Default Cover Image

2016 11th International Conference on Availability, Reliability and Security (ARES )

Aug. 31 2016 to Sept. 2 2016

Salzburg, Austria

Table of Contents

Title Page iFreely available from IEEE.pp. i-i
Title Page iiiFreely available from IEEE.pp. iii-iii
Copyright PageFreely available from IEEE.pp. iv-iv
Table of ContentsFreely available from IEEE.pp. v-xvii
Message from the ARES 2016 Program Committee Co-ChairsFreely available from IEEE.pp. xviii-xviii
ARES 2016 Organizing CommitteeFreely available from IEEE.pp. xix-xix
ARES 2016 Program CommitteeFreely available from IEEE.pp. xx-xxi
Message from the ARES 2016 Workshop ChairFreely available from IEEE.pp. xxii-xxii
Message from the FARES 2016 Workshop OrganizersFreely available from IEEE.pp. xxiii-xxiii
Message from the WSDF 2016 Workshop OrganizersFreely available from IEEE.pp. xxiv-xxiv
WSDF 2016 Program CommitteeFreely available from IEEE.pp. xxv-xxv
Message from the IWSMA 2016 Workshop OrganizersFreely available from IEEE.pp. xxvi-xxvi
IWSMA 2016 Program CommitteeFreely available from IEEE.pp. xxvii-xxvii
Message from the IWCC 2016 Workshop OrganizersFreely available from IEEE.pp. xxviii-xxviii
IWCC 2016 Program CommitteeFreely available from IEEE.pp. xxix-xxix
Message from the SAW 2016 Workshop OrganizersFreely available from IEEE.pp. xxx-xxx
SAW 2016 Program CommitteeFreely available from IEEE.pp. xxxi-xxxi
Message from the SecATM 2016 Workshop OrganizersFreely available from IEEE.pp. xxxii-xxxii
SecATM 2016 Program CommitteeFreely available from IEEE.pp. xxxiii-xxxiii
Message from the ASSD 2016 Workshop OrganizersFreely available from IEEE.pp. xxxiv-xxxiv
ASSD 2016 Program CommitteeFreely available from IEEE.pp. xxxv-xxxv
Message from the WMA 2016 Workshop OrganizersFreely available from IEEE.pp. xxxvi-xxxvi
WMA 2016 Program CommitteeFreely available from IEEE.pp. xxxvii-xxxvii
Message from the ISPM 2016 Workshop OrganizersFreely available from IEEE.pp. xxxviii-xxxviii
ISPM 2016 Program CommitteeFreely available from IEEE.pp. xxxix-xxxix
Message from the ARES 2016 EU Projects SymposiumFreely available from IEEE.pp. xl-xl
Message from the FASES 2016 Workshop OrganizersFreely available from IEEE.pp. xli-xli
FASES 2016 Program CommitteeFreely available from IEEE.pp. xlii-xlii
Message from the SECPID 2016 Workshop OrganizersFreely available from IEEE.pp. xliii-xliii
SECPID 2016 Program CommitteeFreely available from IEEE.pp. xliv-xliv
Message from the MUININ 2016 Workshop OrganizersFreely available from IEEE.pp. xlv-xlv
MUININ 2016 Program CommitteeFreely available from IEEE.pp. xlvi-xlvi
Message from the SOCOTUD 2016 Workshop OrganizersFreely available from IEEE.pp. xlvii-xlvii
SOCOTUD 2016 Program CommitteeFreely available from IEEE.pp. xlviii-xlviii
No Need for Black Chambers: Testing TLS in the E-mail Ecosystem at LargeFull-text access may be available. Sign in or learn about subscription options.pp. 10-20
Revisiting a Watermark-Based Detection Scheme to Handle Cyber-Physical AttacksFull-text access may be available. Sign in or learn about subscription options.pp. 21-28
Byzantine Set-Union Consensus Using Efficient Set ReconciliationFull-text access may be available. Sign in or learn about subscription options.pp. 29-38
k-Times Full Traceable Ring SignatureFull-text access may be available. Sign in or learn about subscription options.pp. 39-48
Towards Cycle-Accurate Emulation of Cortex-M Code to Detect Timing Side ChannelsFull-text access may be available. Sign in or learn about subscription options.pp. 49-58
POTR: Practical On-the-Fly Rejection of Injected and Replayed 802.15.4 FramesFull-text access may be available. Sign in or learn about subscription options.pp. 59-68
HyperCrypt: Hypervisor-Based Encryption of Kernel and User SpaceFull-text access may be available. Sign in or learn about subscription options.pp. 79-87
Efficient and Privacy Preserving Third Party Auditing for a Distributed Storage SystemFull-text access may be available. Sign in or learn about subscription options.pp. 88-97
Introducing Proxy Voting to HeliosFull-text access may be available. Sign in or learn about subscription options.pp. 98-106
ARTIST: The Android Runtime Instrumentation ToolkitFull-text access may be available. Sign in or learn about subscription options.pp. 107-116
Using Expert Systems to Statically Detect "Dynamic" Conflicts in XACMLFull-text access may be available. Sign in or learn about subscription options.pp. 127-136
A Host-Based Intrusion Detection and Mitigation Framework for Smart Home IoT Using OpenFlowFull-text access may be available. Sign in or learn about subscription options.pp. 147-156
Role Mining with Missing ValuesFull-text access may be available. Sign in or learn about subscription options.pp. 167-176
Towards a Systemic Approach for Information Security Risk ManagementFull-text access may be available. Sign in or learn about subscription options.pp. 177-186
Towards a Metamodel for SABSA Conceptual Architecture DescriptionsFull-text access may be available. Sign in or learn about subscription options.pp. 187-194
Threat Modelling Service Security as a Security CeremonyFull-text access may be available. Sign in or learn about subscription options.pp. 195-204
Access Control and Data Separation Metrics in Cloud InfrastructuresFull-text access may be available. Sign in or learn about subscription options.pp. 205-210
IFCaaS: Information Flow Control as a Service for Cloud SecurityFull-text access may be available. Sign in or learn about subscription options.pp. 211-216
