The Community for Technology Leaders
2013 International Conference on Risks and Security of Internet and Systems (CRiSIS) (2012)
Cork, Ireland Ireland
Oct. 10, 2012 to Oct. 12, 2012
ISBN: 978-1-4673-3087-9
TABLE OF CONTENTS
Papers

[Copyright notice] (Abstract)

pp. 1

A vector based model approach for defining trust in Multi-Organization Environments (Abstract)

Mazen El Maarabani , TELECOM & Management SudParis CNRS UMR Samovar, Evry, France
Ana Cavalli , TELECOM & Management SudParis CNRS UMR Samovar, Evry, France
Khalifa Toumi , TELECOM & Management SudParis CNRS UMR Samovar, Evry, France
Cesar Andres , Departamento de Sistemas Informáticos y Computación Universidad Complutense de Madrid, Spain
pp. 1-8

Towards efficient access control in a mobile agent based wireless sensor network (Abstract)

J. Borrell , Dept. of Information and Communications Engineering, Universitat Autònoma de Barcelona
S. N. Foley , Dept. of Computer Science University College Cork
E. Mercadal , Dept. of Information and Communications Engineering, Universitat Autònoma de Barcelona
G. Navarro-Arribas , Dept. of Information and Communications Engineering, Universitat Autònoma de Barcelona
pp. 1-4

Foreword (PDF)

pp. 1
Papers

A honeypot for arbitrary malware on USB storage devices (Abstract)

Sebastian Poeplau , University of Bonn, Institute of Computer Science 4, Friedrich-Ebert-Allee 144, 53113 Bonn
Jan Gassen , Elmar Gerhards-Padilla, Fraunhofer FKIE, Cyber Defense research group, Friedrich-Ebert-Allee 144, 53113 Bonn
pp. 1-8

Evasion-resistant malware signature based on profiling kernel data structure objects (Abstract)

Marcus Matten , Avira Research Department, Avira Operations GmbH& Co. KG
Chen-Ching Liu , Avira Research Department, Avira Operations GmbH& Co. KG
pp. 1-8

Browser function calls modeling for banking malware detection (Abstract)

Manuel Garcia-Cervigon , Computer Networks and Distributed Systems (CNDS), Universitat Politècnica de Catalunya, Barcelona
Manel Medina Llinas , Computer Networks and Distributed Systems (CNDS), Universitat Politècnica de Catalunya, Barcelona
pp. 1-7

Don't work. Can't work? Why it's time to rethink security warnings (Abstract)

M. Angela Sasse , Department of Computer Science, University College London
Kat Krol , Department of Computer Science, Security and Crime Science Doctoral, Research Training Centre (SECReT), University College London
Matthew Moroz , Department of Computer Science, Security and Crime Science Doctoral, Research Training Centre (SECReT), University College London
pp. 1-8

Distributed e-voting using the Smart Card Web Server (Abstract)

Song Dong , Orange Labs, 2nd Floor, Building 10, Chiswick Park, 566 Chiswick High Road, Chiswick, London, W4 5XS
Konstantinos Markantonakis , Smart Card Centre, Information Security Group, Royal Holloway, University of London, Egham, Surrey, TW20 0EX
Keith Mayes , Smart Card Centre, Information Security Group, Royal Holloway, University of London, Egham, Surrey, TW20 0EX
Lazaros Kyrillidis , Smart Card Centre, Information Security Group, Royal Holloway, University of London, Egham, Surrey, TW20 0EX
Sheila Cobourne , Smart Card Centre, Information Security Group, Royal Holloway, University of London, Egham, Surrey, TW20 0EX
pp. 1-8

Anomaly analysis for Physical Access Control security configuration (Abstract)

Barry O'Sullivan , Cork Constraint Computation Centre, Department of Computer Science, University College Cork
Simon N. Foley , Cork Constraint Computation Centre, Department of Computer Science, University College Cork
William M. Fitzgerald , Cork Constraint Computation Centre, Department of Computer Science, University College Cork
Fatih Turkmen , Cork Constraint Computation Centre, Department of Computer Science, University College Cork
pp. 1-8

Security-related vulnerability life cycle analysis (Abstract)

Mohamed Kaaniche , CNRS; LAAS; 7 avenue du colonel Roche, F-31077 Toulouse, France
Geraldine Vache Marconato , CNRS; LAAS; 7 avenue du colonel Roche, F-31077 Toulouse, France
Vincent Nicomette , CNRS; LAAS; 7 avenue du colonel Roche, F-31077 Toulouse, France
pp. 1-8

Semantic matching of web services security policies (Abstract)

