


default search action
38th SP 2017: San Jose, CA, USA - Workshops
- 2017 IEEE Security and Privacy Workshops, SP Workshops 2017, San Jose, CA, USA, May 25, 2017. IEEE Computer Society 2017, ISBN 978-1-5386-1968-1

BioStar: Workshop on Bio-inspired Security, Trust, Assurance and Resilience
- Hisham Salah, Mohamed Eltoweissy:

On the Personalization of Trust Management. 1-10 - Konstantin Böttinger:

Guiding a Colony of Black-Box Fuzzers with Chemotaxis. 11-16 - Jörg Keller, Gabriele Spenger, Steffen Wendzel

:
Ant Colony-Inspired Parallel Algorithm to Improve Cryptographic Pseudo Random Number Generators. 17-22 - Ruidan Li, Errin W. Fulp:

Evolutionary Approaches for Resilient Surveillance Management. 23-28 - Steffen Wendzel

, Wojciech Mazurczyk
, Georg Haas:
Don't You Touch My Nuts: Information Hiding in Cyber Physical Systems. 29-34 - Errin W. Fulp, H. Donald Gage, Matthew R. McNiece:

Using Evolutionary Diversity to Identify Problematic Software Parameters. 35-40 - Brian M. Powell, Ekampreet Kalsy, Gaurav Goswami, Mayank Vatsa

, Richa Singh
, Afzel Noore:
Attack-Resistant aiCAPTCHA Using a Negative Selection Artificial Immune System. 41-46 - Jamison Rose, Yudong Liu, Ahmed Awad:

Biometric Authentication Using Mouse and Eye Movement Data. 47-55 - Ankur Chattopadhyay, Michael J. Schulz, Clinton Rettler, Katie Turkiewicz, Laleah Fernandez, Askar Ziganshin:

Towards a Biometric Authentication-Based Hybrid Trust-Computing Approach for Verification of Provider Profiles in Online Healthcare Information. 56-65
LangSec: Fourth Workshop on Language Theoretic Security
- Stefan Lucks, Norina Marie Grosch, Joshua Konig:

Taming the Length Field in Binary Data: Calc-Regular Languages. 66-79 - Pierre Chifflier, Geoffroy Couprie:

Writing Parsers Like it is 2017. 80-92 - Tobias Bieschke, Lars Hermerschmidt, Bernhard Rumpe, Peter Stanchev:

Eliminating Input-Based Attacks by Deriving Automated Encoders and Decoders from Context-Free Grammars. 93-101 - Yi Lu, Sora Bae, Padmanabhan Krishnan, K. R. Raghavendra:

Inference of Security-Sensitive Entities in Libraries. 102-109 - Kit Sum Tse, Peter C. Johnson:

A Framework for Validating Session Protocols. 110-119 - Prashant Anantharaman, Michael E. Locasto, Gabriela F. Ciocarlie, Ulf Lindqvist

:
Building Hardened Internet-of-Things Clients with Language-Theoretic Security. 120-126 - Jacob I. Torrey, Mark P. Bridgman, Tomasz Tuzel:

Research Report: Hardware-Enforcement of Walther-Recursive Program Functions. 127-131 - Andrei Costin:

Lua Code: Security Overview and Practical Approaches to Static Analysis. 132-142 - Aniqua Z. Baset, Tamara Denning:

IDE Plugins for Detecting Input-Validation Vulnerabilities. 143-146
MoST: Mobile Security Technologies
- Phu H. Phung, Abhinav Mohanty, Rahul Rachapalli, Meera Sridhar:

HybridGuard: A Principal-Based Permission and Fine-Grained Policy Enforcement Framework for Web-Based Mobile Applications. 147-156 - Julian Sexton, Andrey Chudnov, David A. Naumann

:
Spartan Jester: End-to-End Information Flow Control for Hybrid Android Applications. 157-162 - Michael Backes, Sven Bugiel, Philipp von Styp-Rekowsky, Marvin WiBfeld:

Seamless In-App Ad Blocking on Stock Android. 163-168 - Piers O'Hanlon, Ravishankar Borgaonkar

, Lucca Hirschi:
Mobile Subscriber WiFi Privacy. 169-178 - Carlton Shepherd, Iakovos Gurulian, Eibe Frank, Konstantinos Markantonakis

, Raja Naeem Akram
, Emmanouil Panaousis
, Keith Mayes:
The Applicability of Ambient Sensors as Proximity Evidence for NFC Transactions. 179-188 - Fang Liu, Haipeng Cai

, Gang Wang, Danfeng Yao
, Karim O. Elish
, Barbara G. Ryder:
MR-Droid: A Scalable and Prioritized Analysis of Inter-App Communication Risks. 189-198
WTMC: Second Workshop on Traffic Measurements for Cybersecurity
- Oliver Gasser, Quirin Scheitle, Carl Denis, Nadja Schricker, Georg Carle:

Security Implications of Publicly Reachable Building Automation Systems. 199-204 - Paul Prasse

, Lukás Machlica, Tomás Pevný
, Jirí Havelka, Tobias Scheffer:
Malware Detection by Analysing Network Traffic with Neural Networks. 205-210 - Kinan Dak Albab

, Rawane Issa, Andrei Lapets
, Azer Bestavros, Nikolaj Volgushev:
Scalable Secure Multi-party Network Vulnerability Analysis via Symbolic Optimization. 211-216 - Stefan Prandl, Mihai M. Lazarescu

, Duc-Son Pham
, Sieteng Soh
, Subhash C. Kak:
An Investigation of Power Law Probability Distributions for Network Anomaly Detection. 217-222 - Aonan Zhai, Fei Xu, Zigang Cao, Haiqing Pan, Zhen Li, Gang Xiong

:
Real Time Network File Similarity Detection Based on Approximate Matching. 223-228 - Aarthi Reddy, Meredith Ordway-West, Melissa Lee, Matt Dugan, Joshua Whitney, Ronen Kahana, Brad Ford, Johan Muedsam, Austin Henslee, Max Rao:

Using Gaussian Mixture Models to Detect Outliers in Seasonal Univariate Network Traffic. 229-234 - Khalid Shahbar, Nur Zincir-Heywood

:
Effects of Shared Bandwidth on Anonymity of the I2P Network Users. 235-240 - José Camacho

, Pedro Garcia-Teodoro, Gabriel Maciá-Fernández:
Traffic Monitoring and Diagnosis with Multivariate Statistical Network Monitoring: A Case Study. 241-246 - Jeroen van der Ham

:
Ethics and Internet Measurements. 247-251

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














