25 September 2013 – Wednesday
08:30-09:15 Registration
09:15-09:30 Opening Remarks
09:30-10:30 Keynote “Challenges in cyber Security” by Mike Holm – AusCERT
10:30-11:00 Tea/Coffee break
Session I: Security & Privacy in Mobile, Sensor, and Ad Hoc Networks
11:00-11:30 Eirini Karapistoli and Anastasios Economides. Anomaly Detection in Beacon-Enabled IEEE 802.15.4 Wireless Sensor Networks
11:30-12:00 Ting Zhou, Yaping Lin, Wei Zhang, Sheng Xiao and Jinguo Li. Secure and Verifiable Top-k Query in Two-tiered Sensor Networks
12:00-12:30 Mengjun Xie, Liang Hao, Kenji Yoshigoe and Jiang Bian. CamTalk: A Bidirectional Light Communications Framework for Secure Communications On Smartphones
12:30-13:30 Lunch
13:30-14:30 Keynote “Data breach disclosure and other dinner party games” by James Turner – AISA
Session II: Malware, botnets, and Distributed Denial of Service
14:30-15:00 Cui Xiang, Fang Binxing, Shi Jinqiao and Liu Chaoge. Botnet Triple-Channel Model: Towards Resilient and Efficient Bidirectional Communication Botnets
15:00-15:30 Veelasha Moonsamy, Jia Rong, Shaowu Liu, Gang Li and Lynn Batten. Contrasting Permission Patterns between Clean and Malicious Android Application
15:30-16:00 Tea/Coffee break
16:00-16:30 Yousra Aafer, Wenliang Du and Heng Yin. DroidAPIMiner: Mining API-Level Features for Robust Malware Detection in Android
26 September 2013 – Thursday
09:00-09:30 Registration
09:30-10:30 Keynote “Know the enemy” by Mark Goudie – Dell SecureWorks
10:30-11:00 Tea/Coffee break
Session III: Security for emerging technologies: VoIP, peer-to-peer, and Cloud Computing
11:00-11:30 Ryan Farley and Xinyuan Wang. Disabling a Computer by Exploiting Softphone Vulnerabilities: Threat and Mitigation
11:30-12:00 Jun Jiang, Meining Nie, Purui Su and Dengguo Feng. VCCBox: Practical Confinement of Untrusted Applications in Virtual Cloud Computing
12:00-12:30 Vijay Varadharajan and Udaya Tupakula. Integrated Security Architecture for Virtual Machines
12:30-13:30 Lunch
Session IV: Encryption and Key Management
13:30-14:00 Ibrahim Elashry, Yi Mu and Willy Susilo. Generic Mediated Encryption
14:00-14:30 Li Miao, He Liangsheng, Gao Neng, Yang Tongjie and Liu Zongbin. An Efficient Reconfigurable II-ONB Modular Multiplier
14:30-15:00 Hui Cui, Yi Mu and Man Ho Au. Public-Key Encryption Resilient to Linear Related-Key Attacks
15:00-15:30 Tea/Coffee break
Session V: Security in Software and Machine Learning
15:30-16:00 Silvio Cesare, Yang Xiang and Jun Zhang. Clonewise – Detecting Package-level Clones Using Machine Learning
16:00-16:30 Minghua Wang, Purui Su, Qi Li, Lingyun Ying, Yi Yang and Dengguo Feng. Automatic Polymorphic Exploit Generation for Software Vulnerabilities
18:30-22:00 Conference dinner Eat Love Pizza – Darling Harbour Ground Floor, IMAX Theatre Complex
27 September 2013 – Friday
09:00-09:30 Registration
09:30-10:30 Keynote “Cyber security: from bio-cryptography to intrusion detection” by Jiankun Hu – ADFA:UNSW
10:30-11:00 Tea/Coffee break
Session VI: Network and System Security Model
11:00-11:30 Fei Wang, Liusheng Huang, Zhili Chen, Haibo Miao and Wei Yang. A Novel Web Tunnel Detection Method Based on Protocol Behaviors
11:30-12:00 Niels Avonds, Raoul Strackx, Pieter Agten and Frank Piessens. Salus: Non-Hierarchical Memory Access Rights to Enforce the Principle of Least Privilege
12:00-12:30 Jin B. Hong and Dong Seong Kim. Scalable Security Model Generation and Analysis using k-importance Measures
12:30-14:00 Lunch
Session VII: Security and Privacy in Pervasive and Ubiquitous Computing
14:00-14:30 Mehari Msgna, Konstantinos Markantonakis and Keith Mayes. The B-Side of Side Channel Leakage: Control Flow Security In Embedded Systems
14:30-15:00 Aude Plateaux, Patrick Lacharme, Vincent Coquet, Sylvain Vernois, Kumar Murty and Christophe Rosenberger. An e-payment architecture ensuring a high level of privacy protection
15:00-15:30 Xin Ruan, Chuan Yue and Haining Wang. Unveiling Privacy Setting Breaches in Online Social Networks
15:30-16:00 Tea/Coffee break
16:00-16:30 Best paper award and concluding remarks