Limit search to available items
Book Cover
E-book
Author International Conference on Security and Privacy in Communication Networks (12th : 2016 : Guangzhou, China)

Title Security and privacy in communication networks : 12th International Conference, SecureComm 2016, Guangzhou, China, October 10-12, 2016, Proceedings / Robert Deng, Jian Weng, Kui Ren, Vinod Yegneswaran (eds.)
Published Cham, Switzerland : Springer, 2017

Copies

Description 1 online resource (xv, 781 pages) : illustrations
Series Lecture notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 1867-8211 ; 198
Lecture notes of the Institute for Computer Sciences, Social Informatics, and Telecommunications Engineering ; 198. 1867-8211
Contents Intro -- Preface -- Organization -- Contents -- Mobile Security I -- AppShield: Enabling Multi-entity Access Control Cross Platforms for Mobile App Management -- 1 Introduction -- 2 Background and Threat Model -- 3 System Design -- 3.1 Problem Statement -- 3.2 Application Rewriting Framework -- 3.3 Proxy-Based Data Access Mechanism -- 3.4 Security Policy -- 4 Implementation -- 5 Evaluation -- 5.1 Security Policy Enforcement -- 5.2 Reliability -- 5.3 Impact of Application Rewriting -- 6 Discussion -- 7 Related Work -- 8 Conclusion -- References
H-Binder: A Hardened Binder Framework on Android Systems -- 1 Introduction -- 2 Background -- 2.1 The Binder Framework -- 2.2 Hardware Virtualization on ARM Processor -- 3 Overview -- 3.1 The Problem Scope -- 3.2 Challenges -- 3.3 Our Contributions -- 4 H-Binder Building Blocks -- 4.1 Selective Interception for System Call Issuance -- 4.2 Thread-Level Interception for System Call Return -- 5 The H-Binder Workflow -- 5.1 The Approach -- 5.2 Details -- 5.3 Security Analysis -- 6 Implementation and Performance Evaluation -- 6.1 Component Cost of H-Binder
6.2 Application Level Performance Evaluation -- 6.3 Time Cost for Different Sizes of Transferred Data -- 7 Related Work -- 8 Conclusion -- References -- Exploiting Android System Services Through Bypassing Service Helpers -- 1 Introduction -- 2 Background -- 2.1 System Service vs. Service Helper -- 2.2 Security Mechanisms in Service Helpers -- 3 Identifying Vulnerabilities -- 3.1 Overview -- 3.2 Enumerating Service Helper Classes -- 3.3 Detecting Security Mechanisms -- 4 Vulnerability Results -- 4.1 Vulnerability Summary -- 4.2 Real-World Attacks -- 5 Discussion -- 5.1 Lessons Learned
5.2 Limitations -- 6 Related Work -- 7 Conclusion -- References -- Secure Keyboards Against Motion Based Keystroke Inference Attack -- 1 Introduction -- 2 MoBaKIA Attack Introduction -- 3 Countermeasure Based on Observation I -- 4 Countermeasures Based on Observation II -- 4.1 Completely Randomize the Layout -- 4.2 Randomly Resize the Keys -- 4.3 Heuristically Adjust the Layout -- 5 Experiment and Evaluation -- 5.1 Effectiveness -- 5.2 Usability -- 6 Related Work -- 7 Conclusion -- References -- Network Security -- Cloud-Based Privacy-Preserving Parking Navigation Through Vehicular Communications
1 Introduction -- 2 Problem Statement -- 2.1 System Model -- 2.2 Threat Models -- 2.3 Security Goals -- 3 The CPARN System -- 3.1 Preliminaries -- 3.2 The CPARN System -- 4 Security Discussion -- 5 Performance Evaluation -- 5.1 Computational Overhead -- 5.2 Communication Overhead -- 6 Related Work -- 7 Conclusions -- References -- TruSDN: Bootstrapping Trust in Cloud Network Infrastructure -- Abstract -- 1 Introduction -- 1.1 Contribution -- 1.2 Organization -- 2 System Model -- 2.1 Software Defined Networking -- 2.2 Deployment Layers -- 2.3 Trusted Execution Environments -- 3 Adversary Model
Summary This book constitutes the refereed conference proceedings of the 12th International Conference on Security and Privacy in Communications Networks, SecureComm 2016, held in Guangzhou, China, in October 2016. The 32 revised full papers and 18 poster papers were carefully reviewed and selected from 137 submissions. The papers are organized thematically starting with mobile and network security, followed by applied cryptography, web security and privacy, system security, hardware security. The volume also includes papers from the ATCS workshop and the poster session
Notes International conference proceedings
Includes author index
Online resource; title from PDF title page (SpringerLink, viewed June 22, 2017)
Subject Computer networks -- Security measures -- Congresses
Data encryption (Computer science) -- Congresses
Computer security -- Congresses
Computer security.
Coding theory & cryptology.
Network hardware.
Ethical & social aspects of IT.
Artificial intelligence.
Computers -- Security -- General.
Computers -- Hardware -- Network Hardware.
Computers -- Social Aspects -- General.
Computers -- Intelligence (AI) & Semantics.
Computer networks -- Security measures
Computer security
Data encryption (Computer science)
Genre/Form proceedings (reports)
Conference papers and proceedings
Conference papers and proceedings.
Actes de congrès.
Form Electronic book
Author Deng, Robert H., editor.
Weng, Jian. (Jian F.), editor.
Ren, Kui, editor.
Yegneswaran, Vinod, editor
ISBN 9783319596082
331959608X
3319596071
9783319596075
Other Titles SecureComm 2016