Security in computing and communications 7th International Symposium, SSCC 2019, Trivandrum, India, December 18-21, 2019, Revised Selected Papers /: 7th International Symposium, SSCC 2019, Trivandrum, India, December 18-21, 2019, Revised Selected Papers. (2020)
- Record Type:
- Book
- Title:
- Security in computing and communications 7th International Symposium, SSCC 2019, Trivandrum, India, December 18-21, 2019, Revised Selected Papers /: 7th International Symposium, SSCC 2019, Trivandrum, India, December 18-21, 2019, Revised Selected Papers. (2020)
- Main Title:
- Security in computing and communications 7th International Symposium, SSCC 2019, Trivandrum, India, December 18-21, 2019, Revised Selected Papers
- Other Titles:
- SSCC 2019
- Further Information:
- Note: Sabu M. Thampi, Gregorio Martinez Perez, Ryan Ko, Danda B. Rawat (eds.).
- Other Names:
- Thampi, Sabu M
Martinez Pérez, Gregorio
Ko, Ryan
Rawat, Danda B, 1977-
SSCC (Conference), 7th - Contents:
- Intro -- Preface -- Organization -- Contents -- Malware Detection in Android Applications Using Integrated Static Features -- 1 Introduction -- 2 Related Works -- 3 Proposed Approach -- 3.1 Disassembling -- 3.2 Feature Extraction -- 3.3 Feature Selection -- 3.4 Classification -- 4 Experimental Setup and Evaluation -- 5 Conclusion and Future Work -- References -- Intrusion Prediction and Detection with Deep Sequence Modeling -- 1 Introduction -- 2 Related Work -- 2.1 Deep Learning -- 2.2 Intrusion Prediction and Detection Systems -- 3 System-Call Modelling -- 3.1 Approach Outline 3.2 Prediction Model -- 4 System Evaluation -- 4.1 Datasets -- 4.2 Learning Process -- 4.3 Result Analysis -- 4.4 Conclusion -- References -- Secure Authentication Using One Time Contextual QR Code -- 1 Introduction -- 1.1 Use of Quick Response (QR) Code for Securing Applications -- 2 Related Works -- 2.1 Lamport and S/Key One-Time Password System -- 2.2 Scheme of Bicakci and Baykal -- 2.3 RSA SecurID Authenticator -- 2.4 Scheme of Eldefrawy et al. -- 3 Proposed Solution -- 3.1 Registration Phase -- 3.2 Device Setup -- 3.3 Authentication Phase -- 3.4 Authentication Server-Verify OTP 4 Security Analysis, Applicability and Discussion -- 4.1 Security Analysis -- 4.2 Applicability -- 4.3 Discussion -- 5 Usability Study -- 6 Conclusion and Future Work -- References -- A Proximity-Based Measure for Quantifying the Risk of Vulnerabilities*-6pt -- 1 Introduction -- 2 Network Specific Risk Conditions -- 2.1Intro -- Preface -- Organization -- Contents -- Malware Detection in Android Applications Using Integrated Static Features -- 1 Introduction -- 2 Related Works -- 3 Proposed Approach -- 3.1 Disassembling -- 3.2 Feature Extraction -- 3.3 Feature Selection -- 3.4 Classification -- 4 Experimental Setup and Evaluation -- 5 Conclusion and Future Work -- References -- Intrusion Prediction and Detection with Deep Sequence Modeling -- 1 Introduction -- 2 Related Work -- 2.1 Deep Learning -- 2.2 Intrusion Prediction and Detection Systems -- 3 System-Call Modelling -- 3.1 Approach Outline 3.2 Prediction Model -- 4 System Evaluation -- 4.1 Datasets -- 4.2 Learning Process -- 4.3 Result Analysis -- 4.4 Conclusion -- References -- Secure Authentication Using One Time Contextual QR Code -- 1 Introduction -- 1.1 Use of Quick Response (QR) Code for Securing Applications -- 2 Related Works -- 2.1 Lamport and S/Key One-Time Password System -- 2.2 Scheme of Bicakci and Baykal -- 2.3 RSA SecurID Authenticator -- 2.4 Scheme of Eldefrawy et al. -- 3 Proposed Solution -- 3.1 Registration Phase -- 3.2 Device Setup -- 3.3 Authentication Phase -- 3.4 Authentication Server-Verify OTP 4 Security Analysis, Applicability and Discussion -- 4.1 Security Analysis -- 4.2 Applicability -- 4.3 Discussion -- 5 Usability Study -- 6 Conclusion and Future Work -- References -- A Proximity-Based Measure for Quantifying the Risk of Vulnerabilities*-6pt -- 1 Introduction -- 2 Network Specific Risk Conditions -- 2.1 Attack Path Resistance -- 2.2 Vulnerability (or Exploit) Diversity Along the Attack Path -- 2.3 Risk of the Neighboring Vulnerabilities -- 2.4 The Conjunctive (AND) and Disjunctive (OR) Dependency Between Predecessors -- 3 Measuring Security Risk of Vulnerabilities 3.1 Diversity-Adjusted Vulnerability Score (DVS) -- 3.2 Neighborhood Proximity-Adjusted Vulnerability Score (NPVS) -- 3.3 Relative Cumulative Risk -- 3.4 Computational Complexity -- 4 Experimental Setup and Results -- 5 Conclusion -- References -- Man-in-the-browser Attack: A Case Study on Malicious Browser Extensions -- 1 Introduction -- 2 The Attack -- 3 Implementation -- 4 Experiment -- 5 Discussion and Countermeasures -- 6 Conclusion -- References -- Detection and Analysis of Drive-by Downloads and Malicious Websites -- 1 Introduction -- 2 Related Work 2.1 Using Web Crawler to Detect Drive by Downloads -- 2.2 Antivirus Software to Detect Drive-by Downloads Malware -- 2.3 BrowserGuard as a Behavior-Based Solution -- 2.4 A Framework for DBD Attacks with Users Voluntary Monitoring of the Web -- 2.5 HTML and JavaScript Feature for Detecting the Drive-by Download -- 2.6 Approach to Detect Drive-by Download Based on Characters -- 2.7 Enhanced Approach for Malware Downloading -- 2.8 Analyze Redirection Code for Mining URLs -- 2.9 Visualize the Flow of HTTP Traffic -- 2.10 Drive-by Download as a Large Scale Web Attacks -- 3 Methodology -- 3.1 Dataset … (more)
- Publisher Details:
- Singapore : Springer
- Publication Date:
- 2020
- Extent:
- 1 online resource (389 p.)
- Subjects:
- 005.8
Computer security -- Congresses
Computer networks -- Security measures -- Congresses
Computer networks -- Security measures
Computer security
Electronic books
Electronic books
Conference papers and proceedings - Languages:
- English
- ISBNs:
- 9789811548253
9811548250 - Related ISBNs:
- 9789811548246
9811548242 - Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.511305
- Ingest File:
- 03_092.xml