Pub Date : 2017-10-23DOI: 10.1007/978-3-319-75650-9_16
A. Ferrante, M. Malek, F. Martinelli, F. Mercaldo, Jelena Milosevic
{"title":"Extinguishing Ransomware - A Hybrid Approach to Android Ransomware Detection","authors":"A. Ferrante, M. Malek, F. Martinelli, F. Mercaldo, Jelena Milosevic","doi":"10.1007/978-3-319-75650-9_16","DOIUrl":"https://doi.org/10.1007/978-3-319-75650-9_16","url":null,"abstract":"","PeriodicalId":337718,"journal":{"name":"Foundations and Practice of Security","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133791623","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-10-23DOI: 10.1007/978-3-319-75650-9_11
Mohamed Recem Boussaha, R. Khoury, Sylvain Hallé
{"title":"Monitoring of Security Properties Using BeepBeep","authors":"Mohamed Recem Boussaha, R. Khoury, Sylvain Hallé","doi":"10.1007/978-3-319-75650-9_11","DOIUrl":"https://doi.org/10.1007/978-3-319-75650-9_11","url":null,"abstract":"","PeriodicalId":337718,"journal":{"name":"Foundations and Practice of Security","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126536107","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-10-23DOI: 10.1007/978-3-319-75650-9_12
Konrad-Felix Krentz, C. Meinel, Hendrik Graupner
{"title":"More Lightweight, yet Stronger 802.15.4 Security Through an Intra-layer Optimization","authors":"Konrad-Felix Krentz, C. Meinel, Hendrik Graupner","doi":"10.1007/978-3-319-75650-9_12","DOIUrl":"https://doi.org/10.1007/978-3-319-75650-9_12","url":null,"abstract":"","PeriodicalId":337718,"journal":{"name":"Foundations and Practice of Security","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117024643","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-10-23DOI: 10.1007/978-3-319-75650-9_9
Maxime Puys, Marie-Laure Potet, Abdelaziz Khaled
{"title":"Generation of Applicative Attacks Scenarios Against Industrial Systems","authors":"Maxime Puys, Marie-Laure Potet, Abdelaziz Khaled","doi":"10.1007/978-3-319-75650-9_9","DOIUrl":"https://doi.org/10.1007/978-3-319-75650-9_9","url":null,"abstract":"","PeriodicalId":337718,"journal":{"name":"Foundations and Practice of Security","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127644397","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-10-23DOI: 10.1007/978-3-319-75650-9_2
Richard Gay, Jinwei Hu, H. Mantel, Sogol Mazaheri
{"title":"Relationship-Based Access Control for Resharing in Decentralized Online Social Networks","authors":"Richard Gay, Jinwei Hu, H. Mantel, Sogol Mazaheri","doi":"10.1007/978-3-319-75650-9_2","DOIUrl":"https://doi.org/10.1007/978-3-319-75650-9_2","url":null,"abstract":"","PeriodicalId":337718,"journal":{"name":"Foundations and Practice of Security","volume":"10 26","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120969950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-07-10DOI: 10.1007/978-3-319-75650-9_4
Elliott Blot, Jannik Dreier, P. Lafourcade
{"title":"Formal Analysis of Combinations of Secure Protocols","authors":"Elliott Blot, Jannik Dreier, P. Lafourcade","doi":"10.1007/978-3-319-75650-9_4","DOIUrl":"https://doi.org/10.1007/978-3-319-75650-9_4","url":null,"abstract":"","PeriodicalId":337718,"journal":{"name":"Foundations and Practice of Security","volume":"5 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128748372","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-24DOI: 10.1007/978-3-319-51966-1_18
Erkan Ersan, Lior Malka, B. Kapron
{"title":"Semantically Non-preserving Transformations for Antivirus Evaluation","authors":"Erkan Ersan, Lior Malka, B. Kapron","doi":"10.1007/978-3-319-51966-1_18","DOIUrl":"https://doi.org/10.1007/978-3-319-51966-1_18","url":null,"abstract":"","PeriodicalId":337718,"journal":{"name":"Foundations and Practice of Security","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126078845","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-24DOI: 10.1007/978-3-319-51966-1_10
T. Saha, Takeshi Koshiba
{"title":"An Enhancement of Privacy-Preserving Wildcards Pattern Matching","authors":"T. Saha, Takeshi Koshiba","doi":"10.1007/978-3-319-51966-1_10","DOIUrl":"https://doi.org/10.1007/978-3-319-51966-1_10","url":null,"abstract":"","PeriodicalId":337718,"journal":{"name":"Foundations and Practice of Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132707575","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-24DOI: 10.1007/978-3-319-51966-1_16
Guillaume Bonfante, Julien Oury Nogues
{"title":"Function Classification for the Retro-Engineering of Malwares","authors":"Guillaume Bonfante, Julien Oury Nogues","doi":"10.1007/978-3-319-51966-1_16","DOIUrl":"https://doi.org/10.1007/978-3-319-51966-1_16","url":null,"abstract":"","PeriodicalId":337718,"journal":{"name":"Foundations and Practice of Security","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123669336","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-24DOI: 10.1007/978-3-319-51966-1_6
Zhongtian Chen, Hao Han
{"title":"Attack Mitigation by Data Structure Randomization","authors":"Zhongtian Chen, Hao Han","doi":"10.1007/978-3-319-51966-1_6","DOIUrl":"https://doi.org/10.1007/978-3-319-51966-1_6","url":null,"abstract":"","PeriodicalId":337718,"journal":{"name":"Foundations and Practice of Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122140004","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}