This event is endorsed
and organized by

9th International Conference on Security and Privacy in Communication Networks

September 25–27, 2013 | Sydney, Australia

25 September 2013

08:30-09:15 Registration

09:15-09:30 Opening Remarks

09:30-10:30 Keynote by Mike Holm

10:30-11:00 Tea/Coffee break

Session I: Security & Privacy in Mobile, Sensor, and Ad Hoc Networks

11:00-11:30 Eirini Karapistoli and Anastasios Economides. Anomaly Detection in Beacon-Enabled IEEE 802.15.4 Wireless Sensor Networks

11:30-12:00 Ting Zhou, Yaping Lin, Wei Zhang, Sheng Xiao and Jinguo Li. Secure and Verifiable Top-k Query in Two-tiered Sensor Networks

12:00-12:30 Mengjun Xie, Liang Hao, Kenji Yoshigoe and Jiang Bian. CamTalk: A Bidirectional Light Communications Framework for Secure Communications On Smartphones

12:30-13:30 Lunch

13:30-14:30 Keynote by James Turner

Session II: Malware, botnets, and Distributed Denial of Service

14:30-15:00 Cui Xiang, Fang Binxing, Shi Jinqiao and Liu Chaoge. Botnet Triple-Channel Model: Towards Resilient and Efficient Bidirectional Communication Botnets

15:00-15:30 Veelasha Moonsamy, Jia Rong, Shaowu Liu, Gang Li and Lynn Batten. Contrasting Permission Patterns between Clean and Malicious Android Application

15:30-16:00 Tea/Coffee break

16:00-16:30 Yousra Aafer, Wenliang Du and Heng Yin. DroidAPIMiner: Mining API-Level Features for Robust Malware Detection in Android

26 September 2013 – Thursday

08:30-09:00 Registration

09:00-10:00 Keynote by Mark Goudie

10:30-11:00 Tea/Coffee break

Session III: Security for emerging technologies: VoIP, peer-to-peer, and Cloud Computing

11:00-11:30 Ryan Farley and Xinyuan Wang. Disabling a Computer by Exploiting Softphone Vulnerabilities: Threat and Mitigation

11:30-12:00 Jun Jiang, Meining Nie, Purui Su and Dengguo Feng. VCCBox: Practical Confinement of Untrusted Applications in Virtual Cloud Computing

12:00-12:30 Vijay Varadharajan and Udaya Tupakula. Integrated Security Architecture for Virtual Machines

12:30-13:30 Lunch

Session IV: Encryption and Key Management

13:30-14:00 Ibrahim Elashry, Yi Mu and Willy Susilo. Generic Mediated Encryption

14:30-15:00 Li Miao, He Liangsheng, Gao Neng, Yang Tongjie and Liu Zongbin. An Efficient Reconfigurable II-ONB Modular Multiplier

15:00-15:30 Hui Cui, Yi Mu and Man Ho Au. Public-Key Encryption Resilient to Linear Related-Key Attacks

15:30-16:00 Tea/Coffee break

Session V: Security in Software and Machine Learning

16:00-16:30 Silvio Cesare, Yang Xiang and Jun Zhang. Clonewise – Detecting Package-level Clones Using Machine Learning

16:30-17:00 Minghua Wang, Purui Su, Qi Li, Lingyun Ying, Yi Yang and Dengguo Feng. Automatic Polymorphic Exploit Generation for Software Vulnerabilities

18:30-22:00 Conference dinner

27 September 2013 – Friday

08:30-09:00 Registration

09:00-10:00 Keynote by Jiankun Hu

10:30-11:00 Tea/Coffee break

Session VI: Network and System Security Model

11:00-11:30 Fei Wang, Liusheng Huang, Zhili Chen, Haibo Miao and Wei Yang. A Novel Web Tunnel Detection Method Based on Protocol Behaviors

11:30-12:00 Niels Avonds, Raoul Strackx, Pieter Agten and Frank Piessens. Salus: Non-Hierarchical Memory Access Rights to Enforce the Principle of Least Privilege

12:00-12:30 Jin B. Hong and Dong Seong Kim. Scalable Security Model Generation and Analysis using k-importance Measures

12:30-13:30 Lunch Session VII: Security and Privacy in Pervasive and Ubiquitous Computing

13:30-14:00 Mehari Msgna, Konstantinos Markantonakis and Keith Mayes. The B-Side of Side Channel Leakage: Control Flow Security In Embedded Systems

14:30-15:00 Aude Plateaux, Patrick Lacharme, Vincent Coquet, Sylvain Vernois, Kumar Murty and Christophe Rosenberger. An e-payment architecture ensuring a high level of privacy protection

15:00-15:30 Xin Ruan, Chuan Yue and Haining Wang. Unveiling Privacy Setting Breaches in Online Social Networks

15:30-16:00 Tea/Coffee break

16:00-16:30 Best paper award and concluding remarks