The Community for Technology Leaders
2013 IEEE Security and Privacy Workshops (2013)
San Francisco, CA
May 23, 2013 to May 24, 2013
ISBN: 978-1-4799-0458-7
TABLE OF CONTENTS

[Front cover] (PDF)

pp. C4

[Title page iii] (PDF)

pp. iii

Table of contents (PDF)

pp. v-vii

Log Design for Accountability (Abstract)

Denis Butin , INSA-Lyon, Univ. de Lyon, Villeurbanne, France
Marcos Chicote , INSA-Lyon, Univ. de Lyon, Villeurbanne, France
Daniel Le Metayer , INSA-Lyon, Univ. de Lyon, Villeurbanne, France
pp. 1-7

An Integrated Formal Approach to Usage Control (Abstract)

P. A. Bonatti , Dept. of Electr. Eng. & Inf. Technol., Univ. di Napoli Federico II, Naples, Italy
L. Sauro , Dept. of Electr. Eng. & Inf. Technol., Univ. di Napoli Federico II, Naples, Italy
M. Faella , Dept. of Electr. Eng. & Inf. Technol., Univ. di Napoli Federico II, Naples, Italy
C. Galdi , Dept. of Electr. Eng. & Inf. Technol., Univ. di Napoli Federico II, Naples, Italy
pp. 8-12

How Usage Control and Provenance Tracking Get Together - A Data Protection Perspective (Abstract)

Christoph Bier , Fraunhofer Inst. of Optronics, Syst. Technol. & Image Exploitation, Karlsruhe, Germany
pp. 13-17

The Cloud Needs Cross-Layer Data Handling Annotations (Abstract)

Martin Henze , Commun. & Distrib. Syst., RWTH Aachen Univ., Aachen, Germany
Rene Hummen , Commun. & Distrib. Syst., RWTH Aachen Univ., Aachen, Germany
Klaus Wehrle , Commun. & Distrib. Syst., RWTH Aachen Univ., Aachen, Germany
pp. 18-22

Privacy Preserving Data Analytics for Smart Homes (Abstract)

Antorweep Chakravorty , Dept. of Comput. & Electr. Eng., Univ. of Stavanger, Stavanger, Norway
Tomasz Wlodarczyk , Dept. of Comput. & Electr. Eng., Univ. of Stavanger, Stavanger, Norway
Chunming Rong , Dept. of Comput. & Electr. Eng., Univ. of Stavanger, Stavanger, Norway
pp. 23-27

Preventive Inference Control in Data-centric Business Models (Abstract)

Rafael Accorsi , Univ. of Freiburg, Freiburg, Germany
Gunter Muller , Univ. of Freiburg, Freiburg, Germany
pp. 28-33

"I hereby leave my email to...": Data Usage Control and the Digital Estate (Abstract)

Stephan Micklitz , Google, Munich, Germany
Martin Ortlieb , Google, Zurich, Switzerland
Jessica Staddon , Google, Mountain View, CA, USA
pp. 42-44

Multi-Domain Information Fusion for Insider Threat Detection (Abstract)

Hoda Eldardiry , Palo Alto Res. Center (PARC), Palo Alto, CA, USA
Evgeniy Bart , Palo Alto Res. Center (PARC), Palo Alto, CA, USA
Juan Liu , Palo Alto Res. Center (PARC), Palo Alto, CA, USA
John Hanley , Palo Alto Res. Center (PARC), Palo Alto, CA, USA
Bob Price , Palo Alto Res. Center (PARC), Palo Alto, CA, USA
Oliver Brdiczka , Palo Alto Res. Center (PARC), Palo Alto, CA, USA
pp. 45-51

System Level User Behavior Biometrics using Fisher Features and Gaussian Mixture Models (Abstract)

Yingbo Song , Allure Security Technol. Inc., New York, NY, USA
Malek Ben Salem , Accenture Technol. Labs., Arlington, VA, USA
Shlomo Hershkop , Allure Security Technol. Inc., New York, NY, USA
Salvatore J. Stolfo , Allure Security Technol. Inc., New York, NY, USA
pp. 52-59

Use of Domain Knowledge to Detect Insider Threats in Computer Activities (Abstract)

William T. Young , SAIC, Arlington, VA, USA
Henry G. Goldberg , SAIC, Arlington, VA, USA
Alex Memory , SAIC, Arlington, VA, USA
James F. Sartain , SAIC, Arlington, VA, USA
Ted E. Senator , SAIC, Arlington, VA, USA
pp. 60-67

Invalidating Policies using Structural Information (Abstract)

Florian Kammuller , Middlesex Univ. London, London, UK
Christian W. Probst , Tech. Univ. of Denmark, Lyngby, Denmark
pp. 76-81

A Bayesian Network Model for Predicting Insider Threats (Abstract)

Elise T. Axelrad , Human Resources Res. Organ. (HumRRO), Alexandria, VA, USA
Paul J. Sticha , Human Resources Res. Organ. (HumRRO), Alexandria, VA, USA
Oliver Brdiczka , Palo Alto Res. Center (PARC), Palo Alto, CA, USA
Jianqiang Shen , Palo Alto Res. Center (PARC), Palo Alto, CA, USA
pp. 82-89

