Workshop 2015 papers:

ASSD 2015:

Method Selection and Tailoring for Agile Threat Assessment and Mediation
Stephan Renatus, Clemens Teichmann, Jörn Eichler

Independent Security Testing on Agile Software Development: a Case Study in a Software Company
Jesus Choliz, Julian Vilas, Jose Moreira

Analysis of the Challenges of Developing Secure Software Using the Agile Approach
Hela Oueslati, Mohammad Masudur Rahman, Lotfi Ben Othmane

FARES 2015:

Towards the Forensic Identification and Investigation of Cloud Hosted Servers through Noninvasive Wiretaps
Hessel Shut, Mark Scanlon, Jason Farina, NhienAn LeKhac

Privacy and Trust in Smart camera sensor networks
Michael Loughlin, Asma Adnane

Towards a process centered resilience framework
Richard M. Zahoransky, Christian Brenig, Thomas Koslowski

Complexity Estimates of a SHA-1 Near-Collision Attack for GPU and FPGA
Stefan Gradinger, Bernhard Greslehner-Nimmervoll, Jürgen Fuß, Robert Kolmhofer

Security Monitoring of HTTP Traffic Using Extended Flows
Martin Husák, Petr Velan, Jan Vykopal

Impacts of Accommodations as Temporal Shelter for the Reassignment of Shelters Jurisdiction
Yu Ichifuji, Noriaki Koide, Noboru Sonehara

IWCC 2015

IWSMA 2015

Composition-malware: building Android malware at run time
Gerardo Canfora, Francesco Mercaldo, Corrado Aaron Visaggio, Giovanni Moriano

Network Security Challenges in Android Applications
Damjan Buhov, Markus Huber, Georg Merzdovnik, Edgar Weippl, Vesna Dimitrova

Effectiveness of Opcode ngrams for Detection of Multi Family Android Malware
Gerardo Canfora, Andrea De Lorenzo, Eric Medvet, Francesco Mercaldo, Corrado Aaron Visaggio

A Model for Specification and Validation of a Trust Management based Security Scheme in a MANET Environment
Aida Ben Chehida Douss, Ryma Abassi, Sihem Guemara El Fatmi

Trust Negotiation Based Approach to Enforce MANET Routing Security
Aida Ben chehida Douss, samiha ayed, ryma abassi , Nora Cuppens, sihem Guemara EL Fatmi

Risk Assessment of Public Safety and Security Mobile Service
Matti Peltola, Pekka Kekolahti

MFSec 2015:

AnonCall: Making Anonymous Cellular Phone Calls
Eric Chan-Tin

Image Watermaking With Biometric Data For Copyright Protection
Morgan Barbier, Jean-Marie Le Bars, Christophe Rosenberger

PScore: a framework for enhancing privacy awareness in online social networks
Georgios Petkos, Symeon Papadopoulos, Yiannis Kompatsiaris

Concept Detection on Multimedia Web Resources about Home Made Explosives
George Kalpakis, Theodora Tsikrika, Foteini Markatopoulou, Nikiforos Pittaras, Stefanos Vrochidis, Vasileios Mezaris, Ioannis Patras, Ioannis Kompatsiaris

Video spatio-temporal filtering based on cameras and target objects trajectories – Videosurveillance forensic framework
Dana Codreanu, Andre Peninou, Florence Sedes

A Framework for the Discovery, Analysis, and Retrieval of Multimedia Homemade Explosives Information on the Web
Theodora Tsikrika, George Kalpakis, Stefanos Vrochidis, Ioannis Kompatsiaris, Iraklis Paraskakis, Isaak Kavasidis, Jonathan Middleton, Una Williamson

SAW 2015:

Towards Black Box Testing of Android Apps
Yury Zhauniarovich, Anton Philippov, Olga Gadyatskaya, Bruno Crispo, Fabio Massacci

How Much Cloud Can You Handle?
Martin Jaatun, Inger Anne Tøndel

Generation of local and expected behaviors of a smart card application to detect software anomaly
Germain Jolly, Baptiste Hemery, Christophe Rosenberger

Personal Agent for Services in ITS
Shinsaku Kiyomoto, Toru Nakamura, Haruo Takasaki, Tatsuhiko Hirabayashi

A Performance Evaluation of Hash Functions for IP Reputation Lookup using Bloom Filters.
Hugo Gonzalez, Natalia Stakhanova

Towards a CERT-Communication Model as Basis to Software Assurance
Gerald Quirchmayr, Otto Hellwig

An Open Source Code Analyzer and Reviewer (OSCAR) Framework
Simon Tjoa, Patrick Kochberger, Christoph Malin, Andreas Schmoll

Securing web applications with better „patches“: an architectural approach for systematic input validation with security patterns
Jung-Woo Sohn, Jungwoo Ryoo

WCSF 2015: 

Evaluation of a Sector-hash Based Rapid File Detection Method for Monitoring Infrastructure-as-a-Service Cloud Platforms
Manabu Hirano, Hayate Takase, Koki Yoshida

Advanced Attribute-based Key Management for Mobile Devices in Hybrid Clouds
Jaemin Park, Eunchan Kim, Sungjin Park, Cheoloh Kang

Enabling Constraints and Dynamic Preventive Access Control Policy Enforcement in the Cloud
Somchart Fugkeaw, Hiroyuki Sato

Overview of the Forensic Investigation of Cloud Services
Jason Farina, Mark Scanlon, NhienAn LeKhac, Tahar Kechadi

WSDF 2015:

Challenges of Data Provenance for Cloud Forensic Investigations
Victoria Katilu, Virginia Franqueira, Olga Angelopoulou

Watch what you wear: preliminary forensic analysis of smart watches
Ibrahim Baggili, Kyle Anthony, Jeff Oduru, Frank Breitinger, Glenn McGee

Cold Boot Attacks on DDR2 and DDR3 SDRAM
Simon Lindenlauf, Hans Höfken, Marko Schuba

Behavioural Evidence Analysis Applied to Digital Forensics: An Empirical Analysis of Child Pornography Cases using P2P Networks
Noora Al Mutawa, Joanne Bryce, Virginia Franqueira, Andrew Marrington