The Community for Technology Leaders
Green Image
TABLE OF CONTENTS
ISSN: 1545-5971

Reducing Timing Side-channel Information Leakage using 3D Integration (Abstract)

Chongxi Bao , Department of Electrical and Computer Engineering, University of Maryland, College Park, MD 20742.(email:chongxi.bao@gmail.com)
Papers

CipherXRay: Exposing Cryptographic Operations and Transient Secrets from Monitored Binary Execution (Abstract)

Xin Li , George Mason University, Fairfax
Xinyuan Wang , George Mason University, Fairfax
Wentao Chang , George Mason University, Fairfax
Regular Papers

A Large-Scale Study of the Time Required to Compromise a Computer System (Abstract)

Hannes Holm , The Royal Institute of Technology, Stockholm

Secure Two-Party Differentially Private Data Release for Vertically-Partitioned Data (Abstract)

Mourad Debbabi , Concordia University, Montreal
Benjamin C. M. Fung , Concordia University, Montreal
Dima Alhadidi , Concordia University, Montreal
Noman Mohammed , McGill University, Montreal

k-Zero Day Safety: A Network Security Metric for Measuring the Risk of Unknown Vulnerabilities (Abstract)

Lingyu Wang , Concordia University, Montreal
Sushil Jajodia , George Mason University, Fairfax
Anoop Singhal , National Institute of Standards and Technology, Gaithersburg
Pengsu Cheng , Concordia University, Montreal
Steven Noel , George Mason University, Fairfax
Papers

Comment on "Remote Physical Device Fingerprinting" (Abstract)

Libor Polcak , Brno University of Technology, Brno
Jakub Jirasek , Brno University of Technology, Brno
Petr Matousek , Brno University of Technology, Brno
Regular Papers

Fault-Tolerant Network Interfaces for Networks-on-Chip (Abstract)

Leandro Fiorin , Faculty of Lugano, Lugano
Mariagiovanna Sami , Politecnico di Milano, Milano
Papers

Process Authentication for High System Assurance (PDF)

Hussain M.J. Almohri , Virginia Tech, Blacksburg
Danfeng Daphne Yao , Virginia Tech, Blacksburg
Dennis Kafura , Virginia Tech, Blacksburg
Regular Papers

Security Games for Node Localization through Verifiable Multilateration (Abstract)

Nicola Basilico , University of California, Merced
Nicola Gatti , Politecnico di Milano, Milan
Mattia Monga , Università degli Studi di Milano, Milan
Sabrina Sicari , Università degli Studi dell'Insubria, Varese
Papers

Efficient and Privacy-Aware Data Aggregation in Mobile Sensing (Abstract)

Qinghua Li , The Pennsylvania State University, University Park
Guohong Cao , The Pennsylvania State University, University Park
Thomas F. La Porta , The Pennsylvania State University, University Park

STARS: A Statistical Traffic Pattern Discovery System for MANETs (Abstract)

Yang Qin , FaceBook, Menlo Park
Dijiang Huang , Arizona State University, Tempe
Bing Li , Arizona State University, Tempe

Human Effects of Enhanced Privacy Management Models (Abstract)

Gorrell P. Cheek , University of North Carolina at Charlotte, Charlotte
Mohamed Shehab , University of North Carolina at Charlotte, Charlotte

Private Searching on Streaming Data Based on Keyword Frequency (Abstract)

Xun Yi , Victoria University, Melbourne
Elisa Bertino , Purdue University, West Lafayette
Jaideep Vaidya , Rutgers University, Newark
Chaoping Xing , Nanyang Technological University, Singapore

Analysis of Field Data on Web Security Vulnerabilities (Abstract)

José Fonseca , Institute Polytechnic of Guarda, Guarda and University of Coimbra, Coimbra
Nuno Seixas , University of Coimbra, Coimbra
Marco Vieira , University of Coimbra, Coimbra
Henrique Madeira , University of Coimbra, Coimbra

Ensuring the Performance of Apahche HTTP Server Affected by Aging (Abstract)

jing zhao , Harbin Engineering University, Harbin
Kishor S. Trivedi , Duke University, Durham
Michael Grottke , Friedrich-Alexander-Universität Erlangen-Nürnberg, Nürnberg
Javier Alonso , Duke University, Durham
Yanbin Wang , Harbin Institude of Technology, Harbin

Key-Recovery Attacks on KIDS, a Keyed Anomaly Detection System (Abstract)

Juan E. Tapiador , Universidad Carlos III de Madrid, Madrid
Agustín Orfila , Universidad Carlos III de Madrid, Madrid
Arturo Ribagorda , Universidad Carlos III de Madrid, Madrid
Benjamín Ramos , Universidad Carlos III de Madrid, Madrid

Control Flow-based Malware Variant Detection (Abstract)

Silvio Cesare , Deakin University, Burwood
Yang Xiang , Deakin University, Burwood
Wanlei Zhou , Deakin University, Burwood

Abductive Analysis of Administrative Policies in Rule-based Access Control (Abstract)

Puneet Gupta , Google, Inc., Mountain View
Scott D. Stoller , Stony Brook University, Stony Brook
Zhongyuan Xu , Stony Brook University, Stony Brook

Low-Priced and Energy-Efficient Detection of Replicas for Wireless Sensor Networks (Abstract)

Kwantae Cho , Electronics and Telecommunications Research Institute, Daejeon
Byung-Gil Lee , Electronics and Telecommunications Research Institute, Daejeon
Dong Hoon Lee , Korea University, Seoul

A Random Decision Tree Framework for Privacy-preserving Data Mining (Abstract)

Jaideep Vaidya , Rutgers University, Newark
Basit Shafiq , Lahore University of Management Sciences, Lahore
Wei Fan , Huawei Noah's Ark Lab, Hong Kong
Danish Mehmood , Lahore University of Management Sciences, Lahore
David Lorenzi , Rutgers University, Newark

Mobiflage: Deniable Storage Encryption for Mobile Devices (Abstract)

Adam Skillen , Carleton University, Ottawa and Concordia University, Montreal
Mohammad Mannan , Concordia University, Montreal

Software-Level Approaches to Implementing Fault-Tolerant Systems on Coarse-Grained Reconfigurable Architecture (Abstract)

Kyuseung Han , Seoul National University, Seoul
Ganghee Lee , Samsung Electronics Co., Gyeonggi
Kiyoung Choi , Seoul National University, Seoul

Security Analysis and Related Usability of Motion-based CAPTCHAs: Decoding Codewords in Motion (Abstract)

Yi Xu , University of North Carolina at Chapel Hill, Chapel Hill
Gerardo Reynaga , Carleton University, Ottawa
Sonia Chiasson , Carleton University, Ottawa
Jan-Michael Frahm , University of North Carolina at Chapel Hill, Chapel Hill
Fabian Monrose , University of North Carolina at Chapel Hill, Chapel Hill
Paul Van Oorschot , Carleton University, Ottawa

Privacy-Preserving Multi-Class Support Vector Machine for Outsourcing the Data Classification in Cloud (Abstract)

Yogachandran Rahulamathavan , City University London, London
Raphael C.-W. Phan , Multimedia University, Cyberjaya
Suresh Veluru , City University London, London
Kanapathippillai Cumanan , Newcastle University, Newcastle upon tyne
Muttukrishnan Rajarajan , City University London, London

A Note On "Orchestrating an Ensemble of MapReduce Jobs for Minimizing Their Makespan" (Abstract)

Wenhong Tian , University of Electronic Science and Technology of China, Chengdu
Yu Chen , University of Electronic Science and Technology of China, Chengdu
Xinyang Wang , University of Electronic Science and Technology of China, Chengdu

HyperCheck: A Hardware-Assisted Integrity Monitor (Abstract)

Fengwei Zhang , George Mason University, Fairfax
Jiang Wang , Riverbed Technology, Sunnyvale
Kun Sun , George Mason University, Fairfax
Angelos Stavrou , George Mason University, Fairfax

Hiding in the Mobile Crowd: Location Privacy through Collaboration (Abstract)

Reza Shokri , ETH Zurich, Zurich
George Theodorakopoulos , Cardiff University, Cardiff
Panos Papadimitratos , KTH, Stockholm
Ehsan Kazemi , EPFL, Lausanne
Jean-Pierre Hubaux , EPFL, Lausanne

