ARES 2014 Full Research papers:
A Formal Model and Analysis of the MQ Telemetry Transport Protocol
Benjamin Aziz (University of Portsmouth, UK)
A Model-based Security Toolkit for the Internet of Things
Ricardo Neisse, Igor Nai Fovino, Gianmarco Baldini (European Commission Joint Research Centre)
A New Access Control Scheme for Facebook-style Social Networks
Jun Pang, Yang Zhang (University of Luxembourg, Luxembourg)
BitTorrent Sync: Network Investigation Methodology
Mark Scanlon, Jason Farina, M-Tahar Kechadi (University College Dublin, Ireland)
Divide-and-Conquer: Why Android Malware cannot be stopped
Dominik Maier, Tilo Müller, Mykola Protsenko (FAU Erlangen-Nürnberg, Germany)
DroidForce: Enforcing Complex, Data-Centric, System-Wide Policies in Android
Siegfried Rasthofer, Steven Arzt (TU Darmstadt, Germany), Enrico Lovat (TU Munich, Germany), Eric Bodden (TU Darmstadt, Germany)
Enhanced Configuration Generation Approach for Highly Available COTS Based Systems
Parsa Pourali (Concordia University, Canada) Maria Toeroe (Ericsson), Ferhat Khendek (Concordia University, Canada)
Lobotomy: An Architecture for JIT Spraying Mitigation
Martin Jauernig, Matthias Neugschwandtner (Vienna University of Technology, Austria), Paolo Milani-Comparetti (Lastline Inc.), Christian Platzer (Vienna University of Technology, Austria)
No Smurfs: Revealing Fraud Chains in Mobile Money Transfers
Maria Zhdanova, Juergen Repp, Roland Rieke (Fraunhofer SIT, Germany), Chrystel Gaber (Orange, France), Baptiste Hemery (Normandie University, France)
Phishdentity: Leverage Website Favicon to Offset Polymorphic Phishing Website
Jeffrey Soon Fatt Choo, Kang Leng Chiew, San Nah Sze (Universiti Malaysia Sarawak, Malaysia)
Practical Attack on Bilinear Pairings to Disclose the Secrets of Embedded Devices
Thomas Unterluggauer, Erich Wenger (IAIK, TU Graz, Austria)
Rethread: A Low-cost Transient Fault Recovery Scheme for Multithreaded Processors
Jian Fu, Qiang Yang, Raphael Poss, Chris Jesshope (University of Amsterdam, The Netherlands), Chunyuan Zhang (National University of Defense Technology, China)
Visualizing Transaction Context in Trust and Reputation Systems
Johannes Sänger, Günther Pernul (University of Regensburg, Germany)
ARES 2014 Short Research papers:
AES-SEC: Improving software obfuscation through hardware-assistance
Sebastian Schrittwieser (FH St. Pölten, Austria), Stefan Katzenbeisser (TU Darmstadt, Germany), Georg Merzdovnik, Peter Kieseberg, Edgar Weippl (SBA Research, Austria)
An Enhanced Linkable Anonymous Access Protocol of the Distributed Electronic Patient Records
Ning Zhang, Rima Addas (The University of Manchester, UK)
An Incident Management Ontology
David Mundie, Samuel Perl, Ruefle Robin (CERT)
Continuous and Non-Intrusive Reauthentication of Web Sessions based on Mouse Dynamics
Eric Medvet, Alberto Bartoli, Francesca Boem, Fabiano Tarlao (University of Trieste, Italy)
EM Leakage of RFID Devices – Comparison of Two Measurement Approaches
Thomas Korak (IAIK, TU Graz, Austria), Thomas Plos (NXP, Austria)
Healthcare Services in the Cloud – Obstacles to Adoption, and a Way Forward
Karin Bernsmed, Daniela Soares Cruzes, Martin Gilje Jaatun, Børge Haugset, Erlend Andreas Gjære (SINTEF ICT, Norway)
Palpable Privacy through Declarative Information Flows Tracking for Smart Buildings
François Lesueur, Sabina Surdu, Romuald Thion, Yann Gripay, Meriam Ben Ghorbel-Talbi (INSA Lyon, France)
Privacy Dashboards: A means to reconcile data-driven business models and privacy?
Christian Zimmermann, Rafael Accorsi (University of Freiburg, Germany)
Recurrent Queries in Location Based Services
Emad Elabd, Mohand-Said Hacid (LIRIS Lyon, France)
Supporting Security Automation for Multi-Chassis Link Aggregation Groups via the Interconnected-asset Ontology
Henk Birkholz, Ingo Sieverdingbeck (Fraunhofer SIT, Germany)
What does the Fox Say? On the Security Architecture of Firefox OS
Marta Piekarska, Bhargava Shastry, Ravishankar Borgaonkar (TU Berlin, Germany)
Verification of Implementing Security Design Patterns Using a Test Template
Masatoshi Yoshizawa (Waseda University, Japan), Nobukazu Yoshioka (GRACE Center, Japan), Takao Okubo (Graduate School of Information Security, Japan) Haruhiko Kaiya (Shinshu University, Japan), Hironori Washizaki, Yoshiaki Fukazawa (Waseda University, Japan)