Main Page

ASIACCS 2017

ASIACCS 2017 Workshops

CCS 2016

CCS 2016
Workshops

CODASPY 2017

CODASPY 2017 Workshops

SACMAT 2017

WiSec 2016

Compilation Author Index

ACM SIGSAC Membership Application

MIST'17 Table of Contents

MIST'16 Workshop Chairs' Welcome Message
Ilsun You (Soonchunhyang University)

Elisa Bertino (Purdue University)

MIST'16 Workshop Organization List 


Session 1: Access Control & Application Security
Session Chair: Ioaniss Agrafiotis (Oxford University)

A Grey-Box Approach for Detecting Malicious User Interactions in Web Applications (Page 1)
Wafa Ben Jaballah (Orange Labs)

Nizar Kheir (Thales Group)

Restricting Insider Access Through Efficient Implementation of Multi-Policy Access Control Systems (Page 13)
Peter Mell (National Institute of Standards and Technology)

James M. Shook (National Institute of Standards and Technology)

Serban Gavrila (National Institute of Standards and Technology)

Towards Formal Analysis of Insider Threats for Auctions (Page 23)
Florian Kammüller (Middlesex University London)

Manfred Kerber (University of Birmingham)

Christian W. Probst (Technical University of Denmark)

(Return to Top)

Session 2: Best Paper Session
Session Chair: Christian W. Probst (Technical University of Denmark)

Studying Naïve Users and the Insider Threat with SimpleFlow (Page 35)
Ryan Johnson (United States Military Academy)

Jessie Lass (United States Military Academy)

W. Michael Petullo (United States Military Academy)

A New Take on Detecting Insider Threats: Exploring the Use of Hidden Markov Models (Page 47)
Tabish Rashid (University of Oxford)

Ioannis Agrafiotis (University of Oxford)

Jason R. C. Nurse (University of Oxford)

(Return to Top)

Session 3: Cyber Attacks & Network Security
Session Chair: Florian Kammueller (Middlesex University London and TU Berlin)

Cyber Deception: Virtual Networks to Defend Insider Reconnaissance (Page 57)
Stefan Achleitner (The Pennsylvania State University)

Thomas La Porta (The Pennsylvania State University)

Patrick McDaniel (The Pennsylvania State University)

Shridatt Sugrim (Applied Communication Sciences)

Srikanth V. Krishnamurthy (University of California, Riverside)

Ritu Chadha (Applied Communication Sciences)

Pragmatic Security: Modelling IT Security Management Responsibilities for SME Archetypes (Page 69)
Simon Parkin (University College London)

Andrew Fielder (Imperial College London)

Alex Ashby (University of Oxford)

Ports Distribution Management for Privacy Protection inside Local Domain Name System (Page 81)
Fei Song (Beijing Jiaotong University)

Wei Quan (Beijing Jiaotong University)

Tianming Zhao (Beijing Jiaotong University)

Hongke Zhang (Beijing Jiaotong University)

Ziwei Hu (Global Energy Interconnection Research Institute)

Ilsun You (Soonchunhyang University)

(Return to Top)

Session 4: Short Papers Session
Session Chair: Ilsun You (Soonchunhyang University)

Function-Based Access Control (FBAC): From Access Control Matrix to Access Control Tensor (Page 89)
Yvo Desmedt (The University of Texas at Dallas & University College London)

Arash Shaghaghi (UNSW Australia & Data61, CSIRO)

WatchIT: Who Watches Your IT Guy? (Page 93)
Noam Shalev (Technion - Israel Institute of Technology)

Idit Keidar (Technion - Israel Institute of Technology)

Yosef Moatti (IBM Research)

Yaron Weinsberg (IBM Research)

A New Risk Assessment Framework Using Graph Theory for Complex ICT Systems (Page 97)
M. Yassine Naghmouchi (Orange Labs & Université Paris-Dauphine)

Nancy Perrot (Orange Labs)

Nizar Kheir (Thales Group)

A. Ridha Mahjoub (Université Paris-Dauphine)

Jean-Philippe Wary (Orange Labs)

Online and Offline Security Policy Assessment (Page 101)
Fulvio Valenza (Politecnico di torino)

Marco Vallini (Politecnico di torino)

Antonio Lioy (Politecnico di torino)

(Return to Top)

A Tripwire Grammar for Insider Threat Detection (Page 105)
Ioannis Agrafiotis (University of Oxford)

Arnau Erola (University of Oxford)

Michael Goldsmith (University of Oxford)

Sadie Creese (University of Oxford)

Discovering Insider Threats from Log Data with High-Performance Bioinformatics Tools (Page 109)
Markus Wurzenberger (AIT Austrian Institute of Technology)

Florian Skopik (AIT Austrian Institute of Technology)

Roman Fiedler (AIT Austrian Institute of Technology)

Wolfgang Kastner (Vienna University of Technology)

Analysis on Manipulation of the MAC Address and Consequent Security Threats (Page 113)
Kyungroul Lee (Soonchunhyang University)

Hyeungjun Yeuk (Soonchunhyang University)

Kangbin Yim (Soonchunhyang University)

Suhyun Kim (Soonchunhyang University)