Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
ARES
ARES 2016
Generate Citations
2016 11th International Conference on Availability, Reliability and Security (ARES )
Aug. 31 2016 to Sept. 2 2016
Salzburg, Austria
Table of Contents
Title Page i
Freely available from IEEE.
pp. i-i
Title Page iii
Freely available from IEEE.
pp. iii-iii
Copyright Page
Freely available from IEEE.
pp. iv-iv
Table of Contents
Freely available from IEEE.
pp. v-xvii
Message from the ARES 2016 Program Committee Co-Chairs
Freely available from IEEE.
pp. xviii-xviii
ARES 2016 Organizing Committee
Freely available from IEEE.
pp. xix-xix
ARES 2016 Program Committee
Freely available from IEEE.
pp. xx-xxi
Message from the ARES 2016 Workshop Chair
Freely available from IEEE.
pp. xxii-xxii
Message from the FARES 2016 Workshop Organizers
Freely available from IEEE.
pp. xxiii-xxiii
Message from the WSDF 2016 Workshop Organizers
Freely available from IEEE.
pp. xxiv-xxiv
WSDF 2016 Program Committee
Freely available from IEEE.
pp. xxv-xxv
Message from the IWSMA 2016 Workshop Organizers
Freely available from IEEE.
pp. xxvi-xxvi
IWSMA 2016 Program Committee
Freely available from IEEE.
pp. xxvii-xxvii
Message from the IWCC 2016 Workshop Organizers
Freely available from IEEE.
pp. xxviii-xxviii
IWCC 2016 Program Committee
Freely available from IEEE.
pp. xxix-xxix
Message from the SAW 2016 Workshop Organizers
Freely available from IEEE.
pp. xxx-xxx
SAW 2016 Program Committee
Freely available from IEEE.
pp. xxxi-xxxi
Message from the SecATM 2016 Workshop Organizers
Freely available from IEEE.
pp. xxxii-xxxii
SecATM 2016 Program Committee
Freely available from IEEE.
pp. xxxiii-xxxiii
Message from the ASSD 2016 Workshop Organizers
Freely available from IEEE.
pp. xxxiv-xxxiv
ASSD 2016 Program Committee
Freely available from IEEE.
pp. xxxv-xxxv
Message from the WMA 2016 Workshop Organizers
Freely available from IEEE.
pp. xxxvi-xxxvi
WMA 2016 Program Committee
Freely available from IEEE.
pp. xxxvii-xxxvii
Message from the ISPM 2016 Workshop Organizers
Freely available from IEEE.
pp. xxxviii-xxxviii
ISPM 2016 Program Committee
Freely available from IEEE.
pp. xxxix-xxxix
Message from the ARES 2016 EU Projects Symposium
Freely available from IEEE.
pp. xl-xl
Message from the FASES 2016 Workshop Organizers
Freely available from IEEE.
pp. xli-xli
FASES 2016 Program Committee
Freely available from IEEE.
pp. xlii-xlii
Message from the SECPID 2016 Workshop Organizers
Freely available from IEEE.
pp. xliii-xliii
SECPID 2016 Program Committee
Freely available from IEEE.
pp. xliv-xliv
Message from the MUININ 2016 Workshop Organizers
Freely available from IEEE.
pp. xlv-xlv
MUININ 2016 Program Committee
Freely available from IEEE.
pp. xlvi-xlvi
Message from the SOCOTUD 2016 Workshop Organizers
Freely available from IEEE.
pp. xlvii-xlvii
SOCOTUD 2016 Program Committee
Freely available from IEEE.
pp. xlviii-xlviii
A Recommender-Based System for Assisting Non-technical Users in Managing Android Permissions
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-9
by
Arnaud Oglaza
,
Romain Laborde
,
Abdelmalek Benzekri
,
François Barrère
No Need for Black Chambers: Testing TLS in the E-mail Ecosystem at Large
Full-text access may be available. Sign in or learn about subscription options.
