Workshop 2015 papers:
ASSD 2015:
Method Selection and Tailoring for Agile Threat Assessment and Mediation
Stephan Renatus, Clemens Teichmann, Jörn Eichler
Independent Security Testing on Agile Software Development: a Case Study in a Software Company
Jesus Choliz, Julian Vilas, Jose Moreira
Analysis of the Challenges of Developing Secure Software Using the Agile Approach
Hela Oueslati, Mohammad Masudur Rahman, Lotfi Ben Othmane
FARES 2015:
Towards the Forensic Identification and Investigation of Cloud Hosted Servers through Noninvasive Wiretaps
Hessel Shut, Mark Scanlon, Jason Farina, NhienAn LeKhac
Privacy and Trust in Smart camera sensor networks
Michael Loughlin, Asma Adnane
Towards a process centered resilience framework
Richard M. Zahoransky, Christian Brenig, Thomas Koslowski
Complexity Estimates of a SHA-1 Near-Collision Attack for GPU and FPGA
Stefan Gradinger, Bernhard Greslehner-Nimmervoll, Jürgen Fuß, Robert Kolmhofer
Security Monitoring of HTTP Traffic Using Extended Flows
Martin Husák, Petr Velan, Jan Vykopal
Impacts of Accommodations as Temporal Shelter for the Reassignment of Shelters Jurisdiction
Yu Ichifuji, Noriaki Koide, Noboru Sonehara
IWSMA 2015
Composition-malware: building Android malware at run time
Gerardo Canfora, Francesco Mercaldo, Corrado Aaron Visaggio, Giovanni Moriano
Network Security Challenges in Android Applications
Damjan Buhov, Markus Huber, Georg Merzdovnik, Edgar Weippl, Vesna Dimitrova
Effectiveness of Opcode ngrams for Detection of Multi Family Android Malware
Gerardo Canfora, Andrea De Lorenzo, Eric Medvet, Francesco Mercaldo, Corrado Aaron Visaggio
A Model for Specification and Validation of a Trust Management based Security Scheme in a MANET Environment
Aida Ben Chehida Douss, Ryma Abassi, Sihem Guemara El Fatmi
Trust Negotiation Based Approach to Enforce MANET Routing Security
Aida Ben chehida Douss, samiha ayed, ryma abassi , Nora Cuppens, sihem Guemara EL Fatmi
Risk Assessment of Public Safety and Security Mobile Service
Matti Peltola, Pekka Kekolahti
MFSec 2015:
AnonCall: Making Anonymous Cellular Phone Calls
Eric Chan-Tin
Image Watermaking With Biometric Data For Copyright Protection
Morgan Barbier, Jean-Marie Le Bars, Christophe Rosenberger
PScore: a framework for enhancing privacy awareness in online social networks
Georgios Petkos, Symeon Papadopoulos, Yiannis Kompatsiaris
Concept Detection on Multimedia Web Resources about Home Made Explosives
George Kalpakis, Theodora Tsikrika, Foteini Markatopoulou, Nikiforos Pittaras, Stefanos Vrochidis, Vasileios Mezaris, Ioannis Patras, Ioannis Kompatsiaris
Video spatio-temporal filtering based on cameras and target objects trajectories – Videosurveillance forensic framework
Dana Codreanu, Andre Peninou, Florence Sedes
A Framework for the Discovery, Analysis, and Retrieval of Multimedia Homemade Explosives Information on the Web
Theodora Tsikrika, George Kalpakis, Stefanos Vrochidis, Ioannis Kompatsiaris, Iraklis Paraskakis, Isaak Kavasidis, Jonathan Middleton, Una Williamson
SAW 2015:
Towards Black Box Testing of Android Apps
Yury Zhauniarovich, Anton Philippov, Olga Gadyatskaya, Bruno Crispo, Fabio Massacci
How Much Cloud Can You Handle?
Martin Jaatun, Inger Anne Tøndel
Generation of local and expected behaviors of a smart card application to detect software anomaly
Germain Jolly, Baptiste Hemery, Christophe Rosenberger
Personal Agent for Services in ITS
Shinsaku Kiyomoto, Toru Nakamura, Haruo Takasaki, Tatsuhiko Hirabayashi
A Performance Evaluation of Hash Functions for IP Reputation Lookup using Bloom Filters.
Hugo Gonzalez, Natalia Stakhanova
Towards a CERT-Communication Model as Basis to Software Assurance
Gerald Quirchmayr, Otto Hellwig
An Open Source Code Analyzer and Reviewer (OSCAR) Framework
Simon Tjoa, Patrick Kochberger, Christoph Malin, Andreas Schmoll
Securing web applications with better „patches“: an architectural approach for systematic input validation with security patterns
Jung-Woo Sohn, Jungwoo Ryoo
WCSF 2015:
Evaluation of a Sector-hash Based Rapid File Detection Method for Monitoring Infrastructure-as-a-Service Cloud Platforms
Manabu Hirano, Hayate Takase, Koki Yoshida
Advanced Attribute-based Key Management for Mobile Devices in Hybrid Clouds
Jaemin Park, Eunchan Kim, Sungjin Park, Cheoloh Kang
Enabling Constraints and Dynamic Preventive Access Control Policy Enforcement in the Cloud
Somchart Fugkeaw, Hiroyuki Sato
Overview of the Forensic Investigation of Cloud Services
Jason Farina, Mark Scanlon, NhienAn LeKhac, Tahar Kechadi
WSDF 2015:
Challenges of Data Provenance for Cloud Forensic Investigations
Victoria Katilu, Virginia Franqueira, Olga Angelopoulou
Watch what you wear: preliminary forensic analysis of smart watches
Ibrahim Baggili, Kyle Anthony, Jeff Oduru, Frank Breitinger, Glenn McGee
Cold Boot Attacks on DDR2 and DDR3 SDRAM
Simon Lindenlauf, Hans Höfken, Marko Schuba
Behavioural Evidence Analysis Applied to Digital Forensics: An Empirical Analysis of Child Pornography Cases using P2P Networks
Noora Al Mutawa, Joanne Bryce, Virginia Franqueira, Andrew Marrington