Description |
1 online resource (xv, 781 pages) : illustrations |
Series |
Lecture notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 1867-8211 ; 198 |
|
Lecture notes of the Institute for Computer Sciences, Social Informatics, and Telecommunications Engineering ; 198. 1867-8211
|
Contents |
Intro -- Preface -- Organization -- Contents -- Mobile Security I -- AppShield: Enabling Multi-entity Access Control Cross Platforms for Mobile App Management -- 1 Introduction -- 2 Background and Threat Model -- 3 System Design -- 3.1 Problem Statement -- 3.2 Application Rewriting Framework -- 3.3 Proxy-Based Data Access Mechanism -- 3.4 Security Policy -- 4 Implementation -- 5 Evaluation -- 5.1 Security Policy Enforcement -- 5.2 Reliability -- 5.3 Impact of Application Rewriting -- 6 Discussion -- 7 Related Work -- 8 Conclusion -- References |
|
H-Binder: A Hardened Binder Framework on Android Systems -- 1 Introduction -- 2 Background -- 2.1 The Binder Framework -- 2.2 Hardware Virtualization on ARM Processor -- 3 Overview -- 3.1 The Problem Scope -- 3.2 Challenges -- 3.3 Our Contributions -- 4 H-Binder Building Blocks -- 4.1 Selective Interception for System Call Issuance -- 4.2 Thread-Level Interception for System Call Return -- 5 The H-Binder Workflow -- 5.1 The Approach -- 5.2 Details -- 5.3 Security Analysis -- 6 Implementation and Performance Evaluation -- 6.1 Component Cost of H-Binder |
|
6.2 Application Level Performance Evaluation -- 6.3 Time Cost for Different Sizes of Transferred Data -- 7 Related Work -- 8 Conclusion -- References -- Exploiting Android System Services Through Bypassing Service Helpers -- 1 Introduction -- 2 Background -- 2.1 System Service vs. Service Helper -- 2.2 Security Mechanisms in Service Helpers -- 3 Identifying Vulnerabilities -- 3.1 Overview -- 3.2 Enumerating Service Helper Classes -- 3.3 Detecting Security Mechanisms -- 4 Vulnerability Results -- 4.1 Vulnerability Summary -- 4.2 Real-World Attacks -- 5 Discussion -- 5.1 Lessons Learned |
|
5.2 Limitations -- 6 Related Work -- 7 Conclusion -- References -- Secure Keyboards Against Motion Based Keystroke Inference Attack -- 1 Introduction -- 2 MoBaKIA Attack Introduction -- 3 Countermeasure Based on Observation I -- 4 Countermeasures Based on Observation II -- 4.1 Completely Randomize the Layout -- 4.2 Randomly Resize the Keys -- 4.3 Heuristically Adjust the Layout -- 5 Experiment and Evaluation -- 5.1 Effectiveness -- 5.2 Usability -- 6 Related Work -- 7 Conclusion -- References -- Network Security -- Cloud-Based Privacy-Preserving Parking Navigation Through Vehicular Communications |
|
1 Introduction -- 2 Problem Statement -- 2.1 System Model -- 2.2 Threat Models -- 2.3 Security Goals -- 3 The CPARN System -- 3.1 Preliminaries -- 3.2 The CPARN System -- 4 Security Discussion -- 5 Performance Evaluation -- 5.1 Computational Overhead -- 5.2 Communication Overhead -- 6 Related Work -- 7 Conclusions -- References -- TruSDN: Bootstrapping Trust in Cloud Network Infrastructure -- Abstract -- 1 Introduction -- 1.1 Contribution -- 1.2 Organization -- 2 System Model -- 2.1 Software Defined Networking -- 2.2 Deployment Layers -- 2.3 Trusted Execution Environments -- 3 Adversary Model |
Summary |
This book constitutes the refereed conference proceedings of the 12th International Conference on Security and Privacy in Communications Networks, SecureComm 2016, held in Guangzhou, China, in October 2016. The 32 revised full papers and 18 poster papers were carefully reviewed and selected from 137 submissions. The papers are organized thematically starting with mobile and network security, followed by applied cryptography, web security and privacy, system security, hardware security. The volume also includes papers from the ATCS workshop and the poster session |
Notes |
International conference proceedings |
|
Includes author index |
|
Online resource; title from PDF title page (SpringerLink, viewed June 22, 2017) |
Subject |
Computer networks -- Security measures -- Congresses
|
|
Data encryption (Computer science) -- Congresses
|
|
Computer security -- Congresses
|
|
Computer security.
|
|
Coding theory & cryptology.
|
|
Network hardware.
|
|
Ethical & social aspects of IT.
|
|
Artificial intelligence.
|
|
Computers -- Security -- General.
|
|
Computers -- Hardware -- Network Hardware.
|
|
Computers -- Social Aspects -- General.
|
|
Computers -- Intelligence (AI) & Semantics.
|
|
Computer networks -- Security measures
|
|
Computer security
|
|
Data encryption (Computer science)
|
Genre/Form |
proceedings (reports)
|
|
Conference papers and proceedings
|
|
Conference papers and proceedings.
|
|
Actes de congrès.
|
Form |
Electronic book
|
Author |
Deng, Robert H., editor.
|
|
Weng, Jian. (Jian F.), editor.
|
|
Ren, Kui, editor.
|
|
Yegneswaran, Vinod, editor
|
ISBN |
9783319596082 |
|
331959608X |
|
3319596071 |
|
9783319596075 |
|