FULL PAPERS (Received Paper: 107, Accepted Paper: 29, Acceptance Rate: 27%)
4 Using Provenance Patterns to Vet Sensitive Behaviors in Android Apps
Chao Yang: Texas A&M University
Guangliang Yang: Texas A&M University
Ashish Gehani: SRI International
Vinod Yegneswaran: SRI International
Dawood Tariq: SRI International
Guofei Gu: Texas A&M University
11 RScam: Cloud-Based Anti-Malware via Reversible Sketch
Hao Sun: School of Computer, National University of Defense Technology
Xiaofeng Wang: School of Computer, National University of Defense Technology
Jinshu Su: School of Computer, National University of Defense Technology
21 Using a 3D geometrical model to improve accuracy in the evaluation and selection of countermeasures against complex cyber attacks
Gustavo Gonzalez Granadillo: CNRS Samovar UMR 5157, Institut Mines Telecom - Telecom SudParis
Joaquin Garcia-Alfaro: CNRS Samovar UMR 5157, Institut Mines Telecom - Telecom SudParis
HervŽ Debar: CNRS Samovar UMR 5157, Institut Mines Telecom - Telecom SudParis
22 FineDroid: Enforcing Permissions with System-wide Application Execution Context
Yuan Zhang: Fudan University
Min Yang: Fudan University
Guofei Gu: Texas A&M University
Hao Chen: UC Davis
23 TADOOP: Mining Network Traffic Anomalies with Hadoop
Geng Tian: Tsinghua University
Zhiliang Wang: Tsinghua University
Xia Yin: Tsinghua University
Li Zimu: Network Research Center, Tsinghua University
Xingang Shi: Institute for Network Sciences and Cyberspace, Tsinghua University
Ziyi Lu: Cisco Systems, Inc
Chao Zhou: Cisco Systems, Inc
Yang Yu: Tsinghua University
Dan Wu: Tsinghua University
27 Practicality of using side-channel analysis for software integrity checking of embedded systems
Hong Liu: Kansas State University
Hongmin Li: Kansas State University
Eugene Vasserman Kansas State University
28 An Improved Method for Anomaly-Based Network Scan Detection
Ashton Webster: University of Maryland
Margaret Gratian: University of Maryland
Ryan Eckenrod: University of Maryland
Daven Patel: University of Maryland
Michel Cukier: University of Maryland
33 Detection, Classification and Characterization of Android Malware Using API Data Dependency
Yongfeng Li: Nanjing University
Tong Shen Nanjing University
Xin Sun Nanjing University
Xuerui Pan: Nanjing University
Bing Mao: Nanjing University
37 An Attribute-Based Signcryption Scheme to Secure Attribute-Defined Multicast Communications
Chunqiang Hu: George Washington Uiversity
Xiuzhen Cheng: George Washington University
Zhi Tian: George Mason University
Jiguo Yu: Qufu Normal University
Kemal Akkaya: Florida International University
Limin Sun: China Academy of Science
41 SuperCall: A Secure Interface For Isolated Execution Environment to Dynamically Use External Services
Yueqiang Cheng: Carnegie Mellon University
Qing Li: Peking University
Miao Yu: Carnegie Mellon University
Xuhua Ding: SMU
Qingni Shen: peking university
43 KeyPocket - Improving Security and Usability for Provider Independent Login Architectures with Mobile Devices
André Ebert: Mobile and Distributed Systems Group, LMU Munich
Chadly Marouane: Virality GmbH
Benno Rott: Virality GmbH
Martin Werner: Mobile and Distributed Systems Group, LMU Munich
47 A Markov Random Field Approach to Automated Protocol Signature Inference
Tao Xu: Institute of Information Engineering, Chinese Academy of Sciences
Yongzheng Zhang: Institute of Information Engineering, Chinese Academy of Sciences
Yipeng Wang: Institute of Information Engineering, Chinese Academy of Sciences
Jianliang Sun: Institute of Information Engineering, Chinese Academy of Sciences
Xiaoyu Zhang: Institute of Information Engineering, Chinese Academy of Sciences
58 Intrinsic Code Attestation by Instruction Chaining for Embedded Devices
Oliver Stecklina: IHP
Peter Langendörfer: IHP
Frank Vater: IHP
Thorsten Kranz: Horst Gšrtz Institute for IT-Security, Ruhr Univerity Bochum
Gregor Leander: Horst Gšrtz Institute for IT-Security, Ruhr Univerity Bochum
64 Generation of Transmission Control rules compliant with existing Access Control policies
Yoann Bertrand: I3S - Université Nice Sophia Antipolis - CNRS
Mireille Blay-Fornarino: I3S - Université Nice Sophia Antipolis - CNRS
Karima Boudaoud: I3S - Université Nice Sophia Antipolis - CNRS
Michel Riveill I3S - Université Nice Sophia Antipolis - CNRS
66 Route Leaks Identification by Detecting Routing Loops
Song Li: Department of Electronic Engineering, Tsinghua University
Haixin Duan: Institute of Network Science and Cyberspace, Tsinghua University
Zhiliang Wang: Institute of Network Science and Cyberspace, Tsinghua University
