The Community for Technology Leaders
Green Image
TABLE OF CONTENTS
ISSN: 1545-5971

Reducing Timing Side-channel Information Leakage using 3D Integration (Abstract)

Chongxi Bao , Department of Electrical and Computer Engineering, University of Maryland, College Park, MD 20742.(email:chongxi.bao@gmail.com)

End-to-End Detection of Caller ID Spoofing Attacks (Abstract)

Hossen Mustafa , Hossen Mustafa is with the University of South Carolina, Computer Science and Engineering, Columbia, South Carolina, USA. (email: mustafah@email.sc.edu)

Rmind: a Tool for Cryptographically Secure Statistical Analysis (PDF)

Dan Bogdanov , Dan Bogdanov is with the Cybernetica AS, Estonia.(Email: dan@cyber.ee)

CSC-Detector: A System to Infer Large-Scale Probing Campaigns (Abstract)

Elias Bou-Harb , Elias Bou-Harb is with the Florida Atlantic University and NCFTA Canada. (email: ebouharb@fau.edu)

Searchable Encryption over Feature-Rich Data (Abstract)

Qian Wang , Qian Wang is with the The State Key Lab of Software Engineering, School of Computer Science, Wuhan University, China. (email: qianwang@whu.edu.cn)

The g-Good-Neighbor Conditional Diagnosability of Arrangement Graphs (Abstract)

Limei Lin , Limei Lin is with the School of Mathematics and Computer Science and the Fujian Provincial Key Laboratory of Network Security and Cryptology, Fujian Normal University, Fuzhou, Fujian, 350108 P.R. China. (email: putianlinlimei@163.com)

SieveQ: A Layered BFT Protection System for Critical Services (Abstract)

Miguel Garcia , M. Garcia is with the LaSIGE, Faculdade de Ciências, Universidade de Lisboa, Portugal.(email:mhenriques@lasige.di.fc.ul.pt)

Flexible Hardware-Managed Isolated Execution: Architecture, Software Support and Applications (Abstract)

Dmitry Evtyushkin , Dmitry Evtyushkin is with the State University of New York at Binghamton, Binghamton, NY 13902, USA. (email: devtyushkin@cs.binghamton.edu)

A Provably-Secure Cross-Domain Handshake Scheme with Symptoms-Matching for Mobile Healthcare Social Network (Abstract)

Debiao He , Debiao He is with the State Key Lab of Software Engineering, Computer School, Wuhan University, Wuhan, China and the State Key Laboratory of Cryptology, Beijing, China. (email: hedebiao@163.com)

Symbolic Synthesis of Timed Models with Strict 2-Phase Fault Recovery (Abstract)

Fathiyeh Faghih , Fathiyeh Faghih is with Department of Computing and Software, McMaster University, Canada.(email:faghihef@mcmaster.ca)

Locating Faults in MANET-Hosted Software Systems (Abstract)

Petr Novotny , Department of Computing, Imperial College London

Efficient and Expressive Keyword Search Over Encrypted Data in the Cloud (Abstract)

Hui Cui , H. Cui is with the Secure Mobile Centre, Singapore Management University, Singapore.(hcui@smu.edu.sg)

On the Interplay Between Cyber and Physical Spaces for Adaptive Security (Abstract)

Christos Tsigkanos , C. Tsigkanos is with Politecnico di Milano, Italy.(email:christos.tsigkanos@polimi.it)

Real-time and Spatio-temporal Crowd-sourced Social Network Data Publishing with Differential Privacy (Abstract)

Qian Wang , Qian Wang is with The State Key Lab of Software Engineering, and School of Computer Science, Wuhan University, P. R. China.(email:qianwang@whu.edu.cn)

D2FL: Design and Implementation of Distributed Dynamic Fault Localization (Abstract)

Fanfu Zhou , F. Zhou is with the Shanghai Key Laboratory of Scalable Computing and Systems, Shanghai Jiao Tong University, Shanghai 200240, China.(email:zhoufanfu@sjtu.edu.cn)

