Pub Date : 2015-10-26DOI: 10.1007/978-3-319-30303-1_14
Nguyen Minh Hai, Mizuhito Ogawa, Q. T. Tho
{"title":"Obfuscation Code Localization Based on CFG Generation of Malware","authors":"Nguyen Minh Hai, Mizuhito Ogawa, Q. T. Tho","doi":"10.1007/978-3-319-30303-1_14","DOIUrl":"https://doi.org/10.1007/978-3-319-30303-1_14","url":null,"abstract":"","PeriodicalId":337718,"journal":{"name":"Foundations and Practice of Security","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122666967","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-10-26DOI: 10.1007/978-3-319-30303-1_22
Guangye Sui, M. Mejri
{"title":"Security Enforcement by Rewriting: An Algebraic Approach","authors":"Guangye Sui, M. Mejri","doi":"10.1007/978-3-319-30303-1_22","DOIUrl":"https://doi.org/10.1007/978-3-319-30303-1_22","url":null,"abstract":"","PeriodicalId":337718,"journal":{"name":"Foundations and Practice of Security","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126401790","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-10-26DOI: 10.1007/978-3-319-30303-1_15
Sylvain Hallé, R. Khoury
{"title":"Runtime Monitoring of Stream Logic Formulae","authors":"Sylvain Hallé, R. Khoury","doi":"10.1007/978-3-319-30303-1_15","DOIUrl":"https://doi.org/10.1007/978-3-319-30303-1_15","url":null,"abstract":"","PeriodicalId":337718,"journal":{"name":"Foundations and Practice of Security","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130795777","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-10-26DOI: 10.1007/978-3-319-30303-1_1
E. Kranakis, D. Krizanc
{"title":"Optimization Problems in Infrastructure Security","authors":"E. Kranakis, D. Krizanc","doi":"10.1007/978-3-319-30303-1_1","DOIUrl":"https://doi.org/10.1007/978-3-319-30303-1_1","url":null,"abstract":"","PeriodicalId":337718,"journal":{"name":"Foundations and Practice of Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129133857","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-10-26DOI: 10.1007/978-3-319-30303-1_6
Anis Bkakria, F. Cuppens, N. Cuppens-Boulahia, D. Gross-Amblard
{"title":"Security Mechanisms Planning to Enforce Security Policies","authors":"Anis Bkakria, F. Cuppens, N. Cuppens-Boulahia, D. Gross-Amblard","doi":"10.1007/978-3-319-30303-1_6","DOIUrl":"https://doi.org/10.1007/978-3-319-30303-1_6","url":null,"abstract":"","PeriodicalId":337718,"journal":{"name":"Foundations and Practice of Security","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124413615","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-10-26DOI: 10.1007/978-3-319-30303-1_4
Pascal Bissig, P. Brandes, Jonas Passerini, Roger Wattenhofer
{"title":"Inferring Touch from Motion in Real World Data","authors":"Pascal Bissig, P. Brandes, Jonas Passerini, Roger Wattenhofer","doi":"10.1007/978-3-319-30303-1_4","DOIUrl":"https://doi.org/10.1007/978-3-319-30303-1_4","url":null,"abstract":"","PeriodicalId":337718,"journal":{"name":"Foundations and Practice of Security","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121613463","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-10-26DOI: 10.1007/978-3-319-30303-1_9
P. Lafourcade, Maxime Puys
{"title":"Performance Evaluations of Cryptographic Protocols Verification Tools Dealing with Algebraic Properties","authors":"P. Lafourcade, Maxime Puys","doi":"10.1007/978-3-319-30303-1_9","DOIUrl":"https://doi.org/10.1007/978-3-319-30303-1_9","url":null,"abstract":"","PeriodicalId":337718,"journal":{"name":"Foundations and Practice of Security","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122255580","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-10-26DOI: 10.1007/978-3-319-30303-1_10
P. Modesti
{"title":"AnBx: Automatic Generation and Verification of Security Protocols Implementations","authors":"P. Modesti","doi":"10.1007/978-3-319-30303-1_10","DOIUrl":"https://doi.org/10.1007/978-3-319-30303-1_10","url":null,"abstract":"","PeriodicalId":337718,"journal":{"name":"Foundations and Practice of Security","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132971467","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-10-26DOI: 10.1007/978-3-319-30303-1_5
Toomas Krips, J. Willemson
{"title":"Point-Counting Method for Embarrassingly Parallel Evaluation in Secure Computation","authors":"Toomas Krips, J. Willemson","doi":"10.1007/978-3-319-30303-1_5","DOIUrl":"https://doi.org/10.1007/978-3-319-30303-1_5","url":null,"abstract":"","PeriodicalId":337718,"journal":{"name":"Foundations and Practice of Security","volume":"217 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115662658","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-10-26DOI: 10.1007/978-3-319-30303-1_12
M. Alishahi, A. Saracino, M. Mejri, N. Tawbi, F. Martinelli
{"title":"Fast and Effective Clustering of Spam Emails Based on Structural Similarity","authors":"M. Alishahi, A. Saracino, M. Mejri, N. Tawbi, F. Martinelli","doi":"10.1007/978-3-319-30303-1_12","DOIUrl":"https://doi.org/10.1007/978-3-319-30303-1_12","url":null,"abstract":"","PeriodicalId":337718,"journal":{"name":"Foundations and Practice of Security","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115843013","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}