25 September 2013
08:30-09:15 Registration
09:15-09:30 Opening Remarks
09:30-10:30 Keynote by Mike Holm
10:30-11:00 Tea/Coffee break
Session I: Security & Privacy in Mobile, Sensor, and Ad Hoc Networks
11:00-11:30 Eirini Karapistoli and Anastasios Economides. Anomaly Detection in Beacon-Enabled IEEE 802.15.4 Wireless Sensor Networks
11:30-12:00 Ting Zhou, Yaping Lin, Wei Zhang, Sheng Xiao and Jinguo Li. Secure and Verifiable Top-k Query in Two-tiered Sensor Networks
12:00-12:30 Mengjun Xie, Liang Hao, Kenji Yoshigoe and Jiang Bian. CamTalk: A Bidirectional Light Communications Framework for Secure Communications On Smartphones
12:30-13:30 Lunch
13:30-14:30 Keynote by James Turner
Session II: Malware, botnets, and Distributed Denial of Service
14:30-15:00 Cui Xiang, Fang Binxing, Shi Jinqiao and Liu Chaoge. Botnet Triple-Channel Model: Towards Resilient and Efficient Bidirectional Communication Botnets
15:00-15:30 Veelasha Moonsamy, Jia Rong, Shaowu Liu, Gang Li and Lynn Batten. Contrasting Permission Patterns between Clean and Malicious Android Application
15:30-16:00 Tea/Coffee break
16:00-16:30 Yousra Aafer, Wenliang Du and Heng Yin. DroidAPIMiner: Mining API-Level Features for Robust Malware Detection in Android
26 September 2013 – Thursday
08:30-09:00 Registration
09:00-10:00 Keynote by Mark Goudie
10:30-11:00 Tea/Coffee break
Session III: Security for emerging technologies: VoIP, peer-to-peer, and Cloud Computing
11:00-11:30 Ryan Farley and Xinyuan Wang. Disabling a Computer by Exploiting Softphone Vulnerabilities: Threat and Mitigation
11:30-12:00 Jun Jiang, Meining Nie, Purui Su and Dengguo Feng. VCCBox: Practical Confinement of Untrusted Applications in Virtual Cloud Computing
12:00-12:30 Vijay Varadharajan and Udaya Tupakula. Integrated Security Architecture for Virtual Machines
12:30-13:30 Lunch
Session IV: Encryption and Key Management
13:30-14:00 Ibrahim Elashry, Yi Mu and Willy Susilo. Generic Mediated Encryption
14:30-15:00 Li Miao, He Liangsheng, Gao Neng, Yang Tongjie and Liu Zongbin. An Efficient Reconfigurable II-ONB Modular Multiplier
15:00-15:30 Hui Cui, Yi Mu and Man Ho Au. Public-Key Encryption Resilient to Linear Related-Key Attacks
15:30-16:00 Tea/Coffee break
Session V: Security in Software and Machine Learning
16:00-16:30 Silvio Cesare, Yang Xiang and Jun Zhang. Clonewise – Detecting Package-level Clones Using Machine Learning
16:30-17:00 Minghua Wang, Purui Su, Qi Li, Lingyun Ying, Yi Yang and Dengguo Feng. Automatic Polymorphic Exploit Generation for Software Vulnerabilities
18:30-22:00 Conference dinner
27 September 2013 – Friday
08:30-09:00 Registration
09:00-10:00 Keynote by Jiankun Hu
10:30-11:00 Tea/Coffee break
Session VI: Network and System Security Model
11:00-11:30 Fei Wang, Liusheng Huang, Zhili Chen, Haibo Miao and Wei Yang. A Novel Web Tunnel Detection Method Based on Protocol Behaviors
11:30-12:00 Niels Avonds, Raoul Strackx, Pieter Agten and Frank Piessens. Salus: Non-Hierarchical Memory Access Rights to Enforce the Principle of Least Privilege
12:00-12:30 Jin B. Hong and Dong Seong Kim. Scalable Security Model Generation and Analysis using k-importance Measures
12:30-13:30 Lunch Session VII: Security and Privacy in Pervasive and Ubiquitous Computing
13:30-14:00 Mehari Msgna, Konstantinos Markantonakis and Keith Mayes. The B-Side of Side Channel Leakage: Control Flow Security In Embedded Systems
14:30-15:00 Aude Plateaux, Patrick Lacharme, Vincent Coquet, Sylvain Vernois, Kumar Murty and Christophe Rosenberger. An e-payment architecture ensuring a high level of privacy protection
15:00-15:30 Xin Ruan, Chuan Yue and Haining Wang. Unveiling Privacy Setting Breaches in Online Social Networks
15:30-16:00 Tea/Coffee break
16:00-16:30 Best paper award and concluding remarks