FPS'2016 Accepted Papers


    Tarek Bouyahia, Nora Cuppens-Boulahia, Frédéric Cuppens and Fabien Autrel. Multi-Criteria Recommender Approach for Supporting Intrusion Response System

    Hélène Le Bouder, Ronan Lashermes, Gaël Thomas, Yanis Linge and Jean-Yves Zie. A Multi-Round Side Channel Attack on AES using Belief Propagation

    Richard Harang and Peter Mell. Micro-Signatures: The Effectiveness of Known Bad N-Grams for Network Anomaly Detection

    Erkan Ersan, Lior Malka and Bruce Kapron. Semantically Non-Preserving Transformations for Antivirus Evaluation

    Raphael Khoury, Sébastien Gaboury and Sylvain Hallé. Three Views of Log Trace Triaging

    Olivier Blazy, Xavier Bultel and Pascal Lafourcade. Anonymizable Ring Signature Without Pairing

    Salaheddine Zerkane, David Espes, Frédéric Cuppens and Philippe Le Parc. Vulnerability Analysis of Software Defined Networking

    Lyes Bayou, David Espes, Nora Cuppens-Boulahia and Frédéric Cuppens. Security analysis of WirelessHART communication scheme

    Jurek Czyzowicz,Adrian Kosowski, Evangelos Kranakis, and Najmeh Taleb. Patrolling Trees with Mobile Robots

    Nadine Herold, Matthias Wachs, Stephan-A. Posselt and Georg Carle. An Optimal Metric-Aware Response Selection Strategy for Intrusion Response Systems

    Guillaume Bonfante and Julien Oury Nogues. Function classification for the retro-engineering of malwares

    Andrew Bedford, Sébastien Garvin, Josée Desharnais, Nadia Tawbi, Hana Ajakan, Frédéric Audet and Bernard Lebel. Andrana: Quick and Accurate Malware Detection for Android

    Tushar Kanti Saha and Takeshi Koshiba. An Enhancement of Privacy-preserving Wildcards Pattern Matching

    Mina Sheikhalishahi, Mohamed Mejri, Nadia Tawbi and Fabio Martinelli. Privacy-aware Data Sharing in a Tree-based Categorical Clustering Algorithm

    Daniel Servos and Sylvia L. Osborn. Strategies for Incorporating Delegation into Attribute-Based Access Control (ABAC)

    Oscar Guillen, Fabrizio De Santis, Ralf Brederlow and Georg Sigl. Towards Side-Channel Secure Firmware Updates - A Minimalist Anomaly Detection Approach

    Antonio La Marra, Fabio Martinelli, Andrea Saracino and Mina Sheikhalishahi. MalProfiler: Automatic and Effective Classification of Android Malicious Apps in Behavioral Classes

    Zhongtian Chen and Hao Han. Attack Mitigation by Data Structure Randomization

    Nawaf Alhebaishi, Lingyu Wang, Sushil Jajoda and Anoop Singhal. Threat Modeling for Cloud Data Center Infrastructures

    Mickael Emirkanian-Bouchard and Lingyu Wang. Towards Metric-Driven, Application-Specific Visualization of Attack Graphs

    Saed Alrabaee, Paria Shirani, Mourad Debbabi and Lingyu Wang. On the Feasibility of Malware Authorship Attribution

    Sofiene Boulares, Kamel Adi and Luigi Logrippo. Insider threat likelihood assessment for access control systems: Quantitative approach

    Deepak Subramanian, Guillaume Hiet and Christophe Bidan. A self-correcting information flow control model for the web-browser