Accepted Papers

Accepted Paper List

  • An Evasion and Counter-Evasion Study in Malicious Websites Detection
    Li Xu (University of Texas at San Antonio, USA); Zhenxin Zhan (University of Texas at San Antonio, USA); Shouhuai Xu (University of Texas at San Antonio, USA); Keying Ye (University of Texas at San Antonio, USA)

     

  • Mitigating Eclipse Attacks in Peer-to-Peer Networks
    Daniel Germanus (Technical University of Darmstadt, Germany); Stefanie Roos (TU Dresden, Germany); Thorsten Strufe (TU Dresden, Germany); Neeraj Suri (Technische Universitaet Darmstadt, Germany)

     

  • NRE: Suppress Selective Forwarding Attacks in Wireless Sensor Networks
    Biru Cui (Rochester Institute of Technology, USA); Shanchieh Jay Yang (Rochester Institute of Technology, USA)

     

  • CETAD: Detecting Evil Twin Access Point Attacks in Wireless Hotspots
    Hossen Mustafa (University of South Carolina, USA); Wenyuan Xu (University of South Carolina, USA)

     

  • Location Spoofing Attack and Its Countermeasures in Database-Driven Cognitive Radio Network
    Kexiong (Curtis) Zeng (Virginia Tech, USA); Sreeraksha Kondaji Ramesh (Virginia Polytechnic Institute and State University, USA); Yaling Yang (Virginia Tech, USA)

     

  • Towards Effective Feature Selection in Machine Learning-Based Botnet Detection Approaches
    Elaheh Biglar Beigi (University of New Brunswick, Canada); Hossein Hadian Jazi (University of New Brunswick, Canada); Natalia Stakhanova (University of New Brunswick, Canada); Ali A. Ghorbani (University of New Brunswick, Canada)

     

  • A Tunable Proof of Ownership Scheme for Deduplication Using Bloom Filters
    Jorge Blasco (Universidad Carlos III de Madrid, Spain); Agustin Orfila (Universidad Carlos III de Madrid, Spain); Roberto Di Pietro (Bell Labs, France); Alessandro Sorniotti (IBM Research, Switzerland)

     

  • The Drunk Motorcyclist Protocol for Anonymous Communication
    Adam Young (Cryptovirology Labs, USA); Moti Yung (Google and Columbia University, USA)

     

  • Reroute on Loop in Anonymous Peer-to-Peer Content Sharing Networks
    Guanyu Tian (Florida State University, USA); Zhenhai Duan (Florida State University, USA); Todd Baumeister (University of Hawaii at Manoa, USA); Yingfei Dong (University of Hawaii, USA)

     

  • Secret Message Sharing Using Online Social Media
    Jianxia Ning (University of California, Riverside, USA); Indrajeet Singh (UC Riverside, USA); Harsha V. Madhyastha (UC Riverside, USA); Srikanth V. Krishnamurthy (University of California, Riverside, USA); Guohong Cao (The Pennsylvania State University, USA); Prasant Mohapatra (University of California, Davis, USA)

     

  • Accurate Rogue Access Point Localization Leveraging Fine-grained Channel Information
    Xiuyuan Zheng (Stevens Institute of Technology, USA); Chen Wang (Stevens Institute of Technology, USA); Yingying Chen (Stevens Institute of Technology, USA); Jie Yang (Oakland University, USA)

     

  • A Tale of Two Servers: Efficient Privacy-Preserving Computation over Cloud Data under Multiple Keys
    Boyang Wang (Utah State University, USA); Ming Li (Utah State University, USA); Sherman S. M. Chow (Chinese University of Hong Kong, Hong Kong); Hui Li (Xidian University, P.R. China)

     

  • TouchIn: Sightless Two-factor Authentication on Multi-touch Mobile Devices
    Jingchao Sun (Arizona State University, USA); Rui Zhang (University of Hawaii, USA); Jinxue Zhang (Arizona State University, USA); Yanchao Zhang (Arizona State University, USA)

     

  • Towards Verifiable File Search on the Cloud
    Fei Chen (The Chinese University of Hong Kong, Hong Kong); Tao Xiang (Chongqing University, P.R. China); Xinwen Fu (University of Massachusetts Lowell, USA); Wei Yu (Towson University, USA)

     

  • Uncooperative Localization Improves Attack Performance in Underwater Acoustic Networks
    Xiaoyan Lu (University of Conneticut, USA); Michael Zuba (University of Connecticut, USA); Jun-Hong Cui (University of Connecticut, USA); Zhijie Shi (University of Connecticut, USA)

     

  • Attribute-based Access Control for ICN Naming Scheme
    Bing Li (Arizona State University, USA); Ashwin Prabhu Verleker (Arizona State University, USA); Dijiang Huang (Arizona State University, USA); Zhijie Wang (Arizona State University, USA); Yan Zhu (University of Science & Technology Beijing, P.R. China)

     

  • Modelling IP Darkspace Traffic by Means of Clustering Techniques
    Felix Iglesias (Technical University of Vienna, Austria); Tanja Zseby (Vienna University of Technology, Austria)

     

  • An Optimistic Certified E-mail Protocol for the Current Internet E-mail Architecture
    Gerard Draper Gil (University of the Balearic Islands, Spain); Pep-Lluis Ferrer (Universitat de les Illes Balears, Spain); Maria Francisca Hinarejos (University of the Balearic Islands, Spain); Arne Tauber (Graz University of Technology, Austria)

