Conference Program
Program at-a-glance
Wednesday 29 October 2014 (Workshops) | ||||
8:30 – 17:00 | PhySec 14 | CRESS 14 | M2MSec 14 | cataCRYPT 14 |
Thursday 30 October 2014 | ||
8:30 - 10:00 |
Opening Session and Keynote 1 "Security and Privacy of Information Sources: Information Theoretic Insights" by Vincent Poor |
|
10:00 - 10:30 | Networking Break | |
10:30 - 12:30 |
Technical Session A.1 Internet Security I |
Technical Session B.1 Wireless Security I |
12:30 - 13:30 |
Lunch |
|
13:30 - 15:00 |
Panel 1 "Networks Security: The Triumph and Tribulation" |
|
15:00 - 15:30 |
Networking Break |
|
15:30 - 17:30 |
Technical Session A.2 Intrusion Detection |
Technical Session B.2 Security and Privacy in Emerging Networks |
18:00 - 20:00 |
Welcome Reception and Poster Sessions |
Friday 31 October 2014 | ||
8:45 - 10:00 |
Keynote 2 "Introducing the Samsung KNOX" by Peng Ning |
|
10:00 - 10:30 | Networking Break | |
10:30 - 12:30 |
Technical Session A.3 Security and Privacy in Cloud Computing |
Technical Session B.3 Internet Security II |
12:30 - 14:00 |
Lunch |
|
14:00 - 15:30 |
Panel 2 "Wireless Security: Securing the Lower and Higher Layers" |
|
15:30 - 16:00 |
Networking Break |
|
16:00 - 17:40 |
Technical Session A.4 Wireless Security II |
Technical Session B.4 Information Theoretical Security |
Detailed Program
Thursday 30 October 2014
8:30 - 10:00 Opening Session and Keynote 1
Security and Privacy of Information Sources: Information Theoretic Insights, Vincent Poor (Princeton University)
10:30 – 12:30 Session A.1: Internet Security I
Session Chair: Aziz Mohaisen (Verisign Labs, USA)
The Drunk Motorcyclist Protocol for Anonymous Communication
Adam Young (Cryptovirology Labs, USA); Moti Yung (Google and Columbia University, USA)
Modelling IP Darkspace Traffic by Means of Clustering Techniques
Felix Iglesias (Technical University of Vienna, Austria); Tanja Zseby (Vienna University of Technology, Austria)
Location Verification on the Internet: Towards Enforcing Location-aware Access Policies Over Internet Clients
AbdelRahman Abdou (Carleton University, Canada); Ashraf Matrawy (Carleton University, Canada); Paul C. van Oorschot (Carleton University, Canada)
Analyzing the Dangers Posed by Chrome Extensions
Lujo Bauer (Carnegie Mellon University, USA); Shaoying Cai (Singapore Management University, Singapore); Limin Jia (CMU, USA); Tim Passaro (Carnegie Mellon University, USA); Yuan Tian (Carnegie Mellon University, USA)
Detecting Smart, Self-Propagating Internet Worms
Jun Li (University of Oregon, USA); Shad Stafford (Palo Alto Software, USA)
10:30 - 12:30 Session B.1: Wireless Security I
Session Chair: Ming Li (Utah State University, USA)
Location Spoofing Attack and Its Countermeasures in Database-Driven Cognitive Radio Network
Kexiong (Curtis) Zeng (Virginia Tech, USA); Sreeraksha Kondaji Ramesh (Virginia Polytechnic Institute and State University, USA); Yaling Yang (Virginia Tech, USA)
Accurate Rogue Access Point Localization Leveraging Fine-grained Channel Information
Xiuyuan Zheng (Stevens Institute of Technology, USA); Chen Wang (Stevens Institute of Technology, USA); Yingying Chen (Stevens Institute of Technology, USA); Jie Yang (Oakland University, USA)
Self-Healing Wireless Networks under Insider Jamming Attacks
Longquan Li (Penn State University, USA); Sencun Zhu (The Pennsylvania State University, USA); Don Torrieri (US Army Research Laboratory, USA); Sushil Jajodia (George Mason University, USA)
NRE: Suppress Selective Forwarding Attacks in Wireless Sensor Networks
Biru Cui (Rochester Institute of Technology, USA); Shanchieh Jay Yang (Rochester Institute of Technology, USA)
CETAD: Detecting Evil Twin Access Point Attacks in Wireless Hotspots
Hossen Mustafa (University of South Carolina, USA); Wenyuan Xu (University of South Carolina, USA)
13:30 - 15:00 Panel 1: "Networks Security: The Triumph and Tribulation"
Moderator: Mukesh Singhal (University of California-Merced, USA)
15:30 - 17:30 Session A.2: Intrusion Detection
Session Chair: Shanchieh Jay Yang (Rochester Institute of Technology, USA)
