Workshop 2016 papers:

ASSD 2016:

Agile Team Members Perceptions on Non-Functional Testing – Influencing Factors from an Empirical Study
Cristina Rosa Camacho, Sabrina Marczak (PUCRS University, Brazil), Daniela S. Cruzes (SINTEF, Norway)

An Empirical Study on the Relationship between Software Security Skills, Usage and Training needs in Agile Settings
Tosin Daniel Oyetoyan, Daniela S. Cruzes, Martin Gilje Jaatun(SINTEF, Norway)

Case Study of Security Development in an Agile Environment: Building Identity Management for a Government Agency
Kalle Rindell, Sami Hyrynsalmi, Ville Leppänen (University of Turku, Finland)

Misuse, Abuse, and Reuse: Economic utility functions for characterising security requirements
Andrew Simpson,  Chad Heitzenrater (University of Oxford, United Kingdom)

SecDevOps:Is It a Marketing Buzzword? Mapping Research on Security in DevOps
Vaishnavi Mohan (TU Darmstadt, Germany), Lotfi Ben Othmane (Fraunhofer SIT, Germany)

Towards Effective Security Assurance for Incremental Software Development – The Case of Zen Cart Application
Lotfi Ben Othmane, Azmat Ali (Fraunhofer SIT, Germany)

FARES 2016:

Caller-Centrality: Identifying SPIT caller in a VoIP Network
Muhammad Ajmal Azad (INESC FEUP, Portugal), Syed Khurram Rizi (NUST, Pakistan)

Collaborative Attribute Retrieval in Environment with Faulty Attribute Managers
Mario Faiella, Fabio Martinelli, Paolo Mori, Andrea Saracino, Mina Sheikhalishai (IIT-CNR, Italy)

Recognizing Time-Efficiently Local Botnet Infections – A Case Study
Ina Schiering, Tanja Heuer (Ostfalia University of Applied Sciences, Germany), Martin Seeger (NetUSE AG), Frank Klawonn, Alexander Gabel (Ostfalia University of Applied Sciences, Germany)

VoIP Profiler: Profiling Voice Over IP User Communication Behavior
Sainath Batthala, Neminath Hubballi, Mayank Swarnkar (Indian Institute of Technology Indore, India), Maitreya Natu (Tata Consultancy Services, India)

IPSM 2016

Major Challenges in Structuring and Institutionalizing CERT-Communication
Otto Hellwig (SBA Research, Austria), Gerald Quirchmayr (University of Vienna, Austria), Edith Huber (Danube University Krems, Austria), Gernot Goluch (SBA Research, Austria), Franz Vock (Feder Chancellery, Bundeskanzleramt, Austria), Bettina Pospisil (Danube University Krems, Austria)

Privacy Impact Assessment Template for Provenance
Jenni Reuben, Leonardo Martucci, Simone Fischer-Hübner, Hans Hedbom (Karlstad University, Sweden), Heather Packer, Luc Moreau (University of Southampton, United Kingdom)

The Perfect Storm: The Privacy Paradox and the Internet-of-Things
Meredydd Williams, Jason Nurse, Sadie Creese (University of Oxford, United Kingdom)

Towards a Complex Systems Approach to Legal and Economic Impact Analysis of Critical Infrastructures
Thomas Schaberreiter (University of Oulu, Finland), Gerald Quirchmayr (University of Vienna, Austria), Anna-Maija Juuso (University of Oulu, Finland), Moussa Ouedraogo (Luxembourg Institute of Science and Technology, Luxembourg), Juha Röning (University of Oulu, Finland)

IWCC 2016:

Law Enforcement Access to Password Protected and/or Encrypted Mobile Data
Murdoch Watney (University of Johannesburg, South Africa)

Malware in Pirated Software: Case Study of Malware Encounters in Personal Computers
Svrana Kumar, Logesh Madhavan, Mangalam Nagappan, Biplab Sikdar (National University of Singapore, Singapore)

Threat from Within: Case studies of insiders who committed information technology sabotage
Jason Clark (Carnegie Mellon University, United States)

Towards Digital Investigation in Virtual Networks: A Study of Challenges and Open Problems
Daniel Spiekermann, Tobias Eggendorfer (FernUni-Hagen, Germany)

IWSMA 2016:

Hand Dynamics for Behavioral User Authentication
Fuensanta Torres Garcia, Katharina Krombholz, Rudolf Mayer and Edgar Weippl (SBA Research, Austria)

Lightweight Encryption for Smart Home
Sanaah Al Salami, Joonsang Baek, Khaled Salah and Ernesto Damiani (Khalifa University of Science, Technology and Research, UAE)

Notary-assisted Certificate Pinning for Improved Security of Android Apps
Georg Merzdovnik, Damjan Buhov, Artemios Voyiatzis and Edgar Weippl (SBA Research, Austria)

Spotting the Malicious Moment: Characterizing Malware Behavior Using Dynamic Features
Alberto Ferrante (Università della Svizzera italiana, Switzerland), Eric Medvet (DIA – University of Trieste, Italy),
Francesco Mercaldo (University of Sannio, Italy), Jelena Milosevic (Università della Svizzera italiana, Switzerland) and Corrado Aaron Visaggio (University of Sannio, Italy)

SAW 2016:

A Security Game Model for Remote Software Protection
Nicola Basilico, Andrea Lanzi, Mattia Monga (Università degli Studi di Milano, Italy)

