Description |
1 online resource (xvi, 586 pages) : illustrations |
Series |
IFIP Advances in Information and Communication Technology, 1868-4238 ; 502 |
|
IFIP advances in information and communication technology ; 502. 1868-4238
|
Contents |
Intro; Preface; Organization; Contents; Network Security and Cyber Attacks; Turning Active TLS Scanning to Eleven; 1 Introduction; 2 Background; 2.1 Related Work; 3 Methodology; 3.1 Introducing New Approaches; 3.2 Implemented Approaches; 4 Results; 4.1 Experimental Results; 4.2 Cipher Suite Results of Top-10k Domains; 5 Discussion; 6 Conclusion; References; Slow TCAM Exhaustion DDoS Attack; 1 Introduction; 1.1 Slow TCAM Exhaustion Attacks; 2 Slow TCAM Exhaustion Attack (Slow-TCAM); 2.1 Attacking SDN; 2.2 Slow-TCAM; 3 Slow-TCAM Experimental Analysis; 4 Mitigating Slow-TCAM; 4.1 SIFT |
|
4.2 Experimental Results with SIFT5 Related and Future Work; References; Evasive Malware Detection Using Groups of Processes; 1 Introduction; 2 Related Work; 3 Proposed Solution; 3.1 The Management of Groups; 3.2 Heuristics; 3.3 Remediation; 4 Technical Results; 4.1 Detection Tests; 4.2 Limitations of the Solution; 5 Conclusions; References; A Malware-Tolerant, Self-Healing Industrial Control System Framework; 1 Introduction; 2 Overview; 2.1 Traditional Industrial Control System Architecture; 2.2 Assumptions; 2.3 Proposed Architecture; 3 Security Analysis and Results; 3.1 ProVerif Proofs |
|
3.2 Evaluation of Self-healing FreeRTOS3.3 Performance Analysis of TrustZone; 4 Discussion; 4.1 Attacks; 4.2 Diversity of PLCs; 4.3 Implications; 5 Related Work and Comparison; 6 Conclusion; References; Process Discovery for Industrial Control System Cyber Attack Detection; 1 Introduction; 2 Background; 3 ICS Modeling Requirements; 4 Experiment; 4.1 Experimental Setup; 4.2 Experimental Methodology; 5 Results and Analysis; 6 Conclusion; References; Security and Privacy in Social Applications and Cyber Attacks Defense; Secure Photo Sharing in Social Networks; 1 Introduction; 2 Preliminaries |
|
2.1 Access Structure2.2 Linear Secret Sharing Scheme; 2.3 Multi-authority Attributes; 2.4 Bilinear Pairings; 2.5 Security Assumptions; 2.6 MA-ABE Algorithms; 3 System Design; 3.1 Diaspora's Architecture and Assumptions; 3.2 MA-ABE in Diaspora; 4 Evaluation; 5 Related Work; 6 Conclusions; References; Context-Dependent Privacy-Aware Photo Sharing Based on Machine Learning; 1 Introduction; 2 Related Work; 3 A Model for Context-/Privacy-Aware Photo Sharing; 3.1 Security Assumption and Operating Principle; 3.2 Feature Definition; 3.3 Photo Sharing Decisions; 4 User Study and Data Collection |
|
5 Evaluation and Analysis5.1 Methodology; 5.2 Within-Subject Analysis; 5.3 One-Size-Fits-All Model; 5.4 Influences of Features on Decision Making; 6 Discussions; 7 Conclusion; References; 3LP: Three Layers of Protection for Individual Privacy in Facebook; 1 Introduction; 2 The Importance of Friendship Links; 2.1 Data Sets; 2.2 Empirical Demonstration; 3 Our Technique; 4 Experimental Results and Discussion; 5 Conclusion; References; A Framework for Moving Target Defense Quantification; 1 Introduction; 2 Related Work; 3 Threat Model and Assumptions; 4 Quantification Framework |
Summary |
This book constitutes the refereed proceedings of the 32nd IFIP TC 11 International Conference on ICT Systems Security and Privacy Protection, SEC 2017, held in Rome, Italy, in May 2017. The 38 revised full papers presented were carefully reviewed and selected from 199 submissions. The papers are organized in the following topical sections: network security and cyber attacks; security and privacy in social applications and cyber attacks defense; private queries and aggregations; operating systems and firmware security; user authentication and policies; applied cryptography and voting schemes; software security and privacy; privacy; and digital signature, risk management, and code reuse attacks |
Notes |
Includes author index |
Bibliography |
Includes bibliographical references and author index |
Notes |
Online resource; title from PDF title page (SpringerLink, viewed May 25, 2017) |
In |
Springer eBooks |
Subject |
Computer security -- Congresses
|
|
Computer networks -- Security measures -- Congresses
|
|
Internet -- Security measures -- Congresses
|
|
Coding theory & cryptology.
|
|
Information retrieval.
|
|
Ethical & social aspects of IT.
|
|
Legal aspects of IT.
|
|
Information technology: general issues.
|
|
Computer security.
|
|
Computers -- Security -- General.
|
|
Computers -- Information Technology.
|
|
Computers -- Social Aspects -- General.
|
|
Law -- Science & Technology.
|
|
Computers -- Data Processing.
|
|
Computer networks -- Security measures
|
|
Computer security
|
|
Internet -- Security measures
|
Genre/Form |
proceedings (reports)
|
|
Conference papers and proceedings
|
|
Conference papers and proceedings.
|
|
Actes de congrès.
|
Form |
Electronic book
|
Author |
De Capitani di Vimercati, Sabrina, editor.
|
|
Martinelli, F. (Fabio), editor.
|
ISBN |
9783319584690 |
|
3319584693 |
|
3319584685 |
|
9783319584683 |