Accepted Papers
Accepted Paper List
-
An Evasion and Counter-Evasion Study in Malicious Websites Detection
Li Xu (University of Texas at San Antonio, USA); Zhenxin Zhan (University of Texas at San Antonio, USA); Shouhuai Xu (University of Texas at San Antonio, USA); Keying Ye (University of Texas at San Antonio, USA)
-
Mitigating Eclipse Attacks in Peer-to-Peer Networks
Daniel Germanus (Technical University of Darmstadt, Germany); Stefanie Roos (TU Dresden, Germany); Thorsten Strufe (TU Dresden, Germany); Neeraj Suri (Technische Universitaet Darmstadt, Germany)
-
NRE: Suppress Selective Forwarding Attacks in Wireless Sensor Networks
Biru Cui (Rochester Institute of Technology, USA); Shanchieh Jay Yang (Rochester Institute of Technology, USA)
-
CETAD: Detecting Evil Twin Access Point Attacks in Wireless Hotspots
Hossen Mustafa (University of South Carolina, USA); Wenyuan Xu (University of South Carolina, USA)
-
Location Spoofing Attack and Its Countermeasures in Database-Driven Cognitive Radio Network
Kexiong (Curtis) Zeng (Virginia Tech, USA); Sreeraksha Kondaji Ramesh (Virginia Polytechnic Institute and State University, USA); Yaling Yang (Virginia Tech, USA)
-
Towards Effective Feature Selection in Machine Learning-Based Botnet Detection Approaches
Elaheh Biglar Beigi (University of New Brunswick, Canada); Hossein Hadian Jazi (University of New Brunswick, Canada); Natalia Stakhanova (University of New Brunswick, Canada); Ali A. Ghorbani (University of New Brunswick, Canada)
-
A Tunable Proof of Ownership Scheme for Deduplication Using Bloom Filters
Jorge Blasco (Universidad Carlos III de Madrid, Spain); Agustin Orfila (Universidad Carlos III de Madrid, Spain); Roberto Di Pietro (Bell Labs, France); Alessandro Sorniotti (IBM Research, Switzerland)
-
The Drunk Motorcyclist Protocol for Anonymous Communication
Adam Young (Cryptovirology Labs, USA); Moti Yung (Google and Columbia University, USA)
-
Reroute on Loop in Anonymous Peer-to-Peer Content Sharing Networks
Guanyu Tian (Florida State University, USA); Zhenhai Duan (Florida State University, USA); Todd Baumeister (University of Hawaii at Manoa, USA); Yingfei Dong (University of Hawaii, USA)
-
Secret Message Sharing Using Online Social Media
Jianxia Ning (University of California, Riverside, USA); Indrajeet Singh (UC Riverside, USA); Harsha V. Madhyastha (UC Riverside, USA); Srikanth V. Krishnamurthy (University of California, Riverside, USA); Guohong Cao (The Pennsylvania State University, USA); Prasant Mohapatra (University of California, Davis, USA)
-
Accurate Rogue Access Point Localization Leveraging Fine-grained Channel Information
Xiuyuan Zheng (Stevens Institute of Technology, USA); Chen Wang (Stevens Institute of Technology, USA); Yingying Chen (Stevens Institute of Technology, USA); Jie Yang (Oakland University, USA)
-
A Tale of Two Servers: Efficient Privacy-Preserving Computation over Cloud Data under Multiple Keys
Boyang Wang (Utah State University, USA); Ming Li (Utah State University, USA); Sherman S. M. Chow (Chinese University of Hong Kong, Hong Kong); Hui Li (Xidian University, P.R. China)
-
TouchIn: Sightless Two-factor Authentication on Multi-touch Mobile Devices
Jingchao Sun (Arizona State University, USA); Rui Zhang (University of Hawaii, USA); Jinxue Zhang (Arizona State University, USA); Yanchao Zhang (Arizona State University, USA)
-
Towards Verifiable File Search on the Cloud
Fei Chen (The Chinese University of Hong Kong, Hong Kong); Tao Xiang (Chongqing University, P.R. China); Xinwen Fu (University of Massachusetts Lowell, USA); Wei Yu (Towson University, USA)
-
Uncooperative Localization Improves Attack Performance in Underwater Acoustic Networks
Xiaoyan Lu (University of Conneticut, USA); Michael Zuba (University of Connecticut, USA); Jun-Hong Cui (University of Connecticut, USA); Zhijie Shi (University of Connecticut, USA)
-
Attribute-based Access Control for ICN Naming Scheme
Bing Li (Arizona State University, USA); Ashwin Prabhu Verleker (Arizona State University, USA); Dijiang Huang (Arizona State University, USA); Zhijie Wang (Arizona State University, USA); Yan Zhu (University of Science & Technology Beijing, P.R. China)
-
Modelling IP Darkspace Traffic by Means of Clustering Techniques
Felix Iglesias (Technical University of Vienna, Austria); Tanja Zseby (Vienna University of Technology, Austria)
-
An Optimistic Certified E-mail Protocol for the Current Internet E-mail Architecture
Gerard Draper Gil (University of the Balearic Islands, Spain); Pep-Lluis Ferrer (Universitat de les Illes Balears, Spain); Maria Francisca Hinarejos (University of the Balearic Islands, Spain); Arne Tauber (Graz University of Technology, Austria)
