Network and System Security

7th International Conference, NSS 2013, Madrid, Spain, June 3-4, 2013. Proceedings

  • Javier Lopez
  • Xinyi Huang
  • Ravi Sandhu
Conference proceedings NSS 2013

DOI: 10.1007/978-3-642-38631-2

Part of the Lecture Notes in Computer Science book series (LNCS, volume 7873)

Table of contents (71 papers)

  1. Front Matter
  2. NSS 2013 Regular Papers

    1. Network Security: Modeling and Evaluation

      1. Stochastic Traffic Identification for Security Management: eDonkey Protocol as a Case Study
        Rafael A. Rodríguez-Gómez, Gabriel Maciá-Fernández, Pedro García-Teodoro
        Pages 1-13
      2. A Technology Independent Security Gateway for Real-Time Multimedia Communication
        Fudong Li, Nathan Clarke, Steven Furnell
        Pages 14-25
      3. Model the Influence of Sybil Nodes in P2P Botnets
        Tianzuo Wang, Huaimin Wang, Bo Liu, Peichang Shi
        Pages 54-67
    2. Network Security: Security Protocols and Practice

      1. The OffPAD: Requirements and Usage
        Kent Are Varmedal, Henning Klevjer, Joakim Hovlandsvåg, Audun Jøsang, Johann Vincent, Laurent Miralabé
        Pages 80-93
      2. Information-Oriented Trustworthiness Evaluation in Vehicular Ad-hoc Networks
        Sashi Gurung, Dan Lin, Anna Squicciarini, Elisa Bertino
        Pages 94-108
      3. Using Trusted Platform Modules for Location Assurance in Cloud Networking
        Christoph Krauß, Volker Fusenig
        Pages 109-121
    3. Network Security: Network Attacks and Defense

      1. Tracing Sources of Anonymous Slow Suspicious Activities
        Harsha K. Kalutarage, Siraj A. Shaikh, Qin Zhou, Anne E. James
        Pages 122-134
      2. Static Analysis for Regular Expression Denial-of-Service Attacks
        James Kirrage, Asiri Rathnayake, Hayo Thielecke
        Pages 135-148
      3. Next-Generation DoS at the Higher Layers: A Study of SMTP Flooding
        Gabriel Cartier, Jean-François Cartier, José M. Fernandez
        Pages 149-163
      4. Towards Hybrid Honeynets via Virtual Machine Introspection and Cloning
        Tamas K. Lengyel, Justin Neumann, Steve Maresca, Aggelos Kiayias
        Pages 164-177
    4. System Security: Malware and Intrusions

      1. MADS: Malicious Android Applications Detection through String Analysis
        Borja Sanz, Igor Santos, Javier Nieves, Carlos Laorden, Iñigo Alonso-Gonzalez, Pablo G. Bringas
        Pages 178-191
      2. X-TIER: Kernel Module Injection
        Sebastian Vogl, Fatih Kilic, Christian Schneider, Claudia Eckert
        Pages 192-205
      3. Leveraging String Kernels for Malware Detection
        Jonas Pfoh, Christian Schneider, Claudia Eckert
        Pages 206-219
      4. Insiders Trapped in the Mirror Reveal Themselves in Social Media
        Miltiadis Kandias, Konstantina Galbogini, Lilian Mitrou, Dimitris Gritzalis
        Pages 220-235
    5. System Security: Applications Security

      1. On Business Logic Vulnerabilities Hunting: The APP_LogGIC Framework
        George Stergiopoulos, Bill Tsoumas, Dimitris Gritzalis
        Pages 236-249
      2. Using the Smart Card Web Server in Secure Branchless Banking
        Sheila Cobourne, Keith Mayes, Konstantinos Markantonakis
        Pages 250-263

About these proceedings

Introduction

This book constitutes the proceedings of the 7th International Conference on Network and System Security, NSS 2013, held in Madrid, Spain, in June 2013. The 41 full papers presented were carefully reviewed and selected from 176 submissions. The volume also includes 7 short papers and 13 industrial track papers. The paper are organized in topical sections on network security (including: modeling and evaluation; security protocols and practice; network attacks and defense) and system security (including: malware and intrusions; applications security; security algorithms and systems; cryptographic algorithms; privacy; key agreement and distribution).

Keywords

RFID attribute-based signature computer networks encryption vehicular ad-hoc networks

Editors and affiliations

  • Javier Lopez
    • 1
  • Xinyi Huang
    • 2
  • Ravi Sandhu
    • 3
  1. 1.Computer Science Department, ETSI InformaticaUniversity of MalagaMalagaSpain
  2. 2.School of Mathematics and Computer ScienceFujian Normal UniversityFuzhouChina
  3. 3.Institute for Cyber Security,University of Texas at San AntonioSan AntonioUSA

Bibliographic information

  • Copyright Information Springer-Verlag Berlin Heidelberg 2013
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-38630-5
  • Online ISBN 978-3-642-38631-2
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349