Blocks: Ensuring Perfect Undetectability of Network Steganography
Full-text access may be available. Sign in or learn about subscription options.
pp. 436-441
by
Wojciech Fraczek
,
Krzysztof Szczypiorski
Using Facebook for Image Steganography
Full-text access may be available. Sign in or learn about subscription options.
pp. 442-447
by
Jason Hiney
,
Tejas Dakve
,
Krzysztof Szczypiorski
,
Kris Gaj
Color Image Stegananalysis Using Correlations between RGB Channels
Full-text access may be available. Sign in or learn about subscription options.
pp. 448-454
by
Hasan Abdulrahman
,
Marc Chaumont
,
Philippe Montesinos
,
Baptiste Magnier
Steganalysis of Low Bit-Rate Speech Based on Statistic Characteristics of Pulse Positions
Full-text access may be available. Sign in or learn about subscription options.
pp. 455-460
by
Hui Tian
,
Yanpeng Wu
,
Yongfeng Huang
,
Jin Liu
,
Yonghong Chen
,
Tian Wang
,
Yiqiao Cai
A JPEG-Compression Resistant Adaptive Steganography Based on Relative Relationship between DCT Coefficients
Full-text access may be available. Sign in or learn about subscription options.
pp. 461-466
by
Yi Zhang
,
Xiangyang Luo
,
Chunfang Yang
,
Dengpan Ye
,
Fenlin Liu
How Much Cloud Can You Handle?
Full-text access may be available. Sign in or learn about subscription options.
pp. 467-473
by
Martin Gilje Jaatun
,
Inger Anne Tondel
Generation of Local and Expected Behaviors of a Smart Card Application to Detect Software Anomaly
Full-text access may be available. Sign in or learn about subscription options.
pp. 474-480
by
Germain Jolly
,
Baptiste Hemery
,
Christophe Rosenberger
Towards a CERT-Communication Model as Basis to Software Assurance
Full-text access may be available. Sign in or learn about subscription options.
pp. 481-485
by
Otto Hellwig
,
Gerald Quirchmayr
,
Edith Huber
,
Timo Mischitz
,
Markus Huber
Securing Web Applications with Better "Patches": An Architectural Approach for Systematic Input Validation with Security Patterns
Full-text access may be available. Sign in or learn about subscription options.
pp. 486-492
by
Jung-Woo Sohn
,
Jungwoo Ryoo
Personal Agent for Services in ITS
Full-text access may be available. Sign in or learn about subscription options.
pp. 493-500
by
Shinsaku Kiyomoto
,
Toru Nakamura
,
Haruo Takasaki
,
Tatsuhiko Hirabayashi
Towards Black Box Testing of Android Apps
Full-text access may be available. Sign in or learn about subscription options.
pp. 501-510
by
Yury Zhauniarovich
,
Anton Philippov
,
Olga Gadyatskaya
,
Bruno Crispo
,
Fabio Massacci
An Open Source Code Analyzer and Reviewer (OSCAR) Framework
Full-text access may be available. Sign in or learn about subscription options.
pp. 511-515
by
Simon Tjoa
,
Patrick Kochberger
,
Christoph Malin
,
Andreas Schmoll
A Performance Evaluation of Hash Functions for IP Reputation Lookup Using Bloom Filters
Full-text access may be available. Sign in or learn about subscription options.
pp. 516-521
by
Marc Antoine Gosselin-Lavigne
,
Hugo Gonzalez
,
Natalia Stakhanova
,
Ali A. Ghorbani
Independent Security Testing on Agile Software Development: A Case Study in a Software Company
Full-text access may be available. Sign in or learn about subscription options.
pp. 522-531
by
Jesus Choliz
,
Julian Vilas
,
Jose Moreira
Incremental Development of RBAC-Controlled E-Marking System Using the B Method
Full-text access may be available. Sign in or learn about subscription options.
pp. 532-539
by
Nasser Al-Hadhrami
,
Benjamin Aziz
,
Shantanu Sardesai
,
Lotfi ben Othmane
Literature Review of the Challenges of Developing Secure Software Using the Agile Approach
Full-text access may be available. Sign in or learn about subscription options.
pp. 540-547
by
Hela Oueslati
,
Mohammad Masudur Rahman
,
Lotfi ben Othmane
Showing 100 out of 127
Load More
Load All