Your Cloud in My Company: Modern Rights Management Services RevisitedFull-text access may be available. Sign in or learn about subscription options.pp. 217-222
The Case for RAID 4: Cloud-RAID Integration with Local StorageFull-text access may be available. Sign in or learn about subscription options.pp. 235-240
An Empirical Study on GSN Usage Intention: Factors Influencing the Adoption of Geo-Social NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 241-246
Synchronous One Time Biometrics with Pattern Based AuthenticationFull-text access may be available. Sign in or learn about subscription options.pp. 260-265
Usable Privacy-Aware Logging for Unstructured Log EntriesFull-text access may be available. Sign in or learn about subscription options.pp. 272-277
pwnPr3d: An Attack-Graph-Driven Probabilistic Threat-Modeling ApproachFull-text access may be available. Sign in or learn about subscription options.pp. 278-283
The Landscape of Domain Name Typosquatting: Techniques and CountermeasuresFull-text access may be available. Sign in or learn about subscription options.pp. 284-289
Caller-Centrality: Identifying Telemarketers in a VoIP NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 290-295
Recognizing Time-Efficiently Local Botnet Infections - A Case StudyFull-text access may be available. Sign in or learn about subscription options.pp. 304-311
VoIP Profiler: Profiling Voice over IP User Communication BehaviorFull-text access may be available. Sign in or learn about subscription options.pp. 312-320
Identification and Analysis of Email and Contacts Artefacts on iOS and OS XFull-text access may be available. Sign in or learn about subscription options.pp. 321-327
Digital Forensic Artifacts of the Cortana Device Search Cache on Windows 10 DesktopFull-text access may be available. Sign in or learn about subscription options.pp. 338-344
A Forensic Acquisition and Analysis System for IaaS: Architectural Model and ExperimentFull-text access may be available. Sign in or learn about subscription options.pp. 345-354
A Log-Structured Block Preservation and Restoration System for Proactive Forensic Data Collection in the CloudFull-text access may be available. Sign in or learn about subscription options.pp. 355-364
Notary-Assisted Certificate Pinning for Improved Security of Android AppsFull-text access may be available. Sign in or learn about subscription options.pp. 365-371
Lightweight Encryption for Smart HomeFull-text access may be available. Sign in or learn about subscription options.pp. 382-388
Hand Dynamics for Behavioral User AuthenticationFull-text access may be available. Sign in or learn about subscription options.pp. 389-398
Law Enforcement Access to Password Protected and/or Encrypted Mobile DataFull-text access may be available. Sign in or learn about subscription options.pp. 399-405
Towards Digital Investigation in Virtual Networks: A Study of Challenges and Open ProblemsFull-text access may be available. Sign in or learn about subscription options.pp. 406-413
Threat from Within: Case Studies of Insiders Who Committed Information Technology SabotageFull-text access may be available. Sign in or learn about subscription options.pp. 414-422
Malware in Pirated Software: Case Study of Malware Encounters in Personal ComputersFull-text access may be available. Sign in or learn about subscription options.pp. 423-427
A Security Game Model for Remote Software ProtectionFull-text access may be available. Sign in or learn about subscription options.pp. 437-443
SPARER: Secure Cloud-Proof Storage for e-Health ScenariosFull-text access may be available. Sign in or learn about subscription options.pp. 444-453
How Secure are Web Servers? An Empirical Study of Slow HTTP DoS Attacks and DetectionFull-text access may be available. Sign in or learn about subscription options.pp. 454-463
A Type System for Quantified Information-Flow Security in Java-Like LanguagesFull-text access may be available. Sign in or learn about subscription options.pp. 464-473
On Analyzing Program Behavior under Fault Injection AttacksFull-text access may be available. Sign in or learn about subscription options.pp. 474-479
Authentication in the Context of E-Participation: Current Practice, Challenges and RecommendationsFull-text access may be available. Sign in or learn about subscription options.pp. 480-485
Air Traffic Management Security Research in SESARFull-text access may be available. Sign in or learn about subscription options.pp. 486-492
A New Vision for ATM Security Management: The Security Management PlatformFull-text access may be available. Sign in or learn about subscription options.pp. 493-498
'CTRL_S' - A Security Tool for SESAR's Design-In Security ApproachFull-text access may be available. Sign in or learn about subscription options.pp. 499-502
Security Risk Assessment and Risk Treatment for Integrated Modular CommunicationFull-text access may be available. Sign in or learn about subscription options.pp. 503-509
Cyber Security Incident Management in the Aviation DomainFull-text access may be available. Sign in or learn about subscription options.pp. 510-516
A Model-Based Approach for Aviation Cyber Security Risk AssessmentFull-text access may be available. Sign in or learn about subscription options.pp. 517-525
Security Testing with Controller-Pilot Data Link CommunicationsFull-text access may be available. Sign in or learn about subscription options.pp. 526-531
Showing 100 out of 143