Using Screen Brightness to Improve Security in Mobile Social Network Access (Abstract)

Meriem Guerar , M. Guerar is with the University of Sciences and Technology of Oran Mohamed Boudiaf, Algeria.(email:meriem.guerar@univ-usto.dz)

Crashing Modulus Attack on Modular Squaring for Rabin Cryptosystem (Abstract)

Masahiro Kaminaga , Masahiro Kaminaga is with the Gakuin University, 13-1, Chuo- 1, Tagajo, 985-8537, Japan.(Email: kaminaga@mail.tohoku-gakuin.ac.jp)

A Credibility Analysis System for Assessing Information on Twitter (Abstract)

Majed Alrubaian , Majed Alrubaian is with the Research Chair of Pervasive and Mobile Computing, College of Computer and Information Sciences, King Saud University, Riyadh 11543, Saudi Arabia.(Email: malrubaian.c@ksu.edu.sa)

Enhanced Secure Thresholded Data Deduplication Scheme for Cloud Storage (Abstract)

Jan Stanek , Jan Stanek is with the Faculty of Electrical Engineering, Czech Technical University in Prague, Czech Republic. (e-mail: jan.stanek@fel.cvut.cz).

ARF-Predictor: Effective Prediction of Aging-Related Failure Using Entropy (Abstract)

Pengfei Chen , P.Chen is with the Department of Computer Science and Technology, Xi’an Jiaotong University, Xi’an, China, 710049.(email:chenpengfei@outlook.com)

Privacy Leakage of Location Sharing in Mobile Social Networks: Attacks and Defense (Abstract)

Huaxin Li , Huaxin Li is with the Shanghai Jiao Tong University, China. (email: lihuaxin003@sjtu.edu.cn)

Two Birds with One Stone: Two-Factor Authentication with Security Beyond Conventional Bound (Abstract)

Ding Wang , D. Wang is with the School of Electronics Engineering and Computer Science, Peking University, Beijing 100871, P.R. China.(email:wangdingg@pku.edu.cn)

White-Box Traceable CP-ABE for Cloud Storage Service: How to Catch People Leaking Their Access Credentials Effectively (Abstract)

Jianting Ning , Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai, China, 200240 (e-mail: jtning@sjtu.edu.cn).

Towards Privacy-preserving and Practical Image-centric Social Discovery (Abstract)

Xingliang Yuan , Xingliang Yuan is with the Department of Computer Science, City University of Hong Kong, Hong Kong, China.(Email: xyuancs@gmail.com)

Hardware architecture implemented on FPGA for protecting cryptographic keys against side-channel attacks (Abstract)

Ruben Lumbiarres-Lopez , Rubén Lumbiarres-López is with Universitat Politècnica de Catalunya, 08800 Vilanova i la Geltrú.(email:ruben.lumbiarres@upc.edu)

Collective Data-Sanitization for Preventing Sensitive Information Inference Attacks in Social Networks (Abstract)

Zhipeng Cai , Department of Computer Science, Georgia State University, Atlanta, GA, 30303.(email: zcai@gsu.edu)

Security and Privacy in Decentralized Energy Trading through Multi-signatures, Blockchain and Anonymous Messaging Streams (Abstract)

Davor Svetinovic , Department of Electrical Engineering and Computer Science, Masdar Institute of Science and Technology, Abu Dhabi, UAE.

Secure Biometric-Based Authentication Scheme using Chebyshev Chaotic Map for Multi-Server Environment (Abstract)

Neeraj Kumar , Department of Computer Science and Engineering, Thapar University, Patiala, Punjab, India.(Email: neeraj.kumar@thapar.edu)

Segregating Spammers and Unsolicited Bloggers from Genuine Experts on Twitter (Abstract)

Mazhar Ali , Department of Computer Science, COMSATS Institute of Information Technology Abbottabad, Pakistan. (email: mazhar@ciit.net.pk)

Architecture Design of an Area Efficient High Speed Crypto Processor for 4G LTE (Abstract)

