Technical Program

Conference Program 

Program at-a-glance

Wednesday 29 October 2014 (Workshops)
8:30 – 17:00 PhySec 14 CRESS 14 M2MSec 14 cataCRYPT 14


Thursday 30 October 2014
8:30 - 10:00

Opening Session and Keynote 1

"Security and Privacy of Information Sources: Information Theoretic Insights"

by Vincent Poor

10:00 - 10:30 Networking Break
10:30 - 12:30

Technical Session A.1

Internet Security I

Technical Session B.1

Wireless Security I

12:30 - 13:30

Lunch

13:30 - 15:00

Panel 1

"Networks Security: The Triumph and Tribulation"
Moderator: Mukesh Singhal

15:00 - 15:30

Networking Break

15:30 - 17:30

Technical Session A.2

Intrusion Detection

Technical Session B.2

Security and Privacy in Emerging Networks

18:00 - 20:00

Welcome Reception and Poster Sessions




Friday 31 October 2014
8:45 - 10:00

Keynote 2

"Introducing the Samsung KNOX"

by Peng Ning

10:00 - 10:30 Networking Break
10:30 - 12:30

Technical Session A.3

Security and Privacy in Cloud Computing

Technical Session B.3

Internet Security II

12:30 - 14:00

Lunch

14:00 - 15:30

Panel 2

"Wireless Security: Securing the Lower and Higher Layers"
Moderator: Wenyuan Xu

15:30 - 16:00

Networking Break

16:00 - 17:40

Technical Session A.4

Wireless Security II

Technical Session B.4

Information Theoretical Security



Detailed Program


Thursday 30 October 2014


8:30 - 10:00 Opening Session and Keynote 1
 

Security and Privacy of Information Sources: Information Theoretic Insights, Vincent Poor (Princeton University)


10:30 – 12:30 Session A.1: Internet Security I
Session Chair: Aziz Mohaisen (Verisign Labs, USA)


The Drunk Motorcyclist Protocol for Anonymous Communication

Adam Young (Cryptovirology Labs, USA); Moti Yung (Google and Columbia University, USA)

 

Modelling IP Darkspace Traffic by Means of Clustering Techniques

Felix Iglesias (Technical University of Vienna, Austria); Tanja Zseby (Vienna University of Technology, Austria)

 

Location Verification on the Internet: Towards Enforcing Location-aware Access Policies Over Internet Clients

AbdelRahman Abdou (Carleton University, Canada); Ashraf Matrawy (Carleton University, Canada); Paul C. van Oorschot (Carleton University, Canada)

 

Analyzing the Dangers Posed by Chrome Extensions

Lujo Bauer (Carnegie Mellon University, USA); Shaoying Cai (Singapore Management University, Singapore); Limin Jia (CMU, USA); Tim Passaro (Carnegie Mellon University, USA); Yuan Tian (Carnegie Mellon University, USA)

 

Detecting Smart, Self-Propagating Internet Worms

Jun Li (University of Oregon, USA); Shad Stafford (Palo Alto Software, USA)

 

10:30 - 12:30 Session B.1: Wireless Security I
Session Chair: Ming Li (Utah State University, USA)


Location Spoofing Attack and Its Countermeasures in Database-Driven Cognitive Radio Network

Kexiong (Curtis) Zeng (Virginia Tech, USA); Sreeraksha Kondaji Ramesh (Virginia Polytechnic Institute and State University, USA); Yaling Yang (Virginia Tech, USA)

 

Accurate Rogue Access Point Localization Leveraging Fine-grained Channel Information

Xiuyuan Zheng (Stevens Institute of Technology, USA); Chen Wang (Stevens Institute of Technology, USA); Yingying Chen (Stevens Institute of Technology, USA); Jie Yang (Oakland University, USA)

 

Self-Healing Wireless Networks under Insider Jamming Attacks

Longquan Li (Penn State University, USA); Sencun Zhu (The Pennsylvania State University, USA); Don Torrieri (US Army Research Laboratory, USA); Sushil Jajodia (George Mason University, USA)

 

NRE: Suppress Selective Forwarding Attacks in Wireless Sensor Networks

Biru Cui (Rochester Institute of Technology, USA); Shanchieh Jay Yang (Rochester Institute of Technology, USA)

 

CETAD: Detecting Evil Twin Access Point Attacks in Wireless Hotspots

Hossen Mustafa (University of South Carolina, USA); Wenyuan Xu (University of South Carolina, USA)

 

13:30 - 15:00 Panel  1: "Networks Security: The Triumph and Tribulation"
Moderator: Mukesh Singhal (University of California-Merced, USA)


