The Community for Technology Leaders
Green Image
TABLE OF CONTENTS
ISSN: 1545-5971
Papers

CipherXRay: Exposing Cryptographic Operations and Transient Secrets from Monitored Binary Execution (Abstract)

Xin Li , George Mason University, Fairfax
Xinyuan Wang , George Mason University, Fairfax
Wentao Chang , George Mason University, Fairfax
Regular Papers

A Large-Scale Study of the Time Required to Compromise a Computer System (Abstract)

Hannes Holm , The Royal Institute of Technology, Stockholm

Secure Two-Party Differentially Private Data Release for Vertically-Partitioned Data (Abstract)

Mourad Debbabi , Concordia University, Montreal
Benjamin C. M. Fung , Concordia University, Montreal
Dima Alhadidi , Concordia University, Montreal
Noman Mohammed , McGill University, Montreal

k-Zero Day Safety: A Network Security Metric for Measuring the Risk of Unknown Vulnerabilities (Abstract)

Lingyu Wang , Concordia University, Montreal
Sushil Jajodia , George Mason University, Fairfax
Anoop Singhal , National Institute of Standards and Technology, Gaithersburg
Pengsu Cheng , Concordia University, Montreal
Steven Noel , George Mason University, Fairfax
Papers

Comment on "Remote Physical Device Fingerprinting" (Abstract)

Libor Polcak , Brno University of Technology, Brno
Jakub Jirasek , Brno University of Technology, Brno
Petr Matousek , Brno University of Technology, Brno
Regular Papers

Fault-Tolerant Network Interfaces for Networks-on-Chip (Abstract)

Leandro Fiorin , Faculty of Lugano, Lugano
Mariagiovanna Sami , Politecnico di Milano, Milano
Papers

Process Authentication for High System Assurance (PDF)

Hussain M.J. Almohri , Virginia Tech, Blacksburg
Danfeng Daphne Yao , Virginia Tech, Blacksburg
Dennis Kafura , Virginia Tech, Blacksburg
Regular Papers

Security Games for Node Localization through Verifiable Multilateration (Abstract)

Nicola Basilico , University of California, Merced
Nicola Gatti , Politecnico di Milano, Milan
Mattia Monga , Università degli Studi di Milano, Milan
Sabrina Sicari , Università degli Studi dell'Insubria, Varese
Papers

Efficient and Privacy-Aware Data Aggregation in Mobile Sensing (Abstract)

Qinghua Li , The Pennsylvania State University, University Park
Guohong Cao , The Pennsylvania State University, University Park
Thomas F. La Porta , The Pennsylvania State University, University Park

STARS: A Statistical Traffic Pattern Discovery System for MANETs (Abstract)

Yang Qin , FaceBook, Menlo Park
Dijiang Huang , Arizona State University, Tempe
Bing Li , Arizona State University, Tempe

Human Effects of Enhanced Privacy Management Models (Abstract)

Gorrell P. Cheek , University of North Carolina at Charlotte, Charlotte
Mohamed Shehab , University of North Carolina at Charlotte, Charlotte

Private Searching on Streaming Data Based on Keyword Frequency (Abstract)

Xun Yi , Victoria University, Melbourne
Elisa Bertino , Purdue University, West Lafayette
Jaideep Vaidya , Rutgers University, Newark
Chaoping Xing , Nanyang Technological University, Singapore

Analysis of Field Data on Web Security Vulnerabilities (Abstract)

José Fonseca , Institute Polytechnic of Guarda, Guarda and University of Coimbra, Coimbra
Nuno Seixas , University of Coimbra, Coimbra
Marco Vieira , University of Coimbra, Coimbra
Henrique Madeira , University of Coimbra, Coimbra

Ensuring the Performance of Apahche HTTP Server Affected by Aging (Abstract)

jing zhao , Harbin Engineering University, Harbin
Kishor S. Trivedi , Duke University, Durham
Michael Grottke , Friedrich-Alexander-Universität Erlangen-Nürnberg, Nürnberg
Javier Alonso , Duke University, Durham
Yanbin Wang , Harbin Institude of Technology, Harbin

Key-Recovery Attacks on KIDS, a Keyed Anomaly Detection System (Abstract)

Juan E. Tapiador , Universidad Carlos III de Madrid, Madrid
Agustín Orfila , Universidad Carlos III de Madrid, Madrid
Arturo Ribagorda , Universidad Carlos III de Madrid, Madrid
Benjamín Ramos , Universidad Carlos III de Madrid, Madrid

Control Flow-based Malware Variant Detection (Abstract)

Silvio Cesare , Deakin University, Burwood
Yang Xiang , Deakin University, Burwood
Wanlei Zhou , Deakin University, Burwood

Abductive Analysis of Administrative Policies in Rule-based Access Control (Abstract)

Puneet Gupta , Google, Inc., Mountain View
Scott D. Stoller , Stony Brook University, Stony Brook
Zhongyuan Xu , Stony Brook University, Stony Brook