Nicolas Sklavos , Computer Engineering & Informatics Department, of the University of Patras, Greece.(Email: nsklavos@eid.upatras.gr)

Exploiting Social Network to Enhance Human-to-Human Infection Analysis Without Privacy Leakage (Abstract)

Kuan Zhang , Department of Electrical and Computer Engineering, University of Waterloo, Waterloo, ON, N2L 3G1, Canada (e-mail: k52zhang@uwaterloo.ca)

Privacy-preserving Friendship-based Recommender Systems (Abstract)

Qiang Tang , University of Luxembourg, Interdisciplinary Centre for Security Reliability and Trust 6 (email: tonyrhul@gmail.com)

Copker: A Cryptographic Engine against Cold-Boot Attacks (Abstract)

Jingqiang Lin , Data Assurance and Communication Security Research Center, Chinese Academy of Sciences, and also with State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences (e-mail: linjq@lois.cn).

Separable Reversible Data Hiding in Encrypted JPEG Bitstreams (Abstract)

Zhenxing Qian , School of Communication and Information Engineering, Shanghai University, 200444, China.(Email: zxqian@shu.edu.cn)

VPSearch: Achieving Verifiability for Privacy-Preserving Multi-Keyword Search over Encrypted Cloud Data (Abstract)

Zhiguo Wan , School of Computer Science and Technology, Shandong University, Jinan, China.(email: wanzhiguo@sdu.edu.cn)

Search Ranges Efficiently and Compatibly as Keywords over Encrypted Data (Abstract)

Boyang Wang , Department of Electrical and Computer Engineering, The University of Arizona, Tucson, AZ 85721. (email: boyangwang@ email.arizona.edu)

SEDA: Secure Over-The-Air Code Dissemination Protocol for the Internet of Things (Abstract)

Jun Young Kim , Department of Computer Science and Engineering, UNSW Australia, Sydney Australia.(email:jun.kim@unsw.edu.au)

The Rise of Social Botnets: Attacks and Countermeasures (Abstract)

Yanchao Zhang , Department of Electrical, Computer, and Energy Engineering, Arizona State University, Tempe, AZ 85287 (e-mail: yczhang@asu.edu)

Malware Propagations in Wireless Ad Hoc Networks (Abstract)

Bo Liu , School of Information Technology, Deakin University, Mel- bourne, Australia.(Email: bo.liu@deakin.edu.au)

Can the Common Vulnerability Scoring System be Trusted? A Bayesian Analysis (Abstract)

Ulrik Franke , SICS – the Swedish Institute of Computer Science, Isafjordsgatan 22, SE-164 40 Kista, Sweden.(Email: ulrik.franke@sics.se)

Secure and Efficient Initialization and Authentication Protocols for SHIELD (Abstract)

Chenglu Jin , Department of Electrical and Computer Engineering, University of Connecticut, Storrs, CT, 06269.(email:chenglu.jin@uconn.edu)

Stochastic model checking for predicting component failures and service availability (Abstract)

Michele Sevegnani , School of Computing Science, University of Glasgow, Glasgow, G12 8RZ, UK.(email:michele.sevegnanig@glasgow.ac.uk)

SADI: A Novel Model to Study the Propagation of Social Worms in Hierarchical Networks (Abstract)

Yang Xiang , Beijing Key Laboratory of Network Technology, Beihang University, Beijing, China, 100191 (e-mail: yang@deakin.edu.au).

Advancing the State-of-the-Art in Hardware Trojans Detection (Abstract)

Syed Kamran Haider , Department of Electrical and Computer Engineering, University of Connecticut, Storrs, CT, 06279.(email:syed.haider@uconn.edu)

Refinement-based Specification and Security Analysis of Separation Kernels (Abstract)

Yongwang Zhao , School of Computer Science and Engineering, Beihang Univerisity, Beijing, China (e-mail: zhaoyw@buaa.edu.cn).

