↓ Skip to main content

ICT Systems Security and Privacy Protection

Overview of attention for book
Cover of 'ICT Systems Security and Privacy Protection'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 Design Weaknesses in Recent Ultralightweight RFID Authentication Protocols
  3. Altmetric Badge
    Chapter 2 CPMap: Design of Click-Points Map-Based Graphical Password Authentication
  4. Altmetric Badge
    Chapter 3 The Influence of Native Language on Password Composition and Security: A Socioculture Theoretical View
  5. Altmetric Badge
    Chapter 4 A Hypergame Analysis for ErsatzPasswords
  6. Altmetric Badge
    Chapter 5 Walking Through the Deep: Gait Analysis for User Authentication Through Deep Learning
  7. Altmetric Badge
    Chapter 6 Practical Cryptographic Data Integrity Protection with Full Disk Encryption
  8. Altmetric Badge
    Chapter 7 When Your Browser Becomes the Paper Boy
  9. Altmetric Badge
    Chapter 8 EMPower: Detecting Malicious Power Line Networks from EM Emissions
  10. Altmetric Badge
    Chapter 9 Attacking RO-PUFs with Enhanced Challenge-Response Pairs
  11. Altmetric Badge
    Chapter 10 A Security Analysis of FirstCoin
  12. Altmetric Badge
    Chapter 11 PRETT: Protocol Reverse Engineering Using Binary Tokens and Network Traces
  13. Altmetric Badge
    Chapter 12 Assessing Privacy Policies of Internet of Things Services
  14. Altmetric Badge
    Chapter 13 JonDonym Users’ Information Privacy Concerns
  15. Altmetric Badge
    Chapter 14 Optimal Security Configuration for Cyber Insurance
  16. Altmetric Badge
    Chapter 15 The Tweet Advantage: An Empirical Analysis of 0-Day Vulnerability Information Shared on Twitter
  17. Altmetric Badge
    Chapter 16 Anti-forensic = Suspicious: Detection of Stealthy Malware that Hides Its Network Traffic
  18. Altmetric Badge
    Chapter 17 Usability Characteristics of Security and Privacy Tools: The User’s Perspective
  19. Altmetric Badge
    Chapter 18 Efficient Identification of Applications in Co-resident VMs via a Memory Side-Channel
  20. Altmetric Badge
    Chapter 19 Follow the WhiteRabbit: Towards Consolidation of On-the-Fly Virtualization and Virtual Machine Introspection
  21. Altmetric Badge
    Chapter 20 Hunting Password Leaks in Android Applications
  22. Altmetric Badge
    Chapter 21 Smashing the Stack Protector for Fun and Profit
  23. Altmetric Badge
    Chapter 22 Formal Analysis of Sneak-Peek: A Data Centre Attack and Its Mitigations
  24. Altmetric Badge
    Chapter 23 An Evaluation of Bucketing in Systems with Non-deterministic Timing Behavior
  25. Altmetric Badge
    Chapter 24 Detection and Response to Data Exfiltration from Internet of Things Android Devices
  26. Altmetric Badge
    Chapter 25 When George Clooney Is Not George Clooney: Using GenAttack to Deceive Amazon’s and Naver’s Celebrity Recognition APIs
  27. Altmetric Badge
    Chapter 26 Performance Improvements in Behavior Based Malware Detection Solutions
  28. Altmetric Badge
    Chapter 27 On the Integrity of Cross-Origin JavaScripts
Attention for Chapter 11: PRETT: Protocol Reverse Engineering Using Binary Tokens and Network Traces
Altmetric Badge

Citations

dimensions_citation
1 Dimensions

Readers on

mendeley
10 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Chapter title
PRETT: Protocol Reverse Engineering Using Binary Tokens and Network Traces
Chapter number 11
Book title
ICT Systems Security and Privacy Protection
Published by
Springer, Cham, September 2018
DOI 10.1007/978-3-319-99828-2_11
Book ISBNs
978-3-31-999827-5, 978-3-31-999828-2
Authors

Choongin Lee, Jeonghan Bae, Heejo Lee, Lee, Choongin, Bae, Jeonghan, Lee, Heejo

Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 10 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Unknown 10 100%

Demographic breakdown

Readers by professional status Count As %
Student > Master 3 30%
Student > Ph. D. Student 2 20%
Researcher 1 10%
Professor > Associate Professor 1 10%
Unknown 3 30%
Readers by discipline Count As %
Computer Science 7 70%
Unknown 3 30%