Low-Priced and Energy-Efficient Detection of Replicas for Wireless Sensor Networks (Abstract)

Kwantae Cho , Electronics and Telecommunications Research Institute, Daejeon
Byung-Gil Lee , Electronics and Telecommunications Research Institute, Daejeon
Dong Hoon Lee , Korea University, Seoul

A Random Decision Tree Framework for Privacy-preserving Data Mining (Abstract)

Jaideep Vaidya , Rutgers University, Newark
Basit Shafiq , Lahore University of Management Sciences, Lahore
Wei Fan , Huawei Noah's Ark Lab, Hong Kong
Danish Mehmood , Lahore University of Management Sciences, Lahore
David Lorenzi , Rutgers University, Newark

Mobiflage: Deniable Storage Encryption for Mobile Devices (Abstract)

Adam Skillen , Carleton University, Ottawa and Concordia University, Montreal
Mohammad Mannan , Concordia University, Montreal

Software-Level Approaches to Implementing Fault-Tolerant Systems on Coarse-Grained Reconfigurable Architecture (Abstract)

Kyuseung Han , Seoul National University, Seoul
Ganghee Lee , Samsung Electronics Co., Gyeonggi
Kiyoung Choi , Seoul National University, Seoul

Security Analysis and Related Usability of Motion-based CAPTCHAs: Decoding Codewords in Motion (Abstract)

Yi Xu , University of North Carolina at Chapel Hill, Chapel Hill
Gerardo Reynaga , Carleton University, Ottawa
Sonia Chiasson , Carleton University, Ottawa
Jan-Michael Frahm , University of North Carolina at Chapel Hill, Chapel Hill
Fabian Monrose , University of North Carolina at Chapel Hill, Chapel Hill
Paul Van Oorschot , Carleton University, Ottawa

Privacy-Preserving Multi-Class Support Vector Machine for Outsourcing the Data Classification in Cloud (Abstract)

Yogachandran Rahulamathavan , City University London, London
Raphael C.-W. Phan , Multimedia University, Cyberjaya
Suresh Veluru , City University London, London
Kanapathippillai Cumanan , Newcastle University, Newcastle upon tyne
Muttukrishnan Rajarajan , City University London, London

A Note On "Orchestrating an Ensemble of MapReduce Jobs for Minimizing Their Makespan" (Abstract)

Wenhong Tian , University of Electronic Science and Technology of China, Chengdu
Yu Chen , University of Electronic Science and Technology of China, Chengdu
Xinyang Wang , University of Electronic Science and Technology of China, Chengdu

HyperCheck: A Hardware-Assisted Integrity Monitor (Abstract)

Fengwei Zhang , George Mason University, Fairfax
Jiang Wang , Riverbed Technology, Sunnyvale
Kun Sun , George Mason University, Fairfax
Angelos Stavrou , George Mason University, Fairfax

Hiding in the Mobile Crowd: Location Privacy through Collaboration (Abstract)

Reza Shokri , ETH Zurich, Zurich
George Theodorakopoulos , Cardiff University, Cardiff
Panos Papadimitratos , KTH, Stockholm
Ehsan Kazemi , EPFL, Lausanne
Jean-Pierre Hubaux , EPFL, Lausanne

Effective Risk Communication for Android Apps (Abstract)

Christopher S. Gates , Purdue University, West Lafayette
Jing Chen , Purdue University, West Lafayette
Ninghui Li , Purdue University, West Lafayette
Robert W. Proctor , Purdue University, West Lafayette

A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet Drop Attacks in Wireless Sensor Networks (Abstract)

Salmin Sultana , Purdue University, West Lafayette
Gabriel Ghinita , University of Massachusetts, Boston
Elisa Bertino , Purdue University, West Lafayette
Mohamed Shehab , University of North Carolina at Charlotte, Charlotte

Evaluation of Web Security Mechanisms using Vulnerability and Attack Injection (Abstract)

José Fonseca , UDI of the Institute Polytechnic of Guarda, Guarda and the CISUC
Marco Vieira , University of Coimbra, Coimbra
Henrique Madeira , University of Coimbra, Coimbra

Efficient Tagging of Remote Peers During Child Pornography Investigations (Abstract)

Marc Liberatore , University of Massachusetts Amherst, Amherst
Brian Neil Levine , University of Massachusetts Amherst, Amherst
Clay Shields , Georgetown University, Washington
Brian Lynn , University of Massachusetts Amherst, Amherst

MINT: A Reliability Modeling Framework for Energy-Efficient Parallel Disk Systems (Abstract)

Shu Yin , Hunan University, Changsha
Xiaojun Ruan , West Chester University of Pennsylvania, West Chester
Adam Manzanares , California State University - Chico, Chico
Xiao Qin , Auburn University, Auburn
Kenli Li , Hunan University, Changsha

