This event is endorsed
and organized by

11th EAI International Conference on Security and Privacy in Communication Networks

October 26–29, 2015 | Dallas, United States

FULL PAPERS (Received Paper: 107, Accepted Paper: 29, Acceptance Rate: 27%)

4 Using Provenance Patterns to Vet Sensitive Behaviors in Android Apps

Chao Yang: Texas A&M University

Guangliang Yang: Texas A&M University

Ashish Gehani: SRI International

Vinod Yegneswaran: SRI International

Dawood Tariq: SRI International

Guofei Gu: Texas A&M University

11 RScam: Cloud-Based Anti-Malware via Reversible Sketch

Hao Sun: School of Computer, National University of Defense Technology

Xiaofeng Wang: School of Computer, National University of Defense Technology

Jinshu Su: School of Computer, National University of Defense Technology

21 Using a 3D geometrical model to improve accuracy in the evaluation and selection of countermeasures against complex cyber attacks

Gustavo Gonzalez Granadillo: CNRS Samovar UMR 5157, Institut Mines Telecom - Telecom SudParis

Joaquin Garcia-Alfaro: CNRS Samovar UMR 5157, Institut Mines Telecom - Telecom SudParis

HervŽ Debar: CNRS Samovar UMR 5157, Institut Mines Telecom - Telecom SudParis

22 FineDroid: Enforcing Permissions with System-wide Application Execution Context

Yuan Zhang: Fudan University

Min Yang: Fudan University

Guofei Gu: Texas A&M University

Hao Chen: UC Davis

23 TADOOP: Mining Network Traffic Anomalies with Hadoop

Geng Tian: Tsinghua University

Zhiliang Wang: Tsinghua University

Xia Yin: Tsinghua University

Li Zimu: Network Research Center, Tsinghua University

Xingang Shi: Institute for Network Sciences and Cyberspace, Tsinghua University

Ziyi Lu: Cisco Systems, Inc

Chao Zhou: Cisco Systems, Inc

Yang Yu: Tsinghua University

Dan Wu: Tsinghua University

27 Practicality of using side-channel analysis for software integrity checking of embedded systems

Hong Liu: Kansas State University

Hongmin Li: Kansas State University

Eugene Vasserman Kansas State University

28 An Improved Method for Anomaly-Based Network Scan Detection

Ashton Webster: University of Maryland

Margaret Gratian: University of Maryland

Ryan Eckenrod: University of Maryland

Daven Patel: University of Maryland

Michel Cukier: University of Maryland

33 Detection, Classification and Characterization of Android Malware Using API Data Dependency

Yongfeng Li: Nanjing University

Tong Shen Nanjing University

Xin Sun Nanjing University

Xuerui Pan: Nanjing University

Bing Mao: Nanjing University

37 An Attribute-Based Signcryption Scheme to Secure Attribute-Defined Multicast Communications

Chunqiang Hu: George Washington Uiversity

Xiuzhen Cheng: George Washington University

Zhi Tian: George Mason University

Jiguo Yu: Qufu Normal University

Kemal Akkaya: Florida International University

Limin Sun: China Academy of Science

41 SuperCall: A Secure Interface For Isolated Execution Environment to Dynamically Use External Services

Yueqiang Cheng: Carnegie Mellon University

Qing Li: Peking University

Miao Yu: Carnegie Mellon University

Xuhua Ding: SMU

Qingni Shen: peking university

43 KeyPocket - Improving Security and Usability for Provider Independent Login Architectures with Mobile Devices

André Ebert: Mobile and Distributed Systems Group, LMU Munich

Chadly Marouane: Virality GmbH

Benno Rott: Virality GmbH

Martin Werner: Mobile and Distributed Systems Group, LMU Munich

47 A Markov Random Field Approach to Automated Protocol Signature Inference

Tao Xu: Institute of Information Engineering, Chinese Academy of Sciences

Yongzheng Zhang: Institute of Information Engineering, Chinese Academy of Sciences

