The Community for Technology Leaders
2015 International Conference on Information Systems Security and Privacy (ICISSP) (2015)
Angers, France
Feb. 9, 2015 to Feb. 11, 2015
ISBN: 978-1-4673-8405-6
TABLE OF CONTENTS

[Front cover] (PDF)

pp. c1

[Title page] (PDF)

pp. 1-2

Brief contents (PDF)

pp. III

Program committee (PDF)

pp. VI-VIII

Foreword (PDF)

pp. IX-X

Contents (PDF)

pp. XI-XIV

[Blank page] (PDF)

pp. 1

[Blank page] (PDF)

pp. 1

A posteriori process security control (PDF)

Rafael Accorsi , University of Freiburg, Germany
pp. 0

[Blank page] (PDF)

pp. 1

[Blank page] (PDF)

pp. 1

[Blank page] (PDF)

pp. 1

[Blank page] (PDF)

pp. 1

A new science of security decision making (PDF)

Patrick McDaniel , Penn State University, U.S.A
pp. 0

[Blank page] (PDF)

pp. 1

[Blank page] (PDF)

pp. 1

[Blank page] (PDF)

pp. 1

[Blank page] (PDF)

pp. 1

Full papers (PDF)

pp. 1

[Blank page] (PDF)

pp. 1

Understanding information technology security standards diffusion: An institutional perspective (Abstract)

Sylvestre Uwizeyemungu , Département des Sciences Comptables, UQTR, 3351, boul. des Forges, Trois-Rivières (Québec), Canada
Placide Poba-Nzaou , Département d'Organisation et Ressources Humaines, ÉSG UQAM, 315, Ste-Catherine Est, Montréal (Qc), Canada
pp. 5-16

Malfinder: Accelerated malware classification system through filtering on manycore system (Abstract)

Taegyu Kim , Korea Advanced Institute of Science and Technology (KAIST), Daejeon, Republic of Korea
Woomin Hwang , Korea Advanced Institute of Science and Technology (KAIST), Daejeon, Republic of Korea
Chulmin Kim , Korea Advanced Institute of Science and Technology (KAIST), Daejeon, Republic of Korea
Dong-Jae Shin , Korea Advanced Institute of Science and Technology (KAIST), Daejeon, Republic of Korea
Ki-Woong Park , Daejeon University, Daejeon, Republic of Korea
Kyu Ho Park , Korea Advanced Institute of Science and Technology (KAIST), Daejeon, Republic of Korea
pp. 1-10

A structural and content-based approach for a precise and robust detection of malicious PDF files (Abstract)

Davide Maiorca , Department of Electrical and Electronic Engineering, University of Cagliari, Cagliari, Italy
Davide Ariu , Department of Electrical and Electronic Engineering, University of Cagliari, Cagliari, Italy
Igino Corona , Department of Electrical and Electronic Engineering, University of Cagliari, Cagliari, Italy
Giorgio Giacinto , Department of Electrical and Electronic Engineering, University of Cagliari, Cagliari, Italy
pp. 27-36

Short papers (PDF)

pp. 1

[Blank page] (PDF)

pp. 1

Optimizing cryptographically based security in wireless networks (Abstract)

Stuart Jacobs , Computer Science Department, Metropolitan College, Boston University, 808 Commonwealth Ave., Boston, MA, U.S.A.
pp. 39-45

Evaluation of the anonymous I2P network's design choices against performance and security (Abstract)

Juan Pablo Timpanaro , TELECOM Nancy, Université de Lorraine, INRIA/LORIA UMR 7503, Vand?uvre-lès-Nancy, F-54602, France
Thibault Cholez , TELECOM Nancy, Université de Lorraine, INRIA/LORIA UMR 7503, Vand?uvre-lès-Nancy, F-54602, France
Isabelle Chrisment , TELECOM Nancy, Université de Lorraine, INRIA/LORIA UMR 7503, Vand?uvre-lès-Nancy, F-54602, France
Olivier Festor , TELECOM Nancy, Université de Lorraine, INRIA/LORIA UMR 7503, Vand?uvre-lès-Nancy, F-54602, France
pp. 1-10