Enforcing Obligations within Relational Database Management Systems (Abstract)

Pietro Colombo , Università degli Studi dell'Insubria, Varese
Elena Ferrari , Università degli Studi dell'Insubria, Varese

Modeling and Analysis on the Propagation Dynamics of Modern Email Malware (Abstract)

Sheng Wen , Deakin University, Melbourne
Wei Zhou , Deakin University, Melbourne
Jun Zhang , Deakin University, Melbourne
Yang Xiang , Deakin University, Melbourne
Wanlei Zhou , Deakin University, Melbourne
Weijia Jia , City University of Hong Kong, Hong Kong
Cliff C. Zou , University of Central Florida, Orlando

Performance and Availability Modeling of IT Systems with Data Backup and Restore (Abstract)

Ruofan Xia , Duke university, Durham
Xiaoyan Yin , Duke University, Durham
Javier Alonso , Duke University, Durham
Fumio Machida , NEC Corporation, Kawasaki
Kishor S. Trivedi , Duke University, Durham

MOSES: Supporting and Enforcing Security Profiles on Smartphones (Abstract)

Yury Zhauniarovich , Yury Zhauniarovich is with the University of Trento, Trento, 38123, Italy (email: yury.zhauniarovich@unitn.it).

Deleting Secret Data with Public Verifiability (Abstract)

Feng Hao , Feng Hao is with the School of Computing Science, Newcastle University, UK. (email: feng.hao@ncl.ac.uk)

Optimization of Full vs. Incremental Periodic Backup Policy (Abstract)

Gregory Levitin , Gregory Levitina is with the Collaborative Autonomic Computing Laboratory, School of Computer Science, University of Electronic Science and Technology of China (email: levitin@iec.co.il).

Trust-based Service Management for Social Internet of Things Systems (Abstract)

Ing-Ray Chen , Ing-Ray Chen is with the Department of Computer Science, Virginia Tech, Falls Church, VA 22043 (e-mail: irchen@vt.edu).

Generic Soft-Error Detection and Correction for Concurrent Data Structures (Abstract)

Christoph Borchert , Christoph Borchert is with the Department of Computer Science 12, Technische Universität Dortmund, Germany. (email: christoph.borchert@tu-dortmund.de)

Detection of Unspecified Emergencies for Controlled Information Sharing (Abstract)

Barbara Carminati , Barbara Carminati is with the Department of Theoretical and Applied Science University of Insubria, Varese, Italy. (email:

Private and Secure Tag Access for Large-Scale RFID Systems (Abstract)

Min-Te Sun , Min-Te Sun is with the Department of Computer Science and Information Engineering, National Central University, Taoyuan 320, Taiwan. (email: msun@csie.ncu.edu.tw)
Kazuya Sakai , Min-Te Sun is with the Department of Computer Science and Information Engineering, National Central University, Taoyuan 320, Taiwan. (email: msun@csie.ncu.edu.tw)

Using Virtual Machine Allocation Policies to Defend against Co-resident Attacks in Cloud Computing (Abstract)

Yi Han , Yi Han is with the Department of Computing and Information Systems, The University of Melbourne, Melbourne, Australia 3010. (email:an-drew.hanyi@gmail.com)

Robustness-Driven Resilience Evaluation of Self-Adaptive Software Systems (Abstract)

Javier Camara , J. Camara is with the Institute for Software Research, Carnegie MellonUniversity, USA.(email:jcmoreno@cs.cmu.edu)

Reliability Evaluation of Network Systems with Dependent Propagated Failures using Decision Diagrams (Abstract)

Yuchang Mo , Yuchang Mo is with the Department of Computer Science and Technology, Zhejiang Normal University, Jinhua 321004, China.(Email: myc@zjnu.cn)

Universally Composable RFID Mutual Authentication (Abstract)

Chunhua Su , C. Su is with School of Information Science, Japan Advanced Institute of Science and Technology, 1-1 Asahidai, Nomi, Ishikawa, 923-1292 Japan, and State Key Laboratory of Cryptology, P. O. Box 5159, Beijing, 100878,China.(email:chsu@jaist.ac.jp)

An Efficient Lattice Based Multi-stage Secret Sharing Scheme (Abstract)

Hossein Pilaram , Hossein Pilaram is with Department of Electrical Engineering, Sharif University of Technology, Tehran, Iran.(email:h pilaram@ee.sharif.edu)

Efficient and Privacy-preserving Min and k-th Min Computations in Mobile Sensing Systems (Abstract)

Yuan Zhang , Yuan Zhang is with State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing 210023, China. Sheng Zhong is the corresponding author.(email:zhangyuan05@gmail.com)

A Novel Class of Robust Covert Channels Using Out-of-order Packets (Abstract)

Adel El-Atawy , A. El-Atawy is with the School of Computing, DePaul Unviersity, Chicago, IL, 60604 USA.(email:aelatawy@cs.depaul.edu)

My Privacy My Decision: Control of Photo Sharing on Online Social Networks (Abstract)

Kaihe Xu , Kaihe Xu is with the Department of Electrical and Computer Engineering, Gainesville, FL 32611, USA. (e-mail: xukaihe@ufl.edu).