Xing Li: Department of Electronic Engineering, Tsinghua University
73 Defeating Kernel Driver Purifier
Jidong Xiao: The College of William and Mary
Hai Huang: IBM T.J. Watson Research Center
Haining Wang: University of Delaware
74 How to prevent to Delegate Authentication
Mohsen Alimomeni: University of Calgary
Reihaneh Safavi-Naini: University of Calgary
76 Ciphertext-Policy Attribute-Based Encryption with User and Authority Accountability
Xing Zhang: Peking University
Cancan Jin: Peking University
Cong Li: Peking University
Zilong Wen: Peking University
Qingni Shen: Peking University
Yuejian Fang: Peking University
Zhonghai Wu: Peking University
78 A Decentralized Access Control Model for Dynamic Collaboration of Autonomous Peers
Stefan Craß: TU Wien
Gerson Joskowicz: TU Wien
Eva Kühn: TU Wien
82 Authenticating Top-k Results of Secure Multi-keyword Search in Cloud Computing
Xiaojun Xiao: College of Computer Science and Electronic Engineering, Hunan University
Yaping Lin: College of Computer Science and Electronic Engineering, Hunan University
Wei Zhang: College of Computer Science and Electronic Engineering, Hunan University
Xin Yao: College of Computer Science and Electronic Engineering, Hunan University
86 Resource Efficient Privacy Preservation of Online Social Media Conversations
Indrajeet Singh: University of California Riverside
Masoud Akhoondi: University of California Riverside
Mustafa Arslan: NEC Laboratories
Harsha Madhyastha: University of Michigan
Srikanth Krishnamurthy: University of California Riverside
87 Kernel Data Attack is a Realistic Security Threat
Jidong Xiao: The College of William and Mary
Hai Huang: IBM T.J. Watson Research Center
Haining Wang: University of Delaware
96 SplitDroid: Isolated Execution of Sensitive Components for Mobile Applications
Lin Yan: Peking University
Yao Guo: Peking University
Xiangqun Chen: Peking University
100 Why Web Servers Should Fear their Clients:Abusing Websockets in Browsers for DoS
Juan D. Parra Rodriguez: University of Passau
Joachim Posegga: University of Passau
101 PULSAR: Stateful Black-Box Fuzzing of Proprietary Network Protocols
Hugo Gascon: University of Göttingen
Christian Wressnegger: University of Göttingen
Fabian Yamaguchi: University of Göttingen
Daniel Arp: University of Göttingen
Konrad Rieck: University of Göttingen
102 You Are How You Query: Deriving Behavioral Fingerprints From DNS Traffic
Dae Wook Kim: Wright State University
Junjie Zhang: Wright State University
111 Uranine: Real-time Privacy Leakage Monitoring without System Modification for Android
Vaibhav Rastogi: Northwestern University
Zhengyang Qu Northwestern University
Jedidiah McClurg: University of Colorado Boulder
Yinzhi Cao: Columbia University
Yan Chen: Northwestern University
Weiwu Zhu: Zhejiang University
Wenzhi Chen: Zhejiang University
116 Enhancing Traffic Analysis Resistance for Tor Hidden Services with Multipath Routing
Lei Yang: The University of Kansas
Fengjun Li: The University of Kansas
118 Remote Activation of Hardware Trojans via a Temperature Channel
Priyabrart Dash: Utah State University
Chris Perkins: Utah State University
Dr.Ryan Gerdes: Utah State University
ACCEPTED POSTERS
10 A Genetic-Algorithm-Based Solution for HTTP-Based Malware Signature Generation
Amir Pourafshar: University of New Brunswick
Ali A. Ghorbani: Utah State University
26 Ciphertext-Policy Attribute-Based Encryption Method with Secure Decryption Key Generation and Outsourcing Decryption of ABE Ciphertexts
Yuejian Fang: School of Software and Microelectronic, Peking University
Zilong Wen: School of Software and Microelectronic, Peking University
Qingni Shen: School of Software and Microelectronic, Peking University
Zhonghai Wu: School of Software and Microelectronic, Peking University
39 Assessing Security, Capacity and Reachability of a Heterogeneous Industrial Network during Planning Phase
Apala Ray: ABB Corporate Research
Johan kerberg: ABB Corporate Research
Mats Bjšrkman: MŠlardalen University
Mikael Gidlund: Mid Sweden University
51 Using Improved Singular Value Decomposition for Selecting Traces for Enhancement of Correlation Power Analysis
Sun Degang Institute of Information Engineering, Chinese Academy of Sciences
Zhou Xinping: Institute of Information Engineering, Chinese Academy of Sciences
Wang Zhu: Institute of Information Engineering, Chinese Academy of Sciences
Ou Changhai: Institute of Information Engineering, Chinese Academy of Sciences
Huang Weiqing: Institute of Information Engineering, Chinese Academy of Sciences