-
VirtualFriendship: Hiding interactions on Online Social Networks
Filipe Beato (KU Leuven, Belgium); Mauro Conti (University of Padua, Italy); Bart Preneel (KU Leuven, Belgium); Dario Vettore (University of Padua, Belgium)
-
Self-Healing Wireless Networks under Insider Jamming Attacks
Longquan Li (Penn State University, USA); Sencun Zhu (The Pennsylvania State University, USA); Don Torrieri (US Army Research Laboratory, USA); Sushil Jajodia (George Mason University, USA)
-
Chatter: Exploring Classification of Malware based on the Order of Events
Aziz Mohaisen (Verisign Labs, USA)
-
Integrity for Distributed Queries
Sabrina DeCapitanidiVimercati (Università degli Studi di Milano, Italy); Sara Foresti (Università degli Studi di Milano, Italy); Sushil Jajodia (George Mason University, USA); Giovanni Livraga (Università degli Studi di Milano, Italy); Stefano Paraboschi (University of Bergamo, Italy); Pierangela Samarati (Università degli Studi di Milano, Italy)
-
Manipulating Attacker's View of a System's Attack Surface
Massimiliano Albanese (George Mason University, USA); Ermanno Battista (University of Naples Federico II, Italy); Sushil Jajodia (George Mason University, USA); Valentina Casola (University of Naples Federico II, Italy)
-
Two-tier Data-Driven Intrusion Detection for Automatic Generation Control in Smart Grid
Muhammad Qasim Ali (University of North Carolina Charlotte, USA); Reza Yousefian (UNC Charlotte, USA); Ehab Al-Shaer (University of North Carolina Charlotte, USA); Sukumar Kamalasadan (University of North Carolina at Charlotte, USA); Quanyan Zhu (New York University, USA)
-
Adversarial Wiretap Channel with Public Discussion
Pengwei Wang (University of Calgary, Canada); Reihaneh Safavi-Naini (University of Calgary, Canada)
-
MagPairing: Exploiting Magnetometers for Pairing Smartphones in Close Proximity
Rong Jin (University of Michigan - Dearborn, USA); Liu Shi (University of Michigan-Dearborn, USA); Kai Zeng (University of Michigan - Dearborn, USA); Amit Pande (University of California Davis, CA, USA); Prasant Mohapatra (University of California, Davis, USA)
-
Sensory Channel Threats to Cyber Physical Systems: A Wake-up Call
A. Selcuk Uluagac (Georgia Institute of Technology, USA); Venkatachalam Subramanian (Georgia Institute of Technology, USA); Raheem Beyah (Georgia Institute of Technology, USA)
-
Multi-trapdoor Hash Functions and Their Applications in Network Security
Santosh Chandrasekhar (University of California, Merced, USA); Mukesh Singhal (University of California at Merced, USA)
-
Security Configuration Analytics Using Video Games
Mohammed Noraden Alsaleh (UNC Charlotte, USA); Ehab Al-Shaer (University of North Carolina Charlotte, USA)
-
Enabling Trusted Data-Intensive Execution in Cloud Computing
Ning Zhang (Virginia Tech, USA); Wenjing Lou (Virginia Tech, USA); Xuxian Jiang (NC State, USA); Thomas Hou (Virginia Tech, USA)
-
Analyzing the Dangers Posed by Chrome Extensions
Lujo Bauer (Carnegie Mellon University, USA); Shaoying Cai (Singapore Management University, Singapore); Limin Jia (CMU, USA); Tim Passaro (Carnegie Mellon University, USA); Yuan Tian (Carnegie Mellon University, USA)
-
iKUP Keeps Users' Privacy in the Smart Grid
Fábio Borges (Technische Universität Darmstadt - Telecooperation Lab, Germany); Leonardo A. Martucci (Karlstad University, Sweden)
-
LAPWiN: Location-Aided Probing for Protecting User Privacy in Wi-Fi Networks
Yu Seung Kim (Carnegie Mellon University, USA); Yuan Tian (Carnegie Mellon University, USA); Le T Nguyen (Carnegie Mellon University, USA); Patrick Tague (Carnegie Mellon University, USA)
-
Identifying Global Hot Items in Distributed Dynamic Data Streams
Wenji Chen (Iowa State University, USA); Yong Guan (Iowa State University, USA)
-
Location Verification on the Internet: Towards Enforcing Location-aware Access Policies Over Internet Clients
AbdelRahman Abdou (Carleton University, Canada); Ashraf Matrawy (Carleton University, Canada); Paul C. van Oorschot (Carleton University, Canada)
-
Exploiting Altruism in Social Networks for Friend-to-Friend Malware Detection
Matthew Probst (VMWare, USA); Jun Cheol Park (University of Utah, USA); Sneha Kumar Kasera (University of Utah, USA)
-
Lightweight (k,n)-File Sharing Scheme for Distributed Storages with Diverse Communication Capacities
Young-Hoon Park (Seoul National University, Korea); Eun-Dong Lee (Seoul National University, Korea); Seung-Woo Seo (Seoul National University, Korea, Korea)
-
Detecting Smart, Self-Propagating Internet Worms
Jun Li (University of Oregon, USA); Shad Stafford (Palo Alto Software, USA)