High Performance and High Scalable Packet Classification Algorithm for Network Security Systems (Abstract)

Wooguil Pak , W. Pak is with the Computer Engineering Department, Keimyung University, Daegu, Korea.(email:wooguilpak@kmu.ac.kr

Detecting and Preventing Kernel Rootkit Attacks with Bus Snooping (Abstract)

Hyungon Moon , Hyungon Moon is with the Seoul National University (e-mail: hgmoon@sor.snu.ac.kr).

Local Recovery for High Availability in Strongly Consistent Cloud Services (Abstract)

James Anderson , J. W. Anderson is with the Department of Computer Science and Engineering, University of California San Diego.(email:jwanderson@cs.ucsd.edu)

MMBcloud-tree: Authenticated Index for Verifiable Cloud Service Selection (Abstract)

Jingwei Li , Jingwei Li is with the College of Computer and Control Engineering, Nankai University, P.R. China (email: lijw1987@gmail.com)

Secure and Private Data Aggregation for Energy Consumption Scheduling in Smart Grids (Abstract)

Mohammad Ashiqur Rahman , Mohammad Ashiqur Rahman is with the Department of Software and Information Systems, University of North Carolina at Charlotte, North Carolina, USA. (email: mrahman4@uncc.edu)

Efficient and Confidentiality-Preserving Content-Based Publish/Subscribe with Prefiltering (Abstract)

Raphael Barazzutti , Emanuel Onica is with Alexandru Ioan Cuza University of Ia¸si, Romania; other authors are with the Institute of Computer Science, Universite de Neuchatel, Switzerland.(email:eonica@info.uaic.ro)

CPV: Delay-based Location Verification for the Internet (Abstract)

AbdelRahman Abdou , A. Abdou is with the Department of Systems and Computer Engineering, Carleton University.

Efficient Privacy-Preserving Facial Expression Classification (Abstract)

Yogachandran Rahulamathavan , Yogachandran Rahulamathavan is with the Information Security Group, School of Engineering and Mathematical Sciences, City University London, EC1V 0HB, London, U.K. Email:-yogachandran. rahulamathavan.1@city.ac.uk
Muttukrishnan Rajarajan , Yogachandran Rahulamathavan is with the Information Security Group, School of Engineering and Mathematical Sciences, City University London, EC1V 0HB, London, U.K. Email:-yogachandran. rahulamathavan.1@city.ac.uk

A Traceback Attack on Freenet (Abstract)

Guanyu Tian , Guanyu Tian is with the Department of Mathematics and Computer Science, Fontbonne University, Clayton, MO, 63105, USA (email: gtian@fontbonne.edu)
Zhenhai Duan , Guanyu Tian is with the Department of Mathematics and Computer Science, Fontbonne University, Clayton, MO, 63105, USA (email: gtian@fontbonne.edu)
Todd Baumeister , Guanyu Tian is with the Department of Mathematics and Computer Science, Fontbonne University, Clayton, MO, 63105, USA (email: gtian@fontbonne.edu)
Yingfei Dong , Guanyu Tian is with the Department of Mathematics and Computer Science, Fontbonne University, Clayton, MO, 63105, USA (email: gtian@fontbonne.edu)

Hardness of Firewall Analysis (Abstract)

EHAB ELMALLAH , Ehab S. Elmallah is with the Department of Computing Science, University of Alberta, Edmonton, T6G 2E8, Canada.
Mohamed Gouda , Ehab S. Elmallah is with the Department of Computing Science, University of Alberta, Edmonton, T6G 2E8, Canada.

SPE: Security and Privacy Enhancement Framework for Mobile Devices (Abstract)

Brian Krupp , Brian Krupp is with the Computer Science Department, Baldwin Wallace University. E-mail: bkrupp@bw.edu
Nigamanth Sridhar , Brian Krupp is with the Computer Science Department, Baldwin Wallace University. E-mail: bkrupp@bw.edu
Wenbing Zhao , Brian Krupp is with the Computer Science Department, Baldwin Wallace University. E-mail: bkrupp@bw.edu

Scalable Certificate Revocation Schemes for Smart Grid AMI Networks Using Bloom Filters (Abstract)

Khaled Rabieh , Khaled Rabieh is with the Department of Electrical & Computer Engineering, Tennessee Tech University, Cookeville, TN 38505 USA. (e-mail: kmrabieh42@students.tntech.edu).

