ARES 2016 Full Research papers:

A Host-based Intrusion Detection and Mitigation Framework for Smart Home IoT Using OpenFlow
Mehdi Nobakht, Vijay Sivaraman (NICTA, Australia) and Roksana Boreli (UNSW, Australia)

A recommender-based system for assisting non technical users in managing Android permissions
Arnaud Oglaza (IRIT, France), Romain Laborde, Francois Barrere (IRIT/SIERA, France) and Abdelmalek Benzekri (Université Toulouse 3 Paul Sabatier, France)

ARTIST: The Android Runtime Instrumentation Toolkit
Lukas Dresel, Mykolai Protsenko and Tilo Müller (FAU, Germany)

Byzantine Set-Union Consensus using Efficient Set Reconciliation
Florian Dold and Christian Grothoff (INRIA, France)

HyperCrypt: Hypervisor-based Encryption of Kernel and User Space
Johannes Götzfried, Nico Dörr, Ralph Palutke and Tilo Müller (FAU, Germany)

Development of an AUTOSAR Compliant Cryptographic Library on State-of-the-Art Automotive Grade Controllers
Pal-Stefan Murvay, Cristina Solomon, Alexandru Matei and Bogdan Groza (Politehnica University Timisoara, Romania)

Efficient and Privacy Preserving Third Party Auditing for a Distributed Storage System
Denise Demirel (CASED, Germany), Stephan Krenn, Thomas Loruenser (AIT, Austria) and Giulia Traverso (TU Darmstadt, Germany)

Introducing Proxy Voting to Helios
Oksana Kulyk, Karola Marky, Stephan Neumann and Melanie Volkamer (TU Darmstadt, Germany)

k -time Full Traceable Ring Signature
Xavier Bultel and Pascal Lafourcade (University Clermont Auvergne, LIMOS, France)

No Need for Black Chambers: Testing TLS in the E-mail Ecosystem at Large
Wilfried Mayer, Aaron Zauner, Martin Schmiedecker (SBA Research, Austria), Markus Huber (FH St. Pölten, Austria)

POTR: Practical On-the-fly Rejection of Injected and Replayed 802.15.4 Frames
Konrad-Felix Krentz, Christoph Meinel (Hasso-Plattner-Institut, Germany) and Maxim Schnjakin (Bundesdruckerei, Germany)

Revisiting a Watermark-based Detection Scheme to Handle Cyber-Physical Attacks
Jose Manuel Rubio Hernan, Luca De Cicco and Joaquin Garcia-Alfaro (Télécom SudParis, France)

Role Mining with Missing Values
Sokratis Vavilis, Alexandru Egner (Eindhoven University of Technology, Netherlands), Milan Petkovic (Philips Research Laboratories, Netherlands) and Nicola Zannone (Eindhoven University of Technology, Netherlands)

Selection of Mitigation Actions Based on Financial and Operational Impact Assessments
Gustavo Gonzalez Granadillo (CNRS Samovar UMR 5157, France), Alexander Motzek (Universitat zu Lubeck, Germany), Joaquin Garcia-Alfaro and Hervé Debar (CNRS Samovar UMR 5157, France)

Stopping amplified DNS DDoS attacks through query rate sharing between DNS resolvers
Saurabh Verma (University of Minnesota, US), Ali Hamieh (Rutgers Universty, US), Jun Ho Huh (Honeywell ACS Labs, US), Henrik Holm (Forest Glen Research, LLC, US), Siva Raj Rajagopalan (Honeywell ACS Labs, US), Nina Fefferman (Rutgers Universty, US) and Maciej Korczynski (Delft University of Technology, Netherlands)

Threat Modelling Service Security and Privacy as a Security Ceremony
Taciane Martimiano and Jean Everson Martina (Universidade Federal de Santa Catarina, Brazil)

Towards a CDS-Based Intrusion Detection Deployment Scheme for Securing Industrial Wireless Sensor Networks
Lyes Bayou, Nora Cuppens-Boulahia (Telecom Bretagne, France), David Espes (University of Brest, France) and Frédéric Cuppens (Telecom Bretagne, France)

