This event is endorsed
and organized by

10th International Conference on Security and Privacy in Communication Networks

September 24–26, 2014 | Beijing, People's Republic of China

 

23 September 2014 (Workshop)--Tuesday

8:00 - 19:00

Registration

9:00 - 17:00

ATCS Workshop

9:00 - 17:00

SSS/DAPRO Workshop

9:00 - 17:00

SLSS Workshop

24 September 2014 (Day 1)--Wednesday

Morning

PLENARY SESSION

8:00 - 18:00

Registration

8:30 - 9:00

Opening Remarks

9:00 - 9:20

Keynote 1

9:20 – 9:50

Coffee Break

9:50 - 11:10

Keynote 2

11:10 - 12:30

Keynote 3

12:30 - 13:30

Lunch

Afternoon

Technical Track

Industry Track

13:30 - 15:40

Technical Session 1: Cloud Computing Security

IT: Session 1

13:30 - 14:00

 

 

 

14:00 - 14:30

 

 

14:30 - 14:50

 

 

 

14:50 - 15:10

 

 

 

15:10 - 15:40

Inferring the Stealthy Bridges between Enterprise Network Islands in Cloud Using Cross-Layer Bayesian Networks

Xiaoyan Sun, Jun Dai, Anoop Singhal and Peng Liu

 

A Secure Architecture for Inter-Cloud Virtual Machine Migration

Muhammad Yousaf, Tayyaba Zeb, Abdul Ghafoor, and Awais Shibli

 

STRE: Privacy-Preserving Storage and Retrieval over Multiple Clouds (short)

Jingwei Li, Dan Lin, Anna Squicciarini and Chunfu Jia

 

An Effective Search Scheme based on Semantic Tree over Encrypted Cloud Data Supporting Verifiability  (short)

Zhangjie Fu, Jiangang Shu, Xingming Sun

 

Policy Driven Node Selection in MapReduce

Anna Squicciarini, Dan Lin, Smitha Sundareswaran and Jingwei Li

15:40 – 16:00

Coffee Break

16:00 - 18:30

Technical Session 2: Authentication and Identity

IT: Session 2

16:00 - 16:30

 

 

16:30 - 16:50

 

 

 

16:50 - 17:20

 

 

17:20 - 17:50

 

 

 

17:50 - 18:10

 

 

 

18:10 - 18:30

GridMap: Enhanced Security in Cued-Recall Graphical Passwords

Nicolas Van Balen and Haining Wang

 

UAuth: A Strong Authentication Method from Personal Devices to Multi-accounts (short)

Mingming Hu, Yazhe Wang and Chen Li

 

TPM-based Authentication Mechanism for Apache Hadoop

Issa Khalil, Zuochao Dou and Abdallah Khreishah

 

An Authentication and Key Management Scheme for Heterogeneous Sensor Networks

SarmadUllah Khan, Rafiullah Khan, Inam bari, Naveed Jan

 

Social Authentication Identity: An Alternate to Internet Real Name System (short)

Chengcheng Shao, Liang Chen, Shuo Fan and Xinwen Jiang

 

On the Usability of Two-Factor Authentication (short)

Ding Wang and Ping Wang

18:30

Banquet

25 September 2014  (Day 2)--Thursday

 Morning

Technical Track

Industry Track

8:30 - 10:00

Technical Session 3: Network security

 IT: Session 3

8:30 - 9:00

 

 

 

 

9:00 - 9:20

 

 

 

9:20 - 9:40

Securing Resource Discovery in Content Hosting Networks

Sushama Karumanchi, Jingwei Li and Anna Squicciarini

 

Detection of Botnet Command and Control Traffic by the Identification of Untrusted Destinations(short)

Pieter Burghouwt, Marcel E.M. Spruit and Henk J. Sips

 

Keep the Fakes Out: Defending against Sybil Attack in P2P systems (short)

Kan Chen, Peidong Zhu and YueshanXiong

9:40- 10:10

Coffee Break

10:10 - 12:00

Technical Session 4: Privacy & Wireless Security

 IT: Session 4

10:10 - 10:40

 

 

10:40 - 11:00

 

 

 

11:00 - 11:30

 

 

 

11:30 - 12:00

Anonymous Publish-Subscribe Systems

BinhVo and Steven Bellovin

 

Friendly Jamming for Secure Localization in Vehicular Transportation(short)

Bhaswati Deka, Ryan Gerdes, Ming Li and Kevin Heaslip

 

