Skip to main content

Accepted Papers ICISS 17.

Book your accommodation now!

Hotels near by iitb campus can be booked with iciss 2017 reference!

List of accepted papers (congrats to the authors)

Regular long papers:

  • Marco Lobe Kome, Mariem Graa, Frederic Cuppens, Nora Cuppens and Vincent Frey.
    DIscovery and REgistration Protocol:for Device and Person Identity Management in IoT
  • Bold Munkhbaatar, Mamoru Mimura and Hidema Tanaka.
    Dark domain name attack: A new threat to Domain Name System
  • Lyes Bayou, David Espes, Nora Cuppens-Boulahia and Frédéric Cuppens.
    wIDS a multilayer IDS for Wireless-based SCADA
  • Akash Agrawall, Shubh Maheshwari, Projit Bandyopadhyay and Venkatesh Choppella.
    Modelling and Mitigation of Cross-Origin Request Attacks on FIM (Federated Identity Management) Using CORP (Cross Origin Request Policy)
  • Mamoru Mimura and Hidema Tanaka.
    Heavy Log Reader: Learning the Context of Cyber Attacks Automatically with Paragraph Vector
  • Mahender Kumar, C.P. Katti and P.C. Saxena.
    A Secure Anonymous E-Voting System Using Identity-Based Blind Signature Scheme
  • Son Nguyen Duc, Mamoru Mimura and Hidema Tanaka.
    Leveraging Man-in-the-middle DoS Attack with Internal TCP Retransmissions in Virtual Network
  • Amrita Honap and Wonjun Lee.
    Hiding Kernel Level Rootkits Using Buffer Overflow and Return Oriented Programming
  • Varun Garg and Anish Mathuria.
    On Automated Detection of Multi-Protocol Attacks using AVISPA
  • Sandeep Rai, Rushang Dhanesha, Sreyans Nahata and Bernard Menezes.
    Malicious Application Detection on Android with Enhanced Static-Dynamic Analysis
  • Anis Bkakria, Mariem Graa, Nora Cuppens-Boulahia, Frédéric Cuppens and Jean-Louis Lanet.
    Experimenting similarity-based hijacking attacks detection and response in Android Systems
  • Sanjeet Kumar Nayak and Somanath Tripathy.
    SEMFS: Secure & Efficient Multi-keyword Fuzzy Search for Cloud Storage
  • Dileep Kumar Koshley, Sapana Rani and Raju Halder.
    Towards Generalization of Privacy Policy Specification and Property-based Information Leakage
  • Md Mohsin Ali Khan, Kimmo Järvinen, Philip Ginzboorg and Valtteri Niemi
    On De-synchronization of User Pseudonyms in Mobile Network
  • Ganesh Ram Santhanam, Benjamin Holland, Suresh Kothari and Nikhil Ranade.
    Human-on-the-loop Automation for Detecting Software Side-Channel Vulnerabilities
  • Ajinkya Rajput and K. Gopinath.
    The Challenge of Aadhaar
  • Payal Chaudhari, Manik Lal Das and Dipankar Dasgupta.
    Privacy-Preserving Proxy Re-encryption with Fine-grained Access Control

Short papers:

  • Srinivasa Rao and Alwyn Pais.
    An enhanced blacklist method to detect phishing websites
  • Vineet Kumar, Aneek Roy, Sourya Sengupta and Sourav Sen Gupta.
    Parallelized Common Factor Attack on RSA
  • Jay Dave, Shweta Saharan, Parvez Faruki, Vijay Laxmi and Manoj Gaur.
    Secure Random Encryption for Deduplicated Storage
  • Mayukh Rath, Shivali Agarwal and Rudrapatna Shyamasundar.
    Semi Supervised NLP Based Classification of Malware Documents
  • Nachiket Trivedi and Manik Lal Das.
    MalDetec: A Non-Root Approach for Dynamic Malware Detection in Android
  • Moumita Das, Ansuman Banerjee, Nitesh Kumar Singh and Bhaskar Sardar.
    Performance attacks on branch predictors in embedded processors with SMT support