This event is endorsed
and organized by

11th EAI International Conference on Security and Privacy in Communication Networks

October 26–29, 2015 | Dallas, United States

27th October 2015 -- Tuesday

08:00 - 18:00

Registration

08:30 - 09:00

Opening Remarks

09:00 - 10:00

Keynote 1

10:00 - 10:15

Coffee Break

10:15 - 12:15

Mobile, System and Software Security I

  Session Chair: Xiaofeng Wang

FineDroid: Enforcing Permissions with System-wide Application Execution Context

Yuan Zhang (Fudan University) , Min Yang (Fudan University) , Guofei Gu (Texas A&M University) , Hao Chen (UC Davis)

 

Detection, Classification and Characterization of Android Malware Using API Data Dependency

Yongfeng Li (Nanjing University) , Tong Shen (Nanjing University) , Xin Sun (Nanjing University) , Xuerui Pan, Bing Mao (Nanjing University)

 

KeyPocket - Improving Security and Usability for Provider Independent Login Architectures with Mobile Devices

André Ebert (Mobile and Distributed System Group, LMU Munich), Chadly Marouane (Virality GmbH), Benno Rott (Virality GmbH), Martin Werner (Mobile and Distributed System Group, LMU Munich)

 

Using Provenance Patterns to Vet Sensitive Behaviors in Android Apps

Chao Yang (Texas A&M University), Guangliang Yang (Texas A&M University), Ashish Gehani (SRI International), Vinod Yegneswaran (SRI International), Dawood Tariq (SRI International), Guofei Gu (Texas A&M University)

12:20 - 13:30

Lunch Break

13:30 - 15:30

Mobile, System and Software Security II

  Session Chair: Xiaofeng Wang

SplitDroid: Isolated Execution of Sensitive Components for Mobile Applications

Lin Yan (Peking University), Yao Guo (Peking University), Xiangqun Chen (Peking University)

 

Intrinsic Code Attestation by Instruction Chaining for Embedded Devices

Oliver Stecklina (IHP) , Peter Langendörfer (IHP), Frank Vater (IHP), Thorsten Kranz (Horst Gšrtz Institute for IT-Security, Ruhr Univerity Bochum), Gregor Leander (Horst Gšrtz Institute for IT-Security, Ruhr Univerity Bochum)

 

Defeating Kernel Driver Purifier

Jidong Xiao (The College of William and Mary), Hai Huang (IBM T.J. Watson Research Center), Haining Wang (University of Delaware)

 

Kernel Data Attack is a Realistic Security Threat

Jidong Xiao (The College of William and Mary), Hai Huang (IBM T.J. Watson Research Center), Haining Wang (University of Delaware)

15:30 - 15:45

Coffee Break

15:45 - 17:45

Cloud Security

  Session Chair: Guofei Gu

RScam: Cloud-Based Anti-Malware via Reversible Sketch

Hao Sun (School of Computer, National University of Defense Technology), Xiaofeng Wang (School of Computer, National University of Defense Technology), Jinshu Su (School of Computer, National University of Defense Technology)

 

TADOOP: Mining Network Traffic Anomalies with Hadoop

Geng Tian (Tsinghua University), Zhiliang Wang (Tsinghua University), Xia Yin (Tsinghua University), Li Zimu (Tsinghua University), Xingang Shi (Tsinghua University), Ziyi Lu (Cisco System, Inc), Chao Zhou (Cisco System, Inc), Yang Yu (Tsinghua University), Dan Wu (Tsinghua University)

 

SuperCall: A Secure Interface For Isolated Execution Environment to Dynamically Use External Services

Yueqiang Cheng (Carnegie Mellon University), Qing Li (Peking University), Miao Yu (Carnegie Mellon University), Xuhua Ding (SMU), Qingni Shen (Peking University)

 

Authenticating Top-k Results of Secure Multi-keyword Search in Cloud Computing

Xiaojun Xiao (Hunan University), Yaping Lin (Hunan University), Wei Zhang (Hunan University), Xin Yao (Hunan University)

 

28th October 2015 -- Wednesday

08:00 - 18:00

Registration

09:00 - 10:00

Keynote 2

10:00 - 10:15

Coffee Break

Privacy and Side Channels

Session Chair: Latifur Khan

Resource Efficient Privacy Preservation of Online Social Media Conversations

Indrajeet Singh (University of California Riverside), Masoud Akhoondi (University of California Riverside), Mustafa Arslan (NEC Laboratories), Harsha Madhyastha (University of Michigan), Srikanth Krishnamurthy (University of California Riverside)