Assessing information security risks of AMI: What makes it so difficult? (Abstract)

Inger Anne Tondel , SINTEFICT, Trondheim, Norway
Maria B. Line , SINTEFICT, Trondheim, Norway
Gorm Johansen , SINTEFICT, Trondheim, Norway
pp. 56-63

Analyzing quality criteria in role-based identity and access management (Abstract)

Michael Kunz , University of Regensburg, Regensburg, Germany
Ludwig Fuchs , University of Regensburg, Regensburg, Germany
Michael Netter , University of Regensburg, Regensburg, Germany
Gunther Pernul , University of Regensburg, Regensburg, Germany
pp. 1-9

A novel model of security policies and requirements (Abstract)

Preetam Mukherjee , Centre for Distributed Computing, Jadavpur University, Kolkata, India
Chandan Mazumdar , Department of Computer Sc. & Engg., Jadavpur University, Kolkata, India
pp. 73-82

Vulnerability analysis using network timestamps in full virtualization virtual machine (Abstract)

M. Noorafiza , Graduate School of Computer Science, Tokyo University of Technology, 1404-1 Katakuramachi, Hachioji Tokyo, Japan
H. Maeda , Graduate School of Computer Science, Tokyo University of Technology, 1404-1 Katakuramachi, Hachioji Tokyo, Japan
R. Uda , Graduate School of Computer Science, Tokyo University of Technology, 1404-1 Katakuramachi, Hachioji Tokyo, Japan
T. Kinoshita , Graduate School of Computer Science, Tokyo University of Technology, 1404-1 Katakuramachi, Hachioji Tokyo, Japan
M. Shiratori , Graduate School of Computer Science, Tokyo University of Technology, 1404-1 Katakuramachi, Hachioji Tokyo, Japan
pp. 83-89

Clustering spam emails into campaigns (Abstract)

Mina Sheikh Alishahi , Department of Computer science, University Laval, Quebec City, Canada
Mohamed Mejri , Department of Computer science, University Laval, Quebec City, Canada
Nadia Tawbi , Department of Computer science, University Laval, Quebec City, Canada
pp. 90-97

On detection of bitcoin mining redirection attacks (Abstract)

Nicolas T. Courtois , Computer Science, University College London, London, U.K.
Pinar Emirdag , Independent Market Structure Professional, London, U.K.
Zhouyixing Wang , Computer Science, University College London, London, U.K.
pp. 98-105

Implementation and analysis of Dutch-style sealed-bid auctions computational vs unconditional security (Abstract)

Sriram Krishnamachari , Department of Computer Science, Southern Illinois University Carbondale, Illinois, U.S.A
Mehrdad Nojoumian , Department of Computer Science, Southern Illinois University Carbondale, Illinois, U.S.A
Kemal Akkaya , Department of Electrical and Computer Engineering, Florida International University, Florida, U.S.A
pp. 1-8

Defeating DDoS using Productive Puzzles (Abstract)

Mehmud Abliz , Department of Computer Science, University of Pittsburgh, Pittsburgh, PA, U.S.A
Taieb F. Znati , Department of Computer Science, University of Pittsburgh, Pittsburgh, PA, U.S.A
pp. 114-123

HIDE: Hybrid symmetric key algorithm for integrity check, dynamic key generation and encryption (Abstract)

Jayagopal Narayanaswamy , Faculty of Computer Science, Dalhousie University, Halifax, Nova Scotia, Canada
Raghav V. Sampangi , Faculty of Computer Science, Dalhousie University, Halifax, Nova Scotia, Canada
Srinivas Sampalli , Faculty of Computer Science, Dalhousie University, Halifax, Nova Scotia, Canada
pp. 124-131

Modelling of enterprise insider threats (Abstract)

Puloma Roy , Centre for Distributed Computing, Jadavpur University, Kolkata, India
Chandan Mazumdar , Centre for Distributed Computing, Jadavpur University, Kolkata, India
pp. 132-136