Yipeng Wang: Institute of Information Engineering, Chinese Academy of Sciences

Jianliang Sun: Institute of Information Engineering, Chinese Academy of Sciences

Xiaoyu Zhang: Institute of Information Engineering, Chinese Academy of Sciences

58 Intrinsic Code Attestation by Instruction Chaining for Embedded Devices

Oliver Stecklina: IHP

Peter Langendörfer: IHP

Frank Vater: IHP

Thorsten Kranz: Horst Gšrtz Institute for IT-Security, Ruhr Univerity Bochum

Gregor Leander: Horst Gšrtz Institute for IT-Security, Ruhr Univerity Bochum

64 Generation of Transmission Control rules compliant with existing Access Control policies

Yoann Bertrand: I3S - Université Nice Sophia Antipolis - CNRS

Mireille Blay-Fornarino: I3S - Université Nice Sophia Antipolis - CNRS

Karima Boudaoud: I3S - Université Nice Sophia Antipolis - CNRS

Michel Riveill I3S - Université Nice Sophia Antipolis - CNRS

66 Route Leaks Identification by Detecting Routing Loops

Song Li: Department of Electronic Engineering, Tsinghua University

Haixin Duan: Institute of Network Science and Cyberspace, Tsinghua University

Zhiliang Wang: Institute of Network Science and Cyberspace, Tsinghua University

Xing Li: Department of Electronic Engineering, Tsinghua University

73 Defeating Kernel Driver Purifier

Jidong Xiao: The College of William and Mary

Hai Huang: IBM T.J. Watson Research Center

Haining Wang: University of Delaware

74 How to prevent to Delegate Authentication

Mohsen Alimomeni: University of Calgary

Reihaneh Safavi-Naini: University of Calgary

76 Ciphertext-Policy Attribute-Based Encryption with User and Authority Accountability

Xing Zhang: Peking University

Cancan Jin: Peking University

Cong Li: Peking University

Zilong Wen: Peking University

Qingni Shen: Peking University

Yuejian Fang: Peking University

Zhonghai Wu: Peking University

78 A Decentralized Access Control Model for Dynamic Collaboration of Autonomous Peers

Stefan Craß: TU Wien

Gerson Joskowicz: TU Wien

Eva Kühn: TU Wien

82 Authenticating Top-k Results of Secure Multi-keyword Search in Cloud Computing

Xiaojun Xiao: College of Computer Science and Electronic Engineering, Hunan University

Yaping Lin: College of Computer Science and Electronic Engineering, Hunan University

Wei Zhang: College of Computer Science and Electronic Engineering, Hunan University

Xin Yao: College of Computer Science and Electronic Engineering, Hunan University

86 Resource Efficient Privacy Preservation of Online Social Media Conversations

Indrajeet Singh: University of California Riverside

Masoud Akhoondi: University of California Riverside

Mustafa Arslan: NEC Laboratories

Harsha Madhyastha: University of Michigan

Srikanth Krishnamurthy: University of California Riverside

87 Kernel Data Attack is a Realistic Security Threat

Jidong Xiao: The College of William and Mary

Hai Huang: IBM T.J. Watson Research Center

Haining Wang: University of Delaware

96 SplitDroid: Isolated Execution of Sensitive Components for Mobile Applications

Lin Yan: Peking University

Yao Guo: Peking University

Xiangqun Chen: Peking University

100 Why Web Servers Should Fear their Clients:Abusing Websockets in Browsers for DoS

Juan D. Parra Rodriguez: University of Passau

Joachim Posegga: University of Passau

101 PULSAR: Stateful Black-Box Fuzzing of Proprietary Network Protocols

Hugo Gascon: University of Göttingen

Christian Wressnegger: University of Göttingen

Fabian Yamaguchi: University of Göttingen

Daniel Arp: University of Göttingen

Konrad Rieck: University of Göttingen

102 You Are How You Query: Deriving Behavioral Fingerprints From DNS Traffic

Dae Wook Kim: Wright State University

Junjie Zhang: Wright State University

111 Uranine: Real-time Privacy Leakage Monitoring without System Modification for Android

Vaibhav Rastogi: Northwestern University

Zhengyang Qu Northwestern University

Jedidiah McClurg: University of Colorado Boulder

Yinzhi Cao: Columbia University

Yan Chen: Northwestern University

Weiwu Zhu: Zhejiang University

Wenzhi Chen: Zhejiang University

116 Enhancing Traffic Analysis Resistance for Tor Hidden Services with Multipath Routing

Lei Yang: The University of Kansas

Fengjun Li: The University of Kansas

118 Remote Activation of Hardware Trojans via a Temperature Channel

Priyabrart Dash: Utah State University

Chris Perkins: Utah State University

Dr.Ryan Gerdes: Utah State University


ACCEPTED POSTERS

10 A Genetic-Algorithm-Based Solution for HTTP-Based Malware Signature Generation

Amir Pourafshar: University of New Brunswick

Ali A. Ghorbani: Utah State University

26 Ciphertext-Policy Attribute-Based Encryption Method with Secure Decryption Key Generation and Outsourcing Decryption of ABE Ciphertexts

