Technical Sessions

Technical Sessions



Monday 17 October   10:15 – 11:05
Session 1:  Authentication

SegAuth: A Segment-based Approach to Behavioral Biometric Authentication
Yanyan Li and Mengjun Xie (University of Arkansas at Little Rock, USA); Jiang Bian (University of Florida, USA)
 
TwinPeaks: A New Approach for Certificateless Public Key Distribution
Eunsang Cho, Minkyung Park and Kwon Taekyoung (Seoul National University, Korea)
 


Monday 17 October   10:15 – 11:05
Session 2:  Software-Defined Networking Security

Security Policy Checking in Distributed SDN based Clouds
Sandeep Pisharody, Ankur Chowdhary and Dijiang Huang (Arizona State University, USA)
 
SDNShield: Towards More Comprehensive Defense against DDoS Attacks on SDN Control Plane
Kuan-Yin Chen, Anudeep Junuthula and Ishant Siddhrau (NYU Tandon School of Engineering, USA); Yang Xu (New York University, USA); H. Jonathan Chao (NYU Tandon School of Engineering, USA)
 


Monday 17 October   11:20 – 12:35
Session 3:  Mobile Device Security

ACTS: Extracting Android App Topological Signature through Graphlet Sampling
Wei Peng (Intel Corporation, USA); Tianchong Gao (Indiana University-Purdue University Indianapolis, USA); Devkishen Sisodia (University of Oregon, USA); Tanay Kumar Saha, Feng Li and Mohammad A Hasan (Indiana University-Purdue University Indianapolis, USA)
 
XDroid: An Android Permission Control Using Hidden Markov Chain and Online Learning
Bahman Rashidi and Carol J Fung (Virginia Commonwealth University, USA)
 
Analysis of Clickjacking Attacks and An Effective Defense Scheme for Android Devices
Longfei Wu, Benjamin Brandt, Xiaojiang Du and Bo Ji (Temple University, USA)
 


Monday 17 October   11:20 – 12:35
Session 4: System Security

Towards Probabilistic Identification of Zero-day Attack Paths
Xiaoyan Sun (Pennsylvania State University, USA); Jun Dai (California State University, Sacramento, USA); Peng Liu (Pennsylvania State University, USA); Anoop Singhal (NIST, USA); John Yen (The Pennsylvania State University, USA)
 
On-Chip System Call Tracing: A Feasibility Study and Open Prototype
Chengyu Zheng (Politecnico di Milano, Italy); Mila Dalla Preda (University of Verona, Italy); Jorge Granjal (University of Coimbra, Polo 2 & Dep. Informatics Engineering, Portugal); Stefano Zanero and Federico Maggi (Politecnico di Milano, Italy)
 
Finding Proxy Users at the Service Using Anomaly Detection
Allen Webb (Texas A&M University, USA); Narasimha Reddy (Texas A & M University, USA)
 


Monday 17 October   14:00 – 15:40
Session 5:  Wireless and Communication Security

Cascading Denial of Service Attacks on Wi-Fi Networks
Liangxiao Xin and David Starobinski (Boston University, USA); Guevara Noubir (Northeastern University, USA)
 
Online Learning-Based Optimal Primary User Emulation Attacks in Cognitive Radio Networks
Monireh Dabaghchian, Amir Alipour-Fanid and Kai Zeng (George Mason University, USA); Qingsi Wang (Qualcomm Research, USA)
 
On the Security of Angle of Arrival Estimation
Amr Abdelaziz and Can Emre Koksal (The Ohio State University, USA); Hesham El Gamal (Ohio State University, USA)
 
Rolling Preambles: Mitigating Stealthy FO Estimation Attacks in OFDM-based 802.11 Systems
Hanif Rahbari and Marwan Krunz (University of Arizona, USA)
 


Monday 17 October   14:00 – 15:40
Session 6: Privacy

Honey Onions: a Framework for Characterizing and Identifying Misbehaving Tor HSDirs
Amirali Sanatinia and Guevara Noubir (Northeastern University, USA)
 
MaxPace: Speed-Constrained Location Queries
Per Hallgren (Chalmers University of Technology, Sweden); Martín Ochoa (Singapore University of Technology and Design, Singapore); Andrei Sabelfeld (Chalmers University of Technology, Sweden)
 
BidGuard: A Framework for Privacy-Preserving Crowdsensing Incentive Mechanisms
Jian Lin, Dejun Yang and Ming Li (Colorado School of Mines, USA); Jia Xu (Nanjing University of Posts and Telecommunications, P.R. China); Guoliang Xue (Arizona State University, USA)

ExtensionGuard: Towards Runtime Browser Extension Information Leakage Detection
Wentao Chang and Songqing Chen (George Mason University, USA)
 


Tuesday 18 October   9:55 – 11:10
Session 7: Internet of Things Security

Despicable Me(ter): Anonymous and Fine-grained Metering Data Reporting with Dishonest Meters
Moreno Ambrosin (University of Padua, Italy); Hossein Hosseini (Uinveristy of Washington, USA); Kalikinkar Mandal (University of Washington, USA); Mauro Conti (University of Padua, Italy); Radha Poovendran (University of Washington, USA)
 
Detection of False Data Injection Attacks in Smart Grid under Colored Gaussian Noise
Bo Tang, Jun Yan, Steven Kay and Haibo He (University of Rhode Island, USA)

