27th October 2015 -- Tuesday |
|||||||
08:00 - 18:00 |
Registration |
||||||
08:30 - 09:00 |
Opening Remarks |
||||||
09:00 - 10:00 |
|||||||
10:00 - 10:15 |
Coffee Break |
||||||
10:15 - 12:15 |
Mobile, System and Software Security I |
||||||
Session Chair: Xiaofeng Wang | |||||||
FineDroid: Enforcing Permissions with System-wide Application Execution Context Yuan Zhang (Fudan University) , Min Yang (Fudan University) , Guofei Gu (Texas A&M University) , Hao Chen (UC Davis)
Detection, Classification and Characterization of Android Malware Using API Data Dependency Yongfeng Li (Nanjing University) , Tong Shen (Nanjing University) , Xin Sun (Nanjing University) , Xuerui Pan, Bing Mao (Nanjing University)
KeyPocket - Improving Security and Usability for Provider Independent Login Architectures with Mobile Devices André Ebert (Mobile and Distributed System Group, LMU Munich), Chadly Marouane (Virality GmbH), Benno Rott (Virality GmbH), Martin Werner (Mobile and Distributed System Group, LMU Munich)
Using Provenance Patterns to Vet Sensitive Behaviors in Android Apps Chao Yang (Texas A&M University), Guangliang Yang (Texas A&M University), Ashish Gehani (SRI International), Vinod Yegneswaran (SRI International), Dawood Tariq (SRI International), Guofei Gu (Texas A&M University) |
|||||||
12:20 - 13:30 |
Lunch Break |
||||||
13:30 - 15:30 |
Mobile, System and Software Security II |
||||||
Session Chair: Xiaofeng Wang | |||||||
SplitDroid: Isolated Execution of Sensitive Components for Mobile Applications Lin Yan (Peking University), Yao Guo (Peking University), Xiangqun Chen (Peking University)
Intrinsic Code Attestation by Instruction Chaining for Embedded Devices Oliver Stecklina (IHP) , Peter Langendörfer (IHP), Frank Vater (IHP), Thorsten Kranz (Horst Gšrtz Institute for IT-Security, Ruhr Univerity Bochum), Gregor Leander (Horst Gšrtz Institute for IT-Security, Ruhr Univerity Bochum)
Defeating Kernel Driver Purifier Jidong Xiao (The College of William and Mary), Hai Huang (IBM T.J. Watson Research Center), Haining Wang (University of Delaware)
Kernel Data Attack is a Realistic Security Threat Jidong Xiao (The College of William and Mary), Hai Huang (IBM T.J. Watson Research Center), Haining Wang (University of Delaware) |
|||||||
15:30 - 15:45 |
Coffee Break |
||||||
15:45 - 17:45 |
Cloud Security |
||||||
Session Chair: Guofei Gu | |||||||
RScam: Cloud-Based Anti-Malware via Reversible Sketch Hao Sun (School of Computer, National University of Defense Technology), Xiaofeng Wang (School of Computer, National University of Defense Technology), Jinshu Su (School of Computer, National University of Defense Technology)
TADOOP: Mining Network Traffic Anomalies with Hadoop Geng Tian (Tsinghua University), Zhiliang Wang (Tsinghua University), Xia Yin (Tsinghua University), Li Zimu (Tsinghua University), Xingang Shi (Tsinghua University), Ziyi Lu (Cisco System, Inc), Chao Zhou (Cisco System, Inc), Yang Yu (Tsinghua University), Dan Wu (Tsinghua University)
SuperCall: A Secure Interface For Isolated Execution Environment to Dynamically Use External Services Yueqiang Cheng (Carnegie Mellon University), Qing Li (Peking University), Miao Yu (Carnegie Mellon University), Xuhua Ding (SMU), Qingni Shen (Peking University)
Authenticating Top-k Results of Secure Multi-keyword Search in Cloud Computing Xiaojun Xiao (Hunan University), Yaping Lin (Hunan University), Wei Zhang (Hunan University), Xin Yao (Hunan University) |
|||||||
28th October 2015 -- Wednesday |
|||||||
08:00 - 18:00 |
Registration |
||||||
09:00 - 10:00 |
|||||||
10:00 - 10:15 |
Coffee Break |
||||||
Privacy and Side Channels |
|||||||
Session Chair: Latifur Khan | |||||||