pp. 10-20
by
Wilfried Mayer
,
Aaron Zauner
,
Martin Schmiedecker
,
Markus Huber
Revisiting a Watermark-Based Detection Scheme to Handle Cyber-Physical Attacks
Full-text access may be available. Sign in or learn about subscription options.
pp. 21-28
by
José Rubio-Hernán
,
Luca De Cicco
,
Joaquín García-Alfaro
Byzantine Set-Union Consensus Using Efficient Set Reconciliation
Full-text access may be available. Sign in or learn about subscription options.
pp. 29-38
by
Florian Dold
,
Christian Grothoff
k-Times Full Traceable Ring Signature
Full-text access may be available. Sign in or learn about subscription options.
pp. 39-48
by
Xavier Bultel
,
Pascal Lafourcade
Towards Cycle-Accurate Emulation of Cortex-M Code to Detect Timing Side Channels
Full-text access may be available. Sign in or learn about subscription options.
pp. 49-58
by
Johannes Bauer
,
Felix Freiling
POTR: Practical On-the-Fly Rejection of Injected and Replayed 802.15.4 Frames
Full-text access may be available. Sign in or learn about subscription options.
pp. 59-68
by
Konrad-Felix Krentz
,
Christoph Meinel
,
Maxim Schnjakin
Stopping Amplified DNS DDoS Attacks through Distributed Query Rate Sharing
Full-text access may be available. Sign in or learn about subscription options.
pp. 69-78
by
Saurabh Verma
,
Ali Hamieh
,
Jun Ho Huh
,
Henrik Holm
,
Siva Raj Rajagopalan
,
Maciej Korczynski
,
Nina Fefferman
HyperCrypt: Hypervisor-Based Encryption of Kernel and User Space
Full-text access may be available. Sign in or learn about subscription options.
pp. 79-87
by
Johannes Götzfried
,
Nico Dörr
,
Ralph Palutke
,
Tilo Müller
Efficient and Privacy Preserving Third Party Auditing for a Distributed Storage System
Full-text access may be available. Sign in or learn about subscription options.
pp. 88-97
by
Denise Demirel
,
Stephan Krenn
,
Thomas Lorünser
,
Giulia Traverso
Introducing Proxy Voting to Helios
Full-text access may be available. Sign in or learn about subscription options.
pp. 98-106
by
Oksana Kulyk
,
Karola Marky
,
Stephan Neumann
,
Melanie Volkamer
ARTIST: The Android Runtime Instrumentation Toolkit
Full-text access may be available. Sign in or learn about subscription options.
pp. 107-116
by
Lukas Dresel
,
Mykolai Protsenko
,
Tilo Müller
Development of an AUTOSAR Compliant Cryptographic Library on State-of-the-Art Automotive Grade Controllers
Full-text access may be available. Sign in or learn about subscription options.
pp. 117-126
by
Pal-Stefan Murvay
,
Alexandru Matei
,
Cristina Solomon
,
Bogdan Groza
Using Expert Systems to Statically Detect "Dynamic" Conflicts in XACML
Full-text access may be available. Sign in or learn about subscription options.
pp. 127-136
by
Bernard Stepien
,
Amy Felty
Selection of Mitigation Actions Based on Financial and Operational Impact Assessments
Full-text access may be available. Sign in or learn about subscription options.
pp. 137-146
by
Gustavo Gonzalez Granadillo
,
Alexander Motzek
,
Joaquin Garcia-Alfaro
,
Hervé Debar
A Host-Based Intrusion Detection and Mitigation Framework for Smart Home IoT Using OpenFlow
Full-text access may be available. Sign in or learn about subscription options.
pp. 147-156
by
Mehdi Nobakht
,
Vijay Sivaraman
,
Roksana Boreli
Towards a CDS-based Intrusion Detection Deployment Scheme for Securing Industrial Wireless Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 157-166
by
Lyes Bayou
,
Nora Cuppens-Boulahia
,
David Espès
,
Frédéric Cuppen
Role Mining with Missing Values
Full-text access may be available. Sign in or learn about subscription options.
