Information Security 19th International Conference, ISC 2016, Honolulu, HI, USA, September 3-6, 2016. Proceedings

This book constitutes the refereed proceedings of the 19th International Conference on Information Security, ISC 2016, held in Honolulu, HI, USA, in September 2016. The 19 revised full papers presented together with 7 short papers were carefully reviewed and selected from 76 submissions. The confere...

Full description

Saved in:
Bibliographic Details
Main Authors Bishop, Matt, Nascimento, Anderson C. a
Format eBook Conference Proceeding
LanguageEnglish
Published Cham Springer Nature 2016
Springer International Publishing AG
Springer International Publishing
Springer
Edition1
SeriesLecture Notes in Computer Science
Subjects
Online AccessGet full text
ISBN331945871X
9783319458717
3319458701
9783319458700
ISSN0302-9743
1611-3349
DOI10.1007/978-3-319-45871-7

Cover

Abstract This book constitutes the refereed proceedings of the 19th International Conference on Information Security, ISC 2016, held in Honolulu, HI, USA, in September 2016. The 19 revised full papers presented together with 7 short papers were carefully reviewed and selected from 76 submissions. The conference focuses on following subjects technical aspects of information security, cryptanalysis, cryptographic protocols, network and systems security and access control, privacy and watermarking, software security, encryption, signatures and fundamentals.
AbstractList This book constitutes the refereed proceedings of the 19th International Conference on Information Security, ISC 2016, held in Honolulu, HI, USA, in September 2016. The 19 revised full papers presented together with 7 short papers were carefully reviewed and selected from 76 submissions. The conference focuses on following subjects technical aspects of information security, cryptanalysis, cryptographic protocols, network and systems security and access control, privacy and watermarking, software security, encryption, signatures and fundamentals.
Author Bishop, Matt
Nascimento, Anderson C. a
Author_xml – sequence: 1
  fullname: Bishop, Matt
– sequence: 2
  fullname: Nascimento, Anderson C. a
BookMark eNqN0D1PwzAQBmADBdGWbixsiAUxmPozZ49QFahUiQGE2CzHddrQNC5xCuLfkzYIMTJZJz_vK931UKcMpUfojJJrSggMNSjMMacaC6mAYthDPd6Mu-l1H3VpQinmXOiDvx8d1CWcMKxB8CPU1RK0kgDiGA1ifCOEUGCEJ7KLTidlFqqVrfNQnj95t6ny-usEHWa2iH7w8_bRy934efSAp4_3k9HNFFsGTACm2hLGGHiiZMrTNMky1fRSwVymHFMeEpY6p2fWumxmmXNCKa8zKjWfKed4H121xTYu_WdchKKO5qPwaQjLaJrlf1eCxg5bG9dVXs59ZVpFidmeaqsNN403u4DZJi7bxLoK7xsfa7Mrdr6sK1uY8e0oYVpySf8hpQTFRNLIi1Y6G22Rl7lZhTLMK7teRCMFlcAV_wZa9XtI
ContentType eBook
Conference Proceeding
Copyright Springer International Publishing Switzerland 2016
Copyright_xml – notice: Springer International Publishing Switzerland 2016
DBID I4C
DEWEY 005
DOI 10.1007/978-3-319-45871-7
DatabaseName Casalini Torrossa eBooks Institutional Catalogue
DatabaseTitleList
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISBN 331945871X
9783319458717
EISSN 1611-3349
Edition 1
1st Edition 2016
Editor Bishop, Matt
Nascimento, Anderson C A
Editor_xml – sequence: 1
  fullname: Bishop, Matt
– sequence: 2
  fullname: Nascimento, Anderson C A
ExternalDocumentID 9783319458717
418595
EBC6295351
EBC5578246
5415738
GroupedDBID 0D6
0DA
38.