ICS/SCADA security analysis of a Beckhoff CX5020 PLC (Abstract)

Gregor Bonney , FH Aachen, University of Applied Sciences, Eupenerstr. 70, Aachen, Germany
Hans Hofken , FH Aachen, University of Applied Sciences, Eupenerstr. 70, Aachen, Germany
Benedikt Paffen , FH Aachen, University of Applied Sciences, Eupenerstr. 70, Aachen, Germany
Marko Schuba , FH Aachen, University of Applied Sciences, Eupenerstr. 70, Aachen, Germany
pp. 1-6

Trust (PDF)

pp. 1

[Blank page] (PDF)

pp. 1

Short papers (PDF)

pp. 1

[Blank page] (PDF)

pp. 1

Filtering unfair users a Hidden Markov Model approach (Abstract)

Bushra Anjum , Computer Science Department, Missouri University of Science and Technology, Rolla, U.S.A.
Manish Rajangam , Computer Science Department, North Carolina State University, Raleigh U.S.A.
Harry Perros , Computer Science Department, North Carolina State University, Raleigh U.S.A.
Wenjuan Fan , School of Management, Hefei University of Technology, Anhui, China
pp. 147-154

A policy-based communications architecture for vehicles (Abstract)

Vassilis Prevelakis , Institute of Computer and Network Engineering (IDA), Technische Universität Braunschweig, Germany
Mohammad Hamad , Institute of Computer and Network Engineering (IDA), Technische Universität Braunschweig, Germany
pp. 155-162

Research ethics and public trust, preconditions for continued growth of internet mediated research: Public confidence in internet mediate research (Abstract)

Angar Koene , HORIZON Digital Economy Research, University of Nottingham, Nottingham, United Kingdom
Elvira Perez , HORIZON Digital Economy Research, University of Nottingham, Nottingham, United Kingdom
Christopher J. Carter , HORIZON Digital Economy Research, University of Nottingham, Nottingham, United Kingdom
Ramona Statache , HORIZON Digital Economy Research, University of Nottingham, Nottingham, United Kingdom
Svenja Adolphs , HORIZON Digital Economy Research, University of Nottingham, Nottingham, United Kingdom
Claire O'Malley , HORIZON Digital Economy Research, University of Nottingham, Nottingham, United Kingdom
Tom Rodden , HORIZON Digital Economy Research, University of Nottingham, Nottingham, United Kingdom
Derek McAuley , HORIZON Digital Economy Research, University of Nottingham, Nottingham, United Kingdom
pp. 163-168

[Blank page] (PDF)

pp. 1

Full papers (PDF)

pp. 1

[Blank page] (PDF)

pp. 1

Model-driven privacy assessment in the smart grid (Abstract)

Fabian Knirsch , Josef Ressel Center for User-Centric Smart Grid Privacy, Security and Control, Salzburg University of Applied Sciences, Urstein Sued 1, A-5412 Puch/Salzburg, Austria
Dominik Engel , Josef Ressel Center for User-Centric Smart Grid Privacy, Security and Control, Salzburg University of Applied Sciences, Urstein Sued 1, A-5412 Puch/Salzburg, Austria
Cristian Neureiter , Josef Ressel Center for User-Centric Smart Grid Privacy, Security and Control, Salzburg University of Applied Sciences, Urstein Sued 1, A-5412 Puch/Salzburg, Austria
Marc Frincu , Ming-Hsieh Department of Electrical Engineering, University of Southern California, Los Angeles, U.S.A.
Viktor Prasanna , Ming-Hsieh Department of Electrical Engineering, University of Southern California, Los Angeles, U.S.A.
pp. 1-9

A scratch-based graphical policy editor for XACML (Abstract)

