2016 14th Annual Conference on Privacy, Security and Trust (PST)

12-14 Dec. 2016

Filter Results

Displaying Results 1 - 25 of 113
  • Author index

    Publication Year: 2016, Page(s):1 - 7
    Request permission for commercial reuse | PDF file iconPDF (1986 KB)
    Freely Available from IEEE
  • Chair welcome

    Publication Year: 2016, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (39 KB)
    Freely Available from IEEE
  • Committees

    Publication Year: 2016, Page(s):1 - 2
    Request permission for commercial reuse | PDF file iconPDF (53 KB)
    Freely Available from IEEE
  • General welcome

    Publication Year: 2016, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (38 KB)
    Freely Available from IEEE
  • Keynote speakers

    Publication Year: 2016, Page(s):1 - 2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (81 KB)

    Provides an abstract for each of the keynote presentations and a brief professional biography of each presenter. The complete presentations were not made available for publication as part of the conference proceedings. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Opening keynote speakers

    Publication Year: 2016, Page(s):1 - 2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (66 KB)

    Provides an abstract for each of the keynote presentations and a brief professional biography of each presenter. The complete presentations were not made available for publication as part of the conference proceedings. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Steering committee chair welcome

    Publication Year: 2016, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (45 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2016, Page(s):1 - 9
    Request permission for commercial reuse | PDF file iconPDF (3852 KB)
    Freely Available from IEEE
  • Examining the impact of privacy, Security, and trust on the TAM and TTF models for e-commerce consumers: A pilot study

    Publication Year: 2016, Page(s):19 - 26
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (7404 KB) | HTML iconHTML

    This paper examines the impact of privacy, security, and trust (PST) on the Technology Acceptance Model (TAM) and Task-Technology Fit (TTF) model for consumers of e-commerce. The findings of this pilot study were drawn by designing a structural equation model (SEM) on the impact of privacy, security, and trust (PST) on TAM and TTF models for consumers of e-commerce. The population for this pilot s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dr. WATTson: Lightweight current-based Intrusion Detection (CBID)

    Publication Year: 2016, Page(s):170 - 177
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1453 KB) | HTML iconHTML

    Intrusion detection has been an active field of research for more than 35 years. Numerous systems had been built based on the two fundamental detection principles, knowledge-based and behavior-based detection. Anyway, having a look at day-to-day news about data breaches and successful attacks, detection effectiveness is still limited. Even more, heavy-weight intrusion detection systems cannot be i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Toward an off-line analysis of obligation with deadline policies

    Publication Year: 2016, Page(s):178 - 186
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (212 KB) | HTML iconHTML

    In this paper, we give means to analyze obligation with deadline policies in order to predict all undesired situations. The previous studies were focused on obligation with deadline when deadlines are defined using temporal constraints, and the most of them were interested in how obligations impact and depend on authorization state. We particularly investigate obligations with deadlines when the d... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Measuring code reuse in Android apps

    Publication Year: 2016, Page(s):187 - 195
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (291 KB) | HTML iconHTML

    The appearance of the Android platform and its popularity has resulted in a sharp rise in the number of reported vulnerabilities and consequently in the number of mobile threats. Leveraging openness of Android app markets and the lack of security testing, malware authors commonly plagiarize Android applications through code reuse, boosting the amount of malware on the markets and consequently the ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Understanding victim-enabled identity theft

    Publication Year: 2016, Page(s):196 - 202
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (324 KB) | HTML iconHTML

    Victim-enabled identity theft is a crime in which an individual victim is deceived into providing their personally identifying information (PII) to a criminal to facilitate its theft and/or misuse. In this paper we analyse a particular victim- enabled tax-related identity theft scheme recently reported in Australia, which has also been reported, in a slightly different guise, in the US. We find th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mobile forensics for cloud data: Practical and legal considerations

    Publication Year: 2016, Page(s):203 - 206
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (201 KB) | HTML iconHTML

    Forensic examinations of a mobile phone that consider only the internal memory can miss potentially vital data that is accessible from the device, but not stored locally. In this paper, we look at a forensic tool that is able to download data stored on the cloud, using credentials gleaned from device extractions. Through experimention with a variety of devices and configurations, we examine the ef... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Building robust temporal user profiles for anomaly detection in file system accesses

    Publication Year: 2016, Page(s):207 - 210
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (306 KB) | HTML iconHTML

    Protecting sensitive data against malicious or compromised insiders is a big concern. In most cases, insiders have authorized access in file systems containing such data which they misuse or exfiltrate for financial profit. Moreover, external parties can compromise identity credentials of valid file system users by means of exploiting security vulnerabilities, phishing attacks etc. Therefore, in o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Know your master: Driver profiling-based anti-theft method

