Skip to main content
  • Conference proceedings
  • © 2012

Information Security and Privacy Research

27th IFIP TC 11 Information Security and Privacy Conference, SEC 2012, Heraklion, Crete, Greece, June 4-6, 2012, Proceedings

  • State-of-the-art research
  • Fast-track conference proceedings
  • Unique visibility

Conference proceedings info: SEC 2012.

Buy it now

Buying options

eBook USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (53 papers)

  1. Front Matter

  2. Attacks and Malicious Code

    1. Relay Attacks on Secure Element-Enabled Mobile Devices

      • Michael Roland, Josef Langer, Josef Scharinger
      Pages 1-12
    2. Would You Mind Forking This Process? A Denial of Service Attack on Android (and Some Countermeasures)

      • Alessandro Armando, Alessio Merlo, Mauro Migliardi, Luca Verderame
      Pages 13-24
    3. Embedded Eavesdropping on Java Card

      • Guillaume Barbu, Christophe Giraud, Vincent Guerin
      Pages 37-48
  3. Security Architectures

    1. Authenticated Key Exchange (AKE) in Delay Tolerant Networks

      • Sofia Anna Menesidou, Vasilios Katos
      Pages 49-60
    2. Smart OpenID: A Smart Card Based OpenID Protocol

      • Andreas Leicher, Andreas U. Schmidt, Yogendra Shah
      Pages 75-86
    3. Peer to Peer Botnet Detection Based on Flow Intervals

      • David Zhao, Issa Traore, Ali Ghorbani, Bassam Sayed, Sherif Saad, Wei Lu
      Pages 87-102
  4. System Security

    1. Towards a Universal Data Provenance Framework Using Dynamic Instrumentation

      • Eleni Gessiou, Vasilis Pappas, Elias Athanasopoulos, Angelos D. Keromytis, Sotiris Ioannidis
      Pages 103-114
    2. Improving Flask Implementation Using Hardware Assisted In-VM Isolation

      • Baozeng Ding, Fufeng Yao, Yanjun Wu, Yeping He
      Pages 115-125
    3. HyperForce: Hypervisor-enForced Execution of Security-Critical Code

      • Francesco Gadaleta, Nick Nikiforakis, Jan Tobias Mühlberg, Wouter Joosen
      Pages 126-137
    4. RandHyp: Preventing Attacks via Xen Hypercall Interface

      • Feifei Wang, Ping Chen, Bing Mao, Li Xie
      Pages 138-149
  5. Access Control

    1. Role Mining under Role-Usage Cardinality Constraint

      • John C. John, Shamik Sural, Vijayalakshmi Atluri, Jaideep S. Vaidya
      Pages 150-161
    2. HIDE_DHCP: Covert Communications through Network Configuration Messages

      • Ruben Rios, Jose A. Onieva, Javier Lopez
      Pages 162-173
    3. Handling Stateful Firewall Anomalies

      • Frédéric Cuppens, Nora Cuppens-Boulahia, Joaquin Garcia-Alfaro, Tarik Moataz, Xavier Rimasson
      Pages 174-186
    4. A Framework for Threat Assessment in Access Control Systems

      • Hemanth Khambhammettu, Sofiene Boulares, Kamel Adi, Luigi Logrippo
      Pages 187-198
  6. Database Security

    1. Support for Write Privileges on Outsourced Data

      • Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati
      Pages 199-210
    2. Malicious Users’ Transactions: Tackling Insider Threat

      • Weihan Li, Brajendra Panda, Qussai Yaseen
      Pages 211-222
  7. Privacy Attitudes and Properties

    1. Privacy-Preserving Television Audience Measurement Using Smart TVs

      • George Drosatos, Aimilia Tasidou, Pavlos S. Efraimidis
      Pages 223-234

Other Volumes

  1. Information Security and Privacy Research

About this book

This book constitutes the refereed proceedings of the 27th IFIP TC 11 International Information Security Conference, SEC 2012, held in Heraklion, Crete, Greece, in June 2012. The 42 revised full papers presented together with 11 short papers were carefully reviewed and selected from 167 submissions. The papers are organized in topical sections on attacks and malicious code, security architectures, system security, access control, database security, privacy attitudes and properties, social networks and social engineering, applied cryptography, anonymity and trust, usable security, security and trust models, security economics, and authentication and delegation.

Editors and Affiliations

  • Department of Informatics, Information Security and Critical Infrastructure Protection Research Group, Athens University of Economics and Business, Athens, Greece

    Dimitris Gritzalis, Marianthi Theoharidou

  • School of Computing Communications and Electronics, University of Plymouth, Plymouth, UK

    Steven Furnell

Bibliographic Information

Buy it now

Buying options

eBook USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access