Effective Risk Communication for Android Apps (Abstract)

Christopher S. Gates , Purdue University, West Lafayette
Jing Chen , Purdue University, West Lafayette
Ninghui Li , Purdue University, West Lafayette
Robert W. Proctor , Purdue University, West Lafayette

A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet Drop Attacks in Wireless Sensor Networks (Abstract)

Salmin Sultana , Purdue University, West Lafayette
Gabriel Ghinita , University of Massachusetts, Boston
Elisa Bertino , Purdue University, West Lafayette
Mohamed Shehab , University of North Carolina at Charlotte, Charlotte

Evaluation of Web Security Mechanisms using Vulnerability and Attack Injection (Abstract)

José Fonseca , UDI of the Institute Polytechnic of Guarda, Guarda and the CISUC
Marco Vieira , University of Coimbra, Coimbra
Henrique Madeira , University of Coimbra, Coimbra

Efficient Tagging of Remote Peers During Child Pornography Investigations (Abstract)

Marc Liberatore , University of Massachusetts Amherst, Amherst
Brian Neil Levine , University of Massachusetts Amherst, Amherst
Clay Shields , Georgetown University, Washington
Brian Lynn , University of Massachusetts Amherst, Amherst

MINT: A Reliability Modeling Framework for Energy-Efficient Parallel Disk Systems (Abstract)

Shu Yin , Hunan University, Changsha
Xiaojun Ruan , West Chester University of Pennsylvania, West Chester
Adam Manzanares , California State University - Chico, Chico
Xiao Qin , Auburn University, Auburn
Kenli Li , Hunan University, Changsha

Enforcing Obligations within Relational Database Management Systems (Abstract)

Pietro Colombo , Università degli Studi dell'Insubria, Varese
Elena Ferrari , Università degli Studi dell'Insubria, Varese

Modeling and Analysis on the Propagation Dynamics of Modern Email Malware (Abstract)

Sheng Wen , Deakin University, Melbourne
Wei Zhou , Deakin University, Melbourne
Jun Zhang , Deakin University, Melbourne
Yang Xiang , Deakin University, Melbourne
Wanlei Zhou , Deakin University, Melbourne
Weijia Jia , City University of Hong Kong, Hong Kong
Cliff C. Zou , University of Central Florida, Orlando

Performance and Availability Modeling of IT Systems with Data Backup and Restore (Abstract)

Ruofan Xia , Duke university, Durham
Xiaoyan Yin , Duke University, Durham
Javier Alonso , Duke University, Durham
Fumio Machida , NEC Corporation, Kawasaki
Kishor S. Trivedi , Duke University, Durham

MOSES: Supporting and Enforcing Security Profiles on Smartphones (Abstract)

Yury Zhauniarovich , Yury Zhauniarovich is with the University of Trento, Trento, 38123, Italy (email: yury.zhauniarovich@unitn.it).

Forensic Identification of Anonymous Sources in OneSwarm (Abstract)

George Bissias , George Bissias is with the College of Information and Computer Sciences at the University of Massachusetts Amherst.(email:gbiss@cs.umass.edu)

Enhancing MongoDB with Purpose based Access Control (Abstract)

Pietro Colombo , Pietro Colombo is with Dipartimento di Scienze Teoriche e Applicate Universit `a degli Studi dell’Insubria, Varese, Italy.(email:pietro.colombo@uninsubria.it)

Achieving Content-Oriented Anonymity with CRISP (Abstract)

Peng Zhang , Peng Zhang is with Dept. of Computer Science and Technology, Xi’an Jiaotong University, Xi’an, China.(email:p-zhang@xjtu.edu.cn)

Verifiable and Exculpable Outsourced Attribute-Based Encryption for Access Control in Cloud Computing (Abstract)

Hui Ma , Hui Ma is with the State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100093, China.(Email: mahui@iie.ac.cn)

Incentivized Outsourced Computation Resistant to Malicious Contractors (Abstract)

Alptekin Kupcu , Alptekin Kupcu is with the Koc University. (email: akupcu@ku.edu.tr)

Learning-based Jamming Attack against Low-duty-cycle Networks (Abstract)

Zequ Yang , Zequ Yang is with the State Key Laboratory of Industrial Control Technology, Zhejiang University, Hangzhou, China.(email: yzqcjdtc@gmail.com)

Performability Analysis of k-to-l-out-of-n Computing Systems Using Binary Decision Diagrams (Abstract)

Yuchang Mo , Yuchang Mo is with the Department of Computer Science and Technology, Zhejiang Normal University, Jinhua 321004, China. (e-mail: myc@zjnu.cn).

Performability Modeling for RAID Storage Systems by Markov Regenerative Process (Abstract)

Fumio Machida , Fumio Machida is with the NEC Corporation, Kawasaki, Kanagawa, 211-8666, JAPAN.(email: f-machida@ab.jp.nec.com)

Negative Iris Recognition (Abstract)

Dongdong Zhao , Dongdong Zhao is with the University of Science and Technology of China, School of Computer Science and Technology, Hefei, Anhui, China. (email: zdd@mail.ustc.edu.cn)

Fast Software Implementations of Bilinear Pairings (Abstract)

Reza Azarderakhsh , R. Azarderakhsh is with the Department of Computer Engineering, Rochester Institute of Technology, Rochester, New York, USA.(email:rxaeec@rit.edu)

A Systems Theoretic Approach to the Security Threats in Cyber Physical Systems Applied to Stuxnet (Abstract)

Arash Nourian , Arash Nourian is with the Massachusetts Institute of Technology (MIT), Cambridge, MA, USA.(Email: nourian@mit.edu)

Magic Train: Design of Measurement Methods Against Bandwidth Inflation Attacks (Abstract)

Peng Zhou , Peng Zhou is with the Shanghai University, The Hong Kong Polytechnic University (e-mail: pzhou@shu.edu.cn).

Anonymity Leakage in Private VoIP Networks (Abstract)

Saurabh Shintre , Saurabh Shintre is with CyLab and the Department of Electrical and Computer Engineering, Carnegie Mellon University, Pittsburgh, PA 15217 as well as Instituto de Telecomunicacoes and the Department of Electrical and Computer Engineering, Universidade do Porto, Porto, 4200-393, Portugal.
Virgil Gligor , Saurabh Shintre is with CyLab and the Department of Electrical and Computer Engineering, Carnegie Mellon University, Pittsburgh, PA 15217 as well as Instituto de Telecomunicacoes and the Department of Electrical and Computer Engineering, Universidade do Porto, Porto, 4200-393, Portugal.
Joao Barros , Saurabh Shintre is with CyLab and the Department of Electrical and Computer Engineering, Carnegie Mellon University, Pittsburgh, PA 15217 as well as Instituto de Telecomunicacoes and the Department of Electrical and Computer Engineering, Universidade do Porto, Porto, 4200-393, Portugal.

Cryptanalysis of a Privacy-Preserving Aggregation Protocol (Abstract)

Amit Datta , Amit Datta is with the Department of Electrical and Computer Engineering, Carnegie Mellon University, Pittsburgh.(Email: amitdatta@cmu.edu)

Rumor Source Identification in Social Networks with Time-varying Topology (Abstract)

Jiaojiao Jiang , J. Jiang is with the School of Information Technology, Deakin University, VIC 3125, Australia.(email:jjiaoj@deakin.edu.au)

Faultprog: Testing the Accuracy of Binary-Level Software Fault Injection (Abstract)

Domenico Cotroneo , Domenico Cotroneo is with the Department of Electrical Engineering and Information Technologies (DIETI), Federico II University of Naples, Italy.(email:cotroneo@unina.it)

GeTrust: A guarantee-based trust model in Chord-based P2P networks (Abstract)

Xianfu Meng , Xianfu Meng is with the School of Computer Science and Technology, Dalian University of Technology, No. 2, Linggong Road, Dalian 116024, China.(Email: xfmeng@dlut.edu.cn)

Immutable Authentication and Integrity Schemes for Outsourced Databases (Abstract)

Attila Yavuz , Attila A. Yavuz is with the School of Electrical Engineering and Computer Science, Oregon State University, Corvallis, OR 97331 USA.(Email: Attila.Yavuz@oregonstate.edu)

PROVEST: Provenance-based Trust Model for Delay Tolerant Networks (Abstract)