AccConF: An Access Control Framework for Leveraging In-network Cached Data in the ICN-Enabled Wireless Edge (Abstract)

Reza Tourani , Computer Science Department, New Mexico State University, Las Cruces, New Mexico (e-mail: rtourani@cs.nmsu.edu).

Design and Implementation of SecPod, A Framework for Virtualization-based Security Systems (Abstract)

Xiaoguang Wang , Department of Computer Science, Xi’an Jiaotong University, Xi’an, 710049 China (e-mail: xiaoguang@stu.xjtu.edu.cn)

Privacy-Aware Caching in Information-Centric Networking (Abstract)

Gene Tsudik , Department of Computer Science, University of California, Irvine, CA, 92697.
Christopher Wood , Department of Computer Science, University of California, Irvine, CA, 92697.

Social fingerprinting: detection of spambot groups through DNA-inspired behavioral modeling (Abstract)

Angelo Spognardi , DTU Compute, Technical University of Denmark, and the Institute of Informatics and Telematics, IIT-CNR, Italy.

On the Soundness and Security of Privacy-Preserving SVM for Outsourcing Data Classification (Abstract)

Youwen Zhu , Collaborative Innovation Center of Novel Software Technology and Industrialization, Nanjing 210023, China, and Guangxi Key Laboratory of Trusted Software, Guilin University of Electronic Technology, Guilin 541004, China.

Security Pricing as Enabler of Cyber-Insurance A First Look at Differentiated Pricing Markets (Abstract)

Ranjan Pal , Department of Computer Science, University of Southern California, CA, USA. (e-mail: rpal@usc.edu)

FastGeo: Efficient Geometric Range Queries on Encrypted Spatial Data (Abstract)

Boyang Wang , Department of Electrical and Computer Engineering, The University of Arizona, Tucson, AZ 85721.(email:boyangwang@email.arizona.edu)

Investigating the Multi-Ciphersuite and Backwards-Compatibility Security of the Upcoming TLS 1.3 (Abstract)

Xiao Lan , State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100093, China (e-mail: lanxiao@iie.ac.cn)

Exact Inference Techniques for the Analysis of Bayesian Attack Graphs (PDF)

Luis Munoz-Gonzalez , Department of Computing at Imperial College London, 180 Queen’s Gate, SW7 2AZ, London, UK.(email:l.munoz@imperial.ac.uk

On the Security of a Variant of ElGamal Encryption Scheme (Abstract)

Fang-Yu Rao , Department of Computer Science,West Lafayette,Indiana, IN, 47907.(email:raof@purdue.edu)

Optimal Spot-Checking for Collusion Tolerance in Computer Grids (Abstract)

Gregory Levitin , Collaborative Autonomic Computing Laboratory, School of Computer Science, University of Electronic Science and Technology of China, and with The Israel Electric Corporation, P. O. Box 10, Haifa 31000, Israel.(email:levitin@iec.co.il)

Cryptographic Solutions for Credibility and Liability Issues of Genomic Data (Abstract)

Erman Ayday , Computer Engineering Department, Bilkent University, Ankara, Turkey (e-mail: erman@cs.bilkent.edu.tr).

Fault-Tolerant Adaptive Routing in Dragonfly Networks (Abstract)

Dong Xiang , School of Software, Tsinghua University, Beijing 100084, China.

Privacy-Preserving Multi-keyword Top-k Similarity Search Over Encrypted Data (Abstract)

Hai Jin , Services Computing Technology and System Lab, Cluster and Grid Computing Lab, the School of Computer Science and Technology, Huazhong University of Science and Technology, Wuhan 430074, China (e-mail: hjin@hust.edu.cn).

Social Network De-Anonymization and Privacy Inference with Knowledge Graph Model (Abstract)

Jianwei Qian , Department of Computer Science, Illinois Institute of Technology, Chicago, IL 60616 USA (e-mail: jqian15@hawk.iit.edu)

Anonymization of Sensitive Quasi-Identifiers for l-diversity and t-closeness (Abstract)

Yuichi Sei , University of Electro- Communications, Tokyo 182-8585, Japan (e-mail: seiuny@uec.ac.jp).