15:30 - 17:30 Session A.2:  Intrusion Detection 
Session Chair: Shanchieh Jay Yang (Rochester Institute of Technology, USA)


Towards Effective Feature Selection in Machine Learning-Based Botnet Detection Approaches

Elaheh Biglar Beigi (University of New Brunswick, Canada); Hossein Hadian Jazi (University of New Brunswick, Canada); Natalia Stakhanova (University of New Brunswick, Canada); Ali A. Ghorbani (University of New Brunswick, Canada)

 

Security Configuration Analytics Using Video Games

Mohammed Noraden Alsaleh (UNC Charlotte, USA); Ehab Al-Shaer (University of North Carolina Charlotte, USA)

 

An Evasion and Counter-Evasion Study in Malicious Websites Detection

Li Xu (University of Texas at San Antonio, USA); Zhenxin Zhan (University of Texas at San Antonio, USA); Shouhuai Xu (University of Texas at San Antonio, USA); Keying Ye (University of Texas at San Antonio, USA)

 

Exploiting Altruism in Social Networks for Friend-to-Friend Malware Detection

Matthew Probst (VMWare, USA); Jun Cheol Park (University of Utah, USA); Sneha Kumar Kasera (University of Utah, USA)

 

Chatter: Exploring Classification of Malware based on the Order of Events

Aziz Mohaisen (Verisign Labs, USA)

 

15:30 - 17:30 Session B.2: Security and Privacy in Emerging Networks
Session Chair: Rui Zhang (University of Hawaii, USA)


Two-tier Data-Driven Intrusion Detection for Automatic Generation Control in Smart Grid

Muhammad Qasim Ali (University of North Carolina Charlotte, USA); Reza Yousefian (UNC Charlotte, USA); Ehab Al-Shaer (University of North Carolina Charlotte, USA); Sukumar Kamalasadan (University of North Carolina at Charlotte, USA); Quanyan Zhu (New York University, USA)

 

Sensory Channel Threats to Cyber Physical Systems: A Wake-up Call

A. Selcuk Uluagac (Georgia Institute of Technology, USA); Venkatachalam Subramanian (Georgia Institute of Technology, USA); Raheem Beyah (Georgia Institute of Technology, USA)

 

iKUP Keeps Users' Privacy in the Smart Grid

Fabio Borges (Technische Universitat Darmstadt - Telecooperation Lab, Germany); Leonardo A. Martucci (Karlstad University, Sweden)

 

Secret Message Sharing Using Online Social Media

Jianxia Ning (University of California, Riverside, USA); Indrajeet Singh (UC Riverside, USA); Harsha V. Madhyastha (UC Riverside, USA); Srikanth V. Krishnamurthy (University of California, Riverside, USA); Guohong Cao (The Pennsylvania State University, USA); Prasant Mohapatra (University of California, Davis, USA)

 

VirtualFriendship: Hiding interactions on Online Social Networks

Filipe Beato (KU Leuven, Belgium); Mauro Conti (University of Padua, Italy); Bart Preneel (KU Leuven, Belgium); Dario Vettore (University of Padua, Belgium)


18:00 - 20:00  Welcome Reception and Poster Session 

 

Friday 31 October 2014
 

8:45 - 10:00 Announcement and Keynote 2


Introducing the Samsung KNOX,  Peng Ning (North Carolina State University and Samsung)


10:30 – 12:30 Session A.3:  Security and Privacy in Cloud Computing
Session Chair: A. Selcuk Uluagac (Florida International University, USA)


A Tale of Two Servers: Efficient Privacy-Preserving Computation over Cloud Data under Multiple Keys

Boyang Wang (Utah State University, USA); Ming Li (Utah State University, USA); Sherman S. M. Chow (Chinese University of Hong Kong, Hong Kong); Hui Li (Xidian University, P.R. China)

 

Towards Verifiable File Search on the Cloud

Fei Chen (The Chinese University of Hong Kong, Hong Kong); Tao Xiang (Chongqing University, P.R. China); Xinwen Fu (University of Massachusetts Lowell, USA); Wei Yu (Towson University, USA)

 

Enabling Trusted Data-Intensive Execution in Cloud Computing

Ning Zhang (Virginia Tech, USA); Wenjing Lou (Virginia Tech, USA); Xuxian Jiang (NC State, USA); Thomas Hou (Virginia Tech, USA)

 

Integrity for Distributed Queries

Sabrina DeCapitanidiVimercati (Universita degli Studi di Milano, Italy); Sara Foresti (Universita degli Studi di Milano, Italy); Sushil Jajodia (George Mason University, USA); Giovanni Livraga (Universita degli Studi di Milano, Italy); Stefano Paraboschi (University of Bergamo, Italy); Pierangela Samarati (Universita' degli Studi di Milano, Italy)

