Pub Date : 2019-08-28DOI: 10.1007/978-3-030-26834-3_13
A. Zeier, A. Wiesmaier, A. Heinemann
{"title":"API Usability of Stateful Signature Schemes","authors":"A. Zeier, A. Wiesmaier, A. Heinemann","doi":"10.1007/978-3-030-26834-3_13","DOIUrl":"https://doi.org/10.1007/978-3-030-26834-3_13","url":null,"abstract":"","PeriodicalId":20513,"journal":{"name":"Proceedings of the 2018 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization","volume":"34 6 1","pages":"221-240"},"PeriodicalIF":0.0,"publicationDate":"2019-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82789354","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-08-28DOI: 10.1007/978-3-030-26834-3_15
Junichiro Hayata, Fuyuki Kitagawa, Yusuke Sakai, Goichiro Hanaoka, Kanta Matsuura
{"title":"Equivalence Between Non-malleability Against Replayable CCA and Other RCCA-Security Notions","authors":"Junichiro Hayata, Fuyuki Kitagawa, Yusuke Sakai, Goichiro Hanaoka, Kanta Matsuura","doi":"10.1007/978-3-030-26834-3_15","DOIUrl":"https://doi.org/10.1007/978-3-030-26834-3_15","url":null,"abstract":"","PeriodicalId":20513,"journal":{"name":"Proceedings of the 2018 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization","volume":"26 1","pages":"253-272"},"PeriodicalIF":0.0,"publicationDate":"2019-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77422458","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-08-28DOI: 10.1007/978-3-030-26834-3_12
Abigail M. Y. Koay, I. Welch, Winston K.G. Seah
{"title":"(Short Paper) Effectiveness of Entropy-Based Features in High- and Low-Intensity DDoS Attacks Detection","authors":"Abigail M. Y. Koay, I. Welch, Winston K.G. Seah","doi":"10.1007/978-3-030-26834-3_12","DOIUrl":"https://doi.org/10.1007/978-3-030-26834-3_12","url":null,"abstract":"","PeriodicalId":20513,"journal":{"name":"Proceedings of the 2018 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization","volume":"65 1","pages":"207-217"},"PeriodicalIF":0.0,"publicationDate":"2019-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76816639","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-08-28DOI: 10.1007/978-3-030-26834-3_9
Sergii Banin, Geir Olav Dyrkolbotn
{"title":"Correlating High- and Low-Level Features: - Increased Understanding of Malware Classification","authors":"Sergii Banin, Geir Olav Dyrkolbotn","doi":"10.1007/978-3-030-26834-3_9","DOIUrl":"https://doi.org/10.1007/978-3-030-26834-3_9","url":null,"abstract":"","PeriodicalId":20513,"journal":{"name":"Proceedings of the 2018 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization","volume":"22 1","pages":"149-167"},"PeriodicalIF":0.0,"publicationDate":"2019-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79139162","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-08-28DOI: 10.1007/978-3-030-26834-3_14
Masaya Sato, Yuta Imamura, Rintaro Orito, Toshihiro Yamauchi
{"title":"(Short Paper) Method for Preventing Suspicious Web Access in Android WebView","authors":"Masaya Sato, Yuta Imamura, Rintaro Orito, Toshihiro Yamauchi","doi":"10.1007/978-3-030-26834-3_14","DOIUrl":"https://doi.org/10.1007/978-3-030-26834-3_14","url":null,"abstract":"","PeriodicalId":20513,"journal":{"name":"Proceedings of the 2018 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization","volume":"71 1","pages":"241-250"},"PeriodicalIF":0.0,"publicationDate":"2019-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85564014","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-08-28DOI: 10.1007/978-3-030-26834-3_5
J. Dumas, P. Lafourcade, J. L. Fenner, David Lucas, J. Orfila, Clément Pernet, Maxime Puys
{"title":"Secure Multiparty Matrix Multiplication Based on Strassen-Winograd Algorithm","authors":"J. Dumas, P. Lafourcade, J. L. Fenner, David Lucas, J. Orfila, Clément Pernet, Maxime Puys","doi":"10.1007/978-3-030-26834-3_5","DOIUrl":"https://doi.org/10.1007/978-3-030-26834-3_5","url":null,"abstract":"","PeriodicalId":20513,"journal":{"name":"Proceedings of the 2018 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization","volume":"95 6 1","pages":"67-88"},"PeriodicalIF":0.0,"publicationDate":"2019-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80685368","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-08-28DOI: 10.1007/978-3-030-26834-3_19
Y. Desmedt, Kirill Morozov
{"title":"VSS Made Simpler","authors":"Y. Desmedt, Kirill Morozov","doi":"10.1007/978-3-030-26834-3_19","DOIUrl":"https://doi.org/10.1007/978-3-030-26834-3_19","url":null,"abstract":"","PeriodicalId":20513,"journal":{"name":"Proceedings of the 2018 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization","volume":"27 1","pages":"329-342"},"PeriodicalIF":0.0,"publicationDate":"2019-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85616900","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-08-28DOI: 10.1007/978-3-030-26834-3_10
M. Mimura, Taro Ohminami
{"title":"Towards Efficient Detection of Malicious VBA Macros with LSI","authors":"M. Mimura, Taro Ohminami","doi":"10.1007/978-3-030-26834-3_10","DOIUrl":"https://doi.org/10.1007/978-3-030-26834-3_10","url":null,"abstract":"","PeriodicalId":20513,"journal":{"name":"Proceedings of the 2018 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization","volume":"35 1","pages":"168-185"},"PeriodicalIF":0.0,"publicationDate":"2019-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82449198","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-08-28DOI: 10.1007/978-3-030-26834-3_16
Xin Wang, Shimin Li, Rui Xue
{"title":"Cocks' Identity-Based Encryption in the Standard Model, via Obfuscation Techniques (Short Paper)","authors":"Xin Wang, Shimin Li, Rui Xue","doi":"10.1007/978-3-030-26834-3_16","DOIUrl":"https://doi.org/10.1007/978-3-030-26834-3_16","url":null,"abstract":"","PeriodicalId":20513,"journal":{"name":"Proceedings of the 2018 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization","volume":"2 1","pages":"273-283"},"PeriodicalIF":0.0,"publicationDate":"2019-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91417350","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-08-28DOI: 10.1007/978-3-030-26834-3_23
Yuto Otsuki, Yuhei Kawakoya, Makoto Iwamura, Jun Miyoshi, Jacob Faires, Terrence Lillard
{"title":"Toward the Analysis of Distributed Code Injection in Post-mortem Forensics","authors":"Yuto Otsuki, Yuhei Kawakoya, Makoto Iwamura, Jun Miyoshi, Jacob Faires, Terrence Lillard","doi":"10.1007/978-3-030-26834-3_23","DOIUrl":"https://doi.org/10.1007/978-3-030-26834-3_23","url":null,"abstract":"","PeriodicalId":20513,"journal":{"name":"Proceedings of the 2018 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization","volume":"7 1 1","pages":"391-409"},"PeriodicalIF":0.0,"publicationDate":"2019-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79501870","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}