AABBV
AAMCO
AAPIT
AAQZU
ABBVZ
ABMNI
ABOWU
ACLMJ
ADCXD
ADPGQ
AEDXK
AEJGN
AEKFX
AETDV
AEZAY
ALMA_UNASSIGNED_HOLDINGS
AORVH
AZZ
BBABE
CZZ
I4C
IEZ
LDH
NUC
SAO
SBO
SWNTM
TPJZQ
TSXQS
Z7R
Z7S
Z7U
Z7W
Z7X
Z7Y
Z7Z
Z81
Z83
Z84
Z87
Z88
AEJLV
Z85
-DT
-GH
-~X
1SB
29L
2HA
2HV
5QI
875
AASHB
ACGFS
AEFIE
EJD
F5P
FEDTE
HVGLF
LAS
P2P
RNI
RSU
SVGTG
VI1
~02
ID FETCH-LOGICAL-a27247-19a02227e085b3bb6ff8203142cf8c28e762bcc9daacfda2cc488e9f1593d8cc3
ISBN 331945871X
9783319458717
3319458701
9783319458700
ISSN 0302-9743
IngestDate Fri Nov 08 04:08:36 EST 2024
Wed Sep 17 03:55:43 EDT 2025
Fri May 30 22:01:40 EDT 2025
Fri May 30 23:21:36 EDT 2025
Tue Nov 14 22:50:42 EST 2023
IsPeerReviewed true
IsScholarly true
LCCallNum_Ident Q
Language English
LinkModel OpenURL
MeetingName International Conference on Information Security
MergedId FETCHMERGED-LOGICAL-a27247-19a02227e085b3bb6ff8203142cf8c28e762bcc9daacfda2cc488e9f1593d8cc3
OCLC 957985774
1189772015
PQID EBC5578246
PageCount 457
ParticipantIDs askewsholts_vlebooks_9783319458717
springer_books_10_1007_978_3_319_45871_7
proquest_ebookcentral_EBC6295351
proquest_ebookcentral_EBC5578246
casalini_monographs_5415738
PublicationCentury 2000
PublicationDate 2016
2016-08-25
PublicationDateYYYYMMDD 2016-01-01
2016-08-25
PublicationDate_xml – year: 2016
  text: 2016
PublicationDecade 2010
PublicationPlace Cham
PublicationPlace_xml – name: Netherlands
– name: Cham
PublicationSeriesSubtitle Security and Cryptology
PublicationSeriesTitle Lecture Notes in Computer Science
PublicationSeriesTitleAlternate Lect.Notes Computer
PublicationYear 2016
Publisher Springer Nature
Springer International Publishing AG
Springer International Publishing
Springer
Publisher_xml – name: Springer Nature
– name: Springer International Publishing AG
– name: Springer International Publishing
– name: Springer
RelatedPersons Kleinberg, Jon M.
Mattern, Friedemann
Naor, Moni
Mitchell, John C.
Terzopoulos, Demetri
Steffen, Bernhard
Pandu Rangan, C.
Kanade, Takeo
Kittler, Josef
Weikum, Gerhard
Hutchison, David
Tygar, Doug
RelatedPersons_xml – sequence: 1
  givenname: David
  surname: Hutchison
  fullname: Hutchison, David
  organization: Lancaster University, Lancaster, United Kingdom
– sequence: 2
  givenname: Takeo
  surname: Kanade
  fullname: Kanade, Takeo
  organization: Carnegie Mellon University, Pittsburgh, USA
– sequence: 3
  givenname: Josef
  surname: Kittler
  fullname: Kittler, Josef
  organization: University of Surrey, Guildford, United Kingdom
– sequence: 4
  givenname: Jon M.
  surname: Kleinberg
  fullname: Kleinberg, Jon M.
  organization: Cornell University, Ithaca, USA
– sequence: 5
  givenname: Friedemann
  surname: Mattern
  fullname: Mattern, Friedemann
  organization: CNB H 104.2, ETH Zurich, Zürich, Switzerland
– sequence: 6
  givenname: John C.
  surname: Mitchell
  fullname: Mitchell, John C.
  organization: Stanford, USA
– sequence: 7
  givenname: Moni
  surname: Naor
  fullname: Naor, Moni
  organization: Weizmann Institute of Science, Rehovot, Israel
– sequence: 8
  givenname: C.