A Type System for Quantified Information-Flow Security in Java-Like Languages
Gohar Shakoori, Mehran Fallah, Zeinab Iranmanesh (Amirkabir University of Technology, Iran)

Authentication Techniques in the Context of E-participation: Current Practice, Challenges, and Recommendations
Maria Leitner, Arndt Bonitz (AIT, Austria)

How Secure are Web Servers? An Empirical Study of Slow HTTP DoS Attacks and Detection
Neminath Hubballi, Nikhil Tripathi, Yogendra Singh (IIT Indore, India)

On Analyzing Program Behavior Under Fault Injection Attacks
Jakub Breier (Nanyang Technological University, Singapore)

SPARER: Secure Cloud-Proof Storage for e-Health Scenarios
Gabriela Gheorghe (Interdisciplinary Centre for Security, Reliability and Trust, Luxembourg), Muhammad Rizwan Asghar (University of Auckland, New Zealand), Jean Lancrenon (Interdisciplinary Centre for Security, Reliability and Trust, Luxembourg), Sankalp Ghatpande (University of Luxembourg, Luxembourg)

Towards a Unified Secure Cloud Service Development and Deployment Life-cycle
Aleksandar Hudic (AIT, Austria), Matthias Flittner (Karlsruhe Institute of Technology, Germany), Thomas Loruenser, Philipp Radl (AIT, Austria), Roland Bless (Karlsruhe Institute of Technology, Germany) 

SecATM 2016:

Addressing Security in the ATM Environment
Patrizia Montefusco (Finmeccanica, Italy), Rosana Casar Rodriguez (ISDEFE, Spain), Tim H. Stelkens-Kobsch (DLR, Germany), Rainer Koelle (University of Lancaster, United Kingdom)

Air Traffic Management Security Research in SESAR
John Hird (EUROCONTROL, Belgium), Martin Hawley (Winsland Ltd, UK), Chris Machin (Aztech BVBA, Belgium)

A Model-Based Approach for Aviation Cyber Security Risk Assessment
Tobias Kiesling, Josef Niederl, Jürgen Ziegler (IABG, Germany), Matias Krempel (DFS GmbH, Germany)

A New Vision for ATM Security Management – The Security Management Platform
Claudio Porretti (Finmeccanica S.p.A., Italy), Raoul Lahaije (42Solutions, Netherlands), Denis Kolev (University of Lancaster, UK)

‘CTRL_S’ – A security tool for SESAR’s design-in security approach
Karol Gotz (Winsland Ltd, Slovakia), Martin Hawley (Winsland Ltd, United Kingdom), John Hird (EUROCONTROL, Belgium), Chris Machin (Aztech BVBA, Belgium)

Cyber Security Incident Management in the Aviation Domain
Martin Gilje Jaatun (SINTEF ICT, Norway), Rainer Koelle (EUROCONTROL, Belgium)

Security Risk Assessment and Risk Treatment for Integrated Modular Communication
Hamid Asgari, Sarah Haines, Adrian Waller (Thales UK, United Kingdom)

Security Testing With Controller-Pilot Data Link Communications
Doris Di Marco (ENAV, Italy), Alessandro Manzo (SICTA, Italy), John Hird (EUROCONTROL, Belgium), Marco Ivaldi (, Italy)

WMA 2016: 

A Peek Under the Hood of iOS Malware
Laura Garcià (MLW.RE NPO, Spain), Ricardo J. Rodríguez (Universidad de Zaragoza, Spain)

A Study on Tools/Techniques for Malware Analysis and Classification
Ekta Gandotra, Divya Bansal, Sanjeev Sofat (PEC University of Technology, India)

Classification of Short Messages Initiated by Mobile Malware
Marian Kühnel, Ulrike Meyer (RWTH Aachen, Germany)

Detecting Packed Executable File: Supervised or Anomaly Detection Method ?
Neminath Hubballi, Himanshu Dogra (IIT Indore, India)

Exploring the usage of Topic Modeling for Android Malware Static Analysis
Eric Medvet (University of Trieste), Francesco Mercaldo (University of Sannio, Italy)

Ransomware Inside Out
Francesco Mercaldo, Vittoria Nardone, Antonella Santone (University of Sannio, Italy)

What’s your major threat? On the differences between the network behavior of targeted and commodity malware
Enrico Mariconti, Jeremiah Onaolapo, Gordon Ross, Gianluca Stringhini (University College London, United Kingdom)

WSDF 2016:

A Forensic Acquisition and Analysis System for IaaS: Architectural Model and Experiment
Saad Alqahtany, Nathan Clarke, Steven Furnell (Plymouth University, United Kingdom), Christopher Reich (Hochschule Furtwangen University, Germany)

A Log-structured Block Preservation and Restoration System for Proactive Forensic Data Collection in the Cloud
Manabu Hirano, Hiromu Ogawa (National Institute of Technology, Japan)

Digital Forensic Artifacts of the Cortana Device Search Cache on Windows 10 Desktop
Patricio Domingues, Miguel Frade (ESTG – Polytechnic of Leiria, Portugal)

Extraction and analysis of volatile memory in Android systems: an approach focused on trajectory reconstruction based on NMEA 0183 standard.
João Sousa (PCDF, Brazil), João Gondim (UnB, Brazil)

Identification and Analysis of Email and Contacts Artefacts on iOS and OS X
Kenneth Martin Ovens, Gordon Morison (Glasgow Caledonian University, United Kingdom)