    Publication Year: 2016, Page(s):211 - 218
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (11886 KB) | HTML iconHTML

    Although many anti-theft technologies are implemented, auto-theft is still increasing. Also, security vulnerabilities of cars can be used for auto-theft by neutralizing anti-theft system. This keyless auto-theft attack will be increased as cars adopt computerized electronic devices more. To detect auto-theft efficiently, we propose the driver verification method that analyzes driving patterns usin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using machine learning to secure IoT systems

    Publication Year: 2016, Page(s):219 - 222
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1069 KB) | HTML iconHTML

    The Internet of Things (IoT) is a massive group of devices containing sensors or actuators connected together over wired or wireless networks. With an estimate of over 25 billion devices connected together by 2020, IoT has been rapidly growing over the past decade. During the growth, security has been identified as one of the weakest areas in IoT. When implementing security within an IoT network, ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A survey on internet usage and cybersecurity awareness in students

    Publication Year: 2016, Page(s):223 - 228
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (780 KB) | HTML iconHTML

    There has been an exponential increase in the usage of the internet, particularly among students since the introduction of e-learning and Bring Your Own Device (BYO) initiatives into the education system. In New Zealand the percentage of the population using the internet is now 93.8% and this increase in internet usage has increased the risk of cybersecurity attacks. This makes it necessary to pro... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A logical approach to promoting trust over knowledge to trust over action

    Publication Year: 2016, Page(s):27 - 34
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (174 KB) | HTML iconHTML

    We discuss two related forms of trust. One form of trust is related to the perceived knowledge of other agents; we accept the information that another agent provides if we believe they have sufficient expertise in a particular domain. The second form is related to action; we trust another agent to act on our behalf if we believe they will choose acceptable actions. In this paper, we explore the re... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An optical covert-channel to leak data through an air-gap

    Publication Year: 2016, Page(s):642 - 649
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (863 KB) | HTML iconHTML

    In recent years, various out-of-band covert channels have been proposed that demonstrate the feasibility of leaking data out of computers without the need for network connectivity. The methods proposed have been based on different type of electromagnetic, acoustic, and thermal emissions. However, optical channels have largely been considered less covert: because they are visible to the human eye a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • AHCSABAC: Attribute value hierarchies and constraints specification in attribute-based access control

    Publication Year: 2016, Page(s):35 - 41
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (122 KB) | HTML iconHTML

    Attribute-based access control (ABAC) is well known for flexible policy specification and dynamic decision-making capabilities. Unlike the other access control models, in ABAC, privileges are granted on the basis of the values (e.g., manager, deputy manager, secret, etc.) of the attributes (e.g., role, security level, etc.) of various entities (e.g., users, objects, environment, etc.). Therefore, ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Edge-calibrated noise for differentially private mechanisms on graphs

    Publication Year: 2016, Page(s):42 - 49
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (217 KB) | HTML iconHTML

    In this paper, we introduce new methods for releasing differentially private graphs. Our techniques are based on a new way to distribute noise among edge weights. More precisely, we rely on the addition of noise whose amplitude is edge-calibrated and optimize the distribution of the privacy budget among subsets of edges. The generic privacy framework that we propose can capture most of the privacy... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Exploiting known vulnerabilities of a smart thermostat

    Publication Year: 2016, Page(s):50 - 53
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (289 KB) | HTML iconHTML

    We address security vulnerabilities for a smart thermostat. As this kind of smart appliance is adopted in homes around the world, every user will be opening up a new avenue for cyber attack. Since these devices have known vulnerabilities and they are being managed by non-technical users, we anticipate that smart thermostats are likely to be targetted by unsophisticated attackers relying on publicl... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Masquerade of mobile applications: Introducing unlinkability in a practical way

    Publication Year: 2016, Page(s):54 - 61
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (428 KB) | HTML iconHTML

    Smartphone apps are becoming a popular vehicle to collect users' personal interests, demographics and other private information. Due to lack of regulation, a curious party can covertly link and aggregate sensitive information from independent sources (sessions or apps) over time to conduct unwanted user profiling, targeted advertising or surveillance. Such unregulated aggregation is rooted at the ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dynamic Weight on Static Trust for trustworthy social media networks

    Publication Year: 2016, Page(s):62 - 69
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (562 KB) | HTML iconHTML

    Something in our mind does not always reflect with our fingers on keyboard and mouse, but we respect our blood which might be the way out of the wariness in usage of social media networks today. Social media networks are already the largest network among the population across our globe and for sure, it will not stop expanding its territory. Security vulnerabilities on the other side have been moun... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.