2012 IEEE Symposium on Security and Privacy Workshops

24-25 May 2012

Filter Results

Displaying Results 1 - 25 of 39
  • [Front cover]

    Publication Year: 2012, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (557 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2012, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (18 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2012, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (61 KB)
    Freely Available from IEEE
  • Copyright (c) 2012 by The Institute of Electrical and Electronics Engineers, Inc. All rights reserved. [Copyright page]

    Publication Year: 2012, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (136 KB)
    Freely Available from IEEE
  • IEEE CS Security and Privacy Workshops - SPW 2012 - Table of contents

    Publication Year: 2012, Page(s):v - vii
    Request permission for commercial reuse | PDF file iconPDF (130 KB)
    Freely Available from IEEE
  • Message from the General Chair - SPW 2012

    Publication Year: 2012, Page(s):viii - ix
    Request permission for commercial reuse | PDF file iconPDF (99 KB) | HTML iconHTML
    Freely Available from IEEE
  • SPW 2012 Conference Organizers

    Publication Year: 2012, Page(s): x
    Request permission for commercial reuse | PDF file iconPDF (77 KB)
    Freely Available from IEEE
  • Preface - TrustED 2012

    Publication Year: 2012, Page(s): xi
    Request permission for commercial reuse | PDF file iconPDF (81 KB) | HTML iconHTML
    Freely Available from IEEE
  • TrustED 2012 Program Committee

    Publication Year: 2012, Page(s): xii
    Request permission for commercial reuse | PDF file iconPDF (84 KB)
    Freely Available from IEEE
  • TrustED 2012 External Reviewers

    Publication Year: 2012, Page(s): xiii
    Request permission for commercial reuse | PDF file iconPDF (66 KB)
    Freely Available from IEEE
  • Preface - WSCS 2012

    Publication Year: 2012, Page(s): xiv
    Request permission for commercial reuse | PDF file iconPDF (79 KB) | HTML iconHTML
    Freely Available from IEEE
  • WSCS 2012 Program Committee

    Publication Year: 2012, Page(s): xv
    Request permission for commercial reuse | PDF file iconPDF (78 KB)
    Freely Available from IEEE
  • WSCS 2012 External Reviewers

    Publication Year: 2012, Page(s): xvi
    Request permission for commercial reuse | PDF file iconPDF (64 KB)
    Freely Available from IEEE
  • Preface - WRIT 2012

    Publication Year: 2012, Page(s): xvii
    Request permission for commercial reuse | PDF file iconPDF (74 KB) | HTML iconHTML
    Freely Available from IEEE
  • A Theoretical Analysis: Physical Unclonable Functions and the Software Protection Problem

    Publication Year: 2012, Page(s):1 - 11
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (292 KB) | HTML iconHTML

    Physical Unclonable Functions (PUFs) or Physical One Way Functions (P-OWFs) are physical systems whose responses to input stimuli are easy to measure but hard to clone. The unclonability property is due to the accepted hardness of replicating the multitude of uncontrollable manufacturing characteristics and makes PUFs useful in solving problems such as device authentication, software protection an... View full abstract»

    Open Access
  • A Method for Preventing "Skipping" Attacks

    Publication Year: 2012, Page(s):12 - 15
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (372 KB) | HTML iconHTML

    Until recently, known fault attacks against (non-CRT) exponentiation-based cryptosystems were supposed to be of rather theoretical nature, as they require a precise fault injection, e.g., a bit flip. However, Schmidt and Herbst (FDTC 2008) reported practical fault-attacks against RSA in standard mode using low-cost equipment. Although their attacks were described against RSA, they readily extend t... View full abstract»

    Open Access
  • Side-Channel Analysis of Grøstl and Skein

    Publication Year: 2012, Page(s):16 - 26
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1001 KB) | HTML iconHTML

    This work provides a detailed study of two finalists of the SHA-3 competition from the side-channel analysis point of view. For both functions when used as a MAC, this paper presents detected strategies for performing a power analysis. Besides the classical MAC mode, two additionally proposed constructions, the envelope MAC for Grøstl and the Skein-MAC for Skein, are analyzed. Consequently,... View full abstract»