     

  • VirtualFriendship: Hiding interactions on Online Social Networks
    Filipe Beato (KU Leuven, Belgium); Mauro Conti (University of Padua, Italy); Bart Preneel (KU Leuven, Belgium); Dario Vettore (University of Padua, Belgium)

     

  • Self-Healing Wireless Networks under Insider Jamming Attacks
    Longquan Li (Penn State University, USA); Sencun Zhu (The Pennsylvania State University, USA); Don Torrieri (US Army Research Laboratory, USA); Sushil Jajodia (George Mason University, USA)

     

  • Chatter: Exploring Classification of Malware based on the Order of Events
    Aziz Mohaisen (Verisign Labs, USA)

     

  • Integrity for Distributed Queries
    Sabrina DeCapitanidiVimercati (Università degli Studi di Milano, Italy); Sara Foresti (Università degli Studi di Milano, Italy); Sushil Jajodia (George Mason University, USA); Giovanni Livraga (Università degli Studi di Milano, Italy); Stefano Paraboschi (University of Bergamo, Italy); Pierangela Samarati (Università degli Studi di Milano, Italy)

     

  • Manipulating Attacker's View of a System's Attack Surface
    Massimiliano Albanese (George Mason University, USA); Ermanno Battista (University of Naples Federico II, Italy); Sushil Jajodia (George Mason University, USA); Valentina Casola (University of Naples Federico II, Italy)

     

  • Two-tier Data-Driven Intrusion Detection for Automatic Generation Control in Smart Grid
    Muhammad Qasim Ali (University of North Carolina Charlotte, USA); Reza Yousefian (UNC Charlotte, USA); Ehab Al-Shaer (University of North Carolina Charlotte, USA); Sukumar Kamalasadan (University of North Carolina at Charlotte, USA); Quanyan Zhu (New York University, USA)

     

  • Adversarial Wiretap Channel with Public Discussion
    Pengwei Wang (University of Calgary, Canada); Reihaneh Safavi-Naini (University of Calgary, Canada)

     

  • MagPairing: Exploiting Magnetometers for Pairing Smartphones in Close Proximity
    Rong Jin (University of Michigan - Dearborn, USA); Liu Shi (University of Michigan-Dearborn, USA); Kai Zeng (University of Michigan - Dearborn, USA); Amit Pande (University of California Davis, CA, USA); Prasant Mohapatra (University of California, Davis, USA)

     

  • Sensory Channel Threats to Cyber Physical Systems: A Wake-up Call
    A. Selcuk Uluagac (Georgia Institute of Technology, USA); Venkatachalam Subramanian (Georgia Institute of Technology, USA); Raheem Beyah (Georgia Institute of Technology, USA)

     

  • Multi-trapdoor Hash Functions and Their Applications in Network Security
    Santosh Chandrasekhar (University of California, Merced, USA); Mukesh Singhal (University of California at Merced, USA)

     

  • Security Configuration Analytics Using Video Games
    Mohammed Noraden Alsaleh (UNC Charlotte, USA); Ehab Al-Shaer (University of North Carolina Charlotte, USA)

     

  • Enabling Trusted Data-Intensive Execution in Cloud Computing
    Ning Zhang (Virginia Tech, USA); Wenjing Lou (Virginia Tech, USA); Xuxian Jiang (NC State, USA); Thomas Hou (Virginia Tech, USA)

     

  • Analyzing the Dangers Posed by Chrome Extensions
    Lujo Bauer (Carnegie Mellon University, USA); Shaoying Cai (Singapore Management University, Singapore); Limin Jia (CMU, USA); Tim Passaro (Carnegie Mellon University, USA); Yuan Tian (Carnegie Mellon University, USA)

     

  • iKUP Keeps Users' Privacy in the Smart Grid
    Fábio Borges (Technische Universität Darmstadt - Telecooperation Lab, Germany); Leonardo A. Martucci (Karlstad University, Sweden)

     

  • LAPWiN: Location-Aided Probing for Protecting User Privacy in Wi-Fi Networks
    Yu Seung Kim (Carnegie Mellon University, USA); Yuan Tian (Carnegie Mellon University, USA); Le T Nguyen (Carnegie Mellon University, USA); Patrick Tague (Carnegie Mellon University, USA)

     

  • Identifying Global Hot Items in Distributed Dynamic Data Streams
    Wenji Chen (Iowa State University, USA); Yong Guan (Iowa State University, USA)

     

  • Location Verification on the Internet: Towards Enforcing Location-aware Access Policies Over Internet Clients
    AbdelRahman Abdou (Carleton University, Canada); Ashraf Matrawy (Carleton University, Canada); Paul C. van Oorschot (Carleton University, Canada)

     

  • Exploiting Altruism in Social Networks for Friend-to-Friend Malware Detection
    Matthew Probst (VMWare, USA); Jun Cheol Park (University of Utah, USA); Sneha Kumar Kasera (University of Utah, USA)

     

  • Lightweight (k,n)-File Sharing Scheme for Distributed Storages with Diverse Communication Capacities
    Young-Hoon Park (Seoul National University, Korea); Eun-Dong Lee (Seoul National University, Korea); Seung-Woo Seo (Seoul National University, Korea, Korea)

     

  • Detecting Smart, Self-Propagating Internet Worms
    Jun Li (University of Oregon, USA); Shad Stafford (Palo Alto Software, USA)