SEC 2017
32nd International Conference on
ICT Systems Security and Privacy Protection - IFIP SEC 2017
May 29 - 31, 2017, Rome, Italy
National Research Council of Italy

Program Committee
Call for Papers
Important Dates
Paper Submission
Conference Program
Co-Located Events
Social Program
Travel Information
Conference Venue
Keynote Speakers

Conference Program

This year 38 papers out of 196 submitted were accepted.
List of accepted papers (in alphabetical order of title):

  • Khondker Jahid Reza, Md Zahidul Islam and Vladimir Estivill-Castro: 3LP: Three Layers of Protection for Individual Privacy in Facebook
  • Warren J Connell, Massimiliano Albanese and Sridhar Venkatesan: A Framework for Moving Target Defense Quantification
  • Michael Denzel, Mark Ryan and Eike Ritter: A Malware-Tolerant, Self-Healing Industrial Control System Framework
  • Umberto Morelli and Silvio Ranise: Assisted Authoring, Analysis and Enforcement of Access Control Policies in the Cloud
  • Lina Nouh, Ashkan Rahimian, Djedjiga Mouheb, Mourad Debbabi and Aiman Hanna: BinSign: Fingerprinting Binary Functions to Support Automated Analysis of Code Executables
  • Joseph Hallett and David Aspinall: Capturing Policies for BYOD
  • Julian Kirsch, Clemens Jonischkeit, Thomas Kittel, Apostolis Zarras and Claudia Eckert: Combating Control Flow Linearization
  • Lin Yuan, Joël Theytaz and Touradj Ebrahimi: Context-Dependent Privacy-Aware Photo Sharing based on Machine Learning
  • Thibaud Antignac, David Sands and Gerardo Schneider: Data Minimisation: a Language-Based Approach
  • Cecilia Pasquini, Pascal Schoettle and Rainer Boehme: Decoy Password Vaults: (At Least) As Hard As Steganography?
  • Mariem Graa, Nora Cuppens, Frédéric Cuppens, Jean-Louis Lanet and Routa Moussaileb: Detection of Side Channel Attacks based on Data Tainting in Android Systems
  • Jun Wang and Qiang Tang: Differentially Private Neighborhood-based Recommender Systems
  • Stephan Neumann, Melanie Volkamer and Manuel Noll: Election-Dependent Security Evaluation ofInternet Voting Schemes
  • David Lorenzi, Jaideep Vaidya, Achyuta Aich, Shamik Sural, Vijay Atluri and Joseph Calca: EmojiTCHA: Using Emotion Recognition to Tell Computers and Humans Apart
  • Edoardo Serra, Jaideep Vaidya, Haritha Akella and Ashish Sharma: Evaluating the Privacy Implications of Frequent Itemset Disclosure
  • Gheorghe Florin Hajmasan, Alexandra Mondoc, Radu Marian Portase and Octavian Cret: Evasive Malware Detection using Groups
  • Jihye Kim and Hyunok Oh: Forward-Secure Digital Signature Schemes with Optimal Computation and Storage of Signers
  • Liwei Chen, Mengyu Ma, Wenhao Zhang, Gang Shi and Dan Meng: Gadget Weighted Tagging: A Flexible Framework to Protect Against Code Reuse Attacks
  • Jeffrey Avery and Eugene Spafford: Ghost Patches: Fake Patches for Fake Vulnerabilities
  • Roberto Di Pietro, Federico Franzoni and Flavio Lombardi: HyBIS: Advanced Introspection for Effective Windows Guest Protection
  • Jean-Francois Couchot, Raphael Couturier and Michel Salomon: Improving Blind Steganalysis in Spatial Domain using a Criterion to Choose the Appropriate Steganalyzer between CNN and SRM+EC
  • Lydia Kraus, Robert Schmidt, Marcel Walch, Florian Schaub and Sebastian Möller: On the Use of Emojis in Mobile Authentication
  • Somayeh Taheri, Md Morshedul Islam and Reihaneh Safavi-Naini: Privacy-enhanced Profile-based Authentication using Sparse Random Projection
  • David Myers, Kenneth Radke, Suriadi Suriadi and Ernest Foo: Process Discovery for Industrial Control System Cyber Attack Detection
  • Ruben Rios, David Nuñez and Javier Lopez: Query Privacy in Sensing-as-a-Service Platforms
  • Alessio Merlo and Gabriel Claudiu Georgiu: RiskInDroid: Machine Learning-based Risk Analysis on Android
  • Andreas Fuchs, Christoph Krauß and Jürgen Repp: Runtime Firmware Product Lines using TPM2
  • Hafiz Asif, Jaideep Vaidya, Basit Shafiq and Nabil Adam: Secure and Efficient k-NN Queries
  • Robert Riemann and Stephane Grumbach: Secure and Trustable Distributed Aggregation based on Kademlia
  • Pablo Picazo-Sanchez, Raúl Pardo and Gerardo Schneider: Secure Photo Sharing in Social Networks
  • Hongfa Xue, Yurong Chen, Fan Yao, Yongbo Li, Tian Lan and Guru Venkataramani: SIMBER: Eliminating Redundant Memory Bound Checks via Statistical Inference
  • Túlio Pascoal, Yuri Gil Dantas, Iguatemi E Fonseca and Vivek Nigam: Slow TCAM Exhaustion DDoS Attack
  • Vasiliki Diamantopoulou, Christos Kalloniatis, Stefanos Gritzalis and Haralambos Mouratidis: Supporting Privacy by Design using Privacy Process Patterns
  • Minsik Shin, Jungbin Yu, Youngjin Yoon and Taekyoung Kwon: The Fuzzing Awakens: File Format-Aware Mutational Fuzzing on Smartphone Media Server Daemons
  • Andrei Costin, Apostolis Zarras and Aurélien Francillon: Towards Automated Classification of Firmware Images and Identification of Embedded Devices
  • Rene Meis and Maritta Heisel: Towards Systematic Privacy and Operability (PRIOP) Studies
  • Wilfried Mayer and Martin Schmiedecker: Turning Active TLS Scanning to Eleven
  • Ahmed Seid Yesuf, Jetzabel Serna-Olvera and Kai Rannenberg: Using Fraud Patterns for Fraud Risk Assessment of E-services