Towards a metamodel for SABSA Conceptual Architecture Descriptions
Patrick Pleinevaux (Nagra, Switzerland)

Towards a Systemic Approach for Information Security Risk Management
Yannick Naudet, Nicolas Mayer and Christophe Feltus (Luxembourg Institute of Science and Technology, Luxembourg)

Towards Cycle-Accurate Emulation of Cortex-M Code to Detect Timing Side Channels
Johannes Bauer and Felix Freiling (FAU, Germany)

Using Expert Systems to Statically Detect “Dynamic” conflicts in XACML
Bernard Stepien, Amy Felty (University of Ottawa, Canada) and Stan Matwin (Dalhousie University, Canada)

ARES 2016 Short Research papers:

A Hazus-based method for assessing robustness of electricity supply to critical smart grid consumers during flood events
Alexandr Vasenev, Lorena Montoya (University of Twente, Netherlands) and Andrea Ceccarelli (University of Florence, Italy)

Access Control and Data Separation Metrics in Cloud Infrastructures
Bernd Jäger (Colt Technology Services, Germany), Reiner Kraft (Fraunhofer SIT, Germany), Sebastian Luhn (University of Munster, Germany), Annika Selzer and Ulrich Waldmann (Fraunhofer SIT, Germany)

An Empirical Study on GSN Usage Intention: Factors Influencing the Adoption of Geo-Social Networks
Esma Aimeur (University of Montreal, Canada), Sebastien Gambs (Université du Québec à Montréal, Canada) and Cheu Yien Yep (University of Montreal, Canada)

Energy Efficient Mutual Authentication and Key Agreement Scheme with Strong Anonymity Support for Secure Ubiquitious Roaming Services
Prosanta Gope, Ruei-Hau Hsu and Jemin Lee (Singapore University of Technology and Design, Singapore)

Hybrid Focused Crawling for Homemade Explosives Discovery on Surface and Dark Web
Christos Iliou, George Kalpakis, Theodora Tsikrika, Stefanos Vrochidis and Ioannis Kompatsiaris (CERTH, Greece)

IFCaaS: Information Flow Control as a Service for Cloud Security
Marwa Elsayed and Mohammad Zulkernine (Queen’s University, School of Computing, Canada)

Provable user authentication scheme in telecare medicine information system using elliptic curve cryptosystem
Toan Thinh Truong, Duong Tien Phan, Minh Triet Tran (University of Science, VNU-HCM, Vietnam), Anh Duc Duong (University of Information Technology, VNU-HCM, Vietnam) and Isao Echizen (National Institute of Informatics, Japan)

pwnPr3d: a Model-Based Probabilistic Threat Modeling Approach
Pontus Johnson, Alexandre Vernotte, Mathias Ekstedt and Robert Lagerström (KTH Royal Institute of Technology, Sweden)

Synchronous One Time Biometrics With Pattern Based Authentication
Patrick Lacharme and Christophe Rosenberger (ENSICAEN, France)

The Case for RAID 4: Cloud-RAID Integration with Local Storage
Christopher Hansen and James Archibald (Brigham Young University, US)

The Landscape of Domain Name Typosquatting: Techniques and Countermeasures
Jeffrey Spaulding (University at Buffalo, US), Shambhu Upadhyaya (SUNY at Buffalo, US) and Aziz Mohaisen (Verisign Labs, US)

Usable Privacy-aware Logging for Unstructured Log Entries
Christof Rath (Graz University of Technology, Austria)

V-DIFT: Vector-Based Dynamic Information Flow Tracking with Application to Locating Cryptographic Keys for Reverse Engineering
Antonio Espinoza, Jeffrey Knockel, Jedidiah Crandall (University of New Mexico, US) and Pedro Comesaña (University of Vigo, Spain)

Your Cloud in my Company: Modern Rights Management Services Revisited
Martin Grothe, Paul Roesler, Johanna Jupke, Jan Kaiser, Christian Mainka and Joerg Schwenk (Ruhr University Bochum, Germany)