Resource Efficient Privacy Preservation of Online Social Media Conversations Indrajeet Singh (University of California Riverside), Masoud Akhoondi (University of California Riverside), Mustafa Arslan (NEC Laboratories), Harsha Madhyastha (University of Michigan), Srikanth Krishnamurthy (University of California Riverside)
Uranine: Real-time Privacy Leakage Monitoring without System Modification for Android Vaibhav Rastogi (Northwestern University), Zhengyang Qu (Northwestern University), Jedidiah McClurg (University of Colorado), Yinzhi Cao (Columbia University), Yan Chen (Northwestern University), Weiwu Zhu (Zhejiang University), Wenzhi Chen (Zhejiang University)
Practicality of using side-channel analysis for software integrity checking of embedded systems Hong Liu (Kansas State University), Hongmin Li (Kansas State University), Eugene Vasserman (Kansas State University)
Remote Activation of Hardware Trojans via a Temperature Channel Priyabrart Dash (Utah State University), Chris Perkins (Utah State University), Dr.Ryan Gerdes (Utah State University) |
|||||||
12:15 - 13:30 |
Lunch Break |
||||||
Web and Network Security I |
|||||||
Session Chair: Rafiqul Islam | |||||||
Route Leaks Identification by Detecting Routing Loops Song Li (Tsinghua University), Haixin Duan (Tsinghua University), Zhiliang Wang (Tsinghua University), Xing Li (Tsinghua University)
Hugo Gascon (University of Göttingen), Christian Wressnegger (University of Göttingen), Fabian Yamaguchi (University of Göttingen), Daniel Arp (University of Göttingen), Konrad Rieck (University of Göttingen)
Dae Wook Kim (Wright State University), Junjie Zhang (Wright State University)
Lei Yang (The University of Kansas), Fengjun Li (The University of Kansas) |
|||||||
15:30 - 15:45 |
Coffee Break |
||||||
15:45 - 17:45 |
10 Minute Lightning Talks |
||||||
Session Chair: Zhiqiang Lin | |||||||
POSTER: A Genetic-Algorithm-Based Solution for HTTP-Based Malware Signature Generation Amir Pourafsha (University of New Brunswick), Ali A. Ghorbani (Utah State University)
POSTER: Ciphertext-Policy Attribute-Based Encryption Method with Secure Decryption Key Generation and Outsourcing Decryption of ABE Ciphertexts Yuejian Fang (Peking University), Zilong Wen (Peking University), Qingni Shen (Peking University), Zhonghai Wu (Peking University)
POSTER: Assessing Security, Capacity and Reachability of a Heterogeneous Industrial Network during Planning Phase Apala Ray (ABB Corporate Research), Johan Kerberg (ABB Corporate Research), Mats Bjšrkman (MŠlardalen University), Mikael Gidlund (Mid Sweden University)
POSTER: Using Improved Singular Value Decomposition for Selecting Traces for Enhancement of Correlation Power Analysis Sun Degang (Chinese Academy of Science), Zhou Xinping (Chinese Academy of Science), Wang Zhu (Chinese Academy of Science), Ou Changhai (Chinese Academy of Science), Huang Weiqing (Chinese Academy of Science)
POSTER: API-level Multi-policy Access Control Enforcement for Android Middleware Dongdong Tian (Tianjin Univeristy), Xiaohong Li (Tianjin Univeristy), Jing Hu (Tianjin Univeristy), Guangquang Xu (Tianjin Univeristy), Zhiyong Feng (Tianjin Univeristy)
POSTER: A Collaborative Approach on Behavior-Based Android Malware Detection Chanwoo Bae (KAIST), Jesung Jung (KAIST), Jaehyun Nam (KAIST), Seungwon Shin (KAIST)
POSTER: Dynamic Differential-private Naive Bayes Learning over Large-scale Networks Mengdi Huai (University of Science and Technology of China), Liusheng Huang (University of Science and Technology of China), Lu Li (University of Science and Technology of China), Wei Yang (University of Science and Technology of China)
POSTER: Semantics-Aware Rule Recommendation and Enforcement for Event Paths Yongbo Li (The George Washington University), Fan Yao (The George Wahington University), Tian Lan (The George Washington University), Guru Venkataramani (The George Washington University)