  surname: Pandu Rangan
  fullname: Pandu Rangan, C.
  organization: Madras, Indian Institute of Technology, Chennai, India
– sequence: 9
  givenname: Bernhard
  surname: Steffen
  fullname: Steffen, Bernhard
  organization: Fakultät Informatik, TU Dortmund, Dortmund, Germany
– sequence: 10
  givenname: Demetri
  surname: Terzopoulos
  fullname: Terzopoulos, Demetri
  organization: University of California, Los Angeles, USA
– sequence: 11
  givenname: Doug
  surname: Tygar
  fullname: Tygar, Doug
  organization: University of California, Berkeley, USA
– sequence: 12
  givenname: Gerhard
  surname: Weikum
  fullname: Weikum, Gerhard
  organization: Max Planck Institute for Informatics, Saarbrücken, Germany
SSID ssj0001720365
ssj0002792
Score 2.3728054
Snippet This book constitutes the refereed proceedings of the 19th International Conference on Information Security, ISC 2016, held in Honolulu, HI, USA, in September...
SourceID askewsholts
springer
proquest
casalini
SourceType Aggregation Database
Publisher
SubjectTerms Computer programming, programs, data
Computer Science
Computer security-Congresses
Computer Systems Organization and Communication Networks
Computers and Society
Cryptology
Math Applications in Computer Science
Systems and Data Security
Subtitle 19th International Conference, ISC 2016, Honolulu, HI, USA, September 3-6, 2016. Proceedings
TableOfContents 4.1 Experimental Environment -- 4.2 Scalability -- 4.3 Resilience -- 4.4 Flexibility -- 5 Use Cases -- 5.1 Sharing Resources with Geographically Distributed Partners -- 5.2 Sharing Derived Information with Partners -- 6 Related Work -- 7 Conclusions -- References -- Privacy and Watermarking -- Leveraging Internet Services to Evade Censorship -- 1 Introduction -- 2 Threat Model -- 3 System Design -- 3.1 Abstract Architecture -- 3.2 Connector -- 3.3 Dispatcher -- 3.4 Plugins -- 4 Circumvention Systems -- 4.1 Email -- 4.2 VoIP and Instant Messaging -- 4.3 Online Gaming -- 4.4 File Sharing -- 5 Evaluation -- 5.1 Performance -- 5.2 Traffic Patterns -- 5.3 Real-World Deployment -- 6 Related Work -- 7 Conclusions -- References -- Analyzing Randomized Response Mechanisms Under Differential Privacy -- 1 Introduction -- 2 Background -- 2.1 Differential Privacy -- 2.2 Randomized Response Mechanisms -- 3 Analyzing the Randomized Response Mechanisms -- 4 Privacy Analysis -- 4.1 Analyzing the Variants -- 4.2 Analyzing Applications -- 5 Concluding Remarks -- References -- Models and Algorithms for Graph Watermarking -- 1 Introduction -- 2 Our Watermarking Framework -- 3 Identifying High- and Medium-Degree Vertices -- 4 Adversary Tolerance -- 5 Experiments -- References -- Software Security -- Policy-Based Implicit Attestation for Microkernel-Based Virtualized Systems -- 1 Introduction -- 2 Related Work -- 3 Scenario and Attacker Model -- 3.1 Data Integrity Protection and Attestation Scenario -- 3.2 Attacker Model -- 4 Microkernel-Based System Architecture with TPM 2.0 -- 5 Data Integrity Protection with Implicit Attestation -- 5.1 Notation -- 5.2 Cryptographic Keys -- 5.3 Phase 1: Setup -- 5.4 Phase 2: Data Integrity Protection with Implicit Attestation -- 6 Implementation -- 7 Security Discussion -- 8 Conclusion -- References
