University of Calgary
UofC Navigation

PST 2017 Accepted Papers

Arash Habibi Lashkari, Andi Fitriah A.Kadir, Hugo Gonzalez, Kenneth Fon Mbah and Ali A. Ghorbani.  Towards a Network-Based Framework for Android Malware Detection and Characterization.

Yuan Liu and Zheng Zhao. An Identity Management System Based on Blockchain. 

Anastasia Skovoroda and Dennis Gamayunov. Automated static analysis and classification of Android malware using permission and API calls models. 

Romeo Ayemele Djeujo and Christoph Ruland. Secret Matrix Lifecycle Management for Compressive Sensing based Cryptographic Mechanisms. (short paper)

Stefan Wueller, Ulrike Meyer and Susanne Wetzel. Privacy-Preserving Multi-Party Bartering Secure Against Active Adversaries. 

Giulia Traverso, Denise Demirel, Johannes Buchmann, Carlos Garcia Cordero, Sheikh Mahbub Habib, Mehrdad Nojoumian and Reza Azarderakhsh. Evidence-Based Trust Mechanism Using Clustering Algorithms for Distributed Storage Systems. (short paper)

Karthik Sheshadri, Nirav Ajmeri and Jessica Staddon. No (Privacy) News is Good News: An Analysis of New York Times and Guardian Privacy News from 2010 to 2016. 

Ahmad Akmal Aminuddin Mohd Kamal and Keiichi Iwamura. Conditionally Secure Multiparty Computation using Secret Sharing Scheme for n<2k-1 Evidence. 

Meredydd Williams, Jason Nurse and Sadie Creese. "Privacy is the boring bit": User perceptions and behavior in the Internet-of-Things. 

Stylianos Doudalis and Sharad Mehrotra. SORTaki: A Framework to Integrate Sorting with Differential Private Algorithms. 

Sébastien Canard, Sergiu Carpov, Donald Nokam Kuate and Renaud Sirdey. Running compression algorithms in the encrypted domain: a case-study on the homomorphic execution of RLE. 

Sébastien Canard, Baptiste Olivier and Tony Quertier. Differentially private instance-based noise mechanisms in practice. 

Lydia Garms, Siaw-Lynn Ng and Keith Martin. Reputation Schemes for Pervasive Social Networks with Anonymity. (short paper)

Yasushi Shinjo, Sota Naito, Xiao Kunyao and Akira Sato. ABnews: A fast private social messaging system using untrusted storage and attribute-based encryption. 

Petr Dzurenda, Sara Ricci, Jan Hajny and Lukas Malina. Performance Analysis and Comparison of Different Elliptic Curves on Smart Cards. 

Ju-Sung Kang, Hojoong Park and Yongjin Yeom. On the Additional Chi-square Tests for the IID Assumption of NIST SP 800-90B. 

Ruba Alomari, Miguel Vargas Martin, Shane Macdonald, Christopher Bellman, Ramiro Liscano and Amit Maraj. What your brain says about your password: Using brain-computer interfaces to predict password memorability. 

Marc-Andre Laverdiere and Ettore Merlo. Classification and Distribution of RBAC Privilege Protection Changes in Wordpress Evolution. (short paper)

Riham Altawy, Muhammad Elsheikh, Amr Youssef and Guang Gong.  Lelantos: A Blockchain-based Anonymous Physical Delivery System. 

Daniel Augot, Herva Chabanne, Olivier Clamot and William George.  Transforming face-to-face identity proofing into anonymous digital identity using the Bitcoin blockchain. 

Apostolis Zarras and Federico Maggi.  Hiding Behindthe Shoulders of Giants: Abusing Crawlers for Indirect Web Attacks. 

Meiqi He, Jun Zhang, Gongxian Zeng and Siu Ming Yiu.  A Privacy-preserving Multi-pattern Matching Scheme for Searching Strings in Cloud Database. 

Zeinab Joudaki, Julie Thorpe and Miguel Vargas Martin.  System-Assigned Passwords You Can't Write Down, But Don't Need To. 

Nurul Momen, Tobias Pulls, Lothar Fritsch and Stefan Lindskog.  How much Information do the Apps Need? Investigating Resource Usage by Installed Apps on Android. (short paper)

Hyunsung Lee, Seong Hoon Jeong and Huy Kang Kim.  OTIDS: A Novel Intrusion Detection System for In-vehicle Network by using Remote Frame.

Sourya Joyee De and Daniel Le Matayer.  Privacy Risk Analysis to Enable Informed Privacy Settings. 

Subhojeet Mukherjee, Jacob Walker, Indrakshi Ray and Jeremy Daily.  A Precedence Graph-Based Approach to Detect Message Injection Attacks in J1939 Based Networks. 

Ali Elshakankiry and Thomas Dean.  Context Sensitive and Secure Parser Generation for Deep Packet Inspection of Binary Protocols. 

Anis Bkakria, Mariem Graa, Nora Cuppens-Boulahia, Fradaric Cuppens and Jean-Louis Lanet.  Real-time detection and reaction to Activity hijacking attacks in Android smartphones. (short paper)

Khaoula Es-Salhi, David Espes and Nora Cuppens.  A new Segmentation Method for Integrated ICS Systems. (short paper)

Damien Ligier, Sergiu Carpov, Caroline Fontaine and Renaud Sirdey.  Information leakage analysis of inner-product functional encryption based data classification. 

Rebecca Cooper, Hala Assal and Sonia Chiasson.  Cross-national privacy concerns on data collection by government agencies. (short paper)

Andrew Cortese and Amirreza Masoumzadeh.  Modeling Exposure in Online Social Networks. 

Jeremy Martin, Dane Brown, Travis Mayberry, Kristofer Merrion, Erik Rye, Lamont Brown, Lucas Foppe and Collin Donahue.  How Much Privacy Does $3,165 Buy You? A Critical Look At Private OUI Registration. (short paper)

Mario Parreno-Centeno, Aad van Moorsel and Stefano Castruccio.  Smartphone Continuous Authentication Using Deep Learning Autoencoders. 

Akshaya Venkateswara Raja, Jehyun Lee and Debin Gao.  On Return Oriented Programming Threats in Android Runtime.

Seira Hidano, Takao Murakami, Shuichi Katsumata, Shinsaku Kiyomoto and Goichiro Hanaoka.  Model Inversion Attacks for Prediction Systems: Without Knowledge of Non-Sensitive Attributes.

Abhinav Jangda and Mohit Mishra.  RandHeap: Heap Randomization for mitigating Heap Spray Attacks in Virtual Machines.

Gongxian Zeng, Siu Ming Yiu, Jun Zhang and Hiroki Kuzuno.  A Nonoutsourceable Puzzle under GHOST Rule.

Tomoaki Mimoto, Nuttapong Attrapadung, Jacob Schuldt, Shinsaku Kiyomoto and Goichiro Hanaoka. A Taxonomy of Secure Two-party Comparison Protocols and Efficient Constructions.

Anna Squicciarini.  From Tag to Protect: A Tag-Driven Policy Recommender System for Image Sharing.