Jin-Hee Cho , Jin-Hee Cho is with the U.S. Army Research Laboratory, Adelphi, MD 20783.(Email: jinheechogwb@yahoo.com)

Efficient and Privacy-Preserving Outsourced Calculation of Rational Numbers (Abstract)

Ximeng Liu , X. Liu is with the School of Information Systems, Singapore Management University, Singapore.(email:snbnix@gmail.com)

MADAM: Effective and Efficient Behavior-based Android Malware Detection and Prevention (Abstract)

Andrea Saracino , A. Saracino is with the Instituto di Informatica e Telematica, Consiglio Nazionale delle Ricerche, Pisa, Italy.(email:andrea.saracino@iit.cnr.it

Randomness Tests in Hostile Environments (Abstract)

Martin Goll , Martin Goll is with the Department of Embedded Security, Ruhr-University Bochum, Germany. (Email: martin.goll@rub.de)

Risk Assessment in Social Networks based on User Anomalous Behaviour (Abstract)

Naeimeh Laleh , Naeimeh Laleh is with DISTA, University of Insubria, Italy.(email:n.laleh@uninsubria.it)

Towards Transparent Debugging (Abstract)

Fengwei Zhang , Fengwei Zhang is with the Department of Computer Science, Wayne State University, Detroit, MI, 48202 (e-mail: fengwei@wayne.edu).

Knowledge Connectivity Requirements for Solving Byzantine Consensus with Unknown Participants (Abstract)

Eduardo Adilio Pelinson Alchieri , Eduardo Adilio Pelinson Alchieri is with the Department of Computer Science, University of Brasılia, Brazil. (email: alchieri@unb.br)

Understanding Practical Tradeoffs in HPC Checkpoint-Scheduling Policies (Abstract)

Nosayba El-Sayed , Nosayba El-Sayed is with the Department of Computer Science, University of Toronto, Toronto, ON M5S2E4 Canada (email: nosayba@cs.toronto.edu)
Bianca Schroeder , Nosayba El-Sayed is with the Department of Computer Science, University of Toronto, Toronto, ON M5S2E4 Canada (email: nosayba@cs.toronto.edu)

Attribute-based Access Control for ICN Naming Scheme (Abstract)

Bing Li , Bing Li is with the School of Computing Informatics and Decisions Systems Engineering, Arizona State University, Tempe, AZ 85281. (email: Bing.Li.4@asu.edu)

Empirical Study of Face Authentication Systems under OSNFD Attacks (Abstract)

Yan Li , Yan Li is with School of Information Systems, Singapore Management University.(email:yan.li.2009g@smu.edu.sg)

Efficient Anonymous Message Submission (Abstract)

Xinxin Zhao , Xinxin Zhao is with the School of Computing, Informatics and Decision Systems Engineering, Arizona State University, Tempe, AZ, 85281. (e-mail: xzhao32@asu.edu).

Conditional Diagnosability of (n,k)-Star Graphs under the PMC Model (Abstract)

Nai-Wen Chang , Nai-Wen Chang is with the Department of Computer Science and Infor- mation Engineering, National Cheng Kung University, Tainan 70101, Taiwan. (e-mail: changnw@gmail.com).

Shadow Attacks based on Password Reuses: A Quantitative Empirical View (Abstract)

Weili Han , Weili Han is with the Software School, Fudan University, Shanghai, P. R. China 201203. (email: wlhan@fudan.edu.cn)

On the Efficiency of FHE-based Private Queries (Abstract)

Myungsun Kim , Myungsun Kim is with the Department of Information Security, The University of Suwon, Hwaseong, South Korea. (email: msunkim@suwon.ac.kr)

Physical Attestation in the Smart Grid for Distributed State Verification (Abstract)

Thomas Roth , T. Roth is with the Department of Computer Science, Missouri University of Science and Technology, Rolla, MO, 65409.

PDA: Semantically Secure Time-Series Data Analytics with Dynamic Subgroups (Abstract)

Taeho Jung , Taeho Jung is with the Department of Computer Science, Illinois Institute of Technology, Chicago, IL.

End-to-End Detection of Caller ID Spoofing Attacks (Abstract)

Hossen Mustafa , Hossen Mustafa is with the University of South Carolina, Computer Science and Engineering, Columbia, South Carolina, USA. (email: mustafah@email.sc.edu)

Conditional (t,k)-Diagnosis in Regular and Irregular Graphs Under the Comparison Diagnosis Model (Abstract)

Chia-Chen Wei , Chia-Chen Wei is with the Department of Computer Science and Information Engineering, National Cheng Kung University, No. 1, University Road, Tainan 701, Taiwan, R.O.C.(Email: wachanebell@gmail.com)

Rmind: a Tool for Cryptographically Secure Statistical Analysis (PDF)

Dan Bogdanov , Dan Bogdanov is with the Cybernetica AS, Estonia.(Email: dan@cyber.ee)

CSC-Detector: A System to Infer Large-Scale Probing Campaigns (Abstract)

Elias Bou-Harb , Elias Bou-Harb is with the Florida Atlantic University and NCFTA Canada. (email: ebouharb@fau.edu)

Searchable Encryption over Feature-Rich Data (Abstract)

Qian Wang , Qian Wang is with the The State Key Lab of Software Engineering, School of Computer Science, Wuhan University, China. (email: qianwang@whu.edu.cn)

The g-Good-Neighbor Conditional Diagnosability of Arrangement Graphs (Abstract)

Limei Lin , Limei Lin is with the School of Mathematics and Computer Science and the Fujian Provincial Key Laboratory of Network Security and Cryptology, Fujian Normal University, Fuzhou, Fujian, 350108 P.R. China. (email: putianlinlimei@163.com)

SieveQ: A Layered BFT Protection System for Critical Services (Abstract)

Miguel Garcia , M. Garcia is with the LaSIGE, Faculdade de Ciências, Universidade de Lisboa, Portugal.(email:mhenriques@lasige.di.fc.ul.pt)

Flexible Hardware-Managed Isolated Execution: Architecture, Software Support and Applications (Abstract)

Dmitry Evtyushkin , Dmitry Evtyushkin is with the State University of New York at Binghamton, Binghamton, NY 13902, USA. (email: devtyushkin@cs.binghamton.edu)

A Provably-Secure Cross-Domain Handshake Scheme with Symptoms-Matching for Mobile Healthcare Social Network (Abstract)

Debiao He , Debiao He is with the State Key Lab of Software Engineering, Computer School, Wuhan University, Wuhan, China and the State Key Laboratory of Cryptology, Beijing, China. (email: hedebiao@163.com)

Symbolic Synthesis of Timed Models with Strict 2-Phase Fault Recovery (Abstract)

Fathiyeh Faghih , Fathiyeh Faghih is with Department of Computing and Software, McMaster University, Canada.(email:faghihef@mcmaster.ca)

Locating Faults in MANET-Hosted Software Systems (Abstract)

Petr Novotny , Department of Computing, Imperial College London

Efficient and Expressive Keyword Search Over Encrypted Data in the Cloud (Abstract)

Hui Cui , H. Cui is with the Secure Mobile Centre, Singapore Management University, Singapore.(hcui@smu.edu.sg)

On the Interplay Between Cyber and Physical Spaces for Adaptive Security (Abstract)

Christos Tsigkanos , C. Tsigkanos is with Politecnico di Milano, Italy.(email:christos.tsigkanos@polimi.it)

Real-time and Spatio-temporal Crowd-sourced Social Network Data Publishing with Differential Privacy (Abstract)

Qian Wang , Qian Wang is with The State Key Lab of Software Engineering, and School of Computer Science, Wuhan University, P. R. China.(email:qianwang@whu.edu.cn)

D2FL: Design and Implementation of Distributed Dynamic Fault Localization (Abstract)

Fanfu Zhou , F. Zhou is with the Shanghai Key Laboratory of Scalable Computing and Systems, Shanghai Jiao Tong University, Shanghai 200240, China.(email:zhoufanfu@sjtu.edu.cn)

Using Screen Brightness to Improve Security in Mobile Social Network Access (Abstract)

Meriem Guerar , M. Guerar is with the University of Sciences and Technology of Oran Mohamed Boudiaf, Algeria.(email:meriem.guerar@univ-usto.dz)

Crashing Modulus Attack on Modular Squaring for Rabin Cryptosystem (Abstract)

Masahiro Kaminaga , Masahiro Kaminaga is with the Gakuin University, 13-1, Chuo- 1, Tagajo, 985-8537, Japan.(Email: kaminaga@mail.tohoku-gakuin.ac.jp)

A Credibility Analysis System for Assessing Information on Twitter (Abstract)

Majed Alrubaian , Majed Alrubaian is with the Research Chair of Pervasive and Mobile Computing, College of Computer and Information Sciences, King Saud University, Riyadh 11543, Saudi Arabia.(Email: malrubaian.c@ksu.edu.sa)

Enhanced Secure Thresholded Data Deduplication Scheme for Cloud Storage (Abstract)

Jan Stanek , Jan Stanek is with the Faculty of Electrical Engineering, Czech Technical University in Prague, Czech Republic. (e-mail: jan.stanek@fel.cvut.cz).