Generalized Dynamic Opaque Predicates: A New Control Flow Obfuscation Method
2.2 Correlation Between SNR and Power Consumption of an Interesting Point -- 3 Our Methods to Bias Power Traces -- 3.1 Biasing Power Traces by Using Minkowski Distance -- 3.2 Biasing Power Traces by Using the Sum of Probability Density Function Values of Power Consumption of Interesting Points -- 3.3 Biasing Power Traces by Directly Using Power Consumption of Interesting Points -- 3.4 How to Bias Power Traces Using the Above 4 Schemes -- 4 Experimental Results -- 4.1 Interesting Points Extraction -- 4.2 Comparison of Screening Accuracy -- 4.3 Comparison of Success Rates -- 5 Conclusion -- References -- Damaging, Simplifying, and Salvaging p-OMD -- 1 Introduction -- 1.1 Nonce-Misuse Forgery on p-OMD (Damaging) -- 1.2 Spoed (Simplifying) -- 1.3 Spoednic (Salvaging) -- 2 Security Model -- 2.1 Authenticated Encryption -- 2.2 (Tweakable) Keyed Compression Function -- 3 p-OMD -- 3.1 Preliminary Security Claims of p-OMD -- 3.2 Nonce-Misusing Attack on p-OMD -- 4 Spoed -- 4.1 Syntax -- 4.2 Generalized Padding -- 4.3 Data Processing -- 4.4 Security of Spoed -- 5 Spoednic -- 5.1 Security of Spoednic -- 6 Security of Spoed (Theorem 2) -- 6.1 Security of Tweakable Keyed Compression Function -- 6.2 Proof of Theorem 2 -- 7 Security of Spoednic (Theorem 3) -- 7.1 Security of Tweakable Keyed Compression Function -- 7.2 Proof of Theorem 3 -- References -- Cryptographic Protocols -- Blind Password Registration for Two-Server Password Authenticated Key Exchange and Secret Sharing Protocols -- 1 Introduction -- 2 Preliminaries -- 2.1 Commitments -- 2.2 Zero Knowledge Proofs -- 3 Two-Server Blind Password Registration -- 3.1 Security Model for 2BPR Protocols -- 4 An Efficient Two-Server BPR Protocol -- 4.1 Protocol Overview -- 4.2 Two-Server BPR Specification -- 4.3 Security Analysis -- 5 Performance and Use with 2PAKE/2PASS Protocols -- 6 Conclusion -- References
Intro -- Preface -- Organization -- Contents -- Cryptanalysis -- Truncated and Multiple Differential Cryptanalysis of Reduced Round Midori128 -- 1 Introduction -- 2 Specifications of Midori128 -- 2.1 Notations -- 2.2 Specifications -- 3 A 10-round Differential of Midori128 -- 4 13-round Truncated Differential Cryptanalysis of Midori128 -- 5 Multiple Differential Cryptanalysis of Midori128 -- 6 Conclusion -- References -- Improved Linear Cryptanalysis of Round-Reduced ARIA -- 1 Introduction -- 2 Specification of ARIA -- 2.1 Notations -- 3 Linear Cryptanalysis -- 4 Linear Cryptanalysis of ARIA -- 4.1 Key Recovery Attacks on ARIA -- 4.2 Recovering the Master Key -- 5 Conclusion -- References -- Partial Key Exposure Attacks on CRT-RSA: General Improvement for the Exposed Least Significant Bits -- 1 Introduction -- 1.1 Background -- 1.2 Our Contributions -- 1.3 Organization -- 2 Preliminaries -- 3 Lattice Construction of the Takayasu-Kunihiro -- 4 Our Proposed Attack -- 4.1 An Observation of the Previous Lattice -- 4.2 Our Lattice Construction -- 5 Concluding Remarks -- References -- Cryptanalysis and Improved Construction