ICT systems security and privacy protection : 32nd IFIP TC 11 International Conference, SEC 2017, Rome, Italy, May 29-31, 2017, Proceedings /: 32nd IFIP TC 11 International Conference, SEC 2017, Rome, Italy, May 29-31, 2017, Proceedings. (2017)
- Record Type:
- Book
- Title:
- ICT systems security and privacy protection : 32nd IFIP TC 11 International Conference, SEC 2017, Rome, Italy, May 29-31, 2017, Proceedings /: 32nd IFIP TC 11 International Conference, SEC 2017, Rome, Italy, May 29-31, 2017, Proceedings. (2017)
- Main Title:
- ICT systems security and privacy protection : 32nd IFIP TC 11 International Conference, SEC 2017, Rome, Italy, May 29-31, 2017, Proceedings
- Other Titles:
- SEC 2017
- Further Information:
- Note: Edited by Sabrina De Capitani di Vimercati, Fabio Martinelli.
- Editors:
- De Capitani di Vimercati, Sabrina
Martinelli, F (Fabio) - Other Names:
- IFIP TC11 International Information Security Conference, 32nd
- Contents:
- Intro; Preface; Organization; Contents; Network Security and Cyber Attacks; Turning Active TLS Scanning to Eleven; 1 Introduction; 2 Background; 2.1 Related Work; 3 Methodology; 3.1 Introducing New Approaches; 3.2 Implemented Approaches; 4 Results; 4.1 Experimental Results; 4.2 Cipher Suite Results of Top-10k Domains; 5 Discussion; 6 Conclusion; References; Slow TCAM Exhaustion DDoS Attack; 1 Introduction; 1.1 Slow TCAM Exhaustion Attacks; 2 Slow TCAM Exhaustion Attack (Slow-TCAM); 2.1 Attacking SDN; 2.2 Slow-TCAM; 3 Slow-TCAM Experimental Analysis; 4 Mitigating Slow-TCAM; 4.1 SIFT 4.2 Experimental Results with SIFT5 Related and Future Work; References; Evasive Malware Detection Using Groups of Processes; 1 Introduction; 2 Related Work; 3 Proposed Solution; 3.1 The Management of Groups; 3.2 Heuristics; 3.3 Remediation; 4 Technical Results; 4.1 Detection Tests; 4.2 Limitations of the Solution; 5 Conclusions; References; A Malware-Tolerant, Self-Healing Industrial Control System Framework; 1 Introduction; 2 Overview; 2.1 Traditional Industrial Control System Architecture; 2.2 Assumptions; 2.3 Proposed Architecture; 3 Security Analysis and Results; 3.1 ProVerif Proofs 3.2 Evaluation of Self-healing FreeRTOS3.3 Performance Analysis of TrustZone; 4 Discussion; 4.1 Attacks; 4.2 Diversity of PLCs; 4.3 Implications; 5 Related Work and Comparison; 6 Conclusion; References; Process Discovery for Industrial Control System Cyber Attack Detection; 1 Introduction; 2 Background; 3 ICSIntro; Preface; Organization; Contents; Network Security and Cyber Attacks; Turning Active TLS Scanning to Eleven; 1 Introduction; 2 Background; 2.1 Related Work; 3 Methodology; 3.1 Introducing New Approaches; 3.2 Implemented Approaches; 4 Results; 4.1 Experimental Results; 4.2 Cipher Suite Results of Top-10k Domains; 5 Discussion; 6 Conclusion; References; Slow TCAM Exhaustion DDoS Attack; 1 Introduction; 1.1 Slow TCAM Exhaustion Attacks; 2 Slow TCAM Exhaustion Attack (Slow-TCAM); 2.1 Attacking SDN; 2.2 Slow-TCAM; 3 Slow-TCAM Experimental Analysis; 4 Mitigating Slow-TCAM; 4.1 SIFT 4.2 Experimental Results with SIFT5 Related and Future Work; References; Evasive Malware Detection Using Groups of Processes; 1 Introduction; 2 Related Work; 3 Proposed Solution; 3.1 The Management of Groups; 3.2 Heuristics; 3.3 Remediation; 4 Technical Results; 4.1 Detection Tests; 4.2 Limitations of the Solution; 5 Conclusions; References; A Malware-Tolerant, Self-Healing