Security and Privacy Workshops 2014
CREDS: Cyber-Security Research Ethics Dialog and Strategy
- A Case Study in Malware Research Ethics Education: When Teaching Bad is Good,
pdf,
John P. Sullins
- Ethics in Data Sharing: Developing a Model for Best Practice,
pdf,
Sven Dietrich, Jeroen van der Ham, Aiko Pras, Roland van Rijswijk-Deij, Darren Shou, Anna Sperotto, Aimee van Wynsberghe, Lenore D. Zuck
DUMA: International Workshop on Data Usage Management
- Gringotts: Securing Data for Digital Evidence,
pdf,
Catherine M.S. Redfield, Hiroyuki Date
- P2U: A Privacy Policy Specification Language for Secondary Data Sharing and Usage,
pdf,
Johnson Iyilade, Julita Vassileva
- Architecture, Workflows, and Prototype for Stateful Data Usage Control in Cloud,
pdf,
Aliaksandr Lazouski, Gaetano Mancini, Fabio Martinelli, Paolo Mori
- Resilience as a New Enforcement Model for IT Security Based on Usage Control,
pdf,
Sven Wohlgemuth
- Structure Matters - A New Approach for Data Flow Tracking,
pdf,
Enrico Lovat, Florian Kelbert
- Hurdles for Genomic Data Usage Management,
pdf,
Muhammad Naveed
- RAPPD: A Language and Prototype for Recipient-Accountable Private Personal Data,
pdf,
Yuan J. Kang, Allan M. Schiffman, Jeff Shrager
IWCC: International Workshop on Cyber Crime
- DF-C2M2: A Capability Maturity Model for Digital Forensics Organisations,
pdf,
Ebrahim Hamad Al_Hanaei, Awais Rashid
- Asset Risk Scoring in Enterprise Network with Mutually Reinforced Reputation Propagation,
pdf,
Xin Hu, Ting Wang, Marc Ph. Stoecklin, Douglas L. Schales, Jiyong Jang, Reiner Sailer
- Collusion and Fraud Detection on Electronic Energy Meters - A Use Case of Forensics Investigation Procedures,
pdf,
Rubens Alexandre De_Faria, Keiko V. Ono Fonseca, Bertoldo SchneiderJr, Sing Kiong Nguang
- Towards Forensic Analysis of Attacks with DNSSEC,
pdf,
Haya Shulman, Michael Waidner
- The Tricks of the Trade: What Makes Spam Campaigns Successful?,
pdf,
Jane Iedemska, Gianluca Stringhini, Richard Kemmerer, Christopher Kruegel, Giovanni Vigna
- Constructing and Analyzing Criminal Networks,
pdf,
Hamed Sarvari, Ehab Abozinadah, Alex Mbaziira, Damon Mccoy
- Steganography in Long Term Evolution Systems,
pdf,
Iwona Grabska, Krzysztof Szczypiorski
- Improving Hard Disk Contention-Based Covert Channel in Cloud Computing,
pdf,
Bartosz Lipinski, Wojciech Mazurczyk, Krzysztof Szczypiorski
- PeerShark: Detecting Peer-to-Peer Botnets by Tracking Conversations,
pdf,
Pratik Narang, Subhajit Ray, Chittaranjan Hota, Venkat Venkatakrishnan
- Automatic Identification of Replicated Criminal Websites Using Combined Clustering,
pdf,
Jake Drew, Tyler Moore
- iCOP: Automatically Identifying New Child Abuse Media in P2P Networks,
pdf,
Claudia Peersman, Christian Schulze, Awais Rashid, Margaret Brennan, Carl Fischer
- Can We Identify NAT Behavior by Analyzing Traffic Flows?,
pdf,
Yasemin Gokcen, Vahid Aghaei Foroushani, A. Nur Zincir-Heywood
LangSec: Workshop on Language-Theoretic Security
- Mind Your Language(s): A Discussion about Languages and Security,
pdf,
Eric Jaeger, Olivier Levillain
- LEGO® Bricks for Reactive Programming,
pdf,
Dennis Volpano
- Nail: A Practical Interface Generator for Data Formats,
pdf,
Julian Bangert, Nickolai Zeldovich
- Ethos' Deeply Integrated Distributed Types,
pdf,
W. Michael Petullo, Wenyuan Fei, Jon A. Solworth, Pat Gavlin
- Phantom Boundaries and Cross-Layer Illusions in 802.15.4 Digital Radio,
pdf,
Travis Goodspeed
- Finite State Machine Parsing for Internet Protocols: Faster Than You Think,
pdf,
Robert David Graham, Peter C. Johnson
- Parsifal: A Pragmatic Solution to the Binary Parsing Problems,
pdf,
Olivier Levillain
- The Pitfalls of Protocol Design: Attempting to Write a Formally Verified PDF Parser,
pdf,
Andreas Bogk, Marco Schöpl
- Using Existing Hardware Services for Malware Detection,
pdf,
Sarat Kompalli
- The Weird Machines in Proof-Carrying Code,
pdf,
Julien Vanegue
WRIT: Workshop on Research for Insider Threat
- Understanding Insider Threat: A Framework for Characterising Attacks,
pdf,
Jason R.C. Nurse, Oliver Buckley, Philip A. Legg, Michael Goldsmith, Sadie Creese, Gordon R.T. Wright, Monica Whitty
- Combining Generated Data Models with Formal Invalidation for Insider Threat Analysis,
pdf,
Florian Kammüller, Christian W. Probst
- Analysis of Unintentional Insider Threats Deriving from Social Engineering Exploits,
pdf,
Frank L. Greitzer, Jeremy R. Strozer, Sholom Cohen, Andrew P. Moore, David Mundie, Jennifer Cowley
- Insider Threat Identification by Process Analysis,
pdf,
Matt Bishop, Heather M. Conboy, Huong Phan, Borislava I. Simidchieva, George S. Avrunin, Lori A. Clarke, Leon J. Osterweil, Sean Peisert
- Insider Attack Identification and Prevention Using a Declarative Approach,
pdf,
Anandarup Sarkar, Sven Köhler, Sean Riddle, Bertram Ludaescher, Matt Bishop
- Detecting Unknown Insider Threat Scenarios,
pdf,
William T. Young, Alex Memory, Henry G. Goldberg, Ted E. Senator