This volume contains the proceedings of SHCIS '17, the 4th Workshop on Security in highly connected IT systems, organized by the Bavarian Research Alliance FORSEC and sponsored by the Bavarian State Ministry for Education, Science and the Arts.
Proceeding Downloads
Protecting JavaScript Apps from Code Analysis
Apps written in JavaScript are an easy target for reverse engineering attacks, e.g. to steal the intellectual property or to create a clone of an app. Unprotected JavaScript apps even contain high level information such as developer comments, if those ...
Anti-ProGuard: Towards Automated Deobfuscation of Android Apps
A wide adoption of obfuscation techniques by Android application developers, and especially malware authors, introduces a high degree of complication into the process of reverse engineering, analysis, and security evaluation of third-party and ...
Virtual Machine Introspection Based SSH Honeypot
A honeypot provides information about the new attack and exploitation methods and allows analyzing the adversary's activities during or after exploitation. One way of an adversary to communicate with a server is via secure shell (SSH). SSH provides ...
Interactive Visualization of Recommender Systems Data
Recommender systems provide a valuable mechanism to address the information overload problem by reducing a data set to the items that may be interesting for a particular user. While the quality of recommendations has notably improved in the recent years,...
Towards a Generic Architecture for Interactive Cost-Aware Visualization of Monitoring Data in Distributed Systems
The collection of monitoring data in distributed systems can serve many different purposes, such as system status monitoring, performance evaluation, and optimization. There are many well-established approaches for data collection and visualization in ...
Playing a Multi-objective Spot-checking Game in Public Transportation Systems
Public transportation systems represent an essential sector of any nation's critical infrastructure. Hence, continuity of their services is deemed important and with a high priority to the nations. Concerns over risks like terrorism, criminal offenses, ...
Towards a Multi-objective Optimization Model to Support Information Security Investment Decision-making
The protection of assets, including IT resources, intellectual property and business processes, against security attacks has become a challenging task for organizations. From an economic perspective, firms need to minimize the probability of a ...
Architecture for Resource-Aware VMI-based Cloud Malware Analysis
Virtual machine introspection (VMI) is a technology with many possible applications, such as malware analysis and intrusion detection. However, this technique is resource intensive, as inspecting program behavior includes recording of a high number of ...
Index Terms
- Proceedings of the 4th Workshop on Security in Highly Connected IT Systems
Recommendations
Design of Connected Objects: For a Mediation by Design
DTUC '18: Proceedings of the 1st International Conference on Digital Tools & Uses CongressFace à l'augmentation de la taille, la complexité, hétérogénéité et le changement technologique des solutions pour l'internet des objets(IdO), il convient de les décrire à un plus haut niveau d'abstraction (au-delà du code) avant de les implémenter ...
Acceptance Rates
Year | Submitted | Accepted | Rate |
---|---|---|---|
SHCIS '17 | 11 | 8 | 73% |
Overall | 11 | 8 | 73% |