of a Group Key Agreement for Secure Group Communication -- 1 Introduction -- 2 Preliminary -- 2.1 NTRU Public Key Cryptosystem -- 3 Description of an NTRU-Based Group Key Agreement -- 3.1 An NTRU-Based Group Key Agreement -- 4 Attack on NTRU-Based Group Key Agreement -- 4.1 Ciphertext-Only Attack -- 4.2 Further Analysis -- 4.3 Experiment Results -- 5 An Improved NTRU-Based Group Key Agreement -- 5.1 The Improved Group Key Agreement -- 5.2 Security Analysis -- 6 Conclusion -- References -- Enhanced Correlation Power Analysis by Biasing Power Traces -- 1 Introduction -- 1.1 Related Works -- 1.2 Our Contributions -- 1.3 Organization -- 2 The Statistical Characteristics of Power Traces -- 2.1 Composition of Power Consumption
Chip Authentication for E-Passports: PACE with Chip Authentication Mapping v2 -- 1 Introduction -- 2 Preliminaries -- 2.1 Bilinear Maps -- 2.2 Assumptions and Cryptographic Primitives -- 2.3 Security Model -- 3 Generic Version of the Chip Authentication Mapping -- 4 Conclusion -- References -- AEP-M: Practical Anonymous E-Payment for Mobile Devices Using ARM TrustZone and Divisible E-Cash -- 1 Introduction -- 1.1 Our Contribution -- 1.2 Related Work -- 2 Preliminaries -- 2.1 Notation -- 2.2 ARM TrustZone -- 2.3 Physical Unclonable Functions -- 3 System Model and Assumptions -- 3.1 System Model -- 3.2 Assumptions and Threat Model -- 4 AEP-M Scheme for Mobile Devices -- 4.1 The Architecture of Trusted Mobile Device -- 4.2 Key Derivation and Sensitive Data Management -- 4.3 The Details of AEP-M Scheme -- 4.4 Optional Defense Mechanisms and Security Analysis -- 5 Implementation and Evaluation -- 5.1 Implementation -- 5.2 Efficiency and Performance Evaluation -- 6 Conclusion -- References -- Universally Composable Two-Server PAKE -- 1 Introduction -- 2 Preliminaries and Building Blocks -- 2.1 Smooth Projective Hashing (SPHF) -- 2.2 Trapdoor Smooth Projective Hashing -- 2.3 Distributed Smooth Projective Hashing -- 2.4 Ideal Functionalities -- 3 Trapdoor Distributed Smooth Projective Hashing -- 3.1 Cramer-Shoup TD-SPHF -- 4 Universally Composable Two-Server PAKE -- 4.1 The Protocol -- 4.2 Ideal Functionality for 2PAKE -- 4.3 Security -- 5 F2PAKE Discussion -- 6 Conclusion -- References -- Yet Another Note on Block Withholding Attack on Bitcoin Mining Pools -- 1 Introduction -- 1.1 Contribution -- 2 Related Work -- 3 Preliminaries -- 3.1 Bitcoin Mining and Block Withholding Attack -- 3.2 Notations and Terminologies -- 4 Analysis of BWH Attack -- 5 Proposed Remedy to BWH Attack -- 6 Conclusion -- References -- Network and Systems Security and Access Control
Cyber Security Risk Assessment of a DDoS Attack -- 1 Introduction to InfoSec Risk Assessment -- 1.1 Distributed Denial of Service Attacks -- 1.2 Related Work in ISRA -- 2 Choice of Methods -- 2.1 Fundamentals of Risk Analysis -- 2.2 Proposed Methodology for Qualitative Risk Analysis -- 2.3 Methodology for Statistical Risk Analysis -- 3 Case Study: Qualitative Risk Assessment of a DDoS Attack -- 3.1 Events and Results -- 4 Quantitative Risk Analysis -- 4.1 Risk Calculations -- 4.2 Probabilistic Modeling for Risk Estimation -- 5 Discussion