ARF-Predictor: Effective Prediction of Aging-Related Failure Using Entropy (Abstract)

Pengfei Chen , P.Chen is with the Department of Computer Science and Technology, Xi’an Jiaotong University, Xi’an, China, 710049.(email:chenpengfei@outlook.com)

Privacy Leakage of Location Sharing in Mobile Social Networks: Attacks and Defense (Abstract)

Huaxin Li , Huaxin Li is with the Shanghai Jiao Tong University, China. (email: lihuaxin003@sjtu.edu.cn)

Two Birds with One Stone: Two-Factor Authentication with Security Beyond Conventional Bound (Abstract)

Ding Wang , D. Wang is with the School of Electronics Engineering and Computer Science, Peking University, Beijing 100871, P.R. China.(email:wangdingg@pku.edu.cn)

White-Box Traceable CP-ABE for Cloud Storage Service: How to Catch People Leaking Their Access Credentials Effectively (Abstract)

Jianting Ning , Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai, China, 200240 (e-mail: jtning@sjtu.edu.cn).

Towards Privacy-preserving and Practical Image-centric Social Discovery (Abstract)

Xingliang Yuan , Xingliang Yuan is with the Department of Computer Science, City University of Hong Kong, Hong Kong, China.(Email: xyuancs@gmail.com)

Hardware architecture implemented on FPGA for protecting cryptographic keys against side-channel attacks (Abstract)

Ruben Lumbiarres-Lopez , Rubén Lumbiarres-López is with Universitat Politècnica de Catalunya, 08800 Vilanova i la Geltrú.(email:ruben.lumbiarres@upc.edu)

Collective Data-Sanitization for Preventing Sensitive Information Inference Attacks in Social Networks (Abstract)

Zhipeng Cai , Department of Computer Science, Georgia State University, Atlanta, GA, 30303.(email: zcai@gsu.edu)

Security and Privacy in Decentralized Energy Trading through Multi-signatures, Blockchain and Anonymous Messaging Streams (Abstract)

Davor Svetinovic , Department of Electrical Engineering and Computer Science, Masdar Institute of Science and Technology, Abu Dhabi, UAE.

Secure Biometric-Based Authentication Scheme using Chebyshev Chaotic Map for Multi-Server Environment (Abstract)

Neeraj Kumar , Department of Computer Science and Engineering, Thapar University, Patiala, Punjab, India.(Email: neeraj.kumar@thapar.edu)

Segregating Spammers and Unsolicited Bloggers from Genuine Experts on Twitter (Abstract)

Mazhar Ali , Department of Computer Science, COMSATS Institute of Information Technology Abbottabad, Pakistan. (email: mazhar@ciit.net.pk)

Architecture Design of an Area Efficient High Speed Crypto Processor for 4G LTE (Abstract)

Nicolas Sklavos , Computer Engineering & Informatics Department, of the University of Patras, Greece.(Email: nsklavos@eid.upatras.gr)

Exploiting Social Network to Enhance Human-to-Human Infection Analysis Without Privacy Leakage (Abstract)

Kuan Zhang , Department of Electrical and Computer Engineering, University of Waterloo, Waterloo, ON, N2L 3G1, Canada (e-mail: k52zhang@uwaterloo.ca)

Privacy-preserving Friendship-based Recommender Systems (Abstract)

Qiang Tang , University of Luxembourg, Interdisciplinary Centre for Security Reliability and Trust 6 (email: tonyrhul@gmail.com)

Copker: A Cryptographic Engine against Cold-Boot Attacks (Abstract)

Jingqiang Lin , Data Assurance and Communication Security Research Center, Chinese Academy of Sciences, and also with State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences (e-mail: linjq@lois.cn).

Separable Reversible Data Hiding in Encrypted JPEG Bitstreams (Abstract)

Zhenxing Qian , School of Communication and Information Engineering, Shanghai University, 200444, China.(Email: zxqian@shu.edu.cn)

VPSearch: Achieving Verifiability for Privacy-Preserving Multi-Keyword Search over Encrypted Cloud Data (Abstract)

Zhiguo Wan , School of Computer Science and Technology, Shandong University, Jinan, China.(email: wanzhiguo@sdu.edu.cn)

Search Ranges Efficiently and Compatibly as Keywords over Encrypted Data (Abstract)

Boyang Wang , Department of Electrical and Computer Engineering, The University of Arizona, Tucson, AZ 85721. (email: boyangwang@ email.arizona.edu)

SEDA: Secure Over-The-Air Code Dissemination Protocol for the Internet of Things (Abstract)

Jun Young Kim , Department of Computer Science and Engineering, UNSW Australia, Sydney Australia.(email:jun.kim@unsw.edu.au)

The Rise of Social Botnets: Attacks and Countermeasures (Abstract)

Yanchao Zhang , Department of Electrical, Computer, and Energy Engineering, Arizona State University, Tempe, AZ 85287 (e-mail: yczhang@asu.edu)

Malware Propagations in Wireless Ad Hoc Networks (Abstract)

Bo Liu , School of Information Technology, Deakin University, Mel- bourne, Australia.(Email: bo.liu@deakin.edu.au)

Can the Common Vulnerability Scoring System be Trusted? A Bayesian Analysis (Abstract)

Ulrik Franke , SICS – the Swedish Institute of Computer Science, Isafjordsgatan 22, SE-164 40 Kista, Sweden.(Email: ulrik.franke@sics.se)

Secure and Efficient Initialization and Authentication Protocols for SHIELD (Abstract)

Chenglu Jin , Department of Electrical and Computer Engineering, University of Connecticut, Storrs, CT, 06269.(email:chenglu.jin@uconn.edu)

Stochastic model checking for predicting component failures and service availability (Abstract)

Michele Sevegnani , School of Computing Science, University of Glasgow, Glasgow, G12 8RZ, UK.(email:michele.sevegnanig@glasgow.ac.uk)

SADI: A Novel Model to Study the Propagation of Social Worms in Hierarchical Networks (Abstract)

Yang Xiang , Beijing Key Laboratory of Network Technology, Beihang University, Beijing, China, 100191 (e-mail: yang@deakin.edu.au).

Advancing the State-of-the-Art in Hardware Trojans Detection (Abstract)

Syed Kamran Haider , Department of Electrical and Computer Engineering, University of Connecticut, Storrs, CT, 06279.(email:syed.haider@uconn.edu)

Refinement-based Specification and Security Analysis of Separation Kernels (Abstract)

Yongwang Zhao , School of Computer Science and Engineering, Beihang Univerisity, Beijing, China (e-mail: zhaoyw@buaa.edu.cn).

AccConF: An Access Control Framework for Leveraging In-network Cached Data in the ICN-Enabled Wireless Edge (Abstract)

Reza Tourani , Computer Science Department, New Mexico State University, Las Cruces, New Mexico (e-mail: rtourani@cs.nmsu.edu).

Design and Implementation of SecPod, A Framework for Virtualization-based Security Systems (Abstract)

Xiaoguang Wang , Department of Computer Science, Xi’an Jiaotong University, Xi’an, 710049 China (e-mail: xiaoguang@stu.xjtu.edu.cn)

Privacy-Aware Caching in Information-Centric Networking (Abstract)

Gene Tsudik , Department of Computer Science, University of California, Irvine, CA, 92697.
Christopher Wood , Department of Computer Science, University of California, Irvine, CA, 92697.

