This event is endorsed
and organized by

10th International Conference on Security and Privacy in Communication Networks

September 24–26, 2014 | Beijing, People's Republic of China


23 September 2014 (Workshop)--Tuesday

8:00 - 19:00


9:00 - 17:00

ATCS Workshop

9:00 - 17:00

SSS/DAPRO Workshop

9:00 - 17:00

SLSS Workshop

24 September 2014 (Day 1)--Wednesday



8:00 - 18:00


8:30 - 9:00

Opening Remarks

9:00 - 9:20

Keynote 1

9:20 – 9:50

Coffee Break

9:50 - 11:10

Keynote 2

11:10 - 12:30

Keynote 3

12:30 - 13:30



Technical Track

Industry Track

13:30 - 15:40

Technical Session 1: Cloud Computing Security

IT: Session 1

13:30 - 14:00




14:00 - 14:30



14:30 - 14:50




14:50 - 15:10




15:10 - 15:40

Inferring the Stealthy Bridges between Enterprise Network Islands in Cloud Using Cross-Layer Bayesian Networks

Xiaoyan Sun, Jun Dai, Anoop Singhal and Peng Liu


A Secure Architecture for Inter-Cloud Virtual Machine Migration

Muhammad Yousaf, Tayyaba Zeb, Abdul Ghafoor, and Awais Shibli


STRE: Privacy-Preserving Storage and Retrieval over Multiple Clouds (short)

Jingwei Li, Dan Lin, Anna Squicciarini and Chunfu Jia


An Effective Search Scheme based on Semantic Tree over Encrypted Cloud Data Supporting Verifiability  (short)

Zhangjie Fu, Jiangang Shu, Xingming Sun


Policy Driven Node Selection in MapReduce

Anna Squicciarini, Dan Lin, Smitha Sundareswaran and Jingwei Li

15:40 – 16:00

Coffee Break

16:00 - 18:30

Technical Session 2: Authentication and Identity

IT: Session 2

16:00 - 16:30



16:30 - 16:50




16:50 - 17:20



17:20 - 17:50




17:50 - 18:10




18:10 - 18:30

GridMap: Enhanced Security in Cued-Recall Graphical Passwords

Nicolas Van Balen and Haining Wang


UAuth: A Strong Authentication Method from Personal Devices to Multi-accounts (short)

Mingming Hu, Yazhe Wang and Chen Li


TPM-based Authentication Mechanism for Apache Hadoop

Issa Khalil, Zuochao Dou and Abdallah Khreishah


An Authentication and Key Management Scheme for Heterogeneous Sensor Networks

SarmadUllah Khan, Rafiullah Khan, Inam bari, Naveed Jan


Social Authentication Identity: An Alternate to Internet Real Name System (short)

Chengcheng Shao, Liang Chen, Shuo Fan and Xinwen Jiang


On the Usability of Two-Factor Authentication (short)

Ding Wang and Ping Wang



25 September 2014  (Day 2)--Thursday


Technical Track

Industry Track

8:30 - 10:00

Technical Session 3: Network security

 IT: Session 3

8:30 - 9:00





9:00 - 9:20




9:20 - 9:40

Securing Resource Discovery in Content Hosting Networks

Sushama Karumanchi, Jingwei Li and Anna Squicciarini


Detection of Botnet Command and Control Traffic by the Identification of Untrusted Destinations(short)

Pieter Burghouwt, Marcel E.M. Spruit and Henk J. Sips


Keep the Fakes Out: Defending against Sybil Attack in P2P systems (short)

Kan Chen, Peidong Zhu and YueshanXiong

9:40- 10:10

Coffee Break

10:10 - 12:00

Technical Session 4: Privacy & Wireless Security

 IT: Session 4

10:10 - 10:40



10:40 - 11:00




11:00 - 11:30




11:30 - 12:00

Anonymous Publish-Subscribe Systems

BinhVo and Steven Bellovin


Friendly Jamming for Secure Localization in Vehicular Transportation(short)