 

Lightweight (k,n)-File Sharing Scheme for Distributed Storages with Diverse Communication Capacities

Young-Hoon Park (Seoul National University, Korea); Eun-Dong Lee (Seoul National University, Korea); Seung-Woo Seo (Seoul National University, Korea, Korea)

 

10:30 - 12:30 Session B.3: Internet Security II
Session Chair: Sencun Zhu (The Pennsylvania State University, USA)


An Optimistic Certified E-mail Protocol for the Current Internet E-mail Architecture

Gerard Draper Gil (University of the Balearic Islands, Spain); Pep-Lluis Ferrer (Universitat de les Illes Balears, Spain); Maria Francisca Hinarejos (University of the Balearic Islands, Spain); Arne Tauber (Graz University of Technology, Austria)

 

Attribute-based Access Control for ICN Naming Scheme

Bing Li (Arizona State University, USA); Ashwin Prabhu Verleker (Arizona State University, USA); Dijiang Huang (Arizona State University, USA); Zhijie Wang (Arizona State University, USA); Yan Zhu (University of Science & Technology Beijing, P.R. China)

 

Mitigating Eclipse Attacks in Peer-to-Peer Networks

Daniel Germanus (Technical University of Darmstadt, Germany); Stefanie Roos (TU Dresden, Germany); Thorsten Strufe (TU Dresden, Germany); Neeraj Suri (Technische Universitaet Darmstadt, Germany)

 

Reroute on Loop in Anonymous Peer-to-Peer Content Sharing Networks

Guanyu Tian (Florida State University, USA); Zhenhai Duan (Florida State University, USA); Todd Baumeister (University of Hawaii at Manoa, USA); Yingfei Dong (University of Hawaii, USA)

 

Identifying Global Hot Items in Distributed Dynamic Data Streams

Wenji Chen (Iowa State University, USA); Yong Guan (Iowa State University, USA)

 

14:00 - 15:30 Panel  2: "Wireless Security: Securing the Lower and Higher Layers"
Moderator: Wenyuan Xu (University of South Carolina, USA)


16:00 - 17:40 Session A.4: Wireless Security II
Session Chair: Albert Levi (Sabanci University, Turkey)


LAPWiN: Location-Aided Probing for Protecting User Privacy in Wi-Fi Networks

Yu Seung Kim (Carnegie Mellon University, USA); Yuan Tian (Carnegie Mellon University, USA); Le T Nguyen (Carnegie Mellon University, USA); Patrick Tague (Carnegie Mellon University, USA)

 

TouchIn: Sightless Two-factor Authentication on Multi-touch Mobile Devices

Jingchao Sun (Arizona State University, USA); Rui Zhang (University of Hawaii, USA); Jinxue Zhang (Arizona State University, USA); Yanchao Zhang (Arizona State University, USA)

 

MagPairing: Exploiting Magnetometers for Pairing Smartphones in Close Proximity

Rong Jin (University of Michigan - Dearborn, USA); Liu Shi (University of Michigan-Dearborn, USA); Kai Zeng (University of Michigan - Dearborn, USA); Amit Pande (University of California Davis, CA, USA); Prasant Mohapatra (University of California, Davis, USA)

 

Uncooperative Localization Improves Attack Performance in Underwater Acoustic Networks

Xiaoyan Lu (University of Conneticut, USA); Michael Zuba (University of Connecticut, USA); Jun-Hong Cui (University of Connecticut, USA); Zhijie Shi (University of Connecticut, USA)

 

16:00 - 17:40 Session B.4: Information Theoretical Security
Session Chair: Sherman S. M. Chow (Chinese University of Hong Kong, Hong Kong)


Adversarial Wiretap Channel with Public Discussion

Pengwei Wang (University of Calgary, Canada); Reihaneh Safavi-Naini (University of Calgary, Canada)

 

Multi-trapdoor Hash Functions and Their Applications in Network Security

Santosh Chandrasekhar (University of California, Merced, USA); Mukesh Singhal (University of California at Merced, USA)

 

Manipulating Attacker's View of a System's Attack Surface

Massimiliano Albanese (George Mason University, USA); Ermanno Battista (University of Naples Federico II, Italy); Sushil Jajodia (George Mason University, USA); Valentina Casola (University of Naples Federico II, Italy)

 

A Tunable Proof of Ownership Scheme for Deduplication Using Bloom Filters

Jorge Blasco (Universidad Carlos III de Madrid, Spain); Agustin Orfila (Universidad Carlos III de Madrid, Spain); Roberto Di Pietro (Bell Labs, France); Alessandro Sorniotti (IBM Research, Switzerland)