Limit search to available items
Book Cover
E-book
Author IFIP TC11 International Information Security Conference (32nd : 2017 : Rome, Italy)

Title ICT systems security and privacy protection : 32nd IFIP TC 11 International Conference, SEC 2017, Rome, Italy, May 29-31, 2017, Proceedings / edited by Sabrina De Capitani di Vimercati, Fabio Martinelli
Published Cham, Switzerland : Springer, 2017

Copies

Description 1 online resource (xvi, 586 pages) : illustrations
Series IFIP Advances in Information and Communication Technology, 1868-4238 ; 502
IFIP advances in information and communication technology ; 502. 1868-4238
Contents Intro; Preface; Organization; Contents; Network Security and Cyber Attacks; Turning Active TLS Scanning to Eleven; 1 Introduction; 2 Background; 2.1 Related Work; 3 Methodology; 3.1 Introducing New Approaches; 3.2 Implemented Approaches; 4 Results; 4.1 Experimental Results; 4.2 Cipher Suite Results of Top-10k Domains; 5 Discussion; 6 Conclusion; References; Slow TCAM Exhaustion DDoS Attack; 1 Introduction; 1.1 Slow TCAM Exhaustion Attacks; 2 Slow TCAM Exhaustion Attack (Slow-TCAM); 2.1 Attacking SDN; 2.2 Slow-TCAM; 3 Slow-TCAM Experimental Analysis; 4 Mitigating Slow-TCAM; 4.1 SIFT
4.2 Experimental Results with SIFT5 Related and Future Work; References; Evasive Malware Detection Using Groups of Processes; 1 Introduction; 2 Related Work; 3 Proposed Solution; 3.1 The Management of Groups; 3.2 Heuristics; 3.3 Remediation; 4 Technical Results; 4.1 Detection Tests; 4.2 Limitations of the Solution; 5 Conclusions; References; A Malware-Tolerant, Self-Healing Industrial Control System Framework; 1 Introduction; 2 Overview; 2.1 Traditional Industrial Control System Architecture; 2.2 Assumptions; 2.3 Proposed Architecture; 3 Security Analysis and Results; 3.1 ProVerif Proofs
3.2 Evaluation of Self-healing FreeRTOS3.3 Performance Analysis of TrustZone; 4 Discussion; 4.1 Attacks; 4.2 Diversity of PLCs; 4.3 Implications; 5 Related Work and Comparison; 6 Conclusion; References; Process Discovery for Industrial Control System Cyber Attack Detection; 1 Introduction; 2 Background; 3 ICS Modeling Requirements; 4 Experiment; 4.1 Experimental Setup; 4.2 Experimental Methodology; 5 Results and Analysis; 6 Conclusion; References; Security and Privacy in Social Applications and Cyber Attacks Defense; Secure Photo Sharing in Social Networks; 1 Introduction; 2 Preliminaries
2.1 Access Structure2.2 Linear Secret Sharing Scheme; 2.3 Multi-authority Attributes; 2.4 Bilinear Pairings; 2.5 Security Assumptions; 2.6 MA-ABE Algorithms; 3 System Design; 3.1 Diaspora's Architecture and Assumptions; 3.2 MA-ABE in Diaspora; 4 Evaluation; 5 Related Work; 6 Conclusions; References; Context-Dependent Privacy-Aware Photo Sharing Based on Machine Learning; 1 Introduction; 2 Related Work; 3 A Model for Context-/Privacy-Aware Photo Sharing; 3.1 Security Assumption and Operating Principle; 3.2 Feature Definition; 3.3 Photo Sharing Decisions; 4 User Study and Data Collection
5 Evaluation and Analysis5.1 Methodology; 5.2 Within-Subject Analysis; 5.3 One-Size-Fits-All Model; 5.4 Influences of Features on Decision Making; 6 Discussions; 7 Conclusion; References; 3LP: Three Layers of Protection for Individual Privacy in Facebook; 1 Introduction; 2 The Importance of Friendship Links; 2.1 Data Sets; 2.2 Empirical Demonstration; 3 Our Technique; 4 Experimental Results and Discussion; 5 Conclusion; References; A Framework for Moving Target Defense Quantification; 1 Introduction; 2 Related Work; 3 Threat Model and Assumptions; 4 Quantification Framework
Summary This book constitutes the refereed proceedings of the 32nd IFIP TC 11 International Conference on ICT Systems Security and Privacy Protection, SEC 2017, held in Rome, Italy, in May 2017. The 38 revised full papers presented were carefully reviewed and selected from 199 submissions. The papers are organized in the following topical sections: network security and cyber attacks; security and privacy in social applications and cyber attacks defense; private queries and aggregations; operating systems and firmware security; user authentication and policies; applied cryptography and voting schemes; software security and privacy; privacy; and digital signature, risk management, and code reuse attacks
Notes Includes author index
Bibliography Includes bibliographical references and author index
Notes Online resource; title from PDF title page (SpringerLink, viewed May 25, 2017)
In Springer eBooks
Subject Computer security -- Congresses
Computer networks -- Security measures -- Congresses
Internet -- Security measures -- Congresses
Coding theory & cryptology.
Information retrieval.
Ethical & social aspects of IT.
Legal aspects of IT.
Information technology: general issues.
Computer security.
Computers -- Security -- General.
Computers -- Information Technology.
Computers -- Social Aspects -- General.
Law -- Science & Technology.
Computers -- Data Processing.
Computer networks -- Security measures
Computer security
Internet -- Security measures
Genre/Form proceedings (reports)
Conference papers and proceedings
Conference papers and proceedings.
Actes de congrès.
Form Electronic book
Author De Capitani di Vimercati, Sabrina, editor.
Martinelli, F. (Fabio), editor.
ISBN 9783319584690
3319584693
3319584685
9783319584683
Other Titles SEC 2017