Dependable Structural Health Monitoring Using Wireless Sensor Networks (Abstract)

Md Bhuiyan , Md Zakirul Alam Bhuiyan is with the School of Information Science and Engineering, Central South University, Changsha, China, 410083.(Email: zakirulalam@gmail.com)

Location Based Handshake and Private Proximity Test with Location Tags (Abstract)

Yao Zheng , Yao Zheng is with the Department of Computer Science, Virginia Tech, USA.(Email: zhengyao@vt.edu)

Enabling Self-healing Smart Grid Through Jamming Resilient Local Controller Switching (Abstract)

Hongbo Liu , Hongbo Liu is with the Department of Computer Information and Graphics Technology, Indiana University Purdue University at Indianapolis, IN 46202.(email:hl45@iupui.edu)

A Secure, Usable, and Transparent Middleware for Permission Managers on Android (Abstract)

Daibin Wang , D. Wang is with the Services Computing Technology and System Lab, Cluster and Grid Computing Lab, School of Computer Science and Technology, Huazhong University of Science and Technology, Wuhan, 430074, China.(email:daibinwang@hust.edu.cn)

Composability Verification of Multi-service Workflows in a Policy-Driven Cloud Computing Environment (Abstract)

Basit Shafiq , Basit Shafiq is with the Department of Computer Science, Lahore University of Management Sciences, Pakistan.(email:basit@lums.edu.pk)

Zero-Sum Password Cracking Game: A Large-Scale Empirical Study on the Crackability, Correlation, and Security of Passwords (Abstract)

Shouling Ji , S. Ji, is with the School of Electrical and Computer Engineering, Georgia Institute of Technology, Atlanta, GA, 30332.(email:sji@gatech.edu)

A Comprehensive Comparison of Multiparty Secure Additions with Differential Privacy (Abstract)

Slawomir Goryczka , Slawomir Goryczka is with the Department of Mathematics & Computer Science, Emory University, Atlanta, GA, USA.(Email: sgorycz@alumni.emory.edu)

Security Analysis of Password-Authenticated Key Retrieval (Abstract)

SeongHan Shin , SeongHan Shin is with the Research Institute for Secure Systems (RISEC), National Institute of Advanced Industrial Science and Technology (AIST), Ibaraki, 305-8568 Japan. (email: seonghan.shin@aist.go.jp)

Mandatory Content Access Control for Privacy Protection in Information Centric Networks (Abstract)

Qi Li , Qi Li is with the Graduate School at Shenzhen, Tsinghua University, Shenzhen China 518055, and Institute for Cyber Security, The University of Texas at San Antonio, San Antonio, TX 78249 (e-mail: leechqli@gmail.com).

Enabling Anonymous Authorization and Rewarding in the Smart Grid (Abstract)

Tassos Dimitriou , Tassos Dimitriou is with the Computer Engineering Dept. Kuwait University, Kuwait. Research supported by Kuwait University, Research grant no. QE02/13 (e-mail: tassos.dimitriou@ieee.org).

Forensic Identification of Anonymous Sources in OneSwarm (Abstract)

George Bissias , George Bissias is with the College of Information and Computer Sciences at the University of Massachusetts Amherst.(email:gbiss@cs.umass.edu)

Enhancing MongoDB with Purpose based Access Control (Abstract)

Pietro Colombo , Pietro Colombo is with Dipartimento di Scienze Teoriche e Applicate Universit `a degli Studi dell’Insubria, Varese, Italy.(email:pietro.colombo@uninsubria.it)

Achieving Content-Oriented Anonymity with CRISP (Abstract)

Peng Zhang , Peng Zhang is with Dept. of Computer Science and Technology, Xi’an Jiaotong University, Xi’an, China.(email:p-zhang@xjtu.edu.cn)

Verifiable and Exculpable Outsourced Attribute-Based Encryption for Access Control in Cloud Computing (Abstract)

Hui Ma , Hui Ma is with the State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100093, China.(Email: mahui@iie.ac.cn)

Incentivized Outsourced Computation Resistant to Malicious Contractors (Abstract)

Alptekin Kupcu , Alptekin Kupcu is with the Koc University. (email: akupcu@ku.edu.tr)

Learning-based Jamming Attack against Low-duty-cycle Networks (Abstract)

Zequ Yang , Zequ Yang is with the State Key Laboratory of Industrial Control Technology, Zhejiang University, Hangzhou, China.(email: yzqcjdtc@gmail.com)

Performability Analysis of k-to-l-out-of-n Computing Systems Using Binary Decision Diagrams (Abstract)

Yuchang Mo , Yuchang Mo is with the Department of Computer Science and Technology, Zhejiang Normal University, Jinhua 321004, China. (e-mail: myc@zjnu.cn).