Towards Effective Feature Selection in Machine Learning-Based Botnet Detection Approaches
Elaheh Biglar Beigi (University of New Brunswick, Canada); Hossein Hadian Jazi (University of New Brunswick, Canada); Natalia Stakhanova (University of New Brunswick, Canada); Ali A. Ghorbani (University of New Brunswick, Canada)
Security Configuration Analytics Using Video Games
Mohammed Noraden Alsaleh (UNC Charlotte, USA); Ehab Al-Shaer (University of North Carolina Charlotte, USA)
An Evasion and Counter-Evasion Study in Malicious Websites Detection
Li Xu (University of Texas at San Antonio, USA); Zhenxin Zhan (University of Texas at San Antonio, USA); Shouhuai Xu (University of Texas at San Antonio, USA); Keying Ye (University of Texas at San Antonio, USA)
Exploiting Altruism in Social Networks for Friend-to-Friend Malware Detection
Matthew Probst (VMWare, USA); Jun Cheol Park (University of Utah, USA); Sneha Kumar Kasera (University of Utah, USA)
Chatter: Exploring Classification of Malware based on the Order of Events
Aziz Mohaisen (Verisign Labs, USA)
15:30 - 17:30 Session B.2: Security and Privacy in Emerging Networks
Session Chair: Rui Zhang (University of Hawaii, USA)
Two-tier Data-Driven Intrusion Detection for Automatic Generation Control in Smart Grid
Muhammad Qasim Ali (University of North Carolina Charlotte, USA); Reza Yousefian (UNC Charlotte, USA); Ehab Al-Shaer (University of North Carolina Charlotte, USA); Sukumar Kamalasadan (University of North Carolina at Charlotte, USA); Quanyan Zhu (New York University, USA)
Sensory Channel Threats to Cyber Physical Systems: A Wake-up Call
A. Selcuk Uluagac (Georgia Institute of Technology, USA); Venkatachalam Subramanian (Georgia Institute of Technology, USA); Raheem Beyah (Georgia Institute of Technology, USA)
iKUP Keeps Users' Privacy in the Smart Grid
Fabio Borges (Technische Universitat Darmstadt - Telecooperation Lab, Germany); Leonardo A. Martucci (Karlstad University, Sweden)
Secret Message Sharing Using Online Social Media
Jianxia Ning (University of California, Riverside, USA); Indrajeet Singh (UC Riverside, USA); Harsha V. Madhyastha (UC Riverside, USA); Srikanth V. Krishnamurthy (University of California, Riverside, USA); Guohong Cao (The Pennsylvania State University, USA); Prasant Mohapatra (University of California, Davis, USA)
VirtualFriendship: Hiding interactions on Online Social Networks
Filipe Beato (KU Leuven, Belgium); Mauro Conti (University of Padua, Italy); Bart Preneel (KU Leuven, Belgium); Dario Vettore (University of Padua, Belgium)
18:00 - 20:00 Welcome Reception and Poster Session
Friday 31 October 2014
8:45 - 10:00 Announcement and Keynote 2
Introducing the Samsung KNOX, Peng Ning (North Carolina State University and Samsung)
10:30 – 12:30 Session A.3: Security and Privacy in Cloud Computing
Session Chair: A. Selcuk Uluagac (Florida International University, USA)
A Tale of Two Servers: Efficient Privacy-Preserving Computation over Cloud Data under Multiple Keys
Boyang Wang (Utah State University, USA); Ming Li (Utah State University, USA); Sherman S. M. Chow (Chinese University of Hong Kong, Hong Kong); Hui Li (Xidian University, P.R. China)
Towards Verifiable File Search on the Cloud
Fei Chen (The Chinese University of Hong Kong, Hong Kong); Tao Xiang (Chongqing University, P.R. China); Xinwen Fu (University of Massachusetts Lowell, USA); Wei Yu (Towson University, USA)
Enabling Trusted Data-Intensive Execution in Cloud Computing
Ning Zhang (Virginia Tech, USA); Wenjing Lou (Virginia Tech, USA); Xuxian Jiang (NC State, USA); Thomas Hou (Virginia Tech, USA)
Integrity for Distributed Queries
Sabrina DeCapitanidiVimercati (Universita degli Studi di Milano, Italy); Sara Foresti (Universita degli Studi di Milano, Italy); Sushil Jajodia (George Mason University, USA); Giovanni Livraga (Universita degli Studi di Milano, Italy); Stefano Paraboschi (University of Bergamo, Italy); Pierangela Samarati (Universita' degli Studi di Milano, Italy)
