↓ Skip to main content

Information Security and Privacy Research

Overview of attention for book
Cover of 'Information Security and Privacy Research'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 Relay Attacks on Secure Element-Enabled Mobile Devices
  3. Altmetric Badge
    Chapter 2 Would You Mind Forking This Process? A Denial of Service Attack on Android (and Some Countermeasures)
  4. Altmetric Badge
    Chapter 3 An Approach to Detecting Inter-Session Data Flow Induced by Object Pooling
  5. Altmetric Badge
    Chapter 4 Embedded Eavesdropping on Java Card
  6. Altmetric Badge
    Chapter 5 Authenticated Key Exchange (AKE) in Delay Tolerant Networks
  7. Altmetric Badge
    Chapter 6 OFELIA – A Secure Mobile Attribute Aggregation Infrastructure for User-Centric Identity Management
  8. Altmetric Badge
    Chapter 7 Smart OpenID: A Smart Card Based OpenID Protocol
  9. Altmetric Badge
    Chapter 8 Peer to Peer Botnet Detection Based on Flow Intervals
  10. Altmetric Badge
    Chapter 9 Towards a Universal Data Provenance Framework Using Dynamic Instrumentation
  11. Altmetric Badge
    Chapter 10 Improving Flask Implementation Using Hardware Assisted In-VM Isolation
  12. Altmetric Badge
    Chapter 11 HyperForce: Hypervisor-enForced Execution of Security-Critical Code
  13. Altmetric Badge
    Chapter 12 RandHyp: Preventing Attacks via Xen Hypercall Interface
  14. Altmetric Badge
    Chapter 13 Role Mining under Role-Usage Cardinality Constraint
  15. Altmetric Badge
    Chapter 14 HIDE_DHCP: Covert Communications through Network Configuration Messages
  16. Altmetric Badge
    Chapter 15 Handling Stateful Firewall Anomalies
  17. Altmetric Badge
    Chapter 16 A Framework for Threat Assessment in Access Control Systems
  18. Altmetric Badge
    Chapter 17 Support for Write Privileges on Outsourced Data
  19. Altmetric Badge
    Chapter 18 Malicious Users’ Transactions: Tackling Insider Threat
  20. Altmetric Badge
    Chapter 19 Privacy-Preserving Television Audience Measurement Using Smart TVs
  21. Altmetric Badge
    Chapter 20 Tracking Users on the Internet with Behavioral Patterns: Evaluation of Its Practical Feasibility
  22. Altmetric Badge
    Chapter 21 Smartphone Forensics: A Proactive Investigation Scheme for Evidence Acquisition
  23. Altmetric Badge
    Chapter 22 Modeling Social Engineering Botnet Dynamics across Multiple Social Networks
  24. Altmetric Badge
    Chapter 23 Layered Analysis of Security Ceremonies
  25. Altmetric Badge
    Chapter 24 A Small Depth-16 Circuit for the AES S-Box
  26. Altmetric Badge
    Chapter 25 Formal Verification of the mERA-Based eServices with Trusted Third Party Protocol
  27. Altmetric Badge
    Chapter 26 My Authentication Album: Adaptive Images-Based Login Mechanism
  28. Altmetric Badge
    Chapter 27 Balancing Security and Usability of Local Security Mechanisms for Mobile Devices
  29. Altmetric Badge
    Chapter 28 Analyzing Value Conflicts for a Work-Friendly ISS Policy Implementation
  30. Altmetric Badge
    Chapter 29 When Convenience Trumps Security: Defining Objectives for Security and Usability of Systems
  31. Altmetric Badge
    Chapter 30 Security-by-Contract for the OSGi Platform
  32. Altmetric Badge
    Chapter 31 Cyber Weather Forecasting: Forecasting Unknown Internet Worms Using Randomness Analysis
  33. Altmetric Badge
    Chapter 32 Incentive Compatible Moving Target Defense against VM-Colocation Attacks in Clouds
  34. Altmetric Badge
    Chapter 33 Information Security and Privacy Research
  35. Altmetric Badge
    Chapter 34 A Game-Theoretic Formulation of Security Investment Decisions under Ex-ante Regulation
  36. Altmetric Badge
    Chapter 35 Optimizing Network Patching Policy Decisions
  37. Altmetric Badge
    Chapter 36 A Risk Assessment Method for Smartphones
  38. Altmetric Badge
    Chapter 37 Empirical Benefits of Training to Phishing Susceptibility
  39. Altmetric Badge
    Chapter 38 Multi-modal Behavioural Biometric Authentication for Mobile Devices
  40. Altmetric Badge
    Chapter 39 Analysis and Modeling of False Synchronizations in 3G-WLAN Integrated Networks
  41. Altmetric Badge
    Chapter 40 Password Protected Smart Card and Memory Stick Authentication against Off-Line Dictionary Attacks
  42. Altmetric Badge
    Chapter 41 Distributed Path Authentication for Dynamic RFID-Enabled Supply Chains
  43. Altmetric Badge
    Chapter 42 Enhanced Dictionary Based Rainbow Table
  44. Altmetric Badge
    Chapter 43 Authorization Policies for Materialized Views
  45. Altmetric Badge
    Chapter 44 Enhancing the Security of On-line Transactions with CAPTCHA Keyboard
  46. Altmetric Badge
    Chapter 45 Fighting Pollution Attack in Peer-to-Peer Streaming Networks: A Trust Management Approach
  47. Altmetric Badge
    Chapter 46 A Framework for Anonymizing GSM Calls over a Smartphone VoIP Network
  48. Altmetric Badge
    Chapter 47 A Browser-Based Distributed System for the Detection of HTTPS Stripping Attacks against Web Pages
  49. Altmetric Badge
    Chapter 48 Privacy-Preserving Mechanisms for Organizing Tasks in a Pervasive eHealth System
  50. Altmetric Badge
    Chapter 49 Web Services Security Assessment: An Authentication-Focused Approach
  51. Altmetric Badge
    Chapter 50 Open Issues and Proposals in the IT Security Management of Commercial Ports: The S-PORT National Case
  52. Altmetric Badge
    Chapter 51 Information Security and Privacy Research
  53. Altmetric Badge
    Chapter 52 Intrusion Tolerance of Stealth DoS Attacks to Web Services
  54. Altmetric Badge
    Chapter 53 Towards Use-Based Usage Control
Attention for Chapter 12: RandHyp: Preventing Attacks via Xen Hypercall Interface
Altmetric Badge

Citations

dimensions_citation
4 Dimensions

Readers on

mendeley
11 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Chapter title
RandHyp: Preventing Attacks via Xen Hypercall Interface
Chapter number 12
Book title
Information Security and Privacy Research
Published by
Springer, Berlin, Heidelberg, June 2012
DOI 10.1007/978-3-642-30436-1_12
Book ISBNs
978-3-64-230435-4, 978-3-64-230436-1
Authors

Feifei Wang, Ping Chen, Bing Mao, Li Xie, Wang, Feifei, Chen, Ping, Mao, Bing, Xie, Li

Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 11 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Portugal 1 9%
Unknown 10 91%

Demographic breakdown

Readers by professional status Count As %
Student > Ph. D. Student 6 55%
Researcher 2 18%
Student > Doctoral Student 2 18%
Other 1 9%
Readers by discipline Count As %
Computer Science 9 82%
Unknown 2 18%