Industrial Control System Framework; 1 Introduction; 2 Overview; 2.1 Traditional Industrial Control System Architecture; 2.2 Assumptions; 2.3 Proposed Architecture; 3 Security Analysis and Results; 3.1 ProVerif Proofs 3.2 Evaluation of Self-healing FreeRTOS3.3 Performance Analysis of TrustZone; 4 Discussion; 4.1 Attacks; 4.2 Diversity of PLCs; 4.3 Implications; 5 Related Work and Comparison; 6 Conclusion; References; Process Discovery for Industrial Control System Cyber Attack Detection; 1 Introduction; 2 Background; 3 ICS Modeling Requirements; 4 Experiment; 4.1 Experimental Setup; 4.2 Experimental Methodology; 5 Results and Analysis; 6 Conclusion; References; Security and Privacy in Social Applications and Cyber Attacks Defense; Secure Photo Sharing in Social Networks; 1 Introduction; 2 Preliminaries 2.1 Access Structure2.2 Linear Secret Sharing Scheme; 2.3 Multi-authority Attributes; 2.4 Bilinear Pairings; 2.5 Security Assumptions; 2.6 MA-ABE Algorithms; 3 System Design; 3.1 Diaspora's Architecture and Assumptions; 3.2 MA-ABE in Diaspora; 4 Evaluation; 5 Related Work; 6 Conclusions; References; Context-Dependent Privacy-Aware Photo Sharing Based on Machine Learning; 1 Introduction; 2 Related Work; 3 A Model for Context-/Privacy-Aware Photo Sharing; 3.1 Security Assumption and Operating Principle; 3.2 Feature Definition; 3.3 Photo Sharing Decisions; 4 User Study and Data Collection 5 Evaluation and Analysis5.1 Methodology; 5.2 Within-Subject Analysis; 5.3 One-Size-Fits-All Model; 5.4 Influences of Features on Decision Making; 6 Discussions; 7 Conclusion; References; 3LP: Three Layers of Protection for Individual Privacy in Facebook; 1 Introduction; 2 The Importance of Friendship Links; 2.1 Data Sets; 2.2 Empirical Demonstration; 3 Our Technique; 4 Experimental Results and Discussion; 5 Conclusion; References; A Framework for Moving Target Defense Quantification; 1 Introduction; 2 Related Work; 3 Threat Model and Assumptions; 4 Quantification Framework … (more)
- Publisher Details:
- Cham, Switzerland : Springer
- Publication Date:
- 2017
- Extent:
- 1 online resource (xvi, 586 pages), illustrations
- Subjects:
- 005.8
Computer science
Computer security -- Congresses
Computer networks -- Security measures -- Congresses
Internet -- Security measures -- Congresses
Computer networks -- Security measures
Computer security
Internet -- Security measures
Computer Science
Systems and Data Security
Data Encryption
Information Systems Applications (incl. Internet)
Computers and Society
Legal Aspects of Computing
Computer Applications
Computers -- Security -- General
Computers -- Information Technology
Computers -- Social Aspects -- General
Law -- Science & Technology
Computers -- Data Processing
Coding theory & cryptology
Information retrieval
Ethical & social aspects of IT
Legal aspects of IT
Information technology: general issues
Computer security
Data encryption (Computer science)
Computers -- Law and legislation
Computer security
Electronic books
Conference papers and proceedings - Languages:
- English
- ISBNs:
- 9783319584690
3319584693
3319584685
9783319584683 - Related ISBNs:
- 9783319584683
- Notes:
- Note: Includes bibliographical references and author index.
Note: Online resource; title from PDF title page (SpringerLink, viewed May 25, 2017). - Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.373593
- Ingest File:
- 02_353.xml