Pub Date : 2016-10-24DOI: 10.1007/978-3-319-51966-1_1
Antonio La Marra, F. Martinelli, A. Saracino, M. Alishahi
{"title":"MalProfiler: Automatic and Effective Classification of Android Malicious Apps in Behavioral Classes","authors":"Antonio La Marra, F. Martinelli, A. Saracino, M. Alishahi","doi":"10.1007/978-3-319-51966-1_1","DOIUrl":"https://doi.org/10.1007/978-3-319-51966-1_1","url":null,"abstract":"","PeriodicalId":337718,"journal":{"name":"Foundations and Practice of Security","volume":"118 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131472973","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-24DOI: 10.1007/978-3-319-51966-1_4
Tarek Bouyahia, N. Cuppens-Boulahia, F. Cuppens, F. Autrel
{"title":"Multi-Criteria Recommender Approach for Supporting Intrusion Response System","authors":"Tarek Bouyahia, N. Cuppens-Boulahia, F. Cuppens, F. Autrel","doi":"10.1007/978-3-319-51966-1_4","DOIUrl":"https://doi.org/10.1007/978-3-319-51966-1_4","url":null,"abstract":"","PeriodicalId":337718,"journal":{"name":"Foundations and Practice of Security","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127853138","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-24DOI: 10.1007/978-3-319-51966-1_15
Lyes Bayou, D. Espès, N. Cuppens-Boulahia, F. Cuppens
{"title":"Security Analysis of WirelessHART Communication Scheme","authors":"Lyes Bayou, D. Espès, N. Cuppens-Boulahia, F. Cuppens","doi":"10.1007/978-3-319-51966-1_15","DOIUrl":"https://doi.org/10.1007/978-3-319-51966-1_15","url":null,"abstract":"","PeriodicalId":337718,"journal":{"name":"Foundations and Practice of Security","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115782672","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-24DOI: 10.1007/978-3-319-51966-1_12
R. Khoury, S. Gaboury, Sylvain Hallé
{"title":"Three Views of Log Trace Triaging","authors":"R. Khoury, S. Gaboury, Sylvain Hallé","doi":"10.1007/978-3-319-51966-1_12","DOIUrl":"https://doi.org/10.1007/978-3-319-51966-1_12","url":null,"abstract":"","PeriodicalId":337718,"journal":{"name":"Foundations and Practice of Security","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121500203","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-24DOI: 10.1007/978-3-319-51966-1_23
O. Guillen, F. D. Santis, R. Brederlow, G. Sigl
{"title":"Towards Side-Channel Secure Firmware Updates - A Minimalist Anomaly Detection Approach","authors":"O. Guillen, F. D. Santis, R. Brederlow, G. Sigl","doi":"10.1007/978-3-319-51966-1_23","DOIUrl":"https://doi.org/10.1007/978-3-319-51966-1_23","url":null,"abstract":"","PeriodicalId":337718,"journal":{"name":"Foundations and Practice of Security","volume":"03 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127249815","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-24DOI: 10.1007/978-3-319-51966-1_14
Olivier Blazy, Xavier Bultel, P. Lafourcade
{"title":"Anonymizable Ring Signature Without Pairing","authors":"Olivier Blazy, Xavier Bultel, P. Lafourcade","doi":"10.1007/978-3-319-51966-1_14","DOIUrl":"https://doi.org/10.1007/978-3-319-51966-1_14","url":null,"abstract":"","PeriodicalId":337718,"journal":{"name":"Foundations and Practice of Security","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132350079","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-24DOI: 10.1007/978-3-319-51966-1_7
Salaheddine Zerkane, D. Espès, P. L. Parc, F. Cuppens
{"title":"Vulnerability Analysis of Software Defined Networking","authors":"Salaheddine Zerkane, D. Espès, P. L. Parc, F. Cuppens","doi":"10.1007/978-3-319-51966-1_7","DOIUrl":"https://doi.org/10.1007/978-3-319-51966-1_7","url":null,"abstract":"","PeriodicalId":337718,"journal":{"name":"Foundations and Practice of Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128667766","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-24DOI: 10.1007/978-3-319-51966-1_8
Mickael Emirkanian-Bouchard, Lingyu Wang
{"title":"Towards Metric-Driven, Application-Specific Visualization of Attack Graphs","authors":"Mickael Emirkanian-Bouchard, Lingyu Wang","doi":"10.1007/978-3-319-51966-1_8","DOIUrl":"https://doi.org/10.1007/978-3-319-51966-1_8","url":null,"abstract":"","PeriodicalId":337718,"journal":{"name":"Foundations and Practice of Security","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121614748","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-10-26DOI: 10.1007/978-3-319-30303-1_20
F. Gagnon, Marc-Antoine Ferland, M. Fortier, Simon Desloges, Jonathan Ouellet, Catherine Boileau
{"title":"AndroSSL: A Platform to Test Android Applications Connection Security","authors":"F. Gagnon, Marc-Antoine Ferland, M. Fortier, Simon Desloges, Jonathan Ouellet, Catherine Boileau","doi":"10.1007/978-3-319-30303-1_20","DOIUrl":"https://doi.org/10.1007/978-3-319-30303-1_20","url":null,"abstract":"","PeriodicalId":337718,"journal":{"name":"Foundations and Practice of Security","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131785984","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-10-26DOI: 10.1007/978-3-319-30303-1_13
Fariba Haddadi, A. N. Zincir-Heywood
{"title":"A Closer Look at the HTTP and P2P Based Botnets from a Detector's Perspective","authors":"Fariba Haddadi, A. N. Zincir-Heywood","doi":"10.1007/978-3-319-30303-1_13","DOIUrl":"https://doi.org/10.1007/978-3-319-30303-1_13","url":null,"abstract":"","PeriodicalId":337718,"journal":{"name":"Foundations and Practice of Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130434180","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}