Yuejian Fang: School of Software and Microelectronic, Peking University

Zilong Wen: School of Software and Microelectronic, Peking University

Qingni Shen: School of Software and Microelectronic, Peking University

Zhonghai Wu: School of Software and Microelectronic, Peking University

39 Assessing Security, Capacity and Reachability of a Heterogeneous Industrial Network during Planning Phase

Apala Ray: ABB Corporate Research

Johan kerberg: ABB Corporate Research

Mats Bjšrkman: MŠlardalen University

Mikael Gidlund: Mid Sweden University

51 Using Improved Singular Value Decomposition for Selecting Traces for Enhancement of Correlation Power Analysis

Sun Degang Institute of Information Engineering, Chinese Academy of Sciences

Zhou Xinping: Institute of Information Engineering, Chinese Academy of Sciences

Wang Zhu: Institute of Information Engineering, Chinese Academy of Sciences

Ou Changhai: Institute of Information Engineering, Chinese Academy of Sciences

Huang Weiqing: Institute of Information Engineering, Chinese Academy of Sciences

52 API-level Multi-policy Access Control Enforcement for Android Middleware

Dongdong Tian: Tianjin University

Xiaohong Li: Tianjin University

Jing Hu: Tianjin University

Guangquan Xu: Tianjin University

Zhiyong Feng: Tianjin University

62 A Collaborative Approach on Behaivor-Based Android Malware Detection

Chanwoo Bae: KAIST

Jesung Jung: KAIST

Jaehyun Nam: KAIST

Seungwon Shin: KAIST

67 Dynamic Differential-private Naive Bayes Learning over Large-scale Networks

Mengdi Huai: School of Computer Science and Technology, University of Science and Technology of China

Liusheng Huang: School of Computer Science and Technology, University of Science and Technology of China

Lu Li: School of Computer Science and Technology, University of Science and Technology of China

Wei Yang: School of Computer Science and Technology, University of Science and Technology of China

70 Semantics-Aware Rule Recommendation and Enforcement for Event Paths

Yongbo Li: The George Washington University

Fan Yao: The George Washington University

Tian Lan: The George Washington University

Guru Venkataramani: The George Washington University

77 A security adaptive steganography system applied on digital audio

Xuejie Ding: Institute of Information Engineering, Chinese Academy of Sciences

Weiqing Huang: Institute of Information Engineering, Chinese Academy of Sciences

Meng Zhang: Institute of Information Engineering, Chinese Academy of Sciences

Jianlin Zhao: Institute of Information Engineering, Chinese Academy of Sciences

84 Context-Adaptive User-Centric Privacy Scheme for VANET

Karim Emara: Technische Universität München

Wolfgang Wörndl: Technische Universität München

Johann Schlichter: Technische Universität München

95 Runtime-Behavior based Malware Classification Using Online Machine Learning

Abdurrahman Pekta: Cyber Security Institute, The Scientific and Technological Research Council of Turkey

Tankut Acarman: Galatasaray University

Yliès Falcone: Univ. Grenoble Alpes

Jean-Claude Fernandez: Univ. Grenoble Alpes

104 Reliable and Efficient Protection of Consumer Privacy in Advanced Metering Infrastructure

Vitaly Ford: Tennessee Tech University

Ambaree Siraj: Tennessee Tech University

119 An Online Prefix-Preserving IP Address Anonymization Algorithm for Passive Measurement Systems poster

Kai Cao: Sino-German Joint Software Institute, School of Computer Science and Engineering, Beihang University, Beijing, China

Yunchun Li: Sino-German Joint Software Institute, School of Computer Science and Engineering, Beihang University, Beijing, China

Hailong Yang: Sino-German Joint Software Institute, School of Computer Science and Engineering, Beihang University, Beijing, China

Jiqiang Tang: National Computer network Emergency Response technical Team/Coordination Center (CNCERT/CC), Beijing, China

Xiaoxiang Zou: National Computer network Emergency Response technical Team/Coordination Center (CNCERT/CC), Beijing, China


SECURECOMM WORKSHOP ATCS

Securing Application with Software Partitioning: A case study using SGX

Ahmad Atamli:

Andrew Martin: University of Oxford

Mona Vij:

Krystof C. Zmudzinski:

Somnath Chakrabarti:

Secrecy Rate Based User Selection Algorithms in Massive MIMO Broadcast Systems

M. Arif Khan: Charles Sturt University

Rafiqul Islam: Charles Sturt University

Security Considerations for Wireless Carrier Agonistic Bio-monitoring Systems

Ben Townsend: Deakin University

Jemal Abawajy: Deakin University

Image Spam Classification using Neural Network

Mozammel H. Chowdhury: Charles Sturt University

Junbin Gao: Charles Sturt University

Morshed Chowdhury: Deakin University

A Novel Clustering Algorithm for Database Anomaly Detection

Jinkun Geng: Beihang University

Ping Luo: Tsinghua University

Pin Lv: State Information Center

Community-based Collaborative Intrusion Detection

Carlos Garcia Cordero: Center for Advanced Security Research Darmstadt

Emmanouil Vasilomanolakis:

Max Mühlhäuser: Technische Universität Darmstadt

Mathias Fischer: International Computer Science Institute

An Effective T-way Test Data Generation Strategy

Khandakar Rabbi: Charles Sturt University

Quazi Mamun: Charles Sturt University

A Secure Cross-Domain SIP Solution for Mobile Ad Hoc Network using Dynamic Clustering

Ala' Aburumman: University of South Australia

Wei Jye Seo: University of South Australia

Rafiqul Islam: Charles Sturt University

Muhammad Khurram Khan: King Saud University

Kim-Kwang Raymond Choo: University of South Australia

Human Surveillance System for Security Application

Mozammel H. Chowdhury:

Junbin Gao: Charles Sturt University

Rafiqul Islam: Charles Sturt University