ARES 2015 Full Research papers:

A Lightweight Framework for Cold Boot Based Forensics on Mobile Devices
Benjamin Taubmann, Manuel Huber, Sascha Wessel (Fraunhofer AISEC, Germany), Lukas Heim (Technische Universität München, Germany), Hans Peter Reiser (University of Passau, Germany), Georg Sigl (Technische Universität München, Germany)

A Novel Security-Enhanced Agile Software Development Process Applied in an Industrial Setting
Dejan Baca (Ericsson AB), Martin Boldt, Bengt Carlsson (Blekinge Institute of Technology, Sweden), Andreas Jacobsson (Malmö University, Sweden)

Accountable Redactable Signatures
Henrich C. Pöhls (University of Passau, Germany), Kai Samelin (IBM Research Zurich, Switzerland)

Advanced Identity and Access Policy Management using Contextual Data
Matthias Hummer (Nexis GmbH, Germany), Michael Kunz (University of Regensburg, Germany), Michael Netter, Ludwig Fuchs (Nexis GmbH, Germany), Guenther Pernul (University of Regensburg, Germany)

All-Solution Satisfiability Modulo Theories: applications, algorithms and benchmarks
Quoc-Sang Phan, Pasquale Malacaria (Queen Mary University of London, UK)

Don’t brick your car: Firmware confidentiality and rollback for vehicles
Hafizah Mansor, Konstantinos Markantonakis, Raja Naeem Akram, Keith Mayes (Royal Holloway, University of London, UK)

Dynamic Self-Protection and Tamperproofing for Android Apps using Native Code
Mykola Protsenko, Sebastien Kreuter, Tilo Müller (University Erlangen-Nuremberg, Germany)

Empirical Evaluation of the A3 Environment: Evaluating Defenses Against Zero-Day Attacks
Shane Clark, Aaron Paulos, Brett Benyo, Partha Pal, Rick Schantz (BBN Technologies, US)

Fair fingerprinting protocol for attesting software misuses
Raphael Machado, Davidson Boccardo (Inmetro, Brazil), Vinícius de Sá (UFRJ, Brazil), Jayme Szwarcfiter (URFJ & Inmetro, Brazil)

Modeling Fraud Prevention of Online Services using Incident Response Trees and Value at Risk
Dan Gorton (KTH Royal Institute of Technology, Sweden)

Optimizing IT Service Costs With Respect to the Availability Service Level Objective
Sascha Bosse, Matthias Splieth, Klaus Turowski (Otto von Guericke University Magdeburg, Germany)

PALPAS – PAsswordLess PAssword Synchronization
Moritz Horsch (Technische Universität Darmstadt, Germany), Andreas Hülsing (Technische Universiteit Eindhoven, The Netherlands), Johannes Buchmann (Technische Universität Darmstadt, Germany)

Publicly Verifiable Private Aggregation of Time-Series Data
Bence Gábor Bakondi, Andreas Peter (University of Twente, The Netherlands), Maarten Everts (TNO & University of Twente, The Netherlands), Pieter Hartel, Willem Jonker (University of Twente, The Netherlands)

Structural Weaknesses in the Open Smart Grid Protocol
Klaus Kursawe, Christiane Peters (ENCS, The Netherlands)

The Effects of Cultural Dimensions on the Development of an ISMS Based on the ISO 27001
Bahareh Shojaie, Hannes Federrath (University of Hamburg, Germany), Iman Saberi (Technical University of Hamburg, Germany)

The Role and Security of Firewalls in IaaS Cloud Computing
Jordan Cropper, Johanna Ullrich, Peter Frühwirt, Edgar Weippl (SBA Research, Austria)

Uncovering Use-After-Free Conditions In Compiled Code
David Dewey (Georgia Institute of Technology, US), Bradley Reaves, Patrick Traynor (University of Florida, US)

ARES 2015 Short Research papers:

A Model Implementing Certified Reputation and its Application to TripAdvisor
Serena Nicolazzo, Gianluca Lax, Francesco Buccafurri, Antonino Nocera (University of Reggio Calabria, Italy)

A Time Series Approach for Inferring Orchestrated Probing Campaigns by Analyzing Darknet Traffic
Elias Bou-Harb, Mourad Debbabi, Chadi Assi (National Cyber-Forensics and Training Alliance Canada & Concordia University, Canada)

Efficiency Evaluation of Cryptographic Protocols for Boardroom Voting
Oksana Kulyk, Stephan Neumann, Jurlind Budurushi, Melanie Volkamer (TU Darmstadt, Germany)

Error / Intrusion Target Identification on the Physical Layer over a BICM Scheme
Sihem Chaabouni, Amel Makhlouf (ENET’COM, France)

Event Prediction with Leaders
Jun Pang, Yang Zhang (University of Luxembourg, Luxembourg)

Hardware Security Evaluation Using Assurance Case Models
Henrique Kawakami, Roberto Gallo, Ricardo Dahab, Erick Nascimento (Unicamp, Brazil)

On Reconnaissance with IPv6: A Pattern-Based Scanning Approach
Johanna Ullrich, Peter Kieseberg, Katharina Krombholz, Edgar Weippl (SBA Research, Austria)

On the Isofunctionality of Network Access Control Lists
Malek Belhaouane, Joaquin Garcia-Alfaro, Hervé Debar (Télécom SudParis, France)

Physically Secure Code and Data Storage in Autonomously Booting Systems
Johannes Götzfried, Johannes Hampel, Tilo Müller (FAU, Germany)

QR Code Security – How Secure and Usable Apps Can Protect Users Against Malicious QR Codes
Katharina Krombholz, Peter Frühwirt (SBA Research, Austria), Thomas Rieder (TU Wien, Austria), Ioannis Kaspsalis (Aalto University, Finland), Johanna Ullrich, Edgar Weippl (SBA Research, Austria)

Towards Abuse Detection and Prevention in IaaS Cloud Computing
Jens Lindemann (University of Hamburg, Germany)

Trust me, I’m a Root CA! Analyzing SSL Root CAs in modern Browsers and Operating Systems
Tariq Fadai, Sebastian Schrittwieser (St. Poelten University of Applied Sciences, Austria), Peter Kieseberg, Martin Mulazzani (SBA Research, Austria)