POSTER: Context-Adaptive User-Centric Privacy Scheme for VANET Karim Emara (Technische Universität München), Wolfgang Wörndl (Technische Universität München), Johann Schlichter (Technische Universität München)
POSTER: Runtime-Behavior based Malware Classification Using Online Machine Learning Abdurrahman Pekta (Cyber Security Institue, The Scientific and Technological Research Council of Turkey), Tankut Acarman (Galatasaray University), Yliès Falcone (Univ. Grenoble Alpes), Jean-Claude Fernandez (Univ. Grenoble Alpes)
POSTER: Reliable and Efficient Protection of Consumer Privacy in Advanced Metering Infrastructure Vitaly Ford (Tennessee Tech University), Ambaree Siraj (Tennessee Tech University)
POSTER: An Online Prefix-Preserving IP Address Anonymization Algorithm for Passive Measurement Systems Kai Cao (Beihang University), Yunchun Li (Beihang University), Hailong Yang (Beihang University), Jiqiang Tang (CNCERT/CC), Xiaoxiang Zou (CNCERT/CC)
POSTER: A security adaptive steganography system applied on digital audio Xuejie Ding (Chinese Academy of Sciences), Weiqing Huang (Chinese Academy of Sciences), Meng Zhang (Chinese Academy of Sciences), Jianlin Zhao (Chinese Academy of Sciences) |
|||||||
18:00 - 20:00 |
Poster Session and Banquet |
||||||
29th October 2015 -- Thursday |
|||||||
08:00 - 18:00 |
Registration |
||||||
09:00 - 10:00 |
Crypto, Protocol and Model I |
||||||
Session Chair: Vinod Yegneswaran | |||||||
A Markov Random Field Approach to Automated Protocol Signature Inference Tao Xu (Chinese Academy of Sciences), Yongzheng Zhang (Chinese Academy of Sciences), Yipeng Wang (Chinese Academy of Sciences), Jianliang Sun (Chinese Academy of Sciences), Xiaoyu Zhang (Chinese Academy of Sciences)
How to prevent to Delegate Authentication Mohsen Alimomeni (University of Calgray), Reihaneh Safavi-Naini (University of Calgary)
Ciphertext-Policy Attribute-Based Encryption with User and Authority Accountability Xing Zhang (Peking University), Cancan Jin (Peking University), Cong Li (Peking University), Zilong Wen (Peking University), Qingni Shen (Peking University), Yuejian Fang (Peking University), Zhonghai Wu (Peking University)
A Decentralized Access Control Model for Dynamic Collaboration of Autonomous Peers Stefan Craß (TU Wien), Gerson Joskowicz (TU Wien), Eva Kühn (TU Wien)
Using a 3D Geometrical Model to Improve Accuracy in the Evaluation and Selection of Countermeasures Against Complex Cyber Attacks Gustavo Gonzalez Granadillo (Institut Mines Telecom - Telecom SudParis), Joaquin Garcia-Alfaro (Institut Mines Telecom - Telecom SudParis), Herve Debar (Institut Mines Telecom - Telecom SudParis) |
|||||||
11:45 - 13:00 |
Lunch Break |
||||||
13:00 - 15:00 |
Web and Network Security II |
||||||
Session Chair: Jun Dai | |||||||
An Improved Method for Anomaly-Based Network Scan Detection Ashton Webster (University of Maryland), Margaret Gratian (University of Maryland), Ryan Eckenrod (University of Maryland), Daven Patel (University of Maryland), Michel Cukier (University of Maryland)
Juan D. Parra Rodriguez (University of Passau), Joachim Posegga (University of Passau)
Chunqiang Hu (George Washington University), Xiuzhen Cheng (George Washington University), Zhi Tian (George Mason University), Jiguo Yu (Qufu Normal University), Kemal Akkaya (Florida International University), Limin Sun (China Academy of Science)
Yoann Bertrand (Université Nice Sophia Antipolis - CNRS), Mireille Blay-Fornarino (Université Nice Sophia Antipolis - CNRS), Karima Boudaoud (Université Nice Sophia Antipolis - CNRS), Michel Riveill (Université Nice Sophia Antipolis - CNRS) |
|||||||
15:00 - 15:30 |
Closing Remarks |