Social fingerprinting: detection of spambot groups through DNA-inspired behavioral modeling (Abstract)

Angelo Spognardi , DTU Compute, Technical University of Denmark, and the Institute of Informatics and Telematics, IIT-CNR, Italy.

On the Soundness and Security of Privacy-Preserving SVM for Outsourcing Data Classification (Abstract)

Youwen Zhu , Collaborative Innovation Center of Novel Software Technology and Industrialization, Nanjing 210023, China, and Guangxi Key Laboratory of Trusted Software, Guilin University of Electronic Technology, Guilin 541004, China.

Security Pricing as Enabler of Cyber-Insurance A First Look at Differentiated Pricing Markets (Abstract)

Ranjan Pal , Department of Computer Science, University of Southern California, CA, USA. (e-mail: rpal@usc.edu)

FastGeo: Efficient Geometric Range Queries on Encrypted Spatial Data (Abstract)

Boyang Wang , Department of Electrical and Computer Engineering, The University of Arizona, Tucson, AZ 85721.(email:boyangwang@email.arizona.edu)

Investigating the Multi-Ciphersuite and Backwards-Compatibility Security of the Upcoming TLS 1.3 (Abstract)

Xiao Lan , State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100093, China (e-mail: lanxiao@iie.ac.cn)

Exact Inference Techniques for the Analysis of Bayesian Attack Graphs (PDF)

Luis Munoz-Gonzalez , Department of Computing at Imperial College London, 180 Queen’s Gate, SW7 2AZ, London, UK.(email:l.munoz@imperial.ac.uk

On the Security of a Variant of ElGamal Encryption Scheme (Abstract)

Fang-Yu Rao , Department of Computer Science,West Lafayette,Indiana, IN, 47907.(email:raof@purdue.edu)

Optimal Spot-Checking for Collusion Tolerance in Computer Grids (Abstract)

Gregory Levitin , Collaborative Autonomic Computing Laboratory, School of Computer Science, University of Electronic Science and Technology of China, and with The Israel Electric Corporation, P. O. Box 10, Haifa 31000, Israel.(email:levitin@iec.co.il)

Cryptographic Solutions for Credibility and Liability Issues of Genomic Data (Abstract)

Erman Ayday , Computer Engineering Department, Bilkent University, Ankara, Turkey (e-mail: erman@cs.bilkent.edu.tr).

Fault-Tolerant Adaptive Routing in Dragonfly Networks (Abstract)

Dong Xiang , School of Software, Tsinghua University, Beijing 100084, China.

Privacy-Preserving Multi-keyword Top-k Similarity Search Over Encrypted Data (Abstract)

Hai Jin , Services Computing Technology and System Lab, Cluster and Grid Computing Lab, the School of Computer Science and Technology, Huazhong University of Science and Technology, Wuhan 430074, China (e-mail: hjin@hust.edu.cn).

Social Network De-Anonymization and Privacy Inference with Knowledge Graph Model (Abstract)

Jianwei Qian , Department of Computer Science, Illinois Institute of Technology, Chicago, IL 60616 USA (e-mail: jqian15@hawk.iit.edu)

Anonymization of Sensitive Quasi-Identifiers for l-diversity and t-closeness (Abstract)

Yuichi Sei , University of Electro- Communications, Tokyo 182-8585, Japan (e-mail: seiuny@uec.ac.jp).

Yes, Machine Learning Can Be More Secure! A Case Study on Android Malware Detection (Abstract)

Battista Biggio , Dept. of Electrical and Electronic Eng., University of Cagliari, Piazza d’Armi, 09123 Cagliari, Italy.(email:battista.biggio@diee.unica.it)

Efficient Multi-Factor Authenticated Key Exchange Scheme for Mobile Communications (Abstract)

Yuting Xiao , State Key Laboratory of Information Security (SKLOIS), Institute of Information Engineering (IIE), Chinese Academy of Sciences (CAS) and School of Cyber Security, University of Chinese Academy of Sciences (e-mail: xiaoyuting@iie.ac.cn)

A Markov Random Field Framework for Modeling Malware Propagation in Complex Communications Networks (Abstract)

Vasileios Karyotis , NETMODE Lab of the School of Electrical & Computer Engineering, National Technical University of Athens (NTUA), Zografou, 15780, Greece. (e-mail: vassilis@netmode.ntua.gr).

RAW-Tag: Replicating in Altered Cache Ways for Correcting Multiple-Bit Errors in Tag Array (Abstract)

Hamed Farbeh , Department of Computer Engineering, Sharif University of Technology, Tehran 11155-11365, Iran (e-mail: miremadi@sharif.edu).

Efficient Delegated Private Set Intersection on Outsourced Private Datasets (Abstract)

Changyu Dong , School of Computing Science, Newcastle University, Newcastle Upon Tyne, UK ( email: changyu.dong@newcastle.ac.uk).

De-SAG: On the De-anonymization of Structure-Attribute Graph Data (Abstract)

Shouling Ji , College of Computer Science and Technology, Zhejiang University, Hangzhou, Zhejiang 310027, China (E-mail: sji@zju.edu.cn)

A Privacy Mechanism for Access Controlled Graph Data (Abstract)

Muhammad U. Arshad , School of Electrical and Computer Engineering, Purdue University, and Center for Education and Research in Information Assurance and Security (CERIAS) (e-mail: marshad@purdue.edu).

Empirical Analysis and Validation of Security Alerts Filtering Techniques (Abstract)

Antonio Pecchia , Dipartimento di Ingegneria Elettrica e Tecnologie dell’Informazione (DIETI), Universit`a degli Studi di Napoli Federico II, via Claudio 21, 80125, Napoli, Italy.(email:antonio.pecchiag@unina.it)

AP-PRE: Autonomous Path Proxy Re-encryption and Its Application (Abstract)

Hongbing Wang , School of Computer Science, Fudan University, Shanghai, China.(email:wanghongbing@fudan.edu.cn)

Privacy-Preserving Fine-Grained Data Retrieval Schemes For Mobile Social Networks (Abstract)

Mohamed Mahmoud , Department of Electrical & Computer Engineering, Tennessee Tech University, Cookeville, TN 38505 USA.(email:mmahmoud@tntech.edu)

Efficient Nonprofiling 2nd-Order Power Analysis on Masked Devices Utilizing Multiple Leakage Points (Abstract)

Liwei Zhang , Department of Mathematics, Northeastern University, Boston, MA, 02115. (e-mail: zhang.liw@husky.neu.edu)
Aidong Adam Ding , Department of Mathematics, Northeastern University, Boston, MA, 02115. (e-mail: a.ding@neu.edu)
Yunsi Fei , Department of Electrical and Computer Engineering, Northeastern University, Boston, MA, 02115. (e-mail: yfei@ece.neu.edu)
Pei Luo , Department of Electrical and Computer Engineering, Northeastern University, Boston, MA, 02115. (e-mail: silenceluo@gmail.com)

Multitenant Access Control for Cloud-Aware Distributed Filesystems (Abstract)

Giorgos Kappes , Department of Computer Science and Engineering, University of Ioannina, Ioannina, Ioannina Greece (e-mail: gkappes@cs.uoi.gr)
Andromachi Hatzieleftheriou , Systems and Networking, Microsoft Research Ltd, 10438 Cambridge, Cambridgeshire United Kingdom of Great Britain and Northern Ireland (e-mail: ahatziel@cs.uoi.gr)
V. Stergios Anastasiadis , Department of Computer Science and Engineering, University of Ioannina, Ioannina, Ioannina Greece (e-mail: stergios@cs.uoi.gr)

Di-PriDA: Differentially Private Distributed Load Balancing Control for the Smart Grid (Abstract)

Xiaojing Liao , Computer Science, College of William and Mary, 8604 Williamsburg, Virginia United States (e-mail: xiaojing@wm.edu)
Preethi Srinivasan , Electrical and Computer Engineering, Georgia Institute of Technology, Atlanta, Georgia United States (e-mail: preethisrinivasan@gatech.edu)
David Formby , Electrical and Computer Engineering, Georgia Institute of Technology, Atlanta, Georgia United States (e-mail: djformby@gatech.edu)
A. Raheem Beyah , ECE, Georgia Tech, Atlanta, Georgia United States 30318 (e-mail: rbeyah@ece.gatech.edu)

