Security and Privacy in Communication Networks

9th International ICST Conference, SecureComm 2013, Sydney, NSW, Australia, September 25-28, 2013, Revised Selected Papers

Editors:

ISBN: 978-3-319-04282-4 (Print) 978-3-319-04283-1 (Online)

Table of contents (26 chapters)

previous Page of 2
  1. Front Matter

    Pages -

  2. Session I: Security & Privacy in Mobile, Sensor, and Ad Hoc Networks

    1. No Access

      Book Chapter

      Pages 1-18

      Anomaly Detection in Beacon-Enabled IEEE 802.15.4 Wireless Sensor Networks

    2. No Access

      Book Chapter

      Pages 19-34

      Secure and Verifiable Top-k Query in Two-Tiered Sensor Networks

    3. No Access

      Book Chapter

      Pages 35-52

      CamTalk: A Bidirectional Light Communications Framework for Secure Communications on Smartphones

  3. Session II: Malware, Botnets, and Distributed Denial of Service

    1. No Access

      Book Chapter

      Pages 53-68

      Botnet Triple-Channel Model: Towards Resilient and Efficient Bidirectional Communication Botnets

    2. No Access

      Book Chapter

      Pages 69-85

      Contrasting Permission Patterns between Clean and Malicious Android Applications

    3. No Access

      Book Chapter

      Pages 86-103

      DroidAPIMiner: Mining API-Level Features for Robust Malware Detection in Android

  4. Session III: Security for Emerging Technologies: VoIP, Peer-to-peer, and Cloud Computing

    1. No Access

      Book Chapter

      Pages 104-121

      Disabling a Computer by Exploiting Softphone Vulnerabilities: Threat and Mitigation

    2. No Access

      Book Chapter

      Pages 122-139

      VCCBox: Practical Confinement of Untrusted Software in Virtual Cloud Computing

    3. No Access

      Book Chapter

      Pages 140-153

      Integrated Security Architecture for Virtual Machines

  5. Session IV: Encryption and Key Management

    1. No Access

      Book Chapter

      Pages 154-168

      Generic Mediated Encryption

    2. No Access

      Book Chapter

      Pages 169-181

      An Efficient Reconfigurable II-ONB Modular Multiplier

    3. No Access

      Book Chapter

      Pages 182-196

      Public-Key Encryption Resilient to Linear Related-Key Attacks

  6. Session V: Security in Software and Machine Learning

    1. No Access

      Book Chapter

      Pages 197-215

      Clonewise – Detecting Package-Level Clones Using Machine Learning

    2. No Access

      Book Chapter

      Pages 216-233

      Automatic Polymorphic Exploit Generation for Software Vulnerabilities

  7. Session VI: Network and System Security Model

    1. No Access

      Book Chapter

      Pages 234-251

      A Novel Web Tunnel Detection Method Based on Protocol Behaviors

    2. No Access

      Book Chapter

      Pages 252-269

      Salus: Non-hierarchical Memory Access Rights to Enforce the Principle of Least Privilege

    3. No Access

      Book Chapter

      Pages 270-287

      Scalable Security Model Generation and Analysis Using k-importance Measures

  8. Session VII: Security and Privacy in Pervasive and Ubiquitous Computing

    1. No Access

      Book Chapter

      Pages 288-304

      The B-Side of Side Channel Leakage: Control Flow Security in Embedded Systems

    2. No Access

      Book Chapter

      Pages 305-322

      An e-payment Architecture Ensuring a High Level of Privacy Protection

    3. No Access

      Book Chapter

      Pages 323-341

      Unveiling Privacy Setting Breaches in Online Social Networks

previous Page of 2