Performability Modeling for RAID Storage Systems by Markov Regenerative Process (Abstract)

Fumio Machida , Fumio Machida is with the NEC Corporation, Kawasaki, Kanagawa, 211-8666, JAPAN.(email: f-machida@ab.jp.nec.com)

Negative Iris Recognition (Abstract)

Dongdong Zhao , Dongdong Zhao is with the University of Science and Technology of China, School of Computer Science and Technology, Hefei, Anhui, China. (email: zdd@mail.ustc.edu.cn)

Fast Software Implementations of Bilinear Pairings (Abstract)

Reza Azarderakhsh , R. Azarderakhsh is with the Department of Computer Engineering, Rochester Institute of Technology, Rochester, New York, USA.(email:rxaeec@rit.edu)

A Systems Theoretic Approach to the Security Threats in Cyber Physical Systems Applied to Stuxnet (Abstract)

Arash Nourian , Arash Nourian is with the Massachusetts Institute of Technology (MIT), Cambridge, MA, USA.(Email: nourian@mit.edu)

Magic Train: Design of Measurement Methods Against Bandwidth Inflation Attacks (Abstract)

Peng Zhou , Peng Zhou is with the Shanghai University, The Hong Kong Polytechnic University (e-mail: pzhou@shu.edu.cn).

Anonymity Leakage in Private VoIP Networks (Abstract)

Saurabh Shintre , Saurabh Shintre is with CyLab and the Department of Electrical and Computer Engineering, Carnegie Mellon University, Pittsburgh, PA 15217 as well as Instituto de Telecomunicacoes and the Department of Electrical and Computer Engineering, Universidade do Porto, Porto, 4200-393, Portugal.
Virgil Gligor , Saurabh Shintre is with CyLab and the Department of Electrical and Computer Engineering, Carnegie Mellon University, Pittsburgh, PA 15217 as well as Instituto de Telecomunicacoes and the Department of Electrical and Computer Engineering, Universidade do Porto, Porto, 4200-393, Portugal.
Joao Barros , Saurabh Shintre is with CyLab and the Department of Electrical and Computer Engineering, Carnegie Mellon University, Pittsburgh, PA 15217 as well as Instituto de Telecomunicacoes and the Department of Electrical and Computer Engineering, Universidade do Porto, Porto, 4200-393, Portugal.

Cryptanalysis of a Privacy-Preserving Aggregation Protocol (Abstract)

Amit Datta , Amit Datta is with the Department of Electrical and Computer Engineering, Carnegie Mellon University, Pittsburgh.(Email: amitdatta@cmu.edu)

Rumor Source Identification in Social Networks with Time-varying Topology (Abstract)

Jiaojiao Jiang , J. Jiang is with the School of Information Technology, Deakin University, VIC 3125, Australia.(email:jjiaoj@deakin.edu.au)

Faultprog: Testing the Accuracy of Binary-Level Software Fault Injection (Abstract)

Domenico Cotroneo , Domenico Cotroneo is with the Department of Electrical Engineering and Information Technologies (DIETI), Federico II University of Naples, Italy.(email:cotroneo@unina.it)

GeTrust: A guarantee-based trust model in Chord-based P2P networks (Abstract)

Xianfu Meng , Xianfu Meng is with the School of Computer Science and Technology, Dalian University of Technology, No. 2, Linggong Road, Dalian 116024, China.(Email: xfmeng@dlut.edu.cn)

Immutable Authentication and Integrity Schemes for Outsourced Databases (Abstract)

Attila Yavuz , Attila A. Yavuz is with the School of Electrical Engineering and Computer Science, Oregon State University, Corvallis, OR 97331 USA.(Email: Attila.Yavuz@oregonstate.edu)

PROVEST: Provenance-based Trust Model for Delay Tolerant Networks (Abstract)

Jin-Hee Cho , Jin-Hee Cho is with the U.S. Army Research Laboratory, Adelphi, MD 20783.(Email: jinheechogwb@yahoo.com)

Efficient and Privacy-Preserving Outsourced Calculation of Rational Numbers (Abstract)

Ximeng Liu , X. Liu is with the School of Information Systems, Singapore Management University, Singapore.(email:snbnix@gmail.com)

MADAM: Effective and Efficient Behavior-based Android Malware Detection and Prevention (Abstract)

Andrea Saracino , A. Saracino is with the Instituto di Informatica e Telematica, Consiglio Nazionale delle Ricerche, Pisa, Italy.(email:andrea.saracino@iit.cnr.it

Randomness Tests in Hostile Environments (Abstract)

Martin Goll , Martin Goll is with the Department of Embedded Security, Ruhr-University Bochum, Germany. (Email: martin.goll@rub.de)

Risk Assessment in Social Networks based on User Anomalous Behaviour (Abstract)

Naeimeh Laleh , Naeimeh Laleh is with DISTA, University of Insubria, Italy.(email:n.laleh@uninsubria.it)

Towards Transparent Debugging (Abstract)

Fengwei Zhang , Fengwei Zhang is with the Department of Computer Science, Wayne State University, Detroit, MI, 48202 (e-mail: fengwei@wayne.edu).

