Leaky Controller: Cross-VM Memory Controller Covert Channel on Multi-core Systems (Benjamin Semal, Konstantinos Markantonakis, Raja Naeem Akram, Jan Kalbantner).Pages 3-16Įvaluation of Statistical Tests for Detecting Storage-Based Covert Channels (Thomas A. Refined Detection of SSH Brute-Force Attackers Using Machine Learning (Karel Hynek, Tomáš Beneš, Tomáš Čejka, Hana Kubátová).Pages 49-63 IE-Cache: Counteracting Eviction-Based Cache Side-Channel Attacks Through Indirect Eviction (Muhammad Asim Mukhtar, Muhammad Khurram Bhatti, Guy Gogniat).Pages 32-45 For emergency backup, diagnostic and recovery. Fit on 30M credit card cdrom, whereas it contains images of Linux, FreeBSD, OpenBSD and NetBSD in a single multiboot. MultiTLS: Secure Communication Channels with Cipher Suite Diversity (Ricardo Moura, David R. Small, modular mini distribution on bootable live CD to repair, boot or recover systems. Improving Big Data Clustering for Jamming Detection in Smart Mobility (Hind Bangui, Mouzhi Ge, Barbora Buhnova).Pages 78-91Īssisting Users to Create Stronger Passwords Using ContextBased MicroTraining (Joakim Kävrestad, Marcus Nohlberg).Pages 95-108įacilitating Privacy Attitudes and Behaviors with Affective Visual Design (Agnieszka Kitkowska, Yefim Shulman, Leonardo A. JavaScript Malware Detection Using Locality Sensitive Hashing (Stefan Carl Peiser, Ludwig Friborg, Riccardo Scandariato).Pages 143-154 Privacy CURE: Consent Comprehension Made Easy (Olha Drozd, Sabrina Kirrane).Pages 124-139