IoTSAT: A Formal Framework for Security Analysis of the Internet of Things
Mujahid Mohsin (National University of Sciences & Technology, Pakistan); Zahid Anwar and Ghaith Husari (University of North Carolina at Charlotte, USA); Ehab Al-Shaer (University of North Carolina Charlotte, USA); Mohammad Ashiqur Rahman (Tennessee Tech University, USA)
 


Tuesday 18 October   9:55 – 11:10
Session 8: Denial of Service

Preventing Kernel Code-Reuse Attacks Through Disclosure Resistant Code Diversification
Jason Gionta and William Enck (North Carolina State University, USA); Per Larsen (UC Irvine, USA)
 
A Moving Target Defense Approach to Mitigate DDoS Attacks against Proxy-Based Architectures
Sridhar Venkatesan and Massimiliano Albanese (George Mason University, USA); Kareem Amin (University of Michigan, USA); Sushil Jajodia (George Mason University, USA); Mason Wright (University of Michigan, USA)

A Time-dependent SIS-model for Long-term Computer Worm Evolution
Marcus Märtens, Hadi Asghari, Michel van Eeten and Piet Van Mieghem (Delft University of Technology, The Netherlands)
 


Tuesday 18 October   11:25 – 12:40
Session 9:  Network and Protocol Security

Automated Synthesis of Resiliency Configurations for Cyber Networks
Mohammad Ashiqur Rahman (Tennessee Tech University, USA); Abdullah Al Farooq (University of North Carolina at Charlotte, USA); Amarjit Datta (Tennessee Tech University, USA); Ehab Al-Shaer (University of North Carolina Charlotte, USA)
 
Text Mining for Security Threat Detection Discovering Hidden Information in Unstructured Log Messages
Candace Suh-Lee, Ju-Yeon Jo and Yoohwan Kim (University of Nevada, Las Vegas, USA)
 
Validating Security Protocols with Cloud-Based Middleboxes
Curtis Taylor and Craig A. Shue (Worcester Polytechnic Institute, USA)
 


Tuesday 18 October   11:25 – 12:40
Session 10 Peer-to-Peer and Vehicular Network Security

Malicious Peers Eviction for P2P Overlays
Hatem Ismail (Technical University of Darmstadt, Germany); Daniel Germanus (ENX, Germany); Neeraj Suri (Technische Universitaet Darmstadt, Germany)
 
On the Resilience of P2P-based Botnet Graphs
Steffen Haas (University Muenster, Germany); Shankar Karuppayah (Technische Universität Darmstadt & Center for Advanced Security Research Darmstadt & NAv6, Germany and Universiti Sains Malaysia);
Selvakumar Manickam (Universiti Sains Malaysia, Jordan); Max Muehlhaeuser (Technical University Darmstadt, Germany); Mathias Fischer (University Muenster, Germany)

Attribute-Based Authorization Tickets for Car-to-X Communication
Carsten Büttner (Adam Opel AG); Sorin A. Huss (Technische Universität Darmstadt, Germany)
 


Tuesday 18 October   16:00 – 17:40
Session 11:  Intrusion Detection and Prevention

Automated Cross Layer Feature Selection for Effective Intrusion Detection in Networked Systems
Azeem Aqil, Ahmed Fathy Atya and Srikanth V. Krishnamurthy (University of California, Riverside, USA); Paul Yu (Army Research Laboratory, USA); Ananthram Swami (Army Research Lab., USA); Jeff Rowe and Karl Levitt (UC Davis, USA); Alexander Poylisher, Constantin Serban and Ritu Chadha (Applied Communication Sciences, USA)
 
On Probe-Response Attacks in Collaborative Intrusion Detection Systems
Emmanouil Vasilomanolakis (Technische Universität Darmstadt, Germany); Michael Stahn (Technische Universitat Darmstadt, Germany); Carlos Garcia Cordero (Technische Universität Darmstadt, Germany); Max Muehlhaeuser (Technical University Darmstadt, Germany)
 
Scan Prediction and Reconnaissance Mitigation through Commodity Graphics Cards
Christian Doerr (Delft University of Technology, The Netherlands); Mourad el Maouchi, Sille Kamoen and Jarno Moree (TU Delft, The Netherlands)
 
Real-Time GPU-based Timing Channel Detection using Entropy
Ross Gegan and Vishal Ahuja (University of California Davis, USA); John D. Owens and Dipak Ghosal (University of California, Davis, USA)
 


Tuesday 18 October   16:00 – 17:40
Session 12 Applied Security

Assessing the Threat of Web Worker Distributed Attacks
Yao Pan and Jules White (Vanderbilt University, USA); Yu Sun (California State Polytechnic University, Pomona, USA)
 
Virtual Safe: Unauthorized Movement Detection for Mobile Devices
Dakun Shen, Ian Markwood, Dan Shen and Yao Liu (University of South Florida, USA)
 
A Framework to Mitigate Airliner Risk in Air Traffic Management
Depeng Li (University of Hawaii at Manoa, USA); Rui Zhang (University of Delaware, USA)
 
PriExpress: Privacy-Preserving Express Delivery with Fine-Grained Attribute-Based Access Control
Tao Li (Arizona State University, USA); Rui Zhang (University of Delaware, USA); Yanchao Zhang (Arizona State University, USA)