pp. 167-176
by
Sokratis Vavilis
,
Alexandru Ionut Egner
,
Milan Petković
,
Nicola Zannone
Towards a Systemic Approach for Information Security Risk Management
Full-text access may be available. Sign in or learn about subscription options.
pp. 177-186
by
Yannick Naudet
,
Nicolas Mayer
,
Christophe Feltus
Towards a Metamodel for SABSA Conceptual Architecture Descriptions
Full-text access may be available. Sign in or learn about subscription options.
pp. 187-194
by
Patrick Pleinevaux
Threat Modelling Service Security as a Security Ceremony
Full-text access may be available. Sign in or learn about subscription options.
pp. 195-204
by
Taciane Martimiano
,
Jean Everson Martina
Access Control and Data Separation Metrics in Cloud Infrastructures
Full-text access may be available. Sign in or learn about subscription options.
pp. 205-210
by
Bernd Jaeger
,
Reiner Kraft
,
Sebastian Luhn
,
Annika Selzer
,
Ulrich Waldmann
IFCaaS: Information Flow Control as a Service for Cloud Security
Full-text access may be available. Sign in or learn about subscription options.
pp. 211-216
by
Marwa Elsayed
,
Mohammad Zulkernine
Your Cloud in My Company: Modern Rights Management Services Revisited
Full-text access may be available. Sign in or learn about subscription options.
pp. 217-222
by
Martin Grothe
,
Christian Mainka
,
Paul Rösler
,
Johanna Jupke
,
Jan Kaiser
,
Jörg Schwenk
A Hazus-Based Method for Assessing Robustness of Electricity Supply to Critical Smart Grid Consumers during Flood Events
Full-text access may be available. Sign in or learn about subscription options.
pp. 223-228
by
Alexandr Vasenev
,
Lorena Montoya
,
Andrea Ceccarelli
Hybrid Focused Crawling for Homemade Explosives Discovery on Surface and Dark Web
Full-text access may be available. Sign in or learn about subscription options.
pp. 229-234
by
Christos Iliou
,
George Kalpakis
,
Theodora Tsikrika
,
Stefanos Vrochidis
,
Ioannis Kompatsiaris
The Case for RAID 4: Cloud-RAID Integration with Local Storage
Full-text access may be available. Sign in or learn about subscription options.
pp. 235-240
by
Christopher Hansen
,
James Archibald
An Empirical Study on GSN Usage Intention: Factors Influencing the Adoption of Geo-Social Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 241-246
by
Esma Aïmeur
,
Sébastien Gambs
,
Cheu Yien Yep
Energy Efficient Mutual Authentication and Key Agreement Scheme with Strong Anonymity Support for Secure Ubiquitious Roaming Services
Full-text access may be available. Sign in or learn about subscription options.
pp. 247-252
by
Prosanta Gope
,
Ruei-Hau Hsu
,
Jemin Lee
,
Tony Q. S. Quek
Provable User Authentication Scheme in Telecare Medicine Information System Using Elliptic Curve Cryptosystem
Full-text access may be available. Sign in or learn about subscription options.
pp. 253-259
by
Toan Thinh Truong
,
Duong Tien Phan
,
Minh Triet Tran
,
Anh Duc Duong
,
Isao Echizen
Synchronous One Time Biometrics with Pattern Based Authentication
Full-text access may be available. Sign in or learn about subscription options.
pp. 260-265
by
Patrick Lacharme
,
Christophe Rosenberger
V-DIFT: Vector-Based Dynamic Information Flow Tracking with Application to Locating Cryptographic Keys for Reverse Engineering
Full-text access may be available. Sign in or learn about subscription options.
pp. 266-271
by
Antonio M. Espinoza
,
Jeffrey Knockel
,
Pedro Comesaña-Alfaro
,
Jedidiah R. Crandall
Usable Privacy-Aware Logging for Unstructured Log Entries
Full-text access may be available. Sign in or learn about subscription options.
pp. 272-277
by
Christof Rath
pwnPr3d: An Attack-Graph-Driven Probabilistic Threat-Modeling Approach
Full-text access may be available. Sign in or learn about subscription options.
