DIscovery and REgistration Protocol:for Device and Person Identity Management in IoT
Marco Lobe Kome, Mariem Graa, Frederic Cuppens, Nora Cuppens and Vincent Frey.
Dark domain name attack: A new threat to Domain Name System
Bold Munkhbaatar, Mamoru Mimura and Hidema Tanaka.
wIDS a multilayer IDS for Wireless-based SCADA
Lyes Bayou, David Espes, Nora Cuppens-Boulahia and Frédéric Cuppens
Modelling and Mitigation of Cross-Origin Request Attacks on FIM (Federated Identity Management) Using CORP (Cross Origin Request Policy)
Akash Agrawall, Shubh Maheshwari, Projit Bandyopadhyay and Venkatesh Choppella.
Heavy Log Reader: Learning the Context of Cyber Attacks Automatically with Paragraph Vector
Mamoru Mimura and Hidema Tanaka.
A Secure Anonymous E-Voting System Using Identity-Based Blind Signature Scheme
Mahender Kumar, C.P. Katti and P.C. Saxena.
Leveraging Man-in-the-middle DoS Attack with Internal TCP Retransmissions in Virtual Network
Son Nguyen Duc, Mamoru Mimura and Hidema Tanaka.
Hiding Kernel Level Rootkits Using Buffer Overflow and Return Oriented Programming
Amrita Honap and Wonjun Lee.
On Automated Detection of Multi-Protocol Attacks using AVISPA
Varun Garg and Anish Mathuria.
Malicious Application Detection on Android with Enhanced Static-Dynamic Analysis
Sandeep Rai, Rushang Dhanesha, Sreyans Nahata and Bernard Menezes.
Experimenting similarity-based hijacking attacks detection and response in Android Systems
Anis Bkakria, Mariem Graa, Nora Cuppens-Boulahia, Frédéric Cuppens and Jean-Louis Lanet
SEMFS: Secure & Efficient Multi-keyword Fuzzy Search for Cloud Storage
Sanjeet Kumar Nayak and Somanath Tripathy.
Towards Generalization of Privacy Policy Specification and Property-based Information Leakage
Dileep Kumar Koshley, Sapana Rani and Raju Halder.
On De-synchronization of User Pseudonyms in Mobile Network
Md Mohsin Ali Khan, Kimmo Jarvinen, Philip Ginzboorg and Valtteri Niemi.
Human-on-the-loop Automation for Detecting Software Side-Channel Vulnerabilities
Ganesh Ram Santhanam, Benjamin Holland, Suresh Kothari and Nikhil Ranade.
The Challenge of Aadhaar
Ajinkya Rajput and K. Gopinath.
Privacy-Preserving Proxy Re-encryption with Fine-grained Access Control
Payal Chaudhari, Manik Lal Das and Dipankar Dasgupta.
Short papers:
An enhanced blacklist method to detect phishing websites
Srinivasa Rao and Alwyn Pais.
Parallelized Common Factor Attack on RSA
Vineet Kumar, Aneek Roy, Sourya Sengupta and Sourav Sen Gupta.
Secure Random Encryption for Deduplicated Storage
Jay Dave, Shweta Saharan, Parvez Faruki, Vijay Laxmi and Manoj Gaur.
Semi Supervised NLP Based Classification of Malware Documents
Mayukh Rath, Shivali Agarwal and Rudrapatna Shyamasundar.
MalDetec: A Non-Root Approach for Dynamic Malware Detection in Android
Nachiket Trivedi and Manik Lal Das.
Performance attacks on branch predictors in embedded processors with SMT support
Moumita Das, Ansuman Banerjee, Nitesh Kumar Singh and Bhaskar Sardar.