Emerging-Image Motion CAPTCHAs: Vulnerabilities of Existing Designs, and Countermeasures (Abstract)

Song Gao , Software Engineer, Google Inc, 93176 Mountain View, California United States (e-mail: gaos@uab.edu)
Manar Mohamed , Computer & Information Sciences, Temple University, 6558 Philadelphia, Pennsylvania United States (e-mail: manar.kasem.mohamed@temple.edu)
Nitesh Saxena , Department of Computer and Information Sciences, University of Alabama at Birmingham, Birmingham, Alabama United States (e-mail: saxena@uab.edu)
Chengcui Zhang , Department of Computer and Information Sciences, University of Alabama at Birmingham, Birmingham, Alabama United States (e-mail: czhang02@uab.edu)

Supersingular Isogeny Diffie-Hellman Key Exchange on 64-bit ARM (Abstract)

Amir Jalali , Computer and Electrical Engineering and Computer Science, Florida Atlantic University, 1782 Boca Raton, Florida United States (e-mail: ajalali2016@fau.edu)
Reza Azarderakhsh , Computer and Electrical Engineering and Computer Science, Florida Atlantic University, 1782 Boca Raton, Florida United States (e-mail: razarderakhsh@fau.edu)
Mehran Mozaffari Kermani , Electrical and Microelectronic Engineering, Rochester Institute of Technology, Rochester, New York United States 14623 (e-mail: mmkeme@rit.edu)
Daivd Jao , Mathematics, University of Waterloo, 8430 Waterloo, Ontario Canada (e-mail: djao@uwaterloo.ca)

A Novel Security Protocol Attack Detection Logic with Unique Fault Discovery Capability for Freshness Attacks and Interleaving Session Attacks (Abstract)

Anca Jurcut , Electronic & Computer Engineering, University of Limerick, Limerick, Limerick Ireland (e-mail: ancadeliajurcut@gmail.com)
Tom Coffey , Electronic and Computer Engineering, University of Limerick, Limerick, Limerick Ireland (e-mail: tom.coffey@ul.ie)
Reiner Dojen , Faculty od Science & Engineering, Department of Electronic and Computer Engineering, University of Limerick, Limerick, Limerick Ireland (e-mail: reiner.dojen@ul.ie)

Brew: A Security Policy Analysis Framework for Distributed SDN-Based Cloud Environments (Abstract)

Sandeep Pisharody , CIDSE, Arizona State University, 7864 Tempe, Arizona United States 85281 (e-mail: spishar1@asu.edu)
Janakarajan Natarajan , CIDSE, Arizona State University, 7864 Tempe, Arizona United States (e-mail: jnatara1@asu.edu)
Ankur Chowdhary , CIDSE, Arizona State University Ira A Fulton Schools of Engineering, 145951 Tempe, Arizona United States 85287-9309 (e-mail: achaud16@asu.edu)
Abdullah Alshalan , CIDSE, Arizona State University, 7864 Tempe, Arizona United States (e-mail: aalshala@asu.edu)
Dijiang Huang , Computer Science and Engineering, Arizona State University, Tempe, Arizona United States 85281 (e-mail: dijiang@asu.edu)

Block Design-based Key Agreement for Group Data Sharing in Cloud Computing (Abstract)

Jian Shen , School of Computer and Software, Nanjing University of Information Science and Technology, 71127 Nanjing, Jiangsu China 210044 (e-mail: s_shenjian@126.com)
Tianqi Zhou , School of Computer and Software, Nanjing University of Information Science & Technology, Nanjing, Jiangsu China (e-mail: tq_zhou@126.com)
Debiao He , State Key Lab of Software Engineering, Wuhan University, Wuhan, HuBei China 430072 (e-mail: hedebiao@163.com)
Yuexin Zhang , School of Information Technology, Deakin University, Melbourne, Victoria Australia (e-mail: yuexinz@deakin.edu.au)
Xingming Sun , College of Computer and Software, Nanjing University of Information Science & Technology, Nanjing, Jiangsu Province China (e-mail: sunnudt@163.com)
Yang Xiang , School of Information Technology, Deakin University, Burwood, Victoria Australia (e-mail: yang@deakin.edu.au)

Relating Extra Connectivity and Extra Conditional Diagnosability in Regular Networks (Abstract)

Limei Lin , Faculty of Computer Science and Information Technology, Fujian Agriculture and Forestry University, 12449 Fuzhou, Fujian China (e-mail: putianlinlimei@163.com)
Li Xu , School of Mathematics and Computer Science, Fujian Normal University, Fuzhou, Fujian China (e-mail: xuli@fjnu.edu.cn)
Riqing Chen , aculty of Computer Science and Information Technology, Fujian Agriculture and Forestry University, 12449 Fuzhou, Fujian China 350002 (e-mail: riqing.chen@fafu.edu.cn)
Sun-Yuan Hsieh , Computer Science and Information Engineering, National Cheng Kung University, Tainan, Taiwan Taiwan Taiwan 70101 (e-mail: hsiehsy@mail.ncku.edu.tw)
Dajin Wang , Department of Computer Science, Montclair State University, Upper Montclair, New Jersey United States 07043 (e-mail: wangd@mail.montclair.edu)

A Logical Key Hierarchy Based approach to preserve content privacy in Decentralized Online Social Networks (Abstract)

Andrea De Salve , Department of Computer Science, Universita degli Studi di Pisa, 9310 Pisa, Pisa Italy 56100 (e-mail: andreadesalve@gmail.com)
Roberto Di Pietro , Cyber Security Research, Bell Labs, Paris, Paris France (e-mail: roberto.di_pietro@alcatel-lucent.com)
Paolo Mori , Istituto di Informatica e Telematica, IIT-CNR, Pisa, Pisa Italy (e-mail: paolo.mori@iit.cnr.it)
Laura Ricci , Department of Computer Science, Universita degli Studi di Pisa, 9310 Pisa, Toscana Italy (e-mail: laura.ricci@unipi.it)

Lightweight Sharable and Traceable Secure Mobile Health System (Abstract)

Yang Yang , College of Mathematics and Computer Science, Fuzhou University, Fuzhou, Fujian Province China (e-mail: yang.yang.research@gmail.com)
Ximeng Liu , SCHOOL OF INFORMATION SYSTEMS, Singapore Management University, Singapore, Singapore Singapore (e-mail: snbnix@gmail.com)
Robert H. Deng , School of Information Systems, Singapore Management University, Singapore, Singapore Singapore (e-mail: robertdeng@smu.edu.sg)
Yingjiu Li , School of Information Systems, Singapore Management University, Singapore, Singapore Singapore 178902 (e-mail: yjli@smu.edu.sg)

Adaptive Compiler Strategies for Mitigating Timing Side Channel Attacks (Abstract)

Jeroen Van Cleemput , Computer Systems Lab, Ghent University, Gent, Oost-Vlaanderen Belgium (e-mail: jeroen.ugent@gmail.com)
Bjorn De Sutter , Electronics and Information Systems, Ghent University, Gent, Oost-Vlaanderen Belgium 9052 (e-mail: bjorn.desutter@ugent.be)
Koen De Bosschere , Electronics and Information Systems, Ghent University, Gent, Oost-Vlaanderen Belgium (e-mail: Koen.DeBosschere@UGent.be)

Rollback Mechanisms for Cloud Management APIs using AI planning (Abstract)

Suhrid Satyal , Architecture and Analytics Platforms, Data61, CSIRO, Eveleigh, New South Wales Australia 2015 (e-mail: suhridsatyal@gmail.com)
Ingo Weber , Architecture and Analytics Platforms, Data61, CSIRO, Eveleigh, New South Wales Australia (e-mail: Ingo.Weber@nicta.com.au)
Len Bass , -, Carnegie Mellon University, 6612 Pittsburgh, Pennsylvania United States (e-mail: len.bass@gmail.com)
Min Fu , Department of Computing, Macquarie University, Sydney, New South Wales Australia (e-mail: Min.Fu@nicta.com.au)

Secure Inter-domain Forwarding Loop Test in Software Defined Networks (Abstract)