pp. 278-283
by
Pontus Johnson
,
Alexandre Vernotte
,
Mathias Ekstedt
,
Robert Lagerström
The Landscape of Domain Name Typosquatting: Techniques and Countermeasures
Full-text access may be available. Sign in or learn about subscription options.
pp. 284-289
by
Jeffrey Spaulding
,
Shambhu Upadhyaya
,
Aziz Mohaisen
Caller-Centrality: Identifying Telemarketers in a VoIP Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 290-295
by
Muhammad Ajmal Azad
,
Syed Khurram Rizvi
Collaborative Attribute Retrieval in Environment with Faulty Attribute Managers
Full-text access may be available. Sign in or learn about subscription options.
pp. 296-303
by
Mario Faiella
,
Fabio Martinelli
,
Paolo Mori
,
Andrea Saracino
,
Mina Sheikhalishahi
Recognizing Time-Efficiently Local Botnet Infections - A Case Study
Full-text access may be available. Sign in or learn about subscription options.
pp. 304-311
by
Tanja Heuer
,
Ina Schiering
,
Frank Klawnn
,
Alexander Gabel
,
Martin Seeger
VoIP Profiler: Profiling Voice over IP User Communication Behavior
Full-text access may be available. Sign in or learn about subscription options.
pp. 312-320
by
Sainath Batthalla
,
Mayank Swarnkar
,
Neminath Hubballi
,
Maitreya Natu
Identification and Analysis of Email and Contacts Artefacts on iOS and OS X
Full-text access may be available. Sign in or learn about subscription options.
pp. 321-327
by
Kenneth M. Ovens
,
Gordon Morison
Extraction and Analysis of Volatile Memory in Android Systems: An Approach Focused on Trajectory Reconstruction Based on NMEA 0183 Standard
Full-text access may be available. Sign in or learn about subscription options.
pp. 328-337
by
João Paulo Claudino de Sousa
,
João José Costa Gondim
Digital Forensic Artifacts of the Cortana Device Search Cache on Windows 10 Desktop
Full-text access may be available. Sign in or learn about subscription options.
pp. 338-344
by
Patricio Domingues
,
Miguel Frade
A Forensic Acquisition and Analysis System for IaaS: Architectural Model and Experiment
Full-text access may be available. Sign in or learn about subscription options.
pp. 345-354
by
Saad Alqahtany
,
Nathan Clarke
,
Steven Furnell
,
Christoph Reich
A Log-Structured Block Preservation and Restoration System for Proactive Forensic Data Collection in the Cloud
Full-text access may be available. Sign in or learn about subscription options.
pp. 355-364
by
Manabu Hirano
,
Hiromu Ogawa
Notary-Assisted Certificate Pinning for Improved Security of Android Apps
Full-text access may be available. Sign in or learn about subscription options.
pp. 365-371
by
Georg Merzdovnik
,
Damjan Buhov
,
Artemios G. Voyiatzis
,
Edgar R. Weippl
Spotting the Malicious Moment: Characterizing Malware Behavior Using Dynamic Features
Full-text access may be available. Sign in or learn about subscription options.
pp. 372-381
by
Alberto Ferrante
,
Eric Medvet
,
Francesco Mercaldo
,
Jelena Milosevic
,
Corrado Aaron Visaggio
Lightweight Encryption for Smart Home
Full-text access may be available. Sign in or learn about subscription options.
pp. 382-388
by
Sanaah Al Salami
,
Joonsang Baek
,
Khaled Salah
,
Ernesto Damiani
Hand Dynamics for Behavioral User Authentication
Full-text access may be available. Sign in or learn about subscription options.
pp. 389-398
by
Fuensanta Torres Garcia
,
Katharina Krombholz
,
Rudolf Mayer
,
Edgar Weippl
Law Enforcement Access to Password Protected and/or Encrypted Mobile Data
Full-text access may be available. Sign in or learn about subscription options.
