23 September 2014 (Workshop)--Tuesday |
|||||
8:00 - 19:00 |
Registration |
||||
9:00 - 17:00 |
ATCS Workshop |
||||
9:00 - 17:00 |
SSS/DAPRO Workshop |
||||
9:00 - 17:00 |
SLSS Workshop |
||||
24 September 2014 (Day 1)--Wednesday |
|||||
Morning |
PLENARY SESSION |
||||
8:00 - 18:00 |
Registration |
||||
8:30 - 9:00 |
Opening Remarks |
||||
9:00 - 9:20 |
Keynote 1 |
||||
9:20 – 9:50 |
Coffee Break |
||||
9:50 - 11:10 |
Keynote 2 |
||||
11:10 - 12:30 |
Keynote 3 |
||||
12:30 - 13:30 |
Lunch |
||||
Afternoon |
Technical Track |
Industry Track |
|||
13:30 - 15:40 |
Technical Session 1: Cloud Computing Security |
IT: Session 1 |
|||
13:30 - 14:00
14:00 - 14:30
14:30 - 14:50
14:50 - 15:10
15:10 - 15:40 |
Inferring the Stealthy Bridges between Enterprise Network Islands in Cloud Using Cross-Layer Bayesian Networks Xiaoyan Sun, Jun Dai, Anoop Singhal and Peng Liu
A Secure Architecture for Inter-Cloud Virtual Machine Migration Muhammad Yousaf, Tayyaba Zeb, Abdul Ghafoor, and Awais Shibli
STRE: Privacy-Preserving Storage and Retrieval over Multiple Clouds (short) Jingwei Li, Dan Lin, Anna Squicciarini and Chunfu Jia
An Effective Search Scheme based on Semantic Tree over Encrypted Cloud Data Supporting Verifiability (short) Zhangjie Fu, Jiangang Shu, Xingming Sun
Policy Driven Node Selection in MapReduce Anna Squicciarini, Dan Lin, Smitha Sundareswaran and Jingwei Li |
||||
15:40 – 16:00 |
Coffee Break |
||||
16:00 - 18:30 |
Technical Session 2: Authentication and Identity |
IT: Session 2 |
|||
16:00 - 16:30
16:30 - 16:50
16:50 - 17:20
17:20 - 17:50
17:50 - 18:10
18:10 - 18:30 |
GridMap: Enhanced Security in Cued-Recall Graphical Passwords Nicolas Van Balen and Haining Wang
UAuth: A Strong Authentication Method from Personal Devices to Multi-accounts (short) Mingming Hu, Yazhe Wang and Chen Li
TPM-based Authentication Mechanism for Apache Hadoop Issa Khalil, Zuochao Dou and Abdallah Khreishah
An Authentication and Key Management Scheme for Heterogeneous Sensor Networks SarmadUllah Khan, Rafiullah Khan, Inam bari, Naveed Jan
Social Authentication Identity: An Alternate to Internet Real Name System (short) Chengcheng Shao, Liang Chen, Shuo Fan and Xinwen Jiang
On the Usability of Two-Factor Authentication (short) Ding Wang and Ping Wang |
||||
18:30 |
Banquet |
||||
25 September 2014 (Day 2)--Thursday |
|||||
Morning |
Technical Track |
Industry Track |
|||
8:30 - 10:00 |
Technical Session 3: Network security |
IT: Session 3 |
|||
8:30 - 9:00
9:00 - 9:20
9:20 - 9:40 |
Securing Resource Discovery in Content Hosting Networks Sushama Karumanchi, Jingwei Li and Anna Squicciarini
Detection of Botnet Command and Control Traffic by the Identification of Untrusted Destinations(short) Pieter Burghouwt, Marcel E.M. Spruit and Henk J. Sips
Keep the Fakes Out: Defending against Sybil Attack in P2P systems (short) Kan Chen, Peidong Zhu and YueshanXiong |
||||
9:40- 10:10 |
Coffee Break |
||||
10:10 - 12:00 |
Technical Session 4: Privacy & Wireless Security |
IT: Session 4 |
|||
10:10 - 10:40
10:40 - 11:00
11:00 - 11:30
11:30 - 12:00 |
Anonymous Publish-Subscribe Systems BinhVo and Steven Bellovin
Friendly Jamming for Secure Localization in Vehicular Transportation(short) Bhaswati Deka, Ryan Gerdes, Ming Li and Kevin Heaslip