Yes, Machine Learning Can Be More Secure! A Case Study on Android Malware Detection (Abstract)

Battista Biggio , Dept. of Electrical and Electronic Eng., University of Cagliari, Piazza d’Armi, 09123 Cagliari, Italy.(email:battista.biggio@diee.unica.it)

Efficient Multi-Factor Authenticated Key Exchange Scheme for Mobile Communications (Abstract)

Yuting Xiao , State Key Laboratory of Information Security (SKLOIS), Institute of Information Engineering (IIE), Chinese Academy of Sciences (CAS) and School of Cyber Security, University of Chinese Academy of Sciences (e-mail: xiaoyuting@iie.ac.cn)

A Markov Random Field Framework for Modeling Malware Propagation in Complex Communications Networks (Abstract)

Vasileios Karyotis , NETMODE Lab of the School of Electrical & Computer Engineering, National Technical University of Athens (NTUA), Zografou, 15780, Greece. (e-mail: vassilis@netmode.ntua.gr).

RAW-Tag: Replicating in Altered Cache Ways for Correcting Multiple-Bit Errors in Tag Array (Abstract)

Hamed Farbeh , Department of Computer Engineering, Sharif University of Technology, Tehran 11155-11365, Iran (e-mail: miremadi@sharif.edu).

Efficient Delegated Private Set Intersection on Outsourced Private Datasets (Abstract)

Changyu Dong , School of Computing Science, Newcastle University, Newcastle Upon Tyne, UK ( email: changyu.dong@newcastle.ac.uk).

De-SAG: On the De-anonymization of Structure-Attribute Graph Data (Abstract)

Shouling Ji , College of Computer Science and Technology, Zhejiang University, Hangzhou, Zhejiang 310027, China (E-mail: sji@zju.edu.cn)

A Privacy Mechanism for Access Controlled Graph Data (Abstract)

Muhammad U. Arshad , School of Electrical and Computer Engineering, Purdue University, and Center for Education and Research in Information Assurance and Security (CERIAS) (e-mail: marshad@purdue.edu).

Empirical Analysis and Validation of Security Alerts Filtering Techniques (Abstract)

Antonio Pecchia , Dipartimento di Ingegneria Elettrica e Tecnologie dell’Informazione (DIETI), Universit`a degli Studi di Napoli Federico II, via Claudio 21, 80125, Napoli, Italy.(email:antonio.pecchiag@unina.it)

AP-PRE: Autonomous Path Proxy Re-encryption and Its Application (Abstract)

Hongbing Wang , School of Computer Science, Fudan University, Shanghai, China.(email:wanghongbing@fudan.edu.cn)

Privacy-Preserving Fine-Grained Data Retrieval Schemes For Mobile Social Networks (Abstract)

Mohamed Mahmoud , Department of Electrical & Computer Engineering, Tennessee Tech University, Cookeville, TN 38505 USA.(email:mmahmoud@tntech.edu)

Efficient Nonprofiling 2nd-Order Power Analysis on Masked Devices Utilizing Multiple Leakage Points (Abstract)

Liwei Zhang , Department of Mathematics, Northeastern University, Boston, MA, 02115. (e-mail: zhang.liw@husky.neu.edu)
Aidong Adam Ding , Department of Mathematics, Northeastern University, Boston, MA, 02115. (e-mail: a.ding@neu.edu)
Yunsi Fei , Department of Electrical and Computer Engineering, Northeastern University, Boston, MA, 02115. (e-mail: yfei@ece.neu.edu)
Pei Luo , Department of Electrical and Computer Engineering, Northeastern University, Boston, MA, 02115. (e-mail: silenceluo@gmail.com)

Multitenant Access Control for Cloud-Aware Distributed Filesystems (Abstract)

