Default Cover Image

2015 10th International Conference on Availability, Reliability and Security (ARES)

Aug. 24 2015 to Aug. 27 2015

Toulouse, France

Table of Contents

[Title page i]Freely available from IEEE.pp. i-i
[Title page iii]Freely available from IEEE.pp. iii-iii
[Copyright notice]Freely available from IEEE.pp. iv-iv
Table of contentsFreely available from IEEE.pp. v-xiii
Welcome Message from the ARES 2015 Workshop ChairFreely available from IEEE.pp. xviii-xviii
Welcome Message from the FARES 2015 Workshop OrganizersFreely available from IEEE.pp. xix-xix
Welcome Message from the WSDF 2015 Workshop OrganizersFreely available from IEEE.pp. xx-xx
WSDF 2015 Program CommitteeFreely available from IEEE.pp. xxi-xxi
Welcome Message from the IWSMA 2015 Workshop OrganizersFreely available from IEEE.pp. xxii-xxii
IWSMA 2015 Program CommitteeFreely available from IEEE.pp. xxiii-xxiii
Welcome Message from the IWCC 2015 Workshop OrganizersFreely available from IEEE.pp. xxiv-xxiv
IWCC 2015 Program CommitteeFreely available from IEEE.pp. xxv-xxv
Welcome Message from the SAW 2015 Workshop OrganizersFreely available from IEEE.pp. xxvi-xxvi
SAW 2015 Program CommitteeFreely available from IEEE.pp. xxvii-xxvii
Welcome Message from the ASSD 2015 Workshop OrganizersFreely available from IEEE.pp. xxviii-xxviii
ASSD 2015 Program CommitteeFreely available from IEEE.pp. xxix-xxix
Welcome Message from the WCSF 2015 Workshop OrganizersFreely available from IEEE.pp. xxx-xxx
WCSF 2015 Program CommitteeFreely available from IEEE.pp. xxxi-xxxi
Welcome Message from the MFSec 2015 Workshop OrganizersFreely available from IEEE.pp. xxxii-xxxii
MFSec 2015 Program CommitteeFreely available from IEEE.pp. xxxiii-xxxiii
Welcome Message from the ARES EU Projects SymposiumFreely available from IEEE.pp. xxxiv-xxxiv
Welcome Message from the AU2EU 2015 Workshop OrganizersFreely available from IEEE.pp. xxxv-xxxv
AU2EU 2015 Program CommitteeFreely available from IEEE.pp. xxxvi-xxxvi
Welcome Message from the FCCT 2015 Workshop OrganizersFreely available from IEEE.pp. xxxvii-xxxvii
FCCT 2015 Program CommitteeFreely available from IEEE.pp. xxxviii-xxxviii
Welcome Message from the STAM 2015 Workshop OrganizersFreely available from IEEE.pp. xxxix-xxxix
STAM 2015 Program CommitteeFreely available from IEEE.pp. xl-xl
Structural Weaknesses in the Open Smart Grid ProtocolFull-text access may be available. Sign in or learn about subscription options.pp. 1-10
Optimizing IT Service Costs with Respect to the Availability Service Level ObjectiveFull-text access may be available. Sign in or learn about subscription options.pp. 20-29
PALPAS -- PAssword Less PAssword SynchronizationFull-text access may be available. Sign in or learn about subscription options.pp. 30-39
Advanced Identity and Access Policy Management Using Contextual DataFull-text access may be available. Sign in or learn about subscription options.pp. 40-49
Publicly Verifiable Private Aggregation of Time-Series DataFull-text access may be available. Sign in or learn about subscription options.pp. 50-59
Accountable Redactable SignaturesFull-text access may be available. Sign in or learn about subscription options.pp. 60-69
The Role and Security of Firewalls in IaaS Cloud ComputingFull-text access may be available. Sign in or learn about subscription options.pp. 70-79
Uncovering Use-After-Free Conditions in Compiled CodeFull-text access may be available. Sign in or learn about subscription options.pp. 90-99
All-Solution Satisfiability Modulo Theories: Applications, Algorithms and BenchmarksFull-text access may be available. Sign in or learn about subscription options.pp. 100-109
Fair Fingerprinting Protocol for Attesting Software MisusesFull-text access may be available. Sign in or learn about subscription options.pp. 110-119
A Lightweight Framework for Cold Boot Based Forensics on Mobile DevicesFull-text access may be available. Sign in or learn about subscription options.pp. 120-128
Dynamic Self-Protection and Tamperproofing for Android Apps Using Native CodeFull-text access may be available. Sign in or learn about subscription options.pp. 129-138
Don't Brick Your Car: Firmware Confidentiality and Rollback for VehiclesFull-text access may be available. Sign in or learn about subscription options.pp. 139-148
Modeling Fraud Prevention of Online Services Using Incident Response Trees and Value at RiskFull-text access may be available. Sign in or learn about subscription options.pp. 149-158
The Effects of Cultural Dimensions on the Development of an ISMS Based on the ISO 27001Full-text access may be available. Sign in or learn about subscription options.pp. 159-167
On the Isofunctionality of Network Access Control ListsFull-text access may be available. Sign in or learn about subscription options.pp. 168-173
A Time Series Approach for Inferring Orchestrated Probing Campaigns by Analyzing Darknet TrafficFull-text access may be available. Sign in or learn about subscription options.pp. 180-185
On Reconnaissance with IPv6: A Pattern-Based Scanning ApproachFull-text access may be available. Sign in or learn about subscription options.pp. 186-192
Hardware Security Evaluation Using Assurance Case ModelsFull-text access may be available. Sign in or learn about subscription options.pp. 193-198
Physically Secure Code and Data Storage in Autonomously Booting SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 199-204
