Pub Date : 2019-10-23DOI: 10.1007/978-3-030-37231-6_4
Yurong Chen, Tian Lan, Guru Venkataramani
{"title":"CustomPro: Network Protocol Customization Through Cross-Host Feature Analysis","authors":"Yurong Chen, Tian Lan, Guru Venkataramani","doi":"10.1007/978-3-030-37231-6_4","DOIUrl":"https://doi.org/10.1007/978-3-030-37231-6_4","url":null,"abstract":"","PeriodicalId":269657,"journal":{"name":"Security and Privacy in Communication Networks","volume":"605 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131818859","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-23DOI: 10.1007/978-3-030-37231-6_15
Yu Lei, Craig A. Shue
{"title":"Detecting Root-Level Endpoint Sensor Compromises with Correlated Activity","authors":"Yu Lei, Craig A. Shue","doi":"10.1007/978-3-030-37231-6_15","DOIUrl":"https://doi.org/10.1007/978-3-030-37231-6_15","url":null,"abstract":"","PeriodicalId":269657,"journal":{"name":"Security and Privacy in Communication Networks","volume":"151 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123270335","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-23DOI: 10.1007/978-3-030-37228-6_22
Riccardo Bortolameotti, T. V. Ede, Andrea Continella, M. Everts, W. Jonker, P. Hartel, Andreas Peter
{"title":"Victim-Aware Adaptive Covert Channels","authors":"Riccardo Bortolameotti, T. V. Ede, Andrea Continella, M. Everts, W. Jonker, P. Hartel, Andreas Peter","doi":"10.1007/978-3-030-37228-6_22","DOIUrl":"https://doi.org/10.1007/978-3-030-37228-6_22","url":null,"abstract":"","PeriodicalId":269657,"journal":{"name":"Security and Privacy in Communication Networks","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125684110","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-23DOI: 10.1007/978-3-030-37231-6_1
Kun Du, Hao Yang, Zhou Li, Haixin Duan, S. Hao, Baojun Liu, Yuxiao Ye, Mingxuan Liu, XiaoDong Su, Guang Liu, Zhifeng Geng, Zaifeng Zhang, Jinjin Liang
{"title":"TL;DR Hazard: A Comprehensive Study of Levelsquatting Scams","authors":"Kun Du, Hao Yang, Zhou Li, Haixin Duan, S. Hao, Baojun Liu, Yuxiao Ye, Mingxuan Liu, XiaoDong Su, Guang Liu, Zhifeng Geng, Zaifeng Zhang, Jinjin Liang","doi":"10.1007/978-3-030-37231-6_1","DOIUrl":"https://doi.org/10.1007/978-3-030-37231-6_1","url":null,"abstract":"","PeriodicalId":269657,"journal":{"name":"Security and Privacy in Communication Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115719332","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-23DOI: 10.1007/978-3-030-37231-6_5
Xinying Wu, Yuan Ma, Jing Yang, Tianyu Chen, Jingqiang Lin
{"title":"On the Security of TRNGs Based on Multiple Ring Oscillators","authors":"Xinying Wu, Yuan Ma, Jing Yang, Tianyu Chen, Jingqiang Lin","doi":"10.1007/978-3-030-37231-6_5","DOIUrl":"https://doi.org/10.1007/978-3-030-37231-6_5","url":null,"abstract":"","PeriodicalId":269657,"journal":{"name":"Security and Privacy in Communication Networks","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115607047","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-23DOI: 10.1007/978-3-030-37231-6_2
Yu Liu, Matthew R. Squires, Curtis R. Taylor, R. Walls, Craig A. Shue
{"title":"Account Lockouts: Characterizing and Preventing Account Denial-of-Service Attacks","authors":"Yu Liu, Matthew R. Squires, Curtis R. Taylor, R. Walls, Craig A. Shue","doi":"10.1007/978-3-030-37231-6_2","DOIUrl":"https://doi.org/10.1007/978-3-030-37231-6_2","url":null,"abstract":"","PeriodicalId":269657,"journal":{"name":"Security and Privacy in Communication Networks","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122736748","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-23DOI: 10.1007/978-3-030-37231-6_14
Feng Zhu, P. Shen, Chi Chen
{"title":"A Performance-Optimization Method for Reusable Fuzzy Extractor Based on Block Error Distribution of Iris Trait","authors":"Feng Zhu, P. Shen, Chi Chen","doi":"10.1007/978-3-030-37231-6_14","DOIUrl":"https://doi.org/10.1007/978-3-030-37231-6_14","url":null,"abstract":"","PeriodicalId":269657,"journal":{"name":"Security and Privacy in Communication Networks","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131531650","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-23DOI: 10.1007/978-3-030-37228-6_11
Zhiqiang Li, Jun Sun, Qiben Yan, W. Srisa-an, Yutaka Tsutano
{"title":"Obfusifier: Obfuscation-Resistant Android Malware Detection System","authors":"Zhiqiang Li, Jun Sun, Qiben Yan, W. Srisa-an, Yutaka Tsutano","doi":"10.1007/978-3-030-37228-6_11","DOIUrl":"https://doi.org/10.1007/978-3-030-37228-6_11","url":null,"abstract":"","PeriodicalId":269657,"journal":{"name":"Security and Privacy in Communication Networks","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130893533","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-23DOI: 10.1007/978-3-030-37228-6_16
Mengxia Luo, Can Yang, Xiaorui Gong, Lei-Ping Yu
{"title":"FuncNet: A Euclidean Embedding Approach for Lightweight Cross-platform Binary Recognition","authors":"Mengxia Luo, Can Yang, Xiaorui Gong, Lei-Ping Yu","doi":"10.1007/978-3-030-37228-6_16","DOIUrl":"https://doi.org/10.1007/978-3-030-37228-6_16","url":null,"abstract":"","PeriodicalId":269657,"journal":{"name":"Security and Privacy in Communication Networks","volume":"18 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114366633","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-23DOI: 10.1007/978-3-030-37228-6_24
Changbo Tian, Yongzheng Zhang, Tao Yin, Yupeng Tuo, Ruihai Ge
{"title":"A Loss-Tolerant Mechanism of Message Segmentation and Reconstruction in Multi-path Communication of Anti-tracking Network","authors":"Changbo Tian, Yongzheng Zhang, Tao Yin, Yupeng Tuo, Ruihai Ge","doi":"10.1007/978-3-030-37228-6_24","DOIUrl":"https://doi.org/10.1007/978-3-030-37228-6_24","url":null,"abstract":"","PeriodicalId":269657,"journal":{"name":"Security and Privacy in Communication Networks","volume":"114 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114502039","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}