Knowledge Connectivity Requirements for Solving Byzantine Consensus with Unknown Participants (Abstract)

Eduardo Adilio Pelinson Alchieri , Eduardo Adilio Pelinson Alchieri is with the Department of Computer Science, University of Brasılia, Brazil. (email: alchieri@unb.br)

Understanding Practical Tradeoffs in HPC Checkpoint-Scheduling Policies (Abstract)

Nosayba El-Sayed , Nosayba El-Sayed is with the Department of Computer Science, University of Toronto, Toronto, ON M5S2E4 Canada (email: nosayba@cs.toronto.edu)
Bianca Schroeder , Nosayba El-Sayed is with the Department of Computer Science, University of Toronto, Toronto, ON M5S2E4 Canada (email: nosayba@cs.toronto.edu)

Attribute-based Access Control for ICN Naming Scheme (Abstract)

Bing Li , Bing Li is with the School of Computing Informatics and Decisions Systems Engineering, Arizona State University, Tempe, AZ 85281. (email: Bing.Li.4@asu.edu)

Empirical Study of Face Authentication Systems under OSNFD Attacks (Abstract)

Yan Li , Yan Li is with School of Information Systems, Singapore Management University.(email:yan.li.2009g@smu.edu.sg)

Efficient Anonymous Message Submission (Abstract)

Xinxin Zhao , Xinxin Zhao is with the School of Computing, Informatics and Decision Systems Engineering, Arizona State University, Tempe, AZ, 85281. (e-mail: xzhao32@asu.edu).

Conditional Diagnosability of (n,k)-Star Graphs under the PMC Model (Abstract)

Nai-Wen Chang , Nai-Wen Chang is with the Department of Computer Science and Infor- mation Engineering, National Cheng Kung University, Tainan 70101, Taiwan. (e-mail: changnw@gmail.com).

Shadow Attacks based on Password Reuses: A Quantitative Empirical View (Abstract)

Weili Han , Weili Han is with the Software School, Fudan University, Shanghai, P. R. China 201203. (email: wlhan@fudan.edu.cn)

On the Efficiency of FHE-based Private Queries (Abstract)

Myungsun Kim , Myungsun Kim is with the Department of Information Security, The University of Suwon, Hwaseong, South Korea. (email: msunkim@suwon.ac.kr)

Physical Attestation in the Smart Grid for Distributed State Verification (Abstract)

Thomas Roth , T. Roth is with the Department of Computer Science, Missouri University of Science and Technology, Rolla, MO, 65409.

PDA: Semantically Secure Time-Series Data Analytics with Dynamic Subgroups (Abstract)

Taeho Jung , Taeho Jung is with the Department of Computer Science, Illinois Institute of Technology, Chicago, IL.

End-to-End Detection of Caller ID Spoofing Attacks (Abstract)

Hossen Mustafa , Hossen Mustafa is with the University of South Carolina, Computer Science and Engineering, Columbia, South Carolina, USA. (email: mustafah@email.sc.edu)

Conditional (t,k)-Diagnosis in Regular and Irregular Graphs Under the Comparison Diagnosis Model (Abstract)

Chia-Chen Wei , Chia-Chen Wei is with the Department of Computer Science and Information Engineering, National Cheng Kung University, No. 1, University Road, Tainan 701, Taiwan, R.O.C.(Email: wachanebell@gmail.com)

Rmind: a Tool for Cryptographically Secure Statistical Analysis (PDF)

Dan Bogdanov , Dan Bogdanov is with the Cybernetica AS, Estonia.(Email: dan@cyber.ee)

CSC-Detector: A System to Infer Large-Scale Probing Campaigns (Abstract)

Elias Bou-Harb , Elias Bou-Harb is with the Florida Atlantic University and NCFTA Canada. (email: ebouharb@fau.edu)

Searchable Encryption over Feature-Rich Data (Abstract)

Qian Wang , Qian Wang is with the The State Key Lab of Software Engineering, School of Computer Science, Wuhan University, China. (email: qianwang@whu.edu.cn)

The g-Good-Neighbor Conditional Diagnosability of Arrangement Graphs (Abstract)

Limei Lin , Limei Lin is with the School of Mathematics and Computer Science and the Fujian Provincial Key Laboratory of Network Security and Cryptology, Fujian Normal University, Fuzhou, Fujian, 350108 P.R. China. (email: putianlinlimei@163.com)

SieveQ: A Layered BFT Protection System for Critical Services (Abstract)

Miguel Garcia , M. Garcia is with the LaSIGE, Faculdade de Ciências, Universidade de Lisboa, Portugal.(email:mhenriques@lasige.di.fc.ul.pt)

Flexible Hardware-Managed Isolated Execution: Architecture, Software Support and Applications (Abstract)

Dmitry Evtyushkin , Dmitry Evtyushkin is with the State University of New York at Binghamton, Binghamton, NY 13902, USA. (email: devtyushkin@cs.binghamton.edu)