Giorgos Kappes , Department of Computer Science and Engineering, University of Ioannina, Ioannina, Ioannina Greece (e-mail: gkappes@cs.uoi.gr)
Andromachi Hatzieleftheriou , Systems and Networking, Microsoft Research Ltd, 10438 Cambridge, Cambridgeshire United Kingdom of Great Britain and Northern Ireland (e-mail: ahatziel@cs.uoi.gr)
V. Stergios Anastasiadis , Department of Computer Science and Engineering, University of Ioannina, Ioannina, Ioannina Greece (e-mail: stergios@cs.uoi.gr)

Di-PriDA: Differentially Private Distributed Load Balancing Control for the Smart Grid (Abstract)

Xiaojing Liao , Computer Science, College of William and Mary, 8604 Williamsburg, Virginia United States (e-mail: xiaojing@wm.edu)
Preethi Srinivasan , Electrical and Computer Engineering, Georgia Institute of Technology, Atlanta, Georgia United States (e-mail: preethisrinivasan@gatech.edu)
David Formby , Electrical and Computer Engineering, Georgia Institute of Technology, Atlanta, Georgia United States (e-mail: djformby@gatech.edu)
A. Raheem Beyah , ECE, Georgia Tech, Atlanta, Georgia United States 30318 (e-mail: rbeyah@ece.gatech.edu)

Emerging-Image Motion CAPTCHAs: Vulnerabilities of Existing Designs, and Countermeasures (Abstract)

Song Gao , Software Engineer, Google Inc, 93176 Mountain View, California United States (e-mail: gaos@uab.edu)
Manar Mohamed , Computer & Information Sciences, Temple University, 6558 Philadelphia, Pennsylvania United States (e-mail: manar.kasem.mohamed@temple.edu)
Nitesh Saxena , Department of Computer and Information Sciences, University of Alabama at Birmingham, Birmingham, Alabama United States (e-mail: saxena@uab.edu)
Chengcui Zhang , Department of Computer and Information Sciences, University of Alabama at Birmingham, Birmingham, Alabama United States (e-mail: czhang02@uab.edu)

Supersingular Isogeny Diffie-Hellman Key Exchange on 64-bit ARM (Abstract)

Amir Jalali , Computer and Electrical Engineering and Computer Science, Florida Atlantic University, 1782 Boca Raton, Florida United States (e-mail: ajalali2016@fau.edu)
Reza Azarderakhsh , Computer and Electrical Engineering and Computer Science, Florida Atlantic University, 1782 Boca Raton, Florida United States (e-mail: razarderakhsh@fau.edu)
Mehran Mozaffari Kermani , Electrical and Microelectronic Engineering, Rochester Institute of Technology, Rochester, New York United States 14623 (e-mail: mmkeme@rit.edu)
Daivd Jao , Mathematics, University of Waterloo, 8430 Waterloo, Ontario Canada (e-mail: djao@uwaterloo.ca)

High-Performance Memory Snapshotting for Real-Time, Consistent, Hypervisor-Based Monitors (Abstract)

Peter Klemperer , Computer Science, Mount Holyoke College, South Hadley, Massachusetts United States 01075 (e-mail: pklemper@mtholyoke.edu)
Hye Yoon Jeon , Computer Science, Mount Holyoke College, South Hadley, Massachusetts United States (e-mail: jeon22h@mtholyoke.edu)
Bryan D. Payne , Product & Application Security, Netflix Inc, Los Gatos, California United States (e-mail: bdpayne@gmail.com)
James C. Hoe , Electrical and Computer Engineering, Carnegie Mellon University, 6612 Pittsburgh, Pennsylvania United States (e-mail: jhoe@cmu.edu)

A Novel Security Protocol Attack Detection Logic with Unique Fault Discovery Capability for Freshness Attacks and Interleaving Session Attacks (Abstract)

Anca Jurcut , Electronic & Computer Engineering, University of Limerick, Limerick, Limerick Ireland (e-mail: ancadeliajurcut@gmail.com)
Tom Coffey , Electronic and Computer Engineering, University of Limerick, Limerick, Limerick Ireland (e-mail: tom.coffey@ul.ie)
Reiner Dojen , Faculty od Science & Engineering, Department of Electronic and Computer Engineering, University of Limerick, Limerick, Limerick Ireland (e-mail: reiner.dojen@ul.ie)