Visual-Assisted Wormhole Attack Detection for Wireless Sensor Networks

Eirini Karapistoli, Panagiotis Sarigiannidis and Anastasios Economides

 

Implementing an affordable and effective GSM IMSI catcher with 3G authentication

Max Suraev

12:00 - 13:30

Lunch

13:30 - 15:50

Technical Session 5: System & Software Security

13:30 - 14:00

 

 

14:00 - 14:20

 

 

14:20 - 14:50

 

 

14:50 - 15:20

 

 

 

15:20 - 15:50

A Simple and Novel Technique for Counteracting Exploit Kits

Byungho Min and Vijay Varadharajan

 

Policy Enforcement Point Model (short)

Yosra Ben Mustapha, Hervé Debar and Gregory Blanc

 

Control Flow Obfuscation using Neural Network to Fight Concolic Testing Haoyu Ma, Xinjie Ma, Weijie Liu, Zhipeng Huang, DebinGao and ChunfuJia

 

EFS: Efficient and Fault-Scalable Byzantine Fault Tolerant Systems against Faulty Clients

Quanwei Cai, Jingqiang Lin, Fengjun Li, Qiongxiao Wang and Daren Zha

 

SCADS: Separated Control- and Data-Stacks

Christopher Kugler and Tilo Müller

15:50 - 16:10

Coffee Break

16:10 - 18:30

Technical Session 6: Crypto

16:10 - 16:40

 

 

 

16:40 - 17:10

 

 

17:10 - 17:40

 

 

 

17:40 - 18:00

 

 

 

18:00 - 18:30

Improving the Security of the HMQV Protocol using Tamper-Proof Hardware

Qianying Zhang, Shijun Zhao and Dengguo Feng

 

TST: A New Randomness Test Method Based on Coupon Collector's Problem

Qinglong Zhang, Zongbin Liu, Quanwei Cai and Ji Xiang

 

Tree-based Multi-Dimensional Range Search on Encrypted Data with Enhanced Privacy

Boyang Wang, YantianHou, Ming Li, Haitao Wang, Hui Li and Fenghua Li

 

Hardware Implementation of Cryptographic Hash Function based on Spatiotemporal Chaos  (short)

Yuling Luo, Junxiu Liu, Lvchen Cao, Jinjie Bi and SenhuiQiu

 

An Information-Theoretic Approach for Secure Protocol Composition

Yi-Ting Chiang, Tsan-Sheng Hsu, Churn-Jung Liau, Yun-Ching Liu, Chih-Hao Shen, Da-Wei Wang and Justin Zhan

18:30

Dinner

26 September 2014 (Day 3)--Friday

Morning

Technical Track

Poster Session

8:30 - 10:00

Technical Session 7: Mobile SecurityⅠ 

8:30 - 9:00

 

 

9:00 - 9:30

 

 

9:30 - 10:00

Towards a Systematic Study of the Covert Channel Attacks in Smartphones

Swarup Chandra, Zhiqiang Lin, AshishKundu and Latifur Khan

 

DroidKin: Lightweight Detection of Android Apps Similarity

Hugo Gonzalez, Natalia Stakhanova and Ali Ghorbani

 

Detecting Malicious Behaviors in Repackaged Android Apps with Loosely-coupled Payloads Filtering Scheme

Tianning Zang, Zhang Lulu and Yongzheng Zhang

10:00 - 10:20

Coffee Break

10:20 - 12:00

Technical Session 8: Mobile Security

10:20 - 10:50

 

 

10:50 - 11:20

 

 

11:20 - 11:40

 

 

 

 

11:40 - 12:00

Defending Blind DDoS Attack on SDN Based on Moving Target Defense

Duohe Ma , Zhen Xu and Dongdai Lin

 

Function Escalation Attack

Chen Cao, Yuqing Zhang, Qixu Liu and Kai Wang

 

RAMSES: Revealing Android Malware through String Extraction and Selection (short)

Lautaro Dolberg, Quentin Jérôme, Jérôme François, Radu State and Thomas Engel

 

Detecting Mobile Malware with TMSVM (short)

Xi Xiao, Xianni Xiao, Yong Jiang and Qing Li

8:30 - 12:00

Poster Session

8:30 - 12:00

Research on Credible Regulation Mechanism for the Trading of Digital Works

Guozhen Shi, Ying Shen, Fenghua Li, Mang Su and Dong Liu.