pp. 399-405
by
Murdoch Watney
Towards Digital Investigation in Virtual Networks: A Study of Challenges and Open Problems
Full-text access may be available. Sign in or learn about subscription options.
pp. 406-413
by
Daniel Spiekermann
,
Tobias Eggendorfer
Threat from Within: Case Studies of Insiders Who Committed Information Technology Sabotage
Full-text access may be available. Sign in or learn about subscription options.
pp. 414-422
by
Jason W. Clark
Malware in Pirated Software: Case Study of Malware Encounters in Personal Computers
Full-text access may be available. Sign in or learn about subscription options.
pp. 423-427
by
S. Kumar
,
L. Madhavan
,
M. Nagappan
,
B. Sikdar
Towards a Unified Secure Cloud Service Development and Deployment Life-Cycle
Full-text access may be available. Sign in or learn about subscription options.
pp. 428-436
by
Aleksandar Hudic
,
Matthias Flittner
,
Thomas Lorünser
,
Philipp M. Radl
,
Roland Bless
A Security Game Model for Remote Software Protection
Full-text access may be available. Sign in or learn about subscription options.
pp. 437-443
by
Nicola Basilico
,
Andrea Lanzi
,
Mattia Monga
SPARER: Secure Cloud-Proof Storage for e-Health Scenarios
Full-text access may be available. Sign in or learn about subscription options.
pp. 444-453
by
Gabriela Gheorghe
,
Muhammad Rizwan Asghar
,
Jean Lancrenon
,
Sankalp Ghatpande
How Secure are Web Servers? An Empirical Study of Slow HTTP DoS Attacks and Detection
Full-text access may be available. Sign in or learn about subscription options.
pp. 454-463
by
Nikhil Tripathi
,
Neminath Hubballi
,
Yogendra Singh
A Type System for Quantified Information-Flow Security in Java-Like Languages
Full-text access may be available. Sign in or learn about subscription options.
pp. 464-473
by
Gohar Shakoori
,
Mehran S. Fallah
,
Zeinab Iranmanesh
On Analyzing Program Behavior under Fault Injection Attacks
Full-text access may be available. Sign in or learn about subscription options.
pp. 474-479
by
Jakub Breier
Authentication in the Context of E-Participation: Current Practice, Challenges and Recommendations
Full-text access may be available. Sign in or learn about subscription options.
pp. 480-485
by
Maria Leitner
,
Arndt Bonitz
Air Traffic Management Security Research in SESAR
Full-text access may be available. Sign in or learn about subscription options.
pp. 486-492
by
John Hird
,
Martin Hawley
,
Chris Machin
A New Vision for ATM Security Management: The Security Management Platform
Full-text access may be available. Sign in or learn about subscription options.
pp. 493-498
by
Claudio Porretti
,
Raoul Lahaije
,
Denis Kolev
'CTRL_S' - A Security Tool for SESAR's Design-In Security Approach
Full-text access may be available. Sign in or learn about subscription options.
pp. 499-502
by
Karol Gotz
,
Martin Hawley
,
Chris Machin
,
John Hird
Security Risk Assessment and Risk Treatment for Integrated Modular Communication
Full-text access may be available. Sign in or learn about subscription options.
pp. 503-509
by
Hamid Asgari
,
Sarah Haines
,
Adrian Waller
Cyber Security Incident Management in the Aviation Domain
Full-text access may be available. Sign in or learn about subscription options.
pp. 510-516
by
Martin Gilje Jaatun
,
Rainer Koelle
A Model-Based Approach for Aviation Cyber Security Risk Assessment
Full-text access may be available. Sign in or learn about subscription options.
pp. 517-525
by
Tobias Kiesling
,
Matias Krempel
,
Josef Niederl
,
Jürgen Ziegler
Security Testing with Controller-Pilot Data Link Communications
Full-text access may be available. Sign in or learn about subscription options.
pp. 526-531
by
Doris di Marco
,
Alessandro Manzo
,
Marco Ivaldi
,
John Hird
Showing 100 out of 143
Load More
Load All