JavaScript Malware Detection Using Locality Sensitive Hashing (Stefan Carl Peiser, Ludwig Friborg, Riccardo Scandariato).Pages 143-154 Privacy CURE: Consent Comprehension Made Easy (Olha Drozd, Sabrina Kirrane).Pages 124-139
Improving Big Data Clustering for Jamming Detection in Smart Mobility (Hind Bangui, Mouzhi Ge, Barbora Buhnova).Pages 78-91Īssisting Users to Create Stronger Passwords Using ContextBased MicroTraining (Joakim Kävrestad, Marcus Nohlberg).Pages 95-108įacilitating Privacy Attitudes and Behaviors with Affective Visual Design (Agnieszka Kitkowska, Yefim Shulman, Leonardo A. MultiTLS: Secure Communication Channels with Cipher Suite Diversity (Ricardo Moura, David R. Refined Detection of SSH Brute-Force Attackers Using Machine Learning (Karel Hynek, Tomáš Beneš, Tomáš Čejka, Hana Kubátová).Pages 49-63 IE-Cache: Counteracting Eviction-Based Cache Side-Channel Attacks Through Indirect Eviction (Muhammad Asim Mukhtar, Muhammad Khurram Bhatti, Guy Gogniat).Pages 32-45
Leaky Controller: Cross-VM Memory Controller Covert Channel on Multi-core Systems (Benjamin Semal, Konstantinos Markantonakis, Raja Naeem Akram, Jan Kalbantner).Pages 3-16Įvaluation of Statistical Tests for Detecting Storage-Based Covert Channels (Thomas A.