Methods and Metrics for Evaluating Analytic Insider Threat Tools (Abstract)

Frank L. Greitzer , PsyberAnalytix, Richland, WA, USA
Thomas A. Ferryman , Astute Analytics, Richland, WA, USA
pp. 90-97

Bridging the Gap: A Pragmatic Approach to Generating Insider Threat Data (Abstract)

Joshua Glasser , ExactData, LLC, Rochester, NY, USA
Brian Lindauer , Software Eng. Inst., Carnegie Mellon Univ., Pittsburgh, PA, USA
pp. 98-104

On Bad Randomness and Cloning of Contactless Payment and Building Smart Cards (Abstract)

Nicolas T. Courtois , Univ. Coll. London, London, UK
Daniel Hulme , Univ. Coll. London, London, UK
Kumail Hussain , Univ. Coll. London, London, UK
Jerzy A. Gawinecki , Mil. Univ. of Technol., Warsaw, Poland
pp. 105-110

Understanding Network Forensics Analysis in an Operational Environment (Abstract)

Elias Raftopoulos , Commun. Syst. Group, ETH Zurich, Zurich, Switzerland
Xenofontas Dimitropoulos , Commun. Syst. Group, ETH Zurich, Zurich, Switzerland
pp. 111-118

Digital Forensic Reconstruction of a Program Action (Abstract)

Ahmed F. Shosha , Sch. of Comput. Sci. & Inf., Univ. Coll. Dublin, Dublin, Ireland
Lee Tobin , Sch. of Comput. Sci. & Inf., Univ. Coll. Dublin, Dublin, Ireland
Pavel Gladyshev , Sch. of Comput. Sci. & Inf., Univ. Coll. Dublin, Dublin, Ireland
pp. 119-122

On Evaluating IP Traceback Schemes: A Practical Perspective (Abstract)

Vahid Aghaei-Foroushani , Fac. of Comput. Sci., Dalhousie Univ., Halifax, NS, Canada
A. Nur Zincir-Heywood , Fac. of Comput. Sci., Dalhousie Univ., Halifax, NS, Canada
pp. 127-134

Inside the SCAM Jungle: A Closer Look at 419 Scam Email Operations (Abstract)

Jelena Isacenkova , Eurecom, Sophia Antipolis, France
Andrei Costin , Eurecom, Sophia Antipolis, France
Davide Balzarotti , Eurecom, Sophia Antipolis, France
Aurelien Francillon , Eurecom, Sophia Antipolis, France
pp. 143-150

StegTorrent: A Steganographic Method for the P2P File Sharing Service (Abstract)

Pawel Kopiczko , Inst. of Telecommun., Warsaw Univ. of Technol., Warsaw, Poland
Wojciech Mazurczyk , Inst. of Telecommun., Warsaw Univ. of Technol., Warsaw, Poland
Krzysztof Szczypiorski , Inst. of Telecommun., Warsaw Univ. of Technol., Warsaw, Poland
pp. 151-157

Steganography in OFDM Symbols of Fast IEEE 802.11n Networks (Abstract)

Szymon Grabski , Inst. of Telecommun., Warsaw Univ. of Technol., Warsaw, Poland
Krzysztof Szczypiorski , Inst. of Telecommun., Warsaw Univ. of Technol., Warsaw, Poland
pp. 158-164

Quantitative Assessment of Risk Reduction with Cybercrime Black Market Monitoring (Abstract)

Luca Allodi , DISI, Univ. of Trento, Trento, Italy
Woohyun Shim , DISI, Univ. of Trento, Trento, Italy
Fabio Massacci , DISI, Univ. of Trento, Trento, Italy
pp. 165-172

Preventing Cell Phone Intrusion and Theft using Biometrics (Abstract)

Donny Jacob Ohana , Sam Houston State Univ., Huntsville, TX, USA
Liza Phillips , Law Enforcement, College Station, TX, USA
Lei Chen , Sam Houston State Univ., Huntsville, TX, USA
pp. 173-180

Author index (PDF)

pp. 181

Can users control their data in social software? an ethical analysis of control systems (Abstract)

Rula Sayaf , Department of Computer Sciences, iMinds-DistriNet, Belgium
James Rule , The Center for the Study of Law & Society Berkeley Law University of California, CA, USA
Dave Clarke , Department of Computer Sciences, iMinds-DistriNet, Belgium
pp. 1-4

Welcome to the world of human rights: please make yourself uncomfortable (Abstract)

Henry Corrigan-Gibbs , Yale University New Haven, Connecticut, U.S.A.
Bryan Ford , Yale University New Haven, Connecticut, U.S.A.
pp. 1-4

I just want your anonymized contacts! benefits and education in security & privacy research (Abstract)

Ty Bross , School of Informatics and Computing Indiana University, IN
L. Camp , School of Informatics and Computing Indiana University, IN
pp. 1-6
91 ms
(Ver 3.3 (11022016))