Skip to main content
  • Conference proceedings
  • © 2011

Future Challenges in Security and Privacy for Academia and Industry

26th IFIP TC 11 International Information Security Conference, SEC 2011, Lucerne, Switzerland, June 7-9, 2011, Proceedings

  • State-of-the-art research
  • Fast-track conference proceedings
  • Unique visibility

Conference proceedings info: SEC 2011.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book USD 54.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (26 papers)

  1. Front Matter

  2. Malware, Information Flow and DoS Attacks

    1. iSAM: An iPhone Stealth Airborne Malware

      • Dimitrios Damopoulos, Georgios Kambourakis, Stefanos Gritzalis
      Pages 17-28
    2. TCP Ack Storm DoS Attacks

      • Raz Abramov, Amir Herzberg
      Pages 29-40
  3. Authentication

    1. Breaking reCAPTCHA: A Holistic Approach via Shape Recognition

      • Paul Baecher, Niklas Büscher, Marc Fischlin, Benjamin Milde
      Pages 56-67
    2. From Multiple Credentials to Browser-Based Single Sign-On: Are We More Secure?

      • Alessandro Armando, Roberto Carbone, Luca Compagna, Jorge Cuellar, Giancarlo Pellegrino, Alessandro Sorniotti
      Pages 68-79
    3. Quantifying the Effect of Graphical Password Guidelines for Better Security

      • Mohd Jali, Steven Furnell, Paul Dowland
      Pages 80-91
  4. Network Security and Security Protocols

    1. A Case Study in Practical Security of Cable Networks

      • Amir Alsbih, Felix C. Freiling, Christian Schindelhauer
      Pages 92-103
    2. Ceremony Analysis: Strengths and Weaknesses

      • Kenneth Radke, Colin Boyd, Juan Gonzalez Nieto, Margot Brereton
      Pages 104-115
    3. Preventing Board Flooding Attacks in Coercion-Resistant Electronic Voting Schemes

      • Reto Koenig, Rolf Haenni, Stephan Fischli
      Pages 116-127
    4. Piracy Protection for Streaming Content in Home Networks

      • Hongxia Jin, Jeffrey Lotspiech
      Pages 128-141
  5. Software Security

    1. JITDefender: A Defense against JIT Spraying Attacks

      • Ping Chen, Yi Fang, Bing Mao, Li Xie
      Pages 142-153
    2. Retrofitting Security in COTS Software with Binary Rewriting

      • Pádraig O’Sullivan, Kapil Anand, Aparna Kotha, Matthew Smithson, Rajeev Barua, Angelos D. Keromytis
      Pages 154-172
    3. Generating Optimised and Formally Checked Packet Parsing Code

      • Sebastien Mondet, Ion Alberdi, Thomas Plagemann
      Pages 173-184
  6. Policy Compliance and Obligations

    1. Organizational Power and Information Security Rule Compliance

      • Ella Kolkowska, Gurpreet Dhillon
      Pages 185-196
    2. Delegation of Obligations and Responsibility

      • Meriam Ben Ghorbel-Talbi, Frédéric Cuppens, Nora Cuppens-Boulahia, Daniel Le Métayer, Guillaume Piolle
      Pages 197-209
    3. Distributed Security Policy Conformance

      • Mirko Montanari, Ellick Chan, Kevin Larson, Wucherl Yoo, Roy H. Campbell
      Pages 210-222
  7. Privacy Attacks and Privacy-Enhancing Technologies

    1. Scalable Privacy-Preserving Data Mining with Asynchronously Partitioned Datasets

      • Hiroaki Kikuchi, Daisuke Kagawa, Anirban Basu, Kazuhiko Ishii, Masayuki Terada, Sadayuki Hongo
      Pages 223-234

Other Volumes

  1. Future Challenges in Security and Privacy for Academia and Industry

About this book

This book constitutes the refereed proceedings of the 26th IFIP TC 11 International Information Security Conference, SEC 2011, held in Lucerne, Switzerland, in June 2011. The 24 revised full papers presented together with a keynote talk were carefully reviewed and selected from 100 submissions. The papers are organized in topical sections on malware, information flow and DoS attacks, authentication, network security and security protocols, software security, policy compliance and obligations, privacy attacks and privacy-enhancing technologies, risk analysis and security metrics, and intrusion detection.

Editors and Affiliations

  • IBM Zurich Research Laboratory, Rüschlikon, Switzerland

    Jan Camenisch

  • Department of Computer Science, Karlstad University, Karlstad, Sweden

    Simone Fischer-Hübner

  • Faculty of Software and Information Science, Iwate Prefectural University, Takizawa-mura, Japan

    Yuko Murayama

  • Lucerne University of Applied Sciences and Arts, Lucerne, Switzerland

    Armand Portmann, Carlos Rieder

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book USD 54.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access