Maher Ben Jemaa , ReDCAD Laboratory, National School of Engineers of Sfax, BP 1173, 3038 Sfax, Tunisia
Mohamed Jmaiel , ReDCAD Laboratory, National School of Engineers of Sfax, BP 1173, 3038 Sfax, Tunisia
Tarak Chaari , ReDCAD Laboratory, National School of Engineers of Sfax, BP 1173, 3038 Sfax, Tunisia
Monia Ben Brahim , ReDCAD Laboratory, National School of Engineers of Sfax, BP 1173, 3038 Sfax, Tunisia
pp. 1-8

Managing and accessing data in the cloud: Privacy risks and approaches (Abstract)

Pierangela Samarati , Dipartimento di Informatica, Università degli Studi di Milano, 26013 Crema - Italy
Sabrina De Capitani di Vimercati , Dipartimento di Informatica, Università degli Studi di Milano, 26013 Crema - Italy
Sara Foresti , Dipartimento di Informatica, Università degli Studi di Milano, 26013 Crema - Italy
pp. 1-9

CRiSIS 2012 security standards tutorial (Abstract)

Stephen Farrell , School of Statistics and Computer Science, Trinity College Dublin, Ireland
pp. 1-4

Semiring-based constraint models and frameworks for security-related scenarios (Abstract)

Stefano Bistarelli , Dipartimento di Matematica e Informatica, Università di Perugia, Via Vanvitelli 1, Perugia, Italy
Francesco Santini , Centrum Wiskunde & Informatica, Science Park 123, 1098XG, Amsterdam
pp. 1-4

Attacks against smart cards: Hands on session (Abstract)

Jean-Louis Lanet , SSD - XLIM Labs, University of Limoges, 87000 Limoges, France
pp. 1-5

Modeling the Stuxnet attack with BDMP: Towards more formal risk assessments (Abstract)

Ludovic Pietre-Cambacedes , Electricité de France (EDF), R&D Clamart 92141, France
Siwar Kriaa , Grenoble Institute of Technology, Grenoble 38402, France
Marc Bouissou , École Centrale de Paris, Châtenay-Malabry 92295, France
pp. 1-8

Detecting attacks against data in web applications (Abstract)

Yann Bachy , CNRS, LAAS, 7 Avenue du Colonel Roche, F-31400 Toulouse, France
Rim Akrout , CNRS, LAAS, 7 Avenue du Colonel Roche, F-31400 Toulouse, France
Eric Alata , CNRS, LAAS, 7 Avenue du Colonel Roche, F-31400 Toulouse, France
Mohamed Kaaniche , CNRS, LAAS, 7 Avenue du Colonel Roche, F-31400 Toulouse, France
Vincent Nicomette , CNRS, LAAS, 7 Avenue du Colonel Roche, F-31400 Toulouse, France
Frederic Tronel , Supélec, Avenue de la Boulaie, 35576 Cesson-Sevigné, France
Romaric Ludinard , Supélec, Avenue de la Boulaie, 35576 Cesson-Sevigné, France
Eric Totel , Supélec, Avenue de la Boulaie, 35576 Cesson-Sevigné, France
pp. 1-8

Partitioning the Internet (Abstract)

Ramakrishna Thurimella , University of Denver
Matthias Wachs , TU München
Christian Grothoff , TU München
pp. 1-8

Improving the detection of on-line vertical port scan in IP traffic (Abstract)

Philippe Robert , INRIA Paris Rocquencourt, Domaine de Voluceau 78153 Le Chesnay, France
Yousra Chabchoub , ISEP, 21 rue d'assas 75006 Paris
Christine Fricker , INRIA Paris Rocquencourt, Domaine de Voluceau 78153 Le Chesnay, France
pp. 1-6

Hash pile ups: Using collisions to identify unknown hash functions (Abstract)

David Malone , Hamilton Institute, National University of Ireland, Ireland
R. Joshua Tobin , School of Mathematics, Trinity College Dublin, Ireland
pp. 1-6

Investigating the dark cyberspace: Profiling, threat-based analysis and correlation (Abstract)

Mourad Debbabi , NCFTA Canada and Concordia Institute for Information Systems Engineering, Concordia University, Montreal, Quebec, Canada
Farkhund Iqbal , NCFTA Canada and Concordia Institute for Information Systems Engineering, Concordia University, Montreal, Quebec, Canada
Amine Boukhtouta , NCFTA Canada and Concordia Institute for Information Systems Engineering, Concordia University, Montreal, Quebec, Canada
Son Dinh , NCFTA Canada and Concordia Institute for Information Systems Engineering, Concordia University, Montreal, Quebec, Canada
Claude Fachkha , NCFTA Canada and Concordia Institute for Information Systems Engineering, Concordia University, Montreal, Quebec, Canada
Elias Bou-Harb , NCFTA Canada and Concordia Institute for Information Systems Engineering, Concordia University, Montreal, Quebec, Canada
pp. 1-8

[Front cover] (Abstract)

pp. c1

Foreword (Abstract)

pp. 1

Conference organization (Abstract)

pp. 1-2
90 ms
(Ver )