default search action
35th SP 2014: Berkeley, CA, USA - Workshops
- 35. IEEE Security and Privacy Workshops, SPW 2014, San Jose, CA, USA, May 17-18, 2014. IEEE Computer Society 2014, ISBN 978-1-4799-5103-1
CREDS: Cyber-Security Research Ethics Dialog and Strategy
Exploring the Pillars a More Effective
- John P. Sullins:
A Case Study in Malware Research Ethics Education: When Teaching Bad is Good. 1-4 - Sven Dietrich, Jeroen van der Ham, Aiko Pras, Roland van Rijswijk-Deij, Darren Shou, Anna Sperotto, Aimee van Wynsberghe, Lenore D. Zuck:
Ethics in Data Sharing: Developing a Model for Best Practice. 5-9
DUMA: International Workshop on Data Usage Management
Beyond Data Usage Control
- Catherine M. S. Redfield, Hiroyuki Date:
Gringotts: Securing Data for Digital Evidence. 10-17 - Johnson Iyilade, Julita Vassileva:
P2U: A Privacy Policy Specification Language for Secondary Data Sharing and Usage. 18-22 - Aliaksandr Lazouski, Gaetano Mancini, Fabio Martinelli, Paolo Mori:
Architecture, Workflows, and Prototype for Stateful Data Usage Control in Cloud. 23-30
Alternate Approaches
- Sven Wohlgemuth:
Resilience as a New Enforcement Model for IT Security Based on Usage Control. 31-38 - Enrico Lovat, Florian Kelbert:
Structure Matters - A New Approach for Data Flow Tracking. 39-43
Accountability
- Yuan J. Kang, Allan M. Schiffman, Jeff Shrager:
RAPPD: A Language and Prototype for Recipient-Accountable Private Personal Data. 49-56
IWCC: International Workshop on Cyber Crime
Digital Forensics
- Ebrahim Hamad Al Hanaei, Awais Rashid:
DF-C2M2: A Capability Maturity Model for Digital Forensics Organisations. 57-60 - Xin Hu, Ting Wang, Marc Ph. Stoecklin, Douglas Lee Schales, Jiyong Jang, Reiner Sailer:
Asset Risk Scoring in Enterprise Network with Mutually Reinforced Reputation Propagation. 61-64 - Rubens Alexandre De Faria, Keiko Verônica Ono Fonseca, Bertoldo Schneider Jr., Sing Kiong Nguang:
Collusion and Fraud Detection on Electronic Energy Meters - A Use Case of Forensics Investigation Procedures. 65-68 - Haya Schulmann, Michael Waidner:
Towards Forensic Analysis of Attacks with DNSSEC. 69-76
Cyber Crimes Techniques
- Jane Iedemska, Gianluca Stringhini, Richard A. Kemmerer, Christopher Kruegel, Giovanni Vigna:
The Tricks of the Trade: What Makes Spam Campaigns Successful? 77-83 - Hamed Sarvari, Ehab Atif Abozinadah, Alex Mbaziira, Damon McCoy:
Constructing and Analyzing Criminal Networks. 84-91 - Iwona Grabska, Krzysztof Szczypiorski:
Steganography in Long Term Evolution Systems. 92-99 - Bartosz Lipinski, Wojciech Mazurczyk, Krzysztof Szczypiorski:
Improving Hard Disk Contention-Based Covert Channel in Cloud Computing. 100-107
Cyber Crimes Prevention & Monitoring
- Pratik Narang, Subhajit Ray, Chittaranjan Hota, Venkat Venkatakrishnan:
PeerShark: Detecting Peer-to-Peer Botnets by Tracking Conversations. 108-115 - Jake Drew, Tyler Moore:
Automatic Identification of Replicated Criminal Websites Using Combined Clustering. 116-123 - Claudia Peersman, Christian Schulze, Awais Rashid, Margaret Brennan, Carl Fischer:
iCOP: Automatically Identifying New Child Abuse Media in P2P Networks. 124-131 - Yasemin Gokcen, Vahid Aghaei Foroushani, Nur Zincir-Heywood:
Can We Identify NAT Behavior by Analyzing Traffic Flows? 132-139
LangSec: Workshop on Language-Theoretic Security
Papers
- Éric Jaeger, Olivier Levillain:
Mind Your Language(s): A Discussion about Languages and Security. 140-151 - Dennis M. Volpano:
LEGO(TM) Bricks for Reactive Programming. 152-157 - Julian Bangert, Nickolai Zeldovich:
Nail: A Practical Interface Generator for Data Formats. 158-166 - W. Michael Petullo, Wenyuan Fei, Jon A. Solworth, Pat Gavlin:
Ethos' Deeply Integrated Distributed Types. 167-180
Research Reports
- Travis Goodspeed:
Phantom Boundaries and Cross-Layer Illusions in 802.15.4 Digital Radio. 181-184 - Robert David Graham, Peter C. Johnson:
Finite State Machine Parsing for Internet Protocols: Faster Than You Think. 185-190 - Olivier Levillain:
Parsifal: A Pragmatic Solution to the Binary Parsing Problems. 191-197 - Andreas Bogk, Marco Schopl:
The Pitfalls of Protocol Design: Attempting to Write a Formally Verified PDF Parser. 198-203 - Sarat Kompalli:
Using Existing Hardware Services for Malware Detection. 204-208
Invited Presentations
- Julien Vanegue:
The Weird Machines in Proof-Carrying Code. 209-213
WRIT: Workshop on Research for Insider Threat
Understanding the Problem
- Jason R. C. Nurse, Oliver Buckley, Philip A. Legg, Michael Goldsmith, Sadie Creese, Gordon R. T. Wright, Monica T. Whitty:
Understanding Insider Threat: A Framework for Characterising Attacks. 214-228 - Florian Kammüller, Christian W. Probst:
Combining Generated Data Models with Formal Invalidation for Insider Threat Analysis. 229-235 - Frank L. Greitzer, Jeremy R. Strozer, Sholom Cohen, Andrew P. Moore, David A. Mundie, Jennifer Cowley:
Analysis of Unintentional Insider Threats Deriving from Social Engineering Exploits. 236-250
Detection
- Matt Bishop, Heather M. Conboy, Huong Phan, Borislava I. Simidchieva, George S. Avrunin, Lori A. Clarke, Leon J. Osterweil, Sean Peisert:
Insider Threat Identification by Process Analysis. 251-264 - Anandarup Sarkar, Sven Köhler, Sean Riddle, Bertram Ludäscher, Matt Bishop:
Insider Attack Identification and Prevention Using a Declarative Approach. 265-276 - William T. Young, Alex Memory, Henry G. Goldberg, Ted E. Senator:
Detecting Unknown Insider Threat Scenarios. 277-288
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.