Brew: A Security Policy Analysis Framework for Distributed SDN-Based Cloud Environments (Abstract)

Sandeep Pisharody , CIDSE, Arizona State University, 7864 Tempe, Arizona United States 85281 (e-mail: spishar1@asu.edu)
Janakarajan Natarajan , CIDSE, Arizona State University, 7864 Tempe, Arizona United States (e-mail: jnatara1@asu.edu)
Ankur Chowdhary , CIDSE, Arizona State University Ira A Fulton Schools of Engineering, 145951 Tempe, Arizona United States 85287-9309 (e-mail: achaud16@asu.edu)
Abdullah Alshalan , CIDSE, Arizona State University, 7864 Tempe, Arizona United States (e-mail: aalshala@asu.edu)
Dijiang Huang , Computer Science and Engineering, Arizona State University, Tempe, Arizona United States 85281 (e-mail: dijiang@asu.edu)

Block Design-based Key Agreement for Group Data Sharing in Cloud Computing (Abstract)

Jian Shen , School of Computer and Software, Nanjing University of Information Science and Technology, 71127 Nanjing, Jiangsu China 210044 (e-mail: s_shenjian@126.com)
Tianqi Zhou , School of Computer and Software, Nanjing University of Information Science & Technology, Nanjing, Jiangsu China (e-mail: tq_zhou@126.com)
Debiao He , State Key Lab of Software Engineering, Wuhan University, Wuhan, HuBei China 430072 (e-mail: hedebiao@163.com)
Yuexin Zhang , School of Information Technology, Deakin University, Melbourne, Victoria Australia (e-mail: yuexinz@deakin.edu.au)
Xingming Sun , College of Computer and Software, Nanjing University of Information Science & Technology, Nanjing, Jiangsu Province China (e-mail: sunnudt@163.com)
Yang Xiang , School of Information Technology, Deakin University, Burwood, Victoria Australia (e-mail: yang@deakin.edu.au)

Relating Extra Connectivity and Extra Conditional Diagnosability in Regular Networks (Abstract)

Limei Lin , Faculty of Computer Science and Information Technology, Fujian Agriculture and Forestry University, 12449 Fuzhou, Fujian China (e-mail: putianlinlimei@163.com)
Li Xu , School of Mathematics and Computer Science, Fujian Normal University, Fuzhou, Fujian China (e-mail: xuli@fjnu.edu.cn)
Riqing Chen , aculty of Computer Science and Information Technology, Fujian Agriculture and Forestry University, 12449 Fuzhou, Fujian China 350002 (e-mail: riqing.chen@fafu.edu.cn)
Sun-Yuan Hsieh , Computer Science and Information Engineering, National Cheng Kung University, Tainan, Taiwan Taiwan Taiwan 70101 (e-mail: hsiehsy@mail.ncku.edu.tw)
Dajin Wang , Department of Computer Science, Montclair State University, Upper Montclair, New Jersey United States 07043 (e-mail: wangd@mail.montclair.edu)

A Logical Key Hierarchy Based approach to preserve content privacy in Decentralized Online Social Networks (Abstract)

Andrea De Salve , Department of Computer Science, Universita degli Studi di Pisa, 9310 Pisa, Pisa Italy 56100 (e-mail: andreadesalve@gmail.com)
Roberto Di Pietro , Cyber Security Research, Bell Labs, Paris, Paris France (e-mail: roberto.di_pietro@alcatel-lucent.com)
Paolo Mori , Istituto di Informatica e Telematica, IIT-CNR, Pisa, Pisa Italy (e-mail: paolo.mori@iit.cnr.it)
Laura Ricci , Department of Computer Science, Universita degli Studi di Pisa, 9310 Pisa, Toscana Italy (e-mail: laura.ricci@unipi.it)

Lightweight Sharable and Traceable Secure Mobile Health System (Abstract)