Yuan Zhang , Computer Science and Technology, Nanjing University, Nanjing, Jiangsu China (e-mail: zhangyuan05@gmail.com)
Boyu Zhu , Computer Science and Technology, Nanjing University, 12581 Nanjing, Jiangsu China (e-mail: zoeleeeeeeee@gmail.com)
Yixin Fang , CST, Nanjing University, Nanjing, Jiangsu China (e-mail: star.fang1990@gmail.com)
Suxin Guo , Computer Science and Engineering, University at Buffalo, Buffalo, New York United States (e-mail: suxinguo@buffalo.edu)
Aidong Zhang , Computer Science and Engineering, State University of New York at Buffalo, Buffalo, New York United States 14260-2000 (e-mail: azhang@buffalo.edu)
Sheng Zhong , CST, Nanjing University, Nanjing, Jiangsu China (e-mail: zhongsheng@nju.edu.cn)

An Immunization Framework for Social Networks through Big Data Based Influence Modeling (Abstract)

Sancheng Peng , School of Informatics, Guangdong University of Foreign Studies, 12385 Guangzhou, Guangdong China (e-mail: psc346@aliyun.com)
Guojun Wang , Department of Computer Science, School of Information Science and Engineering, Changsha, Hunan Province China (e-mail: csgjwang@gmail.com)
Yongmei Zhou , Software Engineering, Guangdong University of Foreign Studies, 12385 Guangzhou, Guangdong China (e-mail: yongmeizhou@163.com)
Cong Wan , school of computer and communication Engineering, Northeastern University - Qinhuangdao Campus, 74749 Qinhuangdao, Hebei China 066004 (e-mail: 10000cong@163.com)
Cong Wang , School of Computer and Communication Engineering, Northeastern University - Qinhuangdao Campus, 74749 Qinhuangdao, Hebei China 066004 (e-mail: congw@neuq.edu.cn)
Shui Yu , School of Information Technology, Deakin University, Burwood, Victoria Australia (e-mail: syu@deakin.edu.au)

Sensitivity Analysis for Non-Interactive Differential Privacy: Bounds and Efficient Algorithms (Abstract)

Ali Inan , Computer Engineering, Adana Bilim ve Teknoloji Universitesi, 365074 Adana, Adana Turkey 01180 (e-mail: inanxali@gmail.com)
Mehmet Emre Gursoy , Computer Science, Georgia Institute of Technology, Atlanta, Georgia United States (e-mail: memregursoy@gatech.edu)
Yucel Saygin , Computer Engineering, Sabanci University, Orhanli, 81474, Tuzla Turkey 34956 (e-mail: ysaygin@sabanciuniv.edu)

Resiliency of HPC Interconnects: A Case Study of Interconnect Failures and Recovery in Blue Waters (Abstract)

Saurabh Jha , Computer Science, University of Illinois at Urbana-Champaign, 14589 Urbana, Illinois United States 61801-3028 (e-mail: sjha8@illinois.edu)
Valerio Formicola , Electrical and Computer Engineering, University of Illinois at Urbana-Champaign, 14589 Urbana, Illinois United States 61801 (e-mail: valeform@illinois.edu)
Catello Di Martino , NAACS, Alcatel-Lucent Bell Labs, 5676 New Providence, New Jersey United States 07974 (e-mail: lelio.di_martino@nokia-bell-labs.com)
Mark Dalton , System Management, Cray Inc, Seattle, Minnesota United States (e-mail: markwdalton@gmail.com)
William T. Kramer , National Center for Supercomputing Applicaons, University of Illinois Urbana Champaign, Urbana, Illinois United States 61901 (e-mail: wtkramer@illinois.edu)
Zbigniew Kalbarczyk , Coordinated Science Laboratory, Center for Reliable and High-Performance Computing, Urbana, Illinois United States 61801 (e-mail: kalbarcz@illinois.edu)
Ravishankar K. Iyer , Coordinated Science Laboratory, University of Illinois, Urbana, Illinois United States 61801 (e-mail: rkiyer@illinois.edu)

TaintMan: an ART-Compatible Dynamic Taint Analysis Framework on Unmodified and Non-Rooted Android Devices (Abstract)

Wei You , School of Information, Renmin University of China, Beijing, Beijing China (e-mail: youwei@ruc.edu.cn)
Bin Liang , School of Information, Renmin University of China, 12471 Beijing, BEIJING China (e-mail: liangb@ruc.edu.cn)
Wenchang Shi , School of Information, Remin University of China, Beijing, Beijing China (e-mail: wenchang@ruc.edu.cn)
Peng Wang , School of Information, Renmin University of China, 12471 Beijing, BEIJING China (e-mail: pengwang@ruc.edu.cn)
Xiangyu Zhang , Computer Science, Purdue University, West Lafayette, Indiana United States 47907 (e-mail: xyzhang@cs.purdue.edu)

EC2: Ensemble Clustering and Classification for Predicting Android Malware Families (Abstract)

Tanmoy Chakraborty , Dept of Computer Science, University of Maryland at College Park, 1068 College Park, Maryland United States (e-mail: tanchak@umiacs.umd.edu)
Fabio Pierazzi , Computer Engineering, University of Modena and Reggio Emilia, Modena, Modena Italy 41125 (e-mail: fabio.pierazzi@unimore.it)
V. S. Subrahmanian , Computer Science, Dartmouth College, Hanover, New Hampshire United States (e-mail: vs@cs.umd.edu)

Detection of Repackaged Android Malware with Code-Heterogeneity Features (Abstract)

Ke Tian , Computer Science, Virginia Polytechnic Institute and State University, 1757 Blacksburg, Virginia United States 24061-0131 (e-mail: ketian@vt.edu)
Danfeng (Daphne) Yao , Computer Science`, Virginia Tech, Blacksburg, Virginia United States 24060 (e-mail: danfeng@vt.edu)
Barbara G. Ryder , Computer Science, Virginia Tech, Blacksburg, Virginia United States 24061 (e-mail: ryder@cs.vt.edu)
G. Tan , Computer Science and Engineering, Pennsylvania State University, 8082 University Park, Pennsylvania United States (e-mail: gtan@cse.psu.edu)
Guojun Peng , Computer Science, Wuhan University, 12390 Wuhan, Hubei China (e-mail: guojpeng@vt.edu)

How to Fillet a Penguin: Runtime Data Driven Partitioning of Linux Code (Abstract)

Oliver Schwahn , Computer Science, Technische Universitat Darmstadt, 26536 Darmstadt, Hessen Germany 64289 (e-mail: os@cs.tu-darmstadt.de)
Stefan Winter , DEEDS, TU Darmstadt, Darmstadt, Hessen Germany (e-mail: sw@cs.tu-darmstadt.de)
Nicolas Coppik , DEEDS Group, TU Darmstadt, Darmstadt, Hesse Germany 64289 (e-mail: nc@cs.tu-darmstadt.de)
Neeraj Suri , Dept. of Computer Science, TU Darmstadt, Darmstadt, Hessen Germany (e-mail: suri@cs.tu-darmstadt.de)

A Security Analysis and Revised Security Extension for the Precision Time Protocol (Abstract)

Eyal Itkin , School of Computer Science, Tel Aviv University, Ramat Aviv, Israel Israel (e-mail: eyalit@post.tau.ac.il)
Avishai Wool , School of Electrical Engineering Systems, Tel Aviv University, Ramat Aviv, Israel Israel 69978 (e-mail: yash@eng.tau.ac.il)

Wormhole: The Hidden Virus Propagation Power of a Search Engine in Social Networks (Abstract)

Cai Fu , Computer School, Huazhong University of Science and Technology, Wuhan, China, 430074
Xiao-Yang Liu , Computer School, Shanghai Jiao Tong University, Shanghai, China, 200240, and Electrical Engineering Department, Columbia University, New York, NY, USA 10027
Jia Yang , Computer School, Huazhong University of Science and Technology, Wuhan, China, 430074
Laurence T. Yang , Computer School, Huazhong University of Science and Technology, Wuhan, China, 430074, and Department of Computer Science. St. Francis Xavier University, Antigonish, Canada, NS, B2G 2W5
Shui Yu , Information Technology School, Deakin University, Burwood, Victoria, Australia, 3125
Tianqing Zhu , Information Technology School, Deakin University, Burwood, Victoria, Australia, 3125

Real-time multistep attack prediction based on Hidden Markov Models (Abstract)