Bhaswati Deka, Ryan Gerdes, Ming Li and Kevin Heaslip


Visual-Assisted Wormhole Attack Detection for Wireless Sensor Networks

Eirini Karapistoli, Panagiotis Sarigiannidis and Anastasios Economides


Implementing an affordable and effective GSM IMSI catcher with 3G authentication

Max Suraev

12:00 - 13:30


13:30 - 15:50

Technical Session 5: System & Software Security

13:30 - 14:00



14:00 - 14:20



14:20 - 14:50



14:50 - 15:20




15:20 - 15:50

A Simple and Novel Technique for Counteracting Exploit Kits

Byungho Min and Vijay Varadharajan


Policy Enforcement Point Model (short)

Yosra Ben Mustapha, Hervé Debar and Gregory Blanc


Control Flow Obfuscation using Neural Network to Fight Concolic Testing Haoyu Ma, Xinjie Ma, Weijie Liu, Zhipeng Huang, DebinGao and ChunfuJia


EFS: Efficient and Fault-Scalable Byzantine Fault Tolerant Systems against Faulty Clients

Quanwei Cai, Jingqiang Lin, Fengjun Li, Qiongxiao Wang and Daren Zha


SCADS: Separated Control- and Data-Stacks

Christopher Kugler and Tilo Müller

15:50 - 16:10

Coffee Break

16:10 - 18:30

Technical Session 6: Crypto

16:10 - 16:40




16:40 - 17:10



17:10 - 17:40




17:40 - 18:00




18:00 - 18:30

Improving the Security of the HMQV Protocol using Tamper-Proof Hardware

Qianying Zhang, Shijun Zhao and Dengguo Feng


TST: A New Randomness Test Method Based on Coupon Collector's Problem

Qinglong Zhang, Zongbin Liu, Quanwei Cai and Ji Xiang


Tree-based Multi-Dimensional Range Search on Encrypted Data with Enhanced Privacy

Boyang Wang, YantianHou, Ming Li, Haitao Wang, Hui Li and Fenghua Li


Hardware Implementation of Cryptographic Hash Function based on Spatiotemporal Chaos  (short)

Yuling Luo, Junxiu Liu, Lvchen Cao, Jinjie Bi and SenhuiQiu


An Information-Theoretic Approach for Secure Protocol Composition

Yi-Ting Chiang, Tsan-Sheng Hsu, Churn-Jung Liau, Yun-Ching Liu, Chih-Hao Shen, Da-Wei Wang and Justin Zhan



26 September 2014 (Day 3)--Friday


Technical Track

Poster Session

8:30 - 10:00

Technical Session 7: Mobile SecurityⅠ 

8:30 - 9:00



9:00 - 9:30



9:30 - 10:00

Towards a Systematic Study of the Covert Channel Attacks in Smartphones

Swarup Chandra, Zhiqiang Lin, AshishKundu and Latifur Khan


DroidKin: Lightweight Detection of Android Apps Similarity

Hugo Gonzalez, Natalia Stakhanova and Ali Ghorbani


Detecting Malicious Behaviors in Repackaged Android Apps with Loosely-coupled Payloads Filtering Scheme

Tianning Zang, Zhang Lulu and Yongzheng Zhang

10:00 - 10:20

Coffee Break

10:20 - 12:00

Technical Session 8: Mobile Security

10:20 - 10:50



10:50 - 11:20



11:20 - 11:40





11:40 - 12:00

Defending Blind DDoS Attack on SDN Based on Moving Target Defense

Duohe Ma , Zhen Xu and Dongdai Lin


Function Escalation Attack

Chen Cao, Yuqing Zhang, Qixu Liu and Kai Wang


RAMSES: Revealing Android Malware through String Extraction and Selection (short)

Lautaro Dolberg, Quentin Jérôme, Jérôme François, Radu State and Thomas Engel


Detecting Mobile Malware with TMSVM (short)

Xi Xiao, Xianni Xiao, Yong Jiang and Qing Li

8:30 - 12:00

Poster Session

8:30 - 12:00

Research on Credible Regulation Mechanism for the Trading of Digital Works

Guozhen Shi, Ying Shen, Fenghua Li, Mang Su and Dong Liu.