 

Uranine: Real-time Privacy Leakage Monitoring without System Modification for Android

Vaibhav Rastogi (Northwestern University), Zhengyang Qu (Northwestern University), Jedidiah McClurg (University of Colorado), Yinzhi Cao (Columbia University), Yan Chen (Northwestern University), Weiwu Zhu (Zhejiang University), Wenzhi Chen (Zhejiang University)

 

Practicality of using side-channel analysis for software integrity checking of embedded systems

Hong Liu (Kansas State University), Hongmin Li (Kansas State University), Eugene Vasserman (Kansas State University)

 

Remote Activation of Hardware Trojans via a Temperature Channel

Priyabrart Dash (Utah State University), Chris Perkins (Utah State University), Dr.Ryan Gerdes (Utah State University)

12:15 - 13:30

Lunch Break

Web and Network Security I

Session Chair: Rafiqul Islam

Route Leaks Identification by Detecting Routing Loops

Song Li (Tsinghua University), Haixin Duan (Tsinghua University), Zhiliang Wang (Tsinghua University), Xing Li (Tsinghua University)


PULSAR: Stateful Black-Box Fuzzing of Proprietary Network Protocols

Hugo Gascon (University of Göttingen), Christian Wressnegger (University of Göttingen), Fabian Yamaguchi (University of Göttingen), Daniel Arp (University of Göttingen), Konrad Rieck (University of Göttingen)


You Are How You Query: Deriving Behavioral Fingerprints From DNS Traffic

Dae Wook Kim (Wright State University), Junjie Zhang (Wright State University)


Enhancing Traffic Analysis Resistance for Tor Hidden Services with Multipath Routing (Best Paper Award)

Lei Yang (The University of Kansas), Fengjun Li (The University of Kansas)

15:30 - 15:45

Coffee Break

15:45 - 17:45

10 Minute Lightning Talks

  Session Chair: Zhiqiang Lin

POSTER: A Genetic-Algorithm-Based Solution for HTTP-Based Malware Signature Generation

Amir Pourafsha (University of New Brunswick), Ali A. Ghorbani (Utah State University)

 

POSTER: Ciphertext-Policy Attribute-Based Encryption Method with Secure Decryption Key Generation and Outsourcing Decryption of ABE Ciphertexts

Yuejian Fang (Peking University), Zilong Wen (Peking University), Qingni Shen (Peking University), Zhonghai Wu (Peking University)

 

POSTER: Assessing Security, Capacity and Reachability of a Heterogeneous Industrial Network during Planning Phase

Apala Ray (ABB Corporate Research), Johan Kerberg (ABB Corporate Research), Mats Bjšrkman (MŠlardalen University), Mikael Gidlund (Mid Sweden University)

 

POSTER: Using Improved Singular Value Decomposition for Selecting Traces for Enhancement of Correlation Power Analysis

Sun Degang (Chinese Academy of Science), Zhou Xinping (Chinese Academy of Science), Wang Zhu (Chinese Academy of Science), Ou Changhai (Chinese Academy of Science), Huang Weiqing (Chinese Academy of Science)

 

POSTER: API-level Multi-policy Access Control Enforcement for Android Middleware

Dongdong Tian (Tianjin Univeristy), Xiaohong Li (Tianjin Univeristy), Jing Hu (Tianjin Univeristy), Guangquang Xu (Tianjin Univeristy), Zhiyong Feng (Tianjin Univeristy)

 

POSTER: A Collaborative Approach on Behavior-Based Android Malware Detection

Chanwoo Bae (KAIST), Jesung Jung (KAIST), Jaehyun Nam (KAIST), Seungwon Shin (KAIST)

 

POSTER: Dynamic Differential-private Naive Bayes Learning over Large-scale Networks

Mengdi Huai (University of Science and Technology of China), Liusheng Huang (University of Science and Technology of China), Lu Li (University of Science and Technology of China), Wei Yang (University of Science and Technology of China)

 

POSTER: Semantics-Aware Rule Recommendation and Enforcement for Event Paths

Yongbo Li (The George Washington University), Fan Yao (The George Wahington University), Tian Lan (The George Washington University), Guru Venkataramani (The George Washington University)

 