Pilar Holgado , DIT, Universidad Politecnica de Madrid, 16771 Madrid, Madrid Spain 28040 (e-mail: pilarholgado@dit.upm.es)
VICTOR A. VILLAGRA , DIT, Technical University of Madrid - UPM, Madrid, Madrid Spain (e-mail: villagra@dit.upm.es)
Luis Vazquez , DIT, Universidad Politecnica de Madrid, 16771 Madrid, Comunidad de Madrid Spain (e-mail: lvazquez@dit.upm.es)

Secure outsourcing SIFT: Efficient and Privacy-preserving Image Feature Extraction in the Encrypted Domain (Abstract)

Linzhi Jiang , School of Computer Science and Engineering, University of Electronic Science and Technology of China - Qingshuihe Campus, 272021 Chengdu, Sichuan China (e-mail: linzjiang@hotmail.com)
Chunxiang Xu , School of Computer Science and Engineering, University of Electronic Science and Technology of China - Qingshuihe Campus, 272021 Chengdu, Sichuan China (e-mail: linzhij1988@163.com)
Xiaofang Wang , School of Telecommunications Engineering, Xidian University, 47905 Xian, Shaanxi China (e-mail: qizi19801980@163.com)
Bo Luo , EECS, The University of Kansas, Lawrence, Kansas United States (e-mail: bluo@ku.edu)
Huaqun Wang , School of Computer Science and Engineering, Nanjing University of Posts and Telecommunications, 12577 Nanjing, Jiangsu China (e-mail: asusjiang@gmail.com)

Strong stationary times and its use in cryptography (Abstract)

Pawel Lorek , Faculty of Mathematics and Computer Science, Wrocław University, Wrocław, Dolnoslaskie Poland (e-mail: Pawel.Lorek@math.uni.wroc.pl)
Filip Zagorski , Katedra Informatyki, Politechnika Wroclawska Wydzial Podstawowych Problemow Techniki, 414290 Wroclaw, dolnoslaskie Poland (e-mail: filip.zagorski@gmail.com)
Michal Kulis , Faculty of Mathematics and Computer Science, Politechnika Wroclawska, 49567 Wroclaw, dolnoslaskie Poland (e-mail: svenuto9@gmail.com)

Message Integrity Protection over Wireless Channel: Countering Signal Cancellation via Channel Randomization (Abstract)

Yanjun Pan , ECE, University of Arizona, Tucson, Arizona United States (e-mail: yanjunpan@email.arizona.edu)
Yantian Hou , Computer Science, Boise State University, 1791 Boise, Idaho United States (e-mail: yantianhou@boisestate.edu)
Ming Li , ECE, University of Arizona, Tucson, Arizona United States 85721 (e-mail: lim@email.arizona.edu)
Ryan M. Gerdes , ECE, Virginia Polytechnic Institute and State University, Blacksburg, Virginia United States (e-mail: rgerdes@vt.edu)
Kai Zeng , ECE, George Mason University, Fairfax, Virginia United States 22030 (e-mail: kzeng2@gmu.edu)
Md. A. Towfiq , ECE, Utah State University, 4606 Logan, Utah United States (e-mail: aztowfiq@aggiemail.usu.edu)
Bedri A. Cetiner , ECE, Utah State University, 4606 Logan, Utah United States (e-mail: bedri.cetiner@usu.edu)

Challenge-Response Authentication using In-Air Handwriting Style Verification (Abstract)

Jing Tian , Computer Science and Engineering, University of South Carolina, 2629 Columbia, South Carolina United States 29208-0001 (e-mail: tian9@email.sc.edu)
Yu Cao , Computer Science and Engineering, University of South Carolina, 2629 Columbia, South Carolina United States (e-mail: math_yu_cao@hotmail.com)
Wenyuan Xu , Dept. of CSE, University of South Carolina, Columbia, South Carolina United States (e-mail: wyxu@cse.sc.edu)
Song Wang , Computer Science and Engineering, University of South Carolina, Columbia, South Carolina United States 29208 (e-mail: songwang@cec.sc.edu)

Privacy-Aware and Efficient Mobile Crowdsensing with Truth Discovery (Abstract)

Yifeng Zheng , Computer Science, City University of Hong Kong, 53025 Kowloon, Hong Kong Hong Kong (e-mail: yifeng.zheng@my.cityu.edu.hk)
Huayi Duan , Computer Science, City University of Hong Kong, 53025 Kowloon, Hong Kong Hong Kong (e-mail: hduan2-c@my.cityu.edu.hk)
Xingliang Yuan , Faculty of Information Technology, Monash University, Melbourne, Victoria Australia (e-mail: xingliang.yuan@monash.edu)
Cong Wang , Computer Science, City University of Hong Kong, Hong Kong, Hong Kong Hong Kong (e-mail: congwang@cityu.edu.hk)

Markov Regenerative Models of WebServers for Their User-Perceived Availability and Bottlenecks (Abstract)

Zheng Zheng , Automation Science and Electrical Engineering, Beihang university, Beijing, Beijing China (e-mail: zhengz@buaa.edu.cn)
Kishor S. Trivedi , Department of Electrical and Computer Engineering, Duke University, Durham, North Carolina United States (e-mail: wangnangg@gmail.com)
Nan Wang , Department of Electrical and Computer Engineering, Duke University, Durham, North Carolina United States (e-mail: ktrivedi@duke.edu)
Kun Qiu , Automation Science and Electrical Engineering, Beihang university, Beijing, Beijing China (e-mail: qiukun@buaa.edu.cn)

Group Signatures with Time-bound Keys Revisited: A New Model, an Efficient Construction, and its Implementation (Abstract)

Keita Emura , Security Fundamentals Laboratory, National Institute of Information and Communications Technology, Koganei, Tokyo Japan (e-mail: keita.emura@gmail.com)
Takuya Hayashi , Department of Electrical and Electric Engineering, Kobe University, Rokko-dai, Kobe Japan (e-mail: t-hayashi@eedept.kobe-u.ac.jp)
Ai Ishida , Department of Mathematical and Computing Sciences, Tokyo Institute of Technology, Meguro-ku, Tokyo Japan (e-mail: ishida0@is.titech.ac.jp)

Privacy Leakage via De-anonymization and Aggregation in Heterogeneous Social Networks (Abstract)

Huaxin Li , Computer Science & Engineering, Shanghai Jiao Tong University, Shanghai, Shanghai China (e-mail: lihuaxin003@sjtu.edu.cn)
Qingrong Chen , Computer Science and Engineering, Shanghai Jiao Tong University, 12474 Shanghai, shanghai China (e-mail: chenqingrong@sjtu.edu.cn)
Haojin Zhu , Computer Science & Engineering, Shanghai Jiao Tong University, shanghai, ShangHai China (e-mail: zhu-hj@cs.sjtu.edu.cn)
Di Ma , Computer and Information Sciences, University of Michigan-Dearborn, Dearborn, Michigan United States (e-mail: dmadma@umich.edu)
Hong Wen , National Key Laboratory of Science and Technology on Communications, University of Electronic Science and Technology of China, Chengdu, Sichuan China (e-mail: sunlike@uestc.edu.cn)
Xuemin Sherman Shen , Department of Electrical and Computer Engineering, University of Waterloo, Waterloo, Ontario Canada (e-mail: sshen@uwaterloo.ca)

Authenticated Outlier Mining for Outsourced Databases (Abstract)

Boxiang Dong , Computer Science, Montclair State University, 8087 Montclair, New Jersey United States (e-mail: bdong@stevens.edu)
Hui Wendy Wang , Computer Science, Stevens Institute of Technology, Hoboken, New Jersey United States (e-mail: hui.wang@stevens.edu)
Anna Monreale , Computer Science, University of Pisa, Pisa, PI Italy (e-mail: annam@di.unipi.it)
Dino Pedreschi , Dipartimento di Informatica, Universita di Pisa, Pisa, PI Italy 56127 (e-mail: pedre@di.unipi.it)
Fosca Giannotti , Istituto di Scienza e Tecnologie dell'Informazione, CNR, Pisa, Pisa Italy 56124 (e-mail: fosca.giannotti@isti.cnr.it)
Wenge Guo , Department of Mathematical Sciences, New Jersey Institute of Technology, 5965 Newark, New Jersey United States (e-mail: wenge.guo@njit.edu)
88 ms
(Ver 3.3 (11022016))