and Conclusion -- 5.1 Adjusting for Knowledge-Based Probability Estimations -- 5.2 Limitations and Future Work -- 5.3 Conclusion -- References -- Moving Target Defense Against Network Reconnaissance with Software Defined Networking -- 1 Introduction -- 2 Background -- 2.1 Moving Target Defense -- 2.2 Network Scan -- 2.3 Software-Defined Networking -- 3 System Architecture -- 3.1 Scan Sensor -- 3.2 Reflector -- 3.3 Shadow Network -- 4 Design and Implementation -- 4.1 Design Principles -- 4.2 Prototype Implementation -- 5 Evaluation -- 6 Related Work -- 7 Conclusion -- References -- Uni-ARBAC: A Unified Administrative Model for Role-Based Access Control -- 1 Introduction -- 2 Background and Related Work -- 3 The Uni-ARBAC Model -- 3.1 Uni-ARBAC Operational Model -- 3.2 Uni-ARBAC Administrative Model -- 3.3 Uni-ARBAC Invariants -- 4 Variations of Uni-ARBAC -- 4.1 Aggressive Inheritance Model -- 4.2 No Self-administration Model -- 5 Engineering Administrative Units -- 6 Conclusion -- References -- SKALD: A Scalable Architecture for Feature Extraction, Multi-user Analysis, and Real-Time Information Sharing -- 1 Introduction -- 2 System Overview -- 2.1 Planner -- 2.2 Planner Themes -- 2.3 Service -- 2.4 Transport -- 3 System Wide Aspects -- 3.1 Quality of Service -- 3.2 Access Control Layer -- 4 Evaluation
Title Information Security
URI http://digital.casalini.it/9783319458717
https://ebookcentral.proquest.com/lib/[SITE_ID]/detail.action?docID=5578246
https://ebookcentral.proquest.com/lib/[SITE_ID]/detail.action?docID=6295351
http://link.springer.com/10.1007/978-3-319-45871-7
https://www.vlebooks.com/vleweb/product/openreader?id=none&isbn=9783319458717
Volume 9866
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3NT9swFLcGu8AFGJ1WvhRNHCahTDiOvw4coOqEqoJ2gKo3y3Hsy6YikcCBv57nOG7SDqFtlyiKkvTl_fq-_PzeQ-hUWCKYyEjqe12lecldKhm1qSBacoe5KwofKN7csuv7fDKn866svakuqYvv5uXNupL_QRWuAa6-SvYfkF2-FC7AOeALR0AYjmvO75t2pi0lamU-zKELWsJ3L64upm1-4PahbrZdncURDlGi-yE_Xg_545Lf2qJht261EiMSELKcglie91QLAT0IkURQLTaoPuYbGpLQQDTqRinCTJQ_FG1_b4Wvg_K_gFPeWZXlXj_fHUfSDbTBOWidj5fjyXTWrYL5LDDrAhbfzjDkfQJ9vhon0o9Dv6Tue2KSuu0TvELINtrW1S-wE2BD6so7HbrSvtZ0JZJYS343PsXdLhp01ZbJzyW-e-iDXXxCOxGrpMVqH-338E4i3gM0-zG-G12n7VCLVGc8y3mKpW4KkC04uwUpCuYceGEE55lxwmTCgnkqjJGl1saVOjMGdKyVDvxOUgpjyGe0uXhY2C8oYecOoo5M0mZqDHVa4lKCT22toAbiyiH62mOCev7dJOAr1eMi5kN0GHmjQD5Co_RKUfDsOIFXJJFdqnm63TOsxlcj6kch5Oy9WxgQRygeom-R0yqQELtlAymKKCBGNdQofvD3tx6irU46jtBm_fhkj8FFrIuT9n_2CjECWRI
linkProvider Library Specific Holdings
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=Information+Security&rft.series=Lecture+Notes+in+Computer+Science&rft.date=2016-01-01&rft.pub=Springer+International+Publishing&rft.isbn=9783319458700&rft.issn=0302-9743&rft.eissn=1611-3349&rft.volume=9866&rft_id=info:doi/10.1007%2F978-3-319-45871-7&rft.externalDocID=418595
thumbnail_m http://utb.summon.serialssolutions.com/2.0.0/image/custom?url=https%3A%2F%2Fvle.dmmserver.com%2Fmedia%2F640%2F97833194%2F9783319458717.jpg
thumbnail_s http://utb.summon.serialssolutions.com/2.0.0/image/custom?url=https%3A%2F%2Fmedia.springernature.com%2Fw306%2Fspringer-static%2Fcover-hires%2Fbook%2F978-3-319-45871-7