The Community for Technology Leaders
2010 Fifth International Conference on Risks and Security of Internet and Systems (CRiSIS) (2010)
Montreal, QC Canada
Oct. 10, 2010 to Oct. 13, 2010
ISBN: 978-1-4244-8641-0
TABLE OF CONTENTS

Not so fast flux networks for concealing scam servers (Abstract)

Theodore O. Cochran , Nova Southeastern University
James Cannady , Nova Southeastern University
pp. 1-8

Insights from the analysis of the Mariposa botnet (PDF)

Prosenjit Sinha , NCFTA Canada & the Computer Security Laboratory, Concordia University, Montreal, Canada
Amine Boukhtouta , NCFTA Canada & the Computer Security Laboratory, Concordia University, Montreal, Canada
Victor Heber Belarde , NCFTA Canada & the Computer Security Laboratory, Concordia University, Montreal, Canada
Mourad Debbabi , NCFTA Canada & the Computer Security Laboratory, Concordia University, Montreal, Canada
pp. 1-9

SAFE-OS: A secure and usable desktop operating system (PDF)

Francois Lesueur , LRI, University Paris-Sud, Orsay, France
Ala Rezmerita , LRI, University Paris-Sud, Orsay, France
Thomas Herault , LRI, University Paris-Sud, Orsay, France
Sylvain Peyronnet , LRI, University Paris-Sud, Orsay, France
Sebastien Tixeuil , LIP6, UPMC Paris Universitas, Paris, France
pp. 1-7

A multi-view approach for embedded information system security (PDF)

Manuel Munier , LIUPPA, Université de Pau et des Pays de l'Adour, BP 201, 40004 Mont de Marsan, France
pp. 1-8

An intruder model for trust negotiation (PDF)

Philippe Balbiani , CNRS-Université de Toulouse, Institut de recherche en informatique de Toulouse, 118 route de Narbonne, 31062 Toulouse Cedex 9, France
Yannick Chevalier , CNRS-Université de Toulouse, Institut de recherche en informatique de Toulouse, 118 route de Narbonne, 31062 Toulouse Cedex 9, France
Marwa El Houri , CNRS-Université de Toulouse, Institut de recherche en informatique de Toulouse, 118 route de Narbonne, 31062 Toulouse Cedex 9, France
pp. 1-8

Satisfiability of general intruder constraints with a set constructor (PDF)

Tigran Avanesov , Loria-INRIA Grand Est, Nancy, France
Yannick Chevalier , IRIT-Université Paul Sabotier, Toulouse, France
Michael Rusinowitch , Loria-INRIA Grand Est, Nancy, France
Mathieu Turuani , Loria-INRIA Grand Est, Nancy, France
pp. 1-8

Mitigation of topology control traffic attacks in OLSR networks (PDF)

Gimer Cervera , School of Computer Science, Carleton University, K1S 5B6, Ottawa, Ontario, Canada
Michel Barbeau , School of Computer Science, Carleton University, K1S 5B6, Ottawa, Ontario, Canada
Joaquin Garcia-Alfaro , Institut Telecom, Telecom Bretagne, Cesson-Sevigne, 35576, France
Evangelos Kranakis , School of Computer Science, Carleton University, K1S 5B6, Ottawa, Ontario, Canada
pp. 1-8

Solution to the wireless evil-twin transmitter attack (PDF)

Payal Bhatia , School of Computer Science, Carleton University, Ottawa, Ontario K1S 5B6
Christine Laurendeau , School of Computer Science, Carleton University, Ottawa, Ontario K1S 5B6
Michel Barbeau , School of Computer Science, Carleton University, Ottawa, Ontario K1S 5B6
pp. 1-7

Performance assessment of a distributed intrusion detection system in a real network scenario (PDF)

Salvatore D'Antonio , Dipartimento delle Tecnologie - Parthenope University of Napoli, Italy
Valerio Formicola , Dipartimento di Informatica e Sistemistica - Federico II University of Napoli, Italy
Claudio Mazzariello , Dipartimento di Informatica e Sistemistica - Federico II University of Napoli, Italy
Francesco Oliviero , Dipartimento di Informatica e Sistemistica - Federico II University of Napoli, Italy
Simon Pietro Romano , Dipartimento di Informatica e Sistemistica - Federico II University of Napoli, Italy
pp. 1-8

Host-based anomaly detection for pervasive medical systems (PDF)

Biniyam Asfaw , CS Department, Addis Abeba University
Dawit Bekele , Internet Society, African Regional Bureau
B. Eshete , Fondazione Bruno Kessler, (fbk-irst) Trento, Italy
A. Villafiorita , Fondazione Bruno Kessler, (fbk-irst) Trento, Italy
K. Weldemariam , Fondazione Bruno Kessler, (fbk-irst) Trento, Italy
pp. 1-8

A new payment protocol over the Internet (PDF)

Pierre Girard , Gemalto, Avenue du Jujubier - Z. I. Athelia IV, 13705 La Ciotat, France
Karine Villegas , Gemalto, Avenue du Jujubier - Z. I. Athelia IV, 13705 La Ciotat, France
Jean-Louis Lanet , XLIM/DMI/SSD, 83 rue d'Isle, 87000 Limoges, France
Aude Plateaux , XLIM/DMI/SSD, 83 rue d'Isle, 87000 Limoges, France
pp. 1-6

Towards Internet voting security: A threat tree for risk assessment (PDF)

Harold Pardue , School of Computer and Information Sciences, University of South Alabama, Mobile, Alabama, USA
Alec Yasinsac , School of Computer and Information Sciences, University of South Alabama, Mobile, Alabama, USA
Jeffrey Landry , School of Computer and Information Sciences, University of South Alabama, Mobile, Alabama, USA
pp. 1-7
83 ms
(Ver 3.3 (11022016))