Visual-Assisted Wormhole Attack Detection for Wireless Sensor Networks Eirini Karapistoli, Panagiotis Sarigiannidis and Anastasios Economides
Implementing an affordable and effective GSM IMSI catcher with 3G authentication Max Suraev |
||||
12:00 - 13:30 |
Lunch |
||||
13:30 - 15:50 |
Technical Session 5: System & Software Security |
||||
13:30 - 14:00
14:00 - 14:20
14:20 - 14:50
14:50 - 15:20
15:20 - 15:50 |
A Simple and Novel Technique for Counteracting Exploit Kits Byungho Min and Vijay Varadharajan
Policy Enforcement Point Model (short) Yosra Ben Mustapha, Hervé Debar and Gregory Blanc
Control Flow Obfuscation using Neural Network to Fight Concolic Testing Haoyu Ma, Xinjie Ma, Weijie Liu, Zhipeng Huang, DebinGao and ChunfuJia
EFS: Efficient and Fault-Scalable Byzantine Fault Tolerant Systems against Faulty Clients Quanwei Cai, Jingqiang Lin, Fengjun Li, Qiongxiao Wang and Daren Zha
SCADS: Separated Control- and Data-Stacks Christopher Kugler and Tilo Müller |
||||
15:50 - 16:10 |
Coffee Break |
||||
16:10 - 18:30 |
Technical Session 6: Crypto |
||||
16:10 - 16:40
16:40 - 17:10
17:10 - 17:40
17:40 - 18:00
18:00 - 18:30 |
Improving the Security of the HMQV Protocol using Tamper-Proof Hardware Qianying Zhang, Shijun Zhao and Dengguo Feng
TST: A New Randomness Test Method Based on Coupon Collector's Problem Qinglong Zhang, Zongbin Liu, Quanwei Cai and Ji Xiang
Tree-based Multi-Dimensional Range Search on Encrypted Data with Enhanced Privacy Boyang Wang, YantianHou, Ming Li, Haitao Wang, Hui Li and Fenghua Li
Hardware Implementation of Cryptographic Hash Function based on Spatiotemporal Chaos (short) Yuling Luo, Junxiu Liu, Lvchen Cao, Jinjie Bi and SenhuiQiu
An Information-Theoretic Approach for Secure Protocol Composition Yi-Ting Chiang, Tsan-Sheng Hsu, Churn-Jung Liau, Yun-Ching Liu, Chih-Hao Shen, Da-Wei Wang and Justin Zhan |
||||
18:30 |
Dinner |
||||
26 September 2014 (Day 3)--Friday |
|||||
Morning |
Technical Track |
Poster Session |
|||
8:30 - 10:00 |
Technical Session 7: Mobile SecurityⅠ |
||||
8:30 - 9:00
9:00 - 9:30
9:30 - 10:00 |
Towards a Systematic Study of the Covert Channel Attacks in Smartphones Swarup Chandra, Zhiqiang Lin, AshishKundu and Latifur Khan
DroidKin: Lightweight Detection of Android Apps Similarity Hugo Gonzalez, Natalia Stakhanova and Ali Ghorbani
Detecting Malicious Behaviors in Repackaged Android Apps with Loosely-coupled Payloads Filtering Scheme Tianning Zang, Zhang Lulu and Yongzheng Zhang |
||||
10:00 - 10:20 |
Coffee Break |
||||
10:20 - 12:00 |
Technical Session 8: Mobile SecurityⅡ |
||||
10:20 - 10:50
10:50 - 11:20
11:20 - 11:40
11:40 - 12:00 |
Defending Blind DDoS Attack on SDN Based on Moving Target Defense Duohe Ma , Zhen Xu and Dongdai Lin
Function Escalation Attack Chen Cao, Yuqing Zhang, Qixu Liu and Kai Wang
RAMSES: Revealing Android Malware through String Extraction and Selection (short) Lautaro Dolberg, Quentin Jérôme, Jérôme François, Radu State and Thomas Engel
Detecting Mobile Malware with TMSVM (short) Xi Xiao, Xianni Xiao, Yong Jiang and Qing Li |
||||
8:30 - 12:00 |
Poster Session |
||||
8:30 - 12:00 |
Research on Credible Regulation Mechanism for the Trading of Digital Works Guozhen Shi, Ying Shen, Fenghua Li, Mang Su and Dong Liu.