A Provably-Secure Cross-Domain Handshake Scheme with Symptoms-Matching for Mobile Healthcare Social Network (Abstract)

Debiao He , Debiao He is with the State Key Lab of Software Engineering, Computer School, Wuhan University, Wuhan, China and the State Key Laboratory of Cryptology, Beijing, China. (email: hedebiao@163.com)

Symbolic Synthesis of Timed Models with Strict 2-Phase Fault Recovery (Abstract)

Fathiyeh Faghih , Fathiyeh Faghih is with Department of Computing and Software, McMaster University, Canada.(email:faghihef@mcmaster.ca)

Locating Faults in MANET-Hosted Software Systems (Abstract)

Petr Novotny , Department of Computing, Imperial College London

Efficient and Expressive Keyword Search Over Encrypted Data in the Cloud (Abstract)

Hui Cui , H. Cui is with the Secure Mobile Centre, Singapore Management University, Singapore.(hcui@smu.edu.sg)

On the Interplay Between Cyber and Physical Spaces for Adaptive Security (Abstract)

Christos Tsigkanos , C. Tsigkanos is with Politecnico di Milano, Italy.(email:christos.tsigkanos@polimi.it)

Real-time and Spatio-temporal Crowd-sourced Social Network Data Publishing with Differential Privacy (Abstract)

Qian Wang , Qian Wang is with The State Key Lab of Software Engineering, and School of Computer Science, Wuhan University, P. R. China.(email:qianwang@whu.edu.cn)

D2FL: Design and Implementation of Distributed Dynamic Fault Localization (Abstract)

Fanfu Zhou , F. Zhou is with the Shanghai Key Laboratory of Scalable Computing and Systems, Shanghai Jiao Tong University, Shanghai 200240, China.(email:zhoufanfu@sjtu.edu.cn)

Using Screen Brightness to Improve Security in Mobile Social Network Access (Abstract)

Meriem Guerar , M. Guerar is with the University of Sciences and Technology of Oran Mohamed Boudiaf, Algeria.(email:meriem.guerar@univ-usto.dz)

Crashing Modulus Attack on Modular Squaring for Rabin Cryptosystem (Abstract)

Masahiro Kaminaga , Masahiro Kaminaga is with the Gakuin University, 13-1, Chuo- 1, Tagajo, 985-8537, Japan.(Email: kaminaga@mail.tohoku-gakuin.ac.jp)

A Credibility Analysis System for Assessing Information on Twitter (Abstract)

Majed Alrubaian , Majed Alrubaian is with the Research Chair of Pervasive and Mobile Computing, College of Computer and Information Sciences, King Saud University, Riyadh 11543, Saudi Arabia.(Email: malrubaian.c@ksu.edu.sa)

Enhanced Secure Thresholded Data Deduplication Scheme for Cloud Storage (Abstract)

Jan Stanek , Jan Stanek is with the Faculty of Electrical Engineering, Czech Technical University in Prague, Czech Republic. (e-mail: jan.stanek@fel.cvut.cz).

ARF-Predictor: Effective Prediction of Aging-Related Failure Using Entropy (Abstract)

Pengfei Chen , P.Chen is with the Department of Computer Science and Technology, Xi’an Jiaotong University, Xi’an, China, 710049.(email:chenpengfei@outlook.com)

Privacy Leakage of Location Sharing in Mobile Social Networks: Attacks and Defense (Abstract)

Huaxin Li , Huaxin Li is with the Shanghai Jiao Tong University, China. (email: lihuaxin003@sjtu.edu.cn)

Two Birds with One Stone: Two-Factor Authentication with Security Beyond Conventional Bound (Abstract)

Ding Wang , D. Wang is with the School of Electronics Engineering and Computer Science, Peking University, Beijing 100871, P.R. China.(email:wangdingg@pku.edu.cn)

White-Box Traceable CP-ABE for Cloud Storage Service: How to Catch People Leaking Their Access Credentials Effectively (Abstract)

Jianting Ning , Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai, China, 200240 (e-mail: jtning@sjtu.edu.cn).

Towards Privacy-preserving and Practical Image-centric Social Discovery (Abstract)

Xingliang Yuan , Xingliang Yuan is with the Department of Computer Science, City University of Hong Kong, Hong Kong, China.(Email: xyuancs@gmail.com)

Hardware architecture implemented on FPGA for protecting cryptographic keys against side-channel attacks (Abstract)

Ruben Lumbiarres-Lopez , Rubén Lumbiarres-López is with Universitat Politècnica de Catalunya, 08800 Vilanova i la Geltrú.(email:ruben.lumbiarres@upc.edu)

Collective Data-Sanitization for Preventing Sensitive Information Inference Attacks in Social Networks (Abstract)

Zhipeng Cai , Department of Computer Science, Georgia State University, Atlanta, GA, 30303.(email: zcai@gsu.edu)
90 ms
(Ver )