POSTER: Context-Adaptive User-Centric Privacy Scheme for VANET

Karim Emara (Technische Universität München), Wolfgang Wörndl (Technische Universität München), Johann Schlichter (Technische Universität München)

 

POSTER: Runtime-Behavior based Malware Classification Using Online Machine Learning

Abdurrahman Pekta (Cyber Security Institue, The Scientific and Technological Research Council of Turkey), Tankut Acarman (Galatasaray University), Yliès Falcone (Univ. Grenoble Alpes), Jean-Claude Fernandez (Univ. Grenoble Alpes)

 

POSTER: Reliable and Efficient Protection of Consumer Privacy in Advanced Metering Infrastructure

Vitaly Ford (Tennessee Tech University), Ambaree Siraj (Tennessee Tech University)

 

POSTER: An Online Prefix-Preserving IP Address Anonymization Algorithm for Passive Measurement Systems

Kai Cao (Beihang University), Yunchun Li (Beihang University), Hailong Yang (Beihang University), Jiqiang Tang (CNCERT/CC), Xiaoxiang Zou (CNCERT/CC)

 

POSTER: A security adaptive steganography system applied on digital audio

Xuejie Ding (Chinese Academy of Sciences), Weiqing Huang (Chinese Academy of Sciences), Meng Zhang (Chinese Academy of Sciences), Jianlin Zhao (Chinese Academy of Sciences)

18:00 - 20:00

Poster Session and Banquet

 

29th October 2015 -- Thursday

08:00 - 18:00

Registration

09:00 - 10:00

Crypto, Protocol and Model I

  Session Chair: Vinod Yegneswaran

A Markov Random Field Approach to Automated Protocol Signature Inference

Tao Xu (Chinese Academy of Sciences), Yongzheng Zhang (Chinese Academy of Sciences), Yipeng Wang (Chinese Academy of Sciences), Jianliang Sun (Chinese Academy of Sciences), Xiaoyu Zhang (Chinese Academy of Sciences)

 

How to prevent to Delegate Authentication

Mohsen Alimomeni (University of Calgray), Reihaneh Safavi-Naini (University of Calgary)

10:00 - 10:15

Coffee Break

10:15 - 11:45

Crypto, Protocol and Model II

  Session Chair: Vinod Yegneswaran

Ciphertext-Policy Attribute-Based Encryption with User and Authority Accountability

Xing Zhang (Peking University), Cancan Jin (Peking University), Cong Li (Peking University), Zilong Wen (Peking University), Qingni Shen (Peking University), Yuejian Fang (Peking University), Zhonghai Wu (Peking University)

 

A Decentralized Access Control Model for Dynamic Collaboration of Autonomous Peers

Stefan Craß (TU Wien), Gerson Joskowicz (TU Wien), Eva Kühn (TU Wien)

 

Using a 3D Geometrical Model to Improve Accuracy in the Evaluation and Selection of Countermeasures Against Complex Cyber Attacks

Gustavo Gonzalez Granadillo (Institut Mines Telecom - Telecom SudParis), Joaquin Garcia-Alfaro (Institut Mines Telecom - Telecom SudParis), Herve Debar (Institut Mines Telecom - Telecom SudParis)

11:45 - 13:00

Lunch Break

13:00 - 15:00

Web and Network Security II

  Session Chair: Jun Dai

An Improved Method for Anomaly-Based Network Scan Detection

Ashton Webster (University of Maryland), Margaret Gratian (University of Maryland), Ryan Eckenrod (University of Maryland), Daven Patel (University of Maryland), Michel Cukier (University of Maryland)


Why Web Servers Should Fear their Clients:Abusing Websockets in Browsers for DoS

Juan D. Parra Rodriguez (University of Passau), Joachim Posegga (University of Passau)


An Attribute-Based Signcryption Scheme to Secure Attribute-Defined Multicast Communications

Chunqiang Hu (George Washington University), Xiuzhen Cheng (George Washington University), Zhi Tian (George Mason University), Jiguo Yu (Qufu Normal University), Kemal Akkaya (Florida International University), Limin Sun (China Academy of Science)


Generation of Transmission Control rules compliant with existing Access Control policies

Yoann Bertrand (Université Nice Sophia Antipolis - CNRS), Mireille Blay-Fornarino (Université Nice Sophia Antipolis - CNRS), Karima Boudaoud (Université Nice Sophia Antipolis - CNRS), Michel Riveill (Université Nice Sophia Antipolis - CNRS)

15:00 - 15:30

Closing Remarks