Henrik Nergaard , Institute of Information and Communication Technology, University of Agder, Jon Lilletuns vei 9, 4879 Grimstad, Norway
Nils Ulltveit-Moe , Institute of Information and Communication Technology, University of Agder, Jon Lilletuns vei 9, 4879 Grimstad, Norway
Terje Gjosaeter , Institute of Information and Communication Technology, University of Agder, Jon Lilletuns vei 9, 4879 Grimstad, Norway
pp. 1-9

Adaptive buffer resizing for efficient anonymization of streaming data with minimal information loss (Abstract)

Aderonke Busayo Sakpere , Department of Computer Science, University of Cape Town, Cape Town, South Africa
Anne V. D. M. Kayem , Department of Computer Science, University of Cape Town, Cape Town, South Africa
pp. 1-11

[Blank page] (PDF)

pp. 1

Short papers (PDF)

pp. 1

[Blank page] (PDF)

pp. 1

Private web search with constant round efficiency (Abstract)

Bolam Kang , Department of Information Security, The University of Suwon, Hwaseong, 445-743 South Korea
Sung Cheol Goh , Department of Information Security, The University of Suwon, Hwaseong, 445-743 South Korea
Myungsun Kim , Department of Information Security, The University of Suwon, Hwaseong, 445-743 South Korea
pp. 205-212

Expansions of CHAP: Modificationless on its structures of packet and data exchange (Abstract)

Masaki Inamura , Division of Information System Design, Department of Science and Engineering, Tokyo Denki University, Ishizaka, Hatoyama-machi, Hiki-gun, Saitama, Japan
pp. 1-8

Performance-optimized indexes for inequality searches on encrypted data in practice (Abstract)

Jan Lehnhardt , Department of Security and System Architecture, CGMAG, Koblenz, Germany
Tobias Rho , Department of Security and System Architecture, CGMAG, Koblenz, Germany
Adrian Spalka , Department of Security and System Architecture, CGMAG, Koblenz, Germany
Armin B. Cremers , Department of Computer Science III, University of Bonn, Bonn, Germany
pp. 221-229

Malware classification method based on sequence of traffic flow (Abstract)

Hyoyoung Lim , Graduate School of Information Science, Nagoya University, Furo-cho, Chikusa-ku, Nagoya, Japan
Yukiko Yamaguchi , Information Technology Center, Nagoya University, Furo-cho, Chikusa-ku, Nagoya, Japan
Hajime Shimada , Information Technology Center, Nagoya University, Furo-cho, Chikusa-ku, Nagoya, Japan
Hiroki Takakura , Information Technology Center, Nagoya University, Furo-cho, Chikusa-ku, Nagoya, Japan
pp. 1-8

Bilinear pairing-based hybrid mixnet with anonymity revocation (Abstract)

Andrea Huszti , Faculty of Informatics, University of Debrecen, Kassai street 26., Debrecen, Hungary
Zita Kovacs , Faculty of Informatics, University of Debrecen, Kassai street 26., Debrecen, Hungary
pp. 238-245

Privacy and security concern of online social networks from user perspective (Abstract)

Al Amin Hossain , Department of Computer Science, The University of Texas at San Antonio, San Antonio, Texas, U.S.A
Weining Zhang , Department of Computer Science, The University of Texas at San Antonio, San Antonio, Texas, U.S.A
pp. 246-253

[Blank page] (PDF)

pp. 1

[Blank page] (PDF)

pp. 1

Full papers (PDF)

pp. 1

[Blank page] (PDF)

pp. 1

A novel anonymous authenticated key agreement protocol for vehicular ad hoc networks (Abstract)

Carsten Buttner , Advanced Technology, Adam Opel AG, Rüsselsheim, Germany
Sorin A. Huss , Integrated Circuits and Systems Lab, Technische Universität Darmstadt, Darmstadt, Germany
pp. 259-269

Multi-sensor authentication to improve smartphone security (Abstract)

Wei-Han Lee , Princeton Architecture Lab for Multimedia and Security (PALMS), Department of Electrical Engineering, Princeton University, Princeton, NJ, U.S.A.
Ruby B. Lee , Princeton Architecture Lab for Multimedia and Security (PALMS), Department of Electrical Engineering, Princeton University, Princeton, NJ, U.S.A.
pp. 1-11