LICCAS: Assessing the Likelihood of Individual, Coordinated, and Coordination and Concurrency aware Likelihood Assessment of Simultaneous Attacks Léa Samarji, Nora Cuppens-Boulahia, Frédéric Cuppens, Wael Kanoun, Serge Papillon, Wael Kanoun and Samuel Dubus
Domain Algorithmically Generated Botnet Detection And Analysis Xiaolin Xu, Yonglin Zhou and Qingshan Li
Towards Improving Service Accessibility by Adaptive Resource Distribution Strategy Jinqiao Shi, Xiao Wang, Binxing Fang, Qingfeng Tan and Li Guo
Hybrid Detection using Permission Analysis for Android Malware Haofeng Jiao, Xiaohong Li, Lei Zhang, Guangquan Xu and Zhiyong Feng.
Content Security Scheme for Content Centric Networks SarmadUllah Khan, Fawad Khan and Inam Bari
Detection of food safety topics based on SPLDAs Jinshuo Liu, Yabo Li, Yingyue Peng, Juan Deng and Xin Chen
Platform Neutral Sandbox for Analyzing Android Malware and Resource Hoggers Parvez Faruki, Vijay Ganmoor, Ammar Bharmal, Manoj Singh Gaur, Vijay Laxmi and Mauro Conti |
||||
12:00 - 13:30 |
Lunch |
||||
Afternoon |
Technical Track |
Doctoral Symposium |
|||
13:30 - 15:20 |
Technical Session 9: Web Security |
||||
13:30 - 14:00
14:00 - 14:30
14:30 - 15:00
15:00 - 15:20 |
JumpBox - A Seamless Browser Proxy for Tor Pluggable Transports Jeroen Massar, Ian Mason, Linda Briesemeister and Vinod Yegneswaran
Abusing Browser Address Bar for Fun and Profit - An Empirical Investigation of Add-on Cross Site Scripting Attacks Yinzhi Cao, Chao Yang, Vaibhav Rastogi, Yan Chen and Guofei Gu
Characterizing Google Hacking: A First Large-Scale Quantitative Study Jialong Zhang, Jayant Notani and Guofei Gu
Detecting Malicious Sessions through Traffic Fingerprinting using Hidden Markov Models (short) Sami Zhioua, Adnene Ben Jabeur, MahjoubLangar and WaelIlahi |
||||
13:30 - 15:20 |
Doctoral Symposium Session 1 |
||||
13:30 - 14:00
14:00 - 14:30
14:30 - 15:00 |
A Performance Comparison Study of a Coverage-Preserving Node Scheduling Scheme and Its Enhancement in Sensor Networks Qun Wang, HuanyanQian, PeiyuJi, Yu Xie and Shuhui Yang
An Improved Authorization Model in Trust Network Xianming Gao, Xiaozhe zhang, Baosheng Wang and Huiting Shi
KEMF: Key Management for Federated Sensor Networks Piers O'Hanlon, Joss Wright, Tulio de Souza and Ian Brown |
||||
15:20 - 15:40 |
Coffee Break |
||||
15:40 - 17:30 |
Technical Session 10: Intrusion Detection |
||||
15:40 - 16:10
16:10 - 16:40
16:40 - 17:00
17:00 - 17:30 |
METIS: a Two-Tier Intrusion Detection System for Advanced Metering Infrastructures Vincenzo Gulisano, Magnus Almgren and Marina Papatriantafilou
Online Detection of concurrent prefix hijacks Shen Su and Beichuan Zhang
Countermeasures for Mitigating ICN Routing Related DDoS Attacks (short) Eslam Abdallah, Mohammad Zulkernine and Hossam Hassanein
A New Anomaly Detection Method Based on IGTE and IGFE Ziyu Wang, Jiahai Yang and Fuliang Li |
||||
15:40 - 17:30 |
Doctoral Symposium Session 2 |
||||
15:40 - 16:10
16:10 - 16:40
16:40 - 17:10 |
CPS^2: a Contextual Privacy Framework for Social Software Rula Sayaf, Dave Clarke and Richard Harper
Are You Really My Friend? Exactly Spatiotemporal Matching Scheme in Privacy-Aware Mobile Social Networks Ben Niu, Xiuguang Li, Xiaoyan Zhu, Xiaoqing Li and Hui Li
RFID authentication protocol resistant to the man-in-the-middle attack Li Zhai and Chuankun Wu |
||||
17:30 |
Concluding Remarks |