Skip to main content
  • Conference proceedings
  • © 2015

Security Protocols XXIII

23rd International Workshop, Cambridge, UK, March 31 - April 2, 2015, Revised Selected Papers

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 9379)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): Security Protocols: Cambridge International Workshop on Security Protocols

Conference proceedings info: Security Protocols 2015.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (36 papers)

  1. Front Matter

    Pages I-XI
  2. The Dark Side of the Code

    • Olgierd Pieczul, Simon N. Foley
    Pages 1-11
  3. The Dark Side of the Code (Transcript of Discussion)

    • Simon N. Foley, Olgierd Pieczul
    Pages 12-21
  4. Derailing Attacks

    • Saša Radomirović, Mohammad Torabi Dashti
    Pages 41-46
  5. Derailing Attacks (Transcript of Discussion)

    • Mohammad Torabi Dashti
    Pages 47-49
  6. Establishing Software-Only Root of Trust on Embedded Systems: Facts and Fiction

    • Yanlin Li, Yueqiang Cheng, Virgil Gligor, Adrian Perrig
    Pages 50-68
  7. Location-Private Interstellar Communication

    • Hugo Jonker, Sjouke Mauw, Saša Radomirović
    Pages 105-115
  8. The Lifetime of Android API Vulnerabilities: Case Study on the JavaScript-to-Java Interface

    • Daniel R. Thomas, Alastair R. Beresford, Thomas Coudray, Tom Sutcliffe, Adrian Taylor
    Pages 126-138
  9. Challenges of Fiction in Network Security – Perspective of Virtualized Environments

    • Vit Bukac, Radim Ostadal, Petr Svenda, Tatevik Baghdasaryan, Vashek Matyas
    Pages 145-151
  10. Device Attacker Models: Fact and Fiction

    • Jiangshan Yu, Mark D. Ryan
    Pages 158-167
  11. Smearing Fingerprints: Changing the Game of Web Tracking with Composite Privacy

    • Sandy Clark, Matt Blaze, Jonathan M. Smith
    Pages 178-182

Other Volumes

  1. Security Protocols XXIII

About this book

This book constitutes the thoroughly refereed post-workshop proceedings of the 23rd International Workshop on Security Protocols, held in Cambridge, UK, in March/April 2015. After an introduction the volume presents 18 revised papers each followed by a revised transcript of the presentation and ensuing discussion at the event. The theme of this year's workshop is "Information Security in Fiction and in Fact".

Editors and Affiliations

  • University of Hertfordshire, Hatfield, United Kingdom

    Bruce Christianson, James Malcolm

  • Faculty of Informatics, Masaryk University, Brno, Czech Republic

    Petr Švenda, Vashek Matyáš

  • University of Cambridge, Cambridge, United Kingdom

    Frank Stajano

  • Memorial University of Newfoundland, St. John's, Canada

    Jonathan Anderson

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access