2017 IEEE Security and Privacy Workshops (SPW)

25-25 May 2017

Filter Results

Displaying Results 1 - 25 of 53
  • [Title page i]

    Publication Year: 2017, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (12 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2017, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (116 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2017, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (134 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2017, Page(s):v - viii
    Request permission for commercial reuse | PDF file iconPDF (163 KB)
    Freely Available from IEEE
  • Message from the SPW 2017 General Chair

    Publication Year: 2017, Page(s):ix - x
    Request permission for commercial reuse | PDF file iconPDF (113 KB)
    Freely Available from IEEE
  • Introduction to IWPE

    Publication Year: 2017, Page(s): xi
    Request permission for commercial reuse | PDF file iconPDF (109 KB)
    Freely Available from IEEE
  • Summary from the IWPE 2017 Chairs

    Publication Year: 2017, Page(s):xii - xiii
    Request permission for commercial reuse | PDF file iconPDF (162 KB) | HTML iconHTML
    Freely Available from IEEE
  • IWPE Committees

    Publication Year: 2017, Page(s):xiv - xv
    Request permission for commercial reuse | PDF file iconPDF (103 KB)
    Freely Available from IEEE
  • Introduction to BioStar

    Publication Year: 2017, Page(s): xvi
    Request permission for commercial reuse | PDF file iconPDF (109 KB)
    Freely Available from IEEE
  • BioStar Committees

    Publication Year: 2017, Page(s): xvii
    Request permission for commercial reuse | PDF file iconPDF (103 KB)
    Freely Available from IEEE
  • Introduction to LangSec

    Publication Year: 2017, Page(s): xviii
    Request permission for commercial reuse | PDF file iconPDF (109 KB)
    Freely Available from IEEE
  • LangSec Committees

    Publication Year: 2017, Page(s): xix
    Request permission for commercial reuse | PDF file iconPDF (96 KB)
    Freely Available from IEEE
  • Introduction to MoST

    Publication Year: 2017, Page(s): xx
    Request permission for commercial reuse | PDF file iconPDF (106 KB)
    Freely Available from IEEE
  • MoSt Committees

    Publication Year: 2017, Page(s): xxi
    Request permission for commercial reuse | PDF file iconPDF (98 KB)
    Freely Available from IEEE
  • Introduction to ConPro

    Publication Year: 2017, Page(s): xxii
    Request permission for commercial reuse | PDF file iconPDF (108 KB)
    Freely Available from IEEE
  • ConPro Committees

    Publication Year: 2017, Page(s): xxiii
    Request permission for commercial reuse | PDF file iconPDF (96 KB)
    Freely Available from IEEE
  • Introduction to WTMC

    Publication Year: 2017, Page(s): xxiv
    Request permission for commercial reuse | PDF file iconPDF (122 KB)
    Freely Available from IEEE
  • WTMC Committees

    Publication Year: 2017, Page(s):xxv - xxvi
    Request permission for commercial reuse | PDF file iconPDF (120 KB)
    Freely Available from IEEE
  • On the Personalization of Trust Management

    Publication Year: 2017, Page(s):1 - 10
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (816 KB) | HTML iconHTML

    In this paper we present a system architecture for trust management inspired by a human model for the evaluation of trust. We focus on large-scale marketplaces for diverse software resources and services. In such marketplaces, user agents (consumer, provider and broker) are largely autonomous with vastly diverse requirements, capabilities, and trust preferences. We hypothesize the need for persona... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Guiding a Colony of Black-Box Fuzzers with Chemotaxis

    Publication Year: 2017, Page(s):11 - 16
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (348 KB) | HTML iconHTML

    We present a bio-inspired method for large-scale fuzzing of binary executables to detect vulnerabilities. In our approach we deploy a small group of feedback-driven explorers that guide a colony of black-box fuzzers to promising regions in input space. We achieve this by applying the biological concept of chemotaxis: The explorer fuzzers mark test case regions that drive the target binary to previ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Ant Colony-Inspired Parallel Algorithm to Improve Cryptographic Pseudo Random Number Generators

    Publication Year: 2017, Page(s):17 - 22
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (329 KB) | HTML iconHTML

    We present a parallel algorithm to compute promising candidate states for modifying the state space of a pseudo-random number generator in order to increase its cycle length. This is important for generators in low-power devices where increase of state space is not an alternative. The runtime of the parallel algorithm is improved by an analogy to ant colony behavior: if two paths meet, the resulti... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Evolutionary Approaches for Resilient Surveillance Management

    Publication Year: 2017, Page(s):23 - 28
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (196 KB) | HTML iconHTML

    The efficient management (placement and orientation) of security cameras within a floor plan is a well-known and difficult problem that has gained attention recently. The objective is to locate the minimum number of cameras in the space to ensure all walls are within the view of at least one camera. Heuristic-based approaches have been developed for this NP-hard problem, unfortunately, most are on... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Don’t You Touch My Nuts: Information Hiding in Cyber Physical Systems

    Publication Year: 2017, Page(s):29 - 34
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (312 KB) | HTML iconHTML

    Cyber Physical Systems (CPS) have been linked to serious security concerns in recent years. Research publications suggest that there is a potential to transfer hidden information through CPS environments. In comparison to these existing studies, we demonstrate that CPS cannot only be used to covertly transfer secret data but also to store secret data. Using an analogy to the biological concept of ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using Evolutionary Diversity to Identify Problematic Software Parameters

    Publication Year: 2017, Page(s):35 - 40
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (179 KB) | HTML iconHTML

    Many computer performance and security issues can be attributed to poor software configuration settings (misconfigurations). However, finding and resolving errors is complicated by the number of parameters to set and the complexity (unsuspected interdependencies) of these configurations. This problem only becomes more difficult as software systems become more integrated and complex. This paper int... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Attack-Resistant aiCAPTCHA Using a Negative Selection Artificial Immune System

    Publication Year: 2017, Page(s):41 - 46
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1197 KB) | HTML iconHTML

    The growth of online services has resulted in a great need for tools to secure systems from would-be attackers without compromising the user experience. CAPTCHAs (Completely Automated Public Turing Tests to Tell Computers and Humans Apart) are one tool for this purpose, but their popular text-based form has been rendered insecure by improvements in character recognition technology. In this paper, ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.