52 API-level Multi-policy Access Control Enforcement for Android Middleware
Dongdong Tian: Tianjin University
Xiaohong Li: Tianjin University
Jing Hu: Tianjin University
Guangquan Xu: Tianjin University
Zhiyong Feng: Tianjin University
62 A Collaborative Approach on Behaivor-Based Android Malware Detection
Chanwoo Bae: KAIST
Jesung Jung: KAIST
Jaehyun Nam: KAIST
Seungwon Shin: KAIST
67 Dynamic Differential-private Naive Bayes Learning over Large-scale Networks
Mengdi Huai: School of Computer Science and Technology, University of Science and Technology of China
Liusheng Huang: School of Computer Science and Technology, University of Science and Technology of China
Lu Li: School of Computer Science and Technology, University of Science and Technology of China
Wei Yang: School of Computer Science and Technology, University of Science and Technology of China
70 Semantics-Aware Rule Recommendation and Enforcement for Event Paths
Yongbo Li: The George Washington University
Fan Yao: The George Washington University
Tian Lan: The George Washington University
Guru Venkataramani: The George Washington University
77 A security adaptive steganography system applied on digital audio
Xuejie Ding: Institute of Information Engineering, Chinese Academy of Sciences
Weiqing Huang: Institute of Information Engineering, Chinese Academy of Sciences
Meng Zhang: Institute of Information Engineering, Chinese Academy of Sciences
Jianlin Zhao: Institute of Information Engineering, Chinese Academy of Sciences
84 Context-Adaptive User-Centric Privacy Scheme for VANET
Karim Emara: Technische Universität München
Wolfgang Wörndl: Technische Universität München
Johann Schlichter: Technische Universität München
95 Runtime-Behavior based Malware Classification Using Online Machine Learning
Abdurrahman Pekta: Cyber Security Institute, The Scientific and Technological Research Council of Turkey
Tankut Acarman: Galatasaray University
Yliès Falcone: Univ. Grenoble Alpes
Jean-Claude Fernandez: Univ. Grenoble Alpes
104 Reliable and Efficient Protection of Consumer Privacy in Advanced Metering Infrastructure
Vitaly Ford: Tennessee Tech University
Ambaree Siraj: Tennessee Tech University
119 An Online Prefix-Preserving IP Address Anonymization Algorithm for Passive Measurement Systems poster
Kai Cao: Sino-German Joint Software Institute, School of Computer Science and Engineering, Beihang University, Beijing, China
Yunchun Li: Sino-German Joint Software Institute, School of Computer Science and Engineering, Beihang University, Beijing, China
Hailong Yang: Sino-German Joint Software Institute, School of Computer Science and Engineering, Beihang University, Beijing, China
Jiqiang Tang: National Computer network Emergency Response technical Team/Coordination Center (CNCERT/CC), Beijing, China
Xiaoxiang Zou: National Computer network Emergency Response technical Team/Coordination Center (CNCERT/CC), Beijing, China
SECURECOMM WORKSHOP ATCS
Securing Application with Software Partitioning: A case study using SGX
Ahmad Atamli:
Andrew Martin: University of Oxford
Mona Vij:
Krystof C. Zmudzinski:
Somnath Chakrabarti:
Secrecy Rate Based User Selection Algorithms in Massive MIMO Broadcast Systems
M. Arif Khan: Charles Sturt University
Rafiqul Islam: Charles Sturt University
Security Considerations for Wireless Carrier Agonistic Bio-monitoring Systems
Ben Townsend: Deakin University
Jemal Abawajy: Deakin University
Image Spam Classification using Neural Network
Mozammel H. Chowdhury: Charles Sturt University
Junbin Gao: Charles Sturt University
Morshed Chowdhury: Deakin University
A Novel Clustering Algorithm for Database Anomaly Detection
Jinkun Geng: Beihang University
Ping Luo: Tsinghua University
Pin Lv: State Information Center
Community-based Collaborative Intrusion Detection
Carlos Garcia Cordero: Center for Advanced Security Research Darmstadt
Emmanouil Vasilomanolakis:
Max Mühlhäuser: Technische Universität Darmstadt
Mathias Fischer: International Computer Science Institute
An Effective T-way Test Data Generation Strategy
Khandakar Rabbi: Charles Sturt University
Quazi Mamun: Charles Sturt University
A Secure Cross-Domain SIP Solution for Mobile Ad Hoc Network using Dynamic Clustering
Ala' Aburumman: University of South Australia
Wei Jye Seo: University of South Australia
Rafiqul Islam: Charles Sturt University
Muhammad Khurram Khan: King Saud University
Kim-Kwang Raymond Choo: University of South Australia
Human Surveillance System for Security Application
Mozammel H. Chowdhury:
Junbin Gao: Charles Sturt University
Rafiqul Islam: Charles Sturt University