Description |
1 online resource |
Series |
Lecture notes in computer science, 0302-9743 ; 11559 |
|
LNCS Sublibrary: SL3 - Information systems and applications, incl. internet/web, and HCI |
|
Lecture notes in computer science ; 11559.
|
|
LNCS sublibrary. SL 3, Information systems and applications, incl. Internet/Web, and HCI.
|
Contents |
[I]. Attacks: Detecting adversarial attacks in the context of Bayesian networks / Emad Alsuwat, Hatim Alsuwat, John Rose, Marco Valtorta, and Csilla Farkas -- AGBuilder : an AI tool for automated attack graph building, analysis, and refinement / Bruhadeshwar Bezawada, Indrajit Ray, and Kushagra Tiwary -- On practical aspects of PCFG password cracking / Radek Hranický, Filip Lištiak, Dávid Mikuš, and Ondřej Ryšavý -- That's my DNA : detecting malicious tampering of synthesized DNA / Diptendu Mohan Kar and Indrajit Ray |
|
[II]. Mobile and web security: Adversarial sampling attacks against phishing detection / Hossein Shirazi, Bruhadeshwar Bezawada, Indrakshi Ray, and Charles Anderson -- Is my phone listening in? On the feasibility and detectability of mobile eavesdropping / Jacob Leon Kröger and Philip Raschke -- Droids in disarray : detecting frame confusion in hybrid Android apps / Davide Caputo, Luca Verderame, Simone Aonzo, and Alessio Merlo |
|
[III]. Privacy: Geo-graph-indistinguishability : protecting location privacy for LBS over road networks / Shun Takagi, Yang Cao, Yasuhito Asano, and Masatoshi Yoshikawa -- "When and where do you want to hide?" : recommendation of location privacy preferences with local differential privacy / Maho Asada, Masatoshi Yoshikawa, and Yang Cao -- Analysis of privacy policies to enhance informed consent / Raúl Pardo and Daniel Le Métayer |
|
[IV]. Security protocol practices: Lost in TLS? No more! Assisted deployment of secure TLS configurations / Salvatore Manfredi, Silvio Ranise, and Giada Sciarretta -- Contributing to current challenges in identity and access management with visual analytics / Alexander Puchta, Fabian Böhm, and Günther Pernul -- Analysis of multi-path Onion routing-based anonymization networks / Wladimir De la Cadena, Daniel Kaiser, Asya Mitseva, Andriy Panchenko, and Thomas Engel |
|
[V]. Distributed systems: Shoal : query optimization and operator placement for access controlled stream processing systems / Cory Thoma, Alexandros Labrinidis, and Adam J. Lee -- A distributed ledger approach to digital twin secure data sharing / Marietheres Dietz, Benedikt Putz, and Günther Pernul -- Refresh instead of revoke enhances safety and availability : a formal analysis / Mehrnoosh Shakarami and Ravi Sandhu |
|
[VI]. Source code security: Wrangling in the power of code pointers with ProxyCFI / Misiker Tadesse Aga, Colton Holoday, and Todd Austin -- CASFinder : detecting common attack surface / Mengyuan Zhang, Yue Xin, Lingyu Wang, Sushil Jajodia, and Anoop Singhal -- Algorithm diversity for resilient systems / Scott D. Stoller and Yanhong A. Liu |
|
[VII]. Malware: Online malware detection in cloud auto-scaling systems using shallow convolutional neural networks / Mahmoud Abdelsalam, Ram Krishnan, and Ravi Sandhu -- Redirecting malware's target selection with decoy processes / Sara Sutton, Garret Michilli, and Julian Rrushi |
Summary |
This book constitutes the refereed proceedings of the 33rd Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy, DBSec 2019, held in Charleston, SC, USA, in July 2018. The 21 full papers presented were carefully reviewed and selected from 52 submissions. The papers present high-quality original research from academia, industry, and government on theoretical and practical aspects of information security. They are organized in topical sections on attacks, mobile and Web security, privacy, security protocol practices, distributed systems, source code security, and malware. -- Provided by publisher |
Bibliography |
Includes bibliographical references and index |
Notes |
Online resource; title from digital title page (viewed on August 02, 2019) |
Subject |
Computer security -- Congresses
|
|
Application software -- Congresses
|
|
Data protection -- Congresses
|
|
Internet -- Security measures -- Congresses
|
|
Application software
|
|
Computer security
|
|
Data protection
|
|
Internet -- Security measures
|
Genre/Form |
proceedings (reports)
|
|
Conference papers and proceedings
|
|
Conference papers and proceedings.
|
|
Actes de congrès.
|
Form |
Electronic book
|
Author |
Foley, Simon N., editor.
|
ISBN |
9783030224790 |
|
3030224791 |
|
9783030224806 |
|
3030224805 |
|