    Open Access
  • The BlueJay Ultra-Lightweight Hybrid Cryptosystem

    Publication Year: 2012, Page(s):27 - 32
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (327 KB) | HTML iconHTML

    We report on the development of Blue Jay, a hybrid Rabin-based public key encryption cryptosystem that is suitable for ultra-lightweight (total 2000-3000 GE) platforms such as micro sensors and RFID authentication tags. The design is related to authors Passerine and the Oren-Feldhofer WIPR proposals, but is suitable to a wider array of applications. The encryption mechanism is significantly faster... View full abstract»

    Open Access
  • Slender PUF Protocol: A Lightweight, Robust, and Secure Authentication by Substring Matching

    Publication Year: 2012, Page(s):33 - 44
    Cited by:  Papers (28)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (624 KB) | HTML iconHTML

    We introduce Slender PUF protocol, an efficient and secure method to authenticate the responses generated from a Strong Physical Unclonable Function (PUF). The new method is lightweight, and suitable for energy constrained platforms such as ultra-low power embedded systems for use in identification and authentication applications. The proposed protocol does not follow the classic paradigm of expos... View full abstract»

    Open Access
  • Privacy in Online Review Sites

    Publication Year: 2012, Page(s):45 - 52
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (934 KB) | HTML iconHTML

    The increasing use of online review sites is creating new challenges for user privacy. Although reviews are public, many users inadvertently disclose private information about relationship, location, and temporal attributes to the world. This research protects users of online review sites from the inadvertent disclosure of private information in three ways. First, the types of unstructured and str... View full abstract»

    Open Access
  • Policy Aware Social Miner

    Publication Year: 2012, Page(s):53 - 59
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (848 KB) | HTML iconHTML

    There is a wealth of sensitive information available on the Web about any individual that is generated either by her or by others on social networking sites. This information could be used to make important decisions about that individual. The problem is that although people know that searches for their personal information are possible, they have no way to either control the data that is put on t... View full abstract»

    Open Access
  • Semantic Comparison of Security Policies: From Access Control Policies to Flow Properties

    Publication Year: 2012, Page(s):60 - 67
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (485 KB) | HTML iconHTML

    This paper introduces two generic mechanisms allowing to compare security policies from a semantical point of view. First, a notion of embedding is defined in order to compare policies over a common domain. Then, interpretations of security policies are introduced in order to consider their properties over arbitrary domains. Thus, combining interpretations and embeddings allows to compare policies... View full abstract»

    Open Access
  • A Framework for Modeling Decision Making and Deception with Semantic Information

    Publication Year: 2012, Page(s):68 - 74
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (596 KB) | HTML iconHTML

    We propose a mixed logical and game theoretic framework for modeling decision making under the potential for deception. This framework is most appropriate for online communities in which a decision maker must act upon information being provided by various sources with various different motivations. We show that in the simple three-player game we propose there are always equilibria in pure strategi... View full abstract»

    Open Access
  • A Knowledge-Based Approach to Intrusion Detection Modeling

    Publication Year: 2012, Page(s):75 - 81
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (306 KB) | HTML iconHTML

    Current state of the art intrusion detection and prevention systems (IDPS) are signature-based systems that detect threats and vulnerabilities by cross-referencing the threat or vulnerability signatures in their databases. These systems are incapable of taking advantage of heterogeneous data sources for analysis of system activities for threat detection. This work presents a situation-aware intrus... View full abstract»

    Open Access
  • Privacy Control in Smart Phones Using Semantically Rich Reasoning and Context Modeling

    Publication Year: 2012, Page(s):82 - 85
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (306 KB) | HTML iconHTML

    We present our ongoing work on user data and contextual privacy preservation in mobile devices through semantic reasoning. Recent advances in context modeling, tracking and collaborative localization have led to the emergence of a new class of smart phone applications that can access and share embedded sensor data. Unfortunately, this also means significant amount of user context information is no... View full abstract»

    Open Access