LICCAS: Assessing the Likelihood of Individual, Coordinated, and Coordination and Concurrency aware Likelihood Assessment of Simultaneous Attacks

Léa Samarji, Nora Cuppens-Boulahia, Frédéric Cuppens, Wael Kanoun, Serge Papillon, Wael Kanoun and Samuel Dubus


Domain Algorithmically Generated Botnet Detection And Analysis

Xiaolin Xu, Yonglin Zhou and Qingshan Li


Towards Improving Service Accessibility by Adaptive Resource Distribution Strategy

Jinqiao Shi, Xiao Wang, Binxing Fang, Qingfeng Tan and Li Guo


Hybrid Detection using Permission Analysis for Android Malware

Haofeng Jiao, Xiaohong Li, Lei Zhang, Guangquan Xu and Zhiyong Feng.


Content Security Scheme for Content Centric Networks

SarmadUllah Khan, Fawad Khan and Inam Bari


Detection of food safety topics based on SPLDAs

Jinshuo Liu, Yabo Li, Yingyue Peng, Juan Deng and Xin Chen


Platform Neutral Sandbox for Analyzing Android Malware and Resource Hoggers

Parvez Faruki, Vijay Ganmoor, Ammar Bharmal, Manoj Singh Gaur, Vijay Laxmi and Mauro Conti

12:00 - 13:30



Technical Track

Doctoral Symposium

13:30 - 15:20

Technical Session 9: Web Security

13:30 - 14:00


14:00 - 14:30



14:30 - 15:00


15:00 - 15:20

JumpBox - A Seamless Browser Proxy for Tor Pluggable Transports

Jeroen Massar, Ian Mason, Linda Briesemeister and Vinod Yegneswaran 


Abusing Browser Address Bar for Fun and Profit - An Empirical Investigation of Add-on Cross Site Scripting Attacks

Yinzhi Cao, Chao Yang, Vaibhav Rastogi, Yan Chen and Guofei Gu


Characterizing Google Hacking: A First Large-Scale Quantitative Study

Jialong Zhang, Jayant Notani and Guofei Gu


Detecting Malicious Sessions through Traffic Fingerprinting using Hidden Markov Models (short)

Sami Zhioua, Adnene Ben Jabeur, MahjoubLangar and WaelIlahi

13:30 - 15:20

Doctoral Symposium Session 1

13:30 - 14:00




14:00 - 14:30




14:30 - 15:00

A Performance Comparison Study of a Coverage-Preserving Node Scheduling Scheme and Its Enhancement in Sensor Networks

Qun Wang, HuanyanQian, PeiyuJi, Yu Xie and Shuhui Yang


An Improved Authorization Model in Trust Network

Xianming Gao, Xiaozhe zhang, Baosheng Wang and Huiting Shi


KEMF: Key Management for Federated Sensor Networks

Piers O'Hanlon, Joss Wright, Tulio de Souza and Ian Brown

15:20 - 15:40

Coffee Break

15:40 - 17:30

Technical Session 10: Intrusion Detection

15:40 - 16:10




16:10 - 16:40



16:40 - 17:00




17:00 - 17:30

METIS: a Two-Tier Intrusion Detection System for Advanced Metering Infrastructures

Vincenzo Gulisano, Magnus Almgren and Marina Papatriantafilou


Online Detection of concurrent prefix hijacks

Shen Su and Beichuan Zhang


Countermeasures for Mitigating ICN Routing Related DDoS Attacks (short)

Eslam Abdallah, Mohammad Zulkernine and Hossam Hassanein


A New Anomaly Detection Method Based on IGTE and IGFE

Ziyu Wang, Jiahai Yang and Fuliang Li

15:40 - 17:30

Doctoral Symposium Session 2

15:40 - 16:10



16:10 - 16:40




16:40 - 17:10

CPS^2: a Contextual Privacy Framework for Social Software

Rula Sayaf, Dave Clarke and Richard Harper


Are You Really My Friend? Exactly Spatiotemporal Matching Scheme in Privacy-Aware Mobile Social Networks

Ben Niu, Xiuguang Li, Xiaoyan Zhu, Xiaoqing Li and Hui Li


RFID authentication protocol resistant to the man-in-the-middle attack

Li Zhai and Chuankun Wu


Concluding Remarks