 

LICCAS: Assessing the Likelihood of Individual, Coordinated, and Coordination and Concurrency aware Likelihood Assessment of Simultaneous Attacks

Léa Samarji, Nora Cuppens-Boulahia, Frédéric Cuppens, Wael Kanoun, Serge Papillon, Wael Kanoun and Samuel Dubus

 

Domain Algorithmically Generated Botnet Detection And Analysis

Xiaolin Xu, Yonglin Zhou and Qingshan Li

 

Towards Improving Service Accessibility by Adaptive Resource Distribution Strategy

Jinqiao Shi, Xiao Wang, Binxing Fang, Qingfeng Tan and Li Guo

 

Hybrid Detection using Permission Analysis for Android Malware

Haofeng Jiao, Xiaohong Li, Lei Zhang, Guangquan Xu and Zhiyong Feng.

 

Content Security Scheme for Content Centric Networks

SarmadUllah Khan, Fawad Khan and Inam Bari

 

Detection of food safety topics based on SPLDAs

Jinshuo Liu, Yabo Li, Yingyue Peng, Juan Deng and Xin Chen

 

Platform Neutral Sandbox for Analyzing Android Malware and Resource Hoggers

Parvez Faruki, Vijay Ganmoor, Ammar Bharmal, Manoj Singh Gaur, Vijay Laxmi and Mauro Conti

12:00 - 13:30

Lunch

Afternoon

Technical Track

Doctoral Symposium

13:30 - 15:20

Technical Session 9: Web Security

13:30 - 14:00

 

14:00 - 14:30

 

 

14:30 - 15:00

 

15:00 - 15:20

JumpBox - A Seamless Browser Proxy for Tor Pluggable Transports

Jeroen Massar, Ian Mason, Linda Briesemeister and Vinod Yegneswaran 

 

Abusing Browser Address Bar for Fun and Profit - An Empirical Investigation of Add-on Cross Site Scripting Attacks

Yinzhi Cao, Chao Yang, Vaibhav Rastogi, Yan Chen and Guofei Gu

 

Characterizing Google Hacking: A First Large-Scale Quantitative Study

Jialong Zhang, Jayant Notani and Guofei Gu

 

Detecting Malicious Sessions through Traffic Fingerprinting using Hidden Markov Models (short)

Sami Zhioua, Adnene Ben Jabeur, MahjoubLangar and WaelIlahi

13:30 - 15:20

Doctoral Symposium Session 1

13:30 - 14:00

 

 

 

14:00 - 14:30

 

 

 

14:30 - 15:00

A Performance Comparison Study of a Coverage-Preserving Node Scheduling Scheme and Its Enhancement in Sensor Networks

Qun Wang, HuanyanQian, PeiyuJi, Yu Xie and Shuhui Yang

 

An Improved Authorization Model in Trust Network

Xianming Gao, Xiaozhe zhang, Baosheng Wang and Huiting Shi

 

KEMF: Key Management for Federated Sensor Networks

Piers O'Hanlon, Joss Wright, Tulio de Souza and Ian Brown

15:20 - 15:40

Coffee Break

15:40 - 17:30

Technical Session 10: Intrusion Detection

15:40 - 16:10

 

 

 

16:10 - 16:40

 

 

16:40 - 17:00

 

 

 

17:00 - 17:30

METIS: a Two-Tier Intrusion Detection System for Advanced Metering Infrastructures

Vincenzo Gulisano, Magnus Almgren and Marina Papatriantafilou

 

Online Detection of concurrent prefix hijacks

Shen Su and Beichuan Zhang

 

Countermeasures for Mitigating ICN Routing Related DDoS Attacks (short)

Eslam Abdallah, Mohammad Zulkernine and Hossam Hassanein

 

A New Anomaly Detection Method Based on IGTE and IGFE

Ziyu Wang, Jiahai Yang and Fuliang Li

15:40 - 17:30

Doctoral Symposium Session 2

15:40 - 16:10

 

 

16:10 - 16:40

 

 

 

16:40 - 17:10

CPS^2: a Contextual Privacy Framework for Social Software

Rula Sayaf, Dave Clarke and Richard Harper

 

Are You Really My Friend? Exactly Spatiotemporal Matching Scheme in Privacy-Aware Mobile Social Networks

Ben Niu, Xiuguang Li, Xiaoyan Zhu, Xiaoqing Li and Hui Li

 

RFID authentication protocol resistant to the man-in-the-middle attack

Li Zhai and Chuankun Wu

17:30

Concluding Remarks