Lightweight (k,n)-File Sharing Scheme for Distributed Storages with Diverse Communication Capacities
Young-Hoon Park (Seoul National University, Korea); Eun-Dong Lee (Seoul National University, Korea); Seung-Woo Seo (Seoul National University, Korea, Korea)
10:30 - 12:30 Session B.3: Internet Security II
Session Chair: Sencun Zhu (The Pennsylvania State University, USA)
An Optimistic Certified E-mail Protocol for the Current Internet E-mail Architecture
Gerard Draper Gil (University of the Balearic Islands, Spain); Pep-Lluis Ferrer (Universitat de les Illes Balears, Spain); Maria Francisca Hinarejos (University of the Balearic Islands, Spain); Arne Tauber (Graz University of Technology, Austria)
Attribute-based Access Control for ICN Naming Scheme
Bing Li (Arizona State University, USA); Ashwin Prabhu Verleker (Arizona State University, USA); Dijiang Huang (Arizona State University, USA); Zhijie Wang (Arizona State University, USA); Yan Zhu (University of Science & Technology Beijing, P.R. China)
Mitigating Eclipse Attacks in Peer-to-Peer Networks
Daniel Germanus (Technical University of Darmstadt, Germany); Stefanie Roos (TU Dresden, Germany); Thorsten Strufe (TU Dresden, Germany); Neeraj Suri (Technische Universitaet Darmstadt, Germany)
Reroute on Loop in Anonymous Peer-to-Peer Content Sharing Networks
Guanyu Tian (Florida State University, USA); Zhenhai Duan (Florida State University, USA); Todd Baumeister (University of Hawaii at Manoa, USA); Yingfei Dong (University of Hawaii, USA)
Identifying Global Hot Items in Distributed Dynamic Data Streams
Wenji Chen (Iowa State University, USA); Yong Guan (Iowa State University, USA)
14:00 - 15:30 Panel 2: "Wireless Security: Securing the Lower and Higher Layers"
Moderator: Wenyuan Xu (University of South Carolina, USA)
16:00 - 17:40 Session A.4: Wireless Security II
Session Chair: Albert Levi (Sabanci University, Turkey)
LAPWiN: Location-Aided Probing for Protecting User Privacy in Wi-Fi Networks
Yu Seung Kim (Carnegie Mellon University, USA); Yuan Tian (Carnegie Mellon University, USA); Le T Nguyen (Carnegie Mellon University, USA); Patrick Tague (Carnegie Mellon University, USA)
TouchIn: Sightless Two-factor Authentication on Multi-touch Mobile Devices
Jingchao Sun (Arizona State University, USA); Rui Zhang (University of Hawaii, USA); Jinxue Zhang (Arizona State University, USA); Yanchao Zhang (Arizona State University, USA)
MagPairing: Exploiting Magnetometers for Pairing Smartphones in Close Proximity
Rong Jin (University of Michigan - Dearborn, USA); Liu Shi (University of Michigan-Dearborn, USA); Kai Zeng (University of Michigan - Dearborn, USA); Amit Pande (University of California Davis, CA, USA); Prasant Mohapatra (University of California, Davis, USA)
Uncooperative Localization Improves Attack Performance in Underwater Acoustic Networks
Xiaoyan Lu (University of Conneticut, USA); Michael Zuba (University of Connecticut, USA); Jun-Hong Cui (University of Connecticut, USA); Zhijie Shi (University of Connecticut, USA)
16:00 - 17:40 Session B.4: Information Theoretical Security
Session Chair: Sherman S. M. Chow (Chinese University of Hong Kong, Hong Kong)
Adversarial Wiretap Channel with Public Discussion
Pengwei Wang (University of Calgary, Canada); Reihaneh Safavi-Naini (University of Calgary, Canada)
Multi-trapdoor Hash Functions and Their Applications in Network Security
Santosh Chandrasekhar (University of California, Merced, USA); Mukesh Singhal (University of California at Merced, USA)
Manipulating Attacker's View of a System's Attack Surface
Massimiliano Albanese (George Mason University, USA); Ermanno Battista (University of Naples Federico II, Italy); Sushil Jajodia (George Mason University, USA); Valentina Casola (University of Naples Federico II, Italy)
A Tunable Proof of Ownership Scheme for Deduplication Using Bloom Filters
Jorge Blasco (Universidad Carlos III de Madrid, Spain); Agustin Orfila (Universidad Carlos III de Madrid, Spain); Roberto Di Pietro (Bell Labs, France); Alessandro Sorniotti (IBM Research, Switzerland)