Error/Intrusion Target Identification on the Physical Layer over a BICM SchemeFull-text access may be available. Sign in or learn about subscription options.pp. 205-210
Towards Abuse Detection and Prevention in IaaS Cloud ComputingFull-text access may be available. Sign in or learn about subscription options.pp. 211-217
A Model Implementing Certified Reputation and Its Application to TripAdvisorFull-text access may be available. Sign in or learn about subscription options.pp. 218-223
Event Prediction with Community LeadersFull-text access may be available. Sign in or learn about subscription options.pp. 238-243
Privacy and Trust in Smart Camera Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 244-248
Security Monitoring of HTTP Traffic Using Extended FlowsFull-text access may be available. Sign in or learn about subscription options.pp. 258-265
Towards a Process-Centered Resilience FrameworkFull-text access may be available. Sign in or learn about subscription options.pp. 266-273
Complexity Estimates of a SHA-1 Near-Collision Attack for GPU and FPGAFull-text access may be available. Sign in or learn about subscription options.pp. 274-280
Cold Boot Attacks on DDR2 and DDR3 SDRAMFull-text access may be available. Sign in or learn about subscription options.pp. 287-292
Watch What You Wear: Preliminary Forensic Analysis of Smart WatchesFull-text access may be available. Sign in or learn about subscription options.pp. 303-311
Challenges of Data Provenance for Cloud Forensic InvestigationsFull-text access may be available. Sign in or learn about subscription options.pp. 312-317
Composition-Malware: Building Android Malware at Run TimeFull-text access may be available. Sign in or learn about subscription options.pp. 318-326
Network Security Challenges in Android ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 327-332
Risk Assessment of Public Safety and Security Mobile ServiceFull-text access may be available. Sign in or learn about subscription options.pp. 351-359
Trust Negotiation Based Approach to Enforce MANET Routing SecurityFull-text access may be available. Sign in or learn about subscription options.pp. 360-366
Intensifying State Surveillance of Electronic Communications: A Legal Solution in Addressing Extremism or Not?Full-text access may be available. Sign in or learn about subscription options.pp. 367-373
Malicious Insiders with Ties to the Internet Underground CommunityFull-text access may be available. Sign in or learn about subscription options.pp. 374-381
An Empirical Study of Click Fraud in Mobile Advertising NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 382-388
Network-Based HTTPS Client Identification Using SSL/TLS FingerprintingFull-text access may be available. Sign in or learn about subscription options.pp. 389-396
Deploying Honeypots and Honeynets: Issue of PrivacyFull-text access may be available. Sign in or learn about subscription options.pp. 397-403
Gradually Improving the Forensic ProcessFull-text access may be available. Sign in or learn about subscription options.pp. 404-410
A Landmark Calibration Based IP Geolocation ApproachFull-text access may be available. Sign in or learn about subscription options.pp. 411-416
Markov Process Based Retrieval for Encrypted JPEG ImagesFull-text access may be available. Sign in or learn about subscription options.pp. 417-421
Countermeasures for Covert Channel-Internal Control ProtocolsFull-text access may be available. Sign in or learn about subscription options.pp. 422-428
Novel Method of Hiding Information in IP Telephony Using Pitch ApproximationFull-text access may be available. Sign in or learn about subscription options.pp. 429-435
Steg Blocks: Ensuring Perfect Undetectability of Network SteganographyFull-text access may be available. Sign in or learn about subscription options.pp. 436-441
Using Facebook for Image SteganographyFull-text access may be available. Sign in or learn about subscription options.pp. 442-447
Color Image Stegananalysis Using Correlations between RGB ChannelsFull-text access may be available. Sign in or learn about subscription options.pp. 448-454
How Much Cloud Can You Handle?Full-text access may be available. Sign in or learn about subscription options.pp. 467-473
Towards a CERT-Communication Model as Basis to Software AssuranceFull-text access may be available. Sign in or learn about subscription options.pp. 481-485
Personal Agent for Services in ITSFull-text access may be available. Sign in or learn about subscription options.pp. 493-500
Towards Black Box Testing of Android AppsFull-text access may be available. Sign in or learn about subscription options.pp. 501-510
An Open Source Code Analyzer and Reviewer (OSCAR) FrameworkFull-text access may be available. Sign in or learn about subscription options.pp. 511-515
Independent Security Testing on Agile Software Development: A Case Study in a Software CompanyFull-text access may be available. Sign in or learn about subscription options.pp. 522-531
Incremental Development of RBAC-Controlled E-Marking System Using the B MethodFull-text access may be available. Sign in or learn about subscription options.pp. 532-539
Literature Review of the Challenges of Developing Secure Software Using the Agile ApproachFull-text access may be available. Sign in or learn about subscription options.pp. 540-547
Showing 100 out of 127