24-25 May 2012
Filter Results
-
[Front cover]
Publication Year: 2012, Page(s): C1|
PDF (557 KB)
-
[Title page i]
Publication Year: 2012, Page(s): i|
PDF (18 KB)
-
[Title page iii]
Publication Year: 2012, Page(s): iii|
PDF (61 KB)
-
Copyright (c) 2012 by The Institute of Electrical and Electronics Engineers, Inc. All rights reserved. [Copyright page]
Publication Year: 2012, Page(s): iv|
PDF (136 KB)
-
IEEE CS Security and Privacy Workshops - SPW 2012 - Table of contents
Publication Year: 2012, Page(s):v - vii|
PDF (130 KB)
-
Message from the General Chair - SPW 2012
Publication Year: 2012, Page(s):viii - ix -
SPW 2012 Conference Organizers
Publication Year: 2012, Page(s): x|
PDF (77 KB)
-
Preface - TrustED 2012
Publication Year: 2012, Page(s): xi -
TrustED 2012 Program Committee
Publication Year: 2012, Page(s): xii|
PDF (84 KB)
-
TrustED 2012 External Reviewers
Publication Year: 2012, Page(s): xiii|
PDF (66 KB)
-
Preface - WSCS 2012
Publication Year: 2012, Page(s): xiv -
WSCS 2012 Program Committee
Publication Year: 2012, Page(s): xv|
PDF (78 KB)
-
WSCS 2012 External Reviewers
Publication Year: 2012, Page(s): xvi|
PDF (64 KB)
-
Preface - WRIT 2012
Publication Year: 2012, Page(s): xvii -
A Theoretical Analysis: Physical Unclonable Functions and the Software Protection Problem
Publication Year: 2012, Page(s):1 - 11
Cited by: Papers (4)Physical Unclonable Functions (PUFs) or Physical One Way Functions (P-OWFs) are physical systems whose responses to input stimuli are easy to measure but hard to clone. The unclonability property is due to the accepted hardness of replicating the multitude of uncontrollable manufacturing characteristics and makes PUFs useful in solving problems such as device authentication, software protection an... View full abstract»
-
A Method for Preventing "Skipping" Attacks
Publication Year: 2012, Page(s):12 - 15
Cited by: Papers (1)Until recently, known fault attacks against (non-CRT) exponentiation-based cryptosystems were supposed to be of rather theoretical nature, as they require a precise fault injection, e.g., a bit flip. However, Schmidt and Herbst (FDTC 2008) reported practical fault-attacks against RSA in standard mode using low-cost equipment. Although their attacks were described against RSA, they readily extend t... View full abstract»
-
Side-Channel Analysis of Grøstl and Skein
Publication Year: 2012, Page(s):16 - 26
Cited by: Papers (1)This work provides a detailed study of two finalists of the SHA-3 competition from the side-channel analysis point of view. For both functions when used as a MAC, this paper presents detected strategies for performing a power analysis. Besides the classical MAC mode, two additionally proposed constructions, the envelope MAC for Grøstl and the Skein-MAC for Skein, are analyzed. Consequently, exampl... View full abstract»
-
The BlueJay Ultra-Lightweight Hybrid Cryptosystem
Publication Year: 2012, Page(s):27 - 32
Cited by: Papers (6)We report on the development of Blue Jay, a hybrid Rabin-based public key encryption cryptosystem that is suitable for ultra-lightweight (total 2000-3000 GE) platforms such as micro sensors and RFID authentication tags. The design is related to authors Passerine and the Oren-Feldhofer WIPR proposals, but is suitable to a wider array of applications. The encryption mechanism is significantly faster... View full abstract»
-
Slender PUF Protocol: A Lightweight, Robust, and Secure Authentication by Substring Matching
Publication Year: 2012, Page(s):33 - 44
Cited by: Papers (41) | Patents (1)We introduce Slender PUF protocol, an efficient and secure method to authenticate the responses generated from a Strong Physical Unclonable Function (PUF). The new method is lightweight, and suitable for energy constrained platforms such as ultra-low power embedded systems for use in identification and authentication applications. The proposed protocol does not follow the classic paradigm of expos... View full abstract»
-
Privacy in Online Review Sites
Publication Year: 2012, Page(s):45 - 52The increasing use of online review sites is creating new challenges for user privacy. Although reviews are public, many users inadvertently disclose private information about relationship, location, and temporal attributes to the world. This research protects users of online review sites from the inadvertent disclosure of private information in three ways. First, the types of unstructured and str... View full abstract»
-
Policy Aware Social Miner
Publication Year: 2012, Page(s):53 - 59
Cited by: Papers (2)There is a wealth of sensitive information available on the Web about any individual that is generated either by her or by others on social networking sites. This information could be used to make important decisions about that individual. The problem is that although people know that searches for their personal information are possible, they have no way to either control the data that is put on t... View full abstract»
-
Semantic Comparison of Security Policies: From Access Control Policies to Flow Properties
Publication Year: 2012, Page(s):60 - 67
Cited by: Papers (2)This paper introduces two generic mechanisms allowing to compare security policies from a semantical point of view. First, a notion of embedding is defined in order to compare policies over a common domain. Then, interpretations of security policies are introduced in order to consider their properties over arbitrary domains. Thus, combining interpretations and embeddings allows to compare policies... View full abstract»
-
A Framework for Modeling Decision Making and Deception with Semantic Information
Publication Year: 2012, Page(s):68 - 74
Cited by: Papers (2)We propose a mixed logical and game theoretic framework for modeling decision making under the potential for deception. This framework is most appropriate for online communities in which a decision maker must act upon information being provided by various sources with various different motivations. We show that in the simple three-player game we propose there are always equilibria in pure strategi... View full abstract»
-
A Knowledge-Based Approach to Intrusion Detection Modeling
Publication Year: 2012, Page(s):75 - 81
Cited by: Papers (18)Current state of the art intrusion detection and prevention systems (IDPS) are signature-based systems that detect threats and vulnerabilities by cross-referencing the threat or vulnerability signatures in their databases. These systems are incapable of taking advantage of heterogeneous data sources for analysis of system activities for threat detection. This work presents a situation-aware intrus... View full abstract»
-
Privacy Control in Smart Phones Using Semantically Rich Reasoning and Context Modeling
Publication Year: 2012, Page(s):82 - 85
Cited by: Papers (13)We present our ongoing work on user data and contextual privacy preservation in mobile devices through semantic reasoning. Recent advances in context modeling, tracking and collaborative localization have led to the emergence of a new class of smart phone applications that can access and share embedded sensor data. Unfortunately, this also means significant amount of user context information is no... View full abstract»