Short paper (PDF)

pp. 1

[Blank page] (PDF)

pp. 1

On the power consumption of cryptographic processors in civil microdrones (Abstract)

Abdulhadi Shoufan , Electrical and Computer Engineering Department, Khalifa University, Abu Dhabi, U.A.E
Hassan Alnoon , Advanced Technology Consultancy L.L.C, Emirates Advanced Investment Group L.L.C, Abu Dhabi, U.A.E
Joonsang Baek , Electrical and Computer Engineering Department, Khalifa University, Abu Dhabi, U.A.E
pp. 283-290

[Blank page] (PDF)

pp. 1

Full papers (PDF)

pp. 1

[Blank page] (PDF)

pp. 1

The palm vein graph feature extraction and matching (Abstract)

Arathi Arakala , School of Mathematical and Geospatial Sciences, RMIT University, Melbourne, Australia
Hao Hao , School of Mathematical and Geospatial Sciences, RMIT University, Melbourne, Australia
Stephen Davis , School of Mathematical and Geospatial Sciences, RMIT University, Melbourne, Australia
K. J. Horadam , School of Mathematical and Geospatial Sciences, RMIT University, Melbourne, Australia
pp. 1-9

Balancing is the key: Performing finger vein template protection using fuzzy commitment (Abstract)

Melanie Favre , Morpho, Issy-les-Moulineaux, France
Sylvaine Picard , Safran, Magny-les-Hameaux, France
Julien Bringer , Morpho, Issy-les-Moulineaux, France
Herve Chabanne , Morpho, Issy-les-Moulineaux, France
pp. 1-8

[Blank page] (PDF)

pp. 1

Short papers (PDF)

pp. 1

[Blank page] (PDF)

pp. 1

Quality assessment of fingerprints with minutiae delaunay triangulation (Abstract)

Z. Yao , Universite de Caen Basse Normandie, ENSICAEN, UMR 6072 GREYC, Caen, France
J. Le bars , Universite de Caen Basse Normandie, ENSICAEN, UMR 6072 GREYC, Caen, France
C. Charrier , Universite de Caen Basse Normandie, ENSICAEN, UMR 6072 GREYC, Caen, France
C. Rosenberger , Universite de Caen Basse Normandie, ENSICAEN, UMR 6072 GREYC, Caen, France
pp. 315-321

The smartphone as a gait recognition device impact of selected parameters on gait recognition (Abstract)

Josselyn Le Moing , School of Computing and Mathematics, Plymouth University, Plymouth, U.K
Ingo Stengel , School of Computing and Mathematics, Plymouth University, Plymouth, U.K
pp. 322-328

EvaBio platform for the evaluation biometric system: Application to the optimization of the enrollment process for fingerprints devices (Abstract)

B. Vibert , ENSICAEN, 3UMR 6072 GREYC, F-14032 Caen, France
Z. Yao , ENSICAEN, 3UMR 6072 GREYC, F-14032 Caen, France
S. Vernois , ENSICAEN, 3UMR 6072 GREYC, F-14032 Caen, France
J-M. Le Bars , UNICAEN, 3UMR 6072 GREYC, F-14032 Caen, France
C. Charrier , UNICAEN, 3UMR 6072 GREYC, F-14032 Caen, France
C. Rosenberger , ENSICAEN, 3UMR 6072 GREYC, F-14032 Caen, France
pp. 329-335

Defeating DDoS using productive puzzles (Abstract)

Mehmud Abliz , Department of Computer Science, University of Pittsburgh, Pittsburgh, PA, U.S.A
Taieb F. Znati , Department of Computer Science, University of Pittsburgh, Pittsburgh, PA, U.S.A
pp. 114-123

[Blank page] (PDF)

pp. 1

Author index (PDF)

pp. 1-2

[Back cover] (PDF)

pp. c4
92 ms
(Ver 3.3 (11022016))