Information Security Applications

15th International Workshop, WISA 2014, Jeju Island, Korea, August 25-27, 2014. Revised Selected Papers

  • Kyung-Hyune Rhee
  • Jeong Hyun Yi
Conference proceedings WISA 2014

Part of the Lecture Notes in Computer Science book series (LNCS, volume 8909)

Also part of the Security and Cryptology book sub series (LNSC, volume 8909)

Table of contents

  1. Front Matter
    Pages I-XIII
  2. Malware Detection

    1. Front Matter
      Pages 1-1
    2. Ahmed E. Kosba, Aziz Mohaisen, Andrew West, Trevor Tonn, Huy Kang Kim
      Pages 3-16
    3. Jaehyeok Song, Jonghyuk Song, Jong Kim
      Pages 17-26
    4. Ubaidullah Rajput, Fizza Abbas, Rasheed Hussain, Hasoo Eun, Heekuck Oh
      Pages 27-37
  3. Mobile Security

    1. Front Matter
      Pages 39-39
    2. Eunhyun Kim, Kyungwon Park, Hyoungshick Kim, Jaeseung Song
      Pages 55-67
    3. Jina Kang, Daehyun Kim, Hyoungshick Kim, Jun Ho Huh
      Pages 68-79
  4. Vulnerability Analysis

    1. Front Matter
      Pages 81-81
    2. Shinichi Matsumoto, Yuya Onitsuka, Junpei Kawamoto, Kouichi Sakurai
      Pages 83-94
    3. Shinjo Park, Suwan Park, Insu Yun, Dongkwan Kim, Yongdae Kim
      Pages 95-106
    4. Ashar Javed, Jörg Schwenk
      Pages 122-133
  5. Applied Cryptography

    1. Front Matter
      Pages 135-135
    2. Ryoma Ito, Atsuko Miyaji
      Pages 137-149
    3. Hwajeong Seo, Zhe Liu, Yasuyuki Nogami, Jongseok Choi, Howon Kim
      Pages 150-161
  6. Network Security

    1. Front Matter
      Pages 163-163
    2. Dongwan Kang, Joohyung Oh, Chaetae Im
      Pages 165-176
    3. Chao-Lieh Chen, Shen-Chien Chen, Chun-Ruei Chang, Chia-Fei Lin
      Pages 177-189
    4. Ngoc-Tu Chau, Minh-Duong Nguyen, Seungwook Jung, Souhwan Jung
      Pages 190-201
    5. Aziz Mohaisen, Mansurul Bhuiyan, Yannis Labrou
      Pages 202-215
    6. Fizza Abbas, Ubaidullah Rajput, Rasheed Hussain, Hasoo Eun, Heekuck Oh
      Pages 216-227
  7. Cryptography

    1. Front Matter
      Pages 229-229
    2. Pairat Thorncharoensri, Willy Susilo, Yi Mu
      Pages 244-256
  8. Hardware Security

    1. Front Matter
      Pages 281-281
    2. Jörn Müller-Quade, Antonio Sobreira de Almeida
      Pages 283-294
    3. Fangyu Zheng, Wuqiong Pan, Jingqiang Lin, Jiwu Jing, Yuan Zhao
      Pages 295-306
    4. Yeoncheol Lee, Hwajeong Seo, Howon Kim
      Pages 307-320
    5. Taesung Kim, Sungjun Ahn, Seungkwang Lee, Dooho Choi
      Pages 331-342
  9. Critical Infrastructure Security and Policy

    1. Front Matter
      Pages 343-343
    2. Seungoh Choi, Yeop Chang, Jeong-Han Yun, Woonyon Kim
      Pages 345-357
    3. Kyoung-Ho Kim, Jeong-Han Yun, Yeop Chang, Woonyon Kim
      Pages 358-369
    4. Youngin You, Sangkyo Oh, Kyungho Lee
      Pages 383-393
  10. Back Matter
    Pages 405-406

About these proceedings


This book constitutes the thoroughly refereed proceedings of the 15th International Workshop on Information Security Applications, WISA 2014, held on Jeju Island, Korea, in August 2014. The 30 revised full papers presented in this volume were carefully reviewed and selected from 69 submissions. The papers are organized in topical sections such as malware detection; mobile security; vulnerability analysis; applied cryptography; network security; cryptography; hardware security; and critical infrastructure security and policy.


Access Control Advanced Encryption Standard (AES) Block Cipher Computer Forensics Cryptocurrency Cryptography Cyber-Attack Identity-based Encryption Information Security Malware Permission System Phishing Public key Cryptography Secure Systems Security Applications Security Protocol Security Technologies Smartphone

Editors and affiliations

  • Kyung-Hyune Rhee
    • 1
  • Jeong Hyun Yi
    • 2
  1. 1.Pukyong National UniversityBusanKorea, Republic of (South Korea)
  2. 2.School of Computer Science and EngineeringSoongsil UniversitySeoulKorea, Republic of (South Korea)

Bibliographic information

  • DOI
  • Copyright Information Springer International Publishing Switzerland 2015
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science Computer Science (R0)
  • Print ISBN 978-3-319-15086-4
  • Online ISBN 978-3-319-15087-1
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site
Industry Sectors
Chemical Manufacturing
Finance, Business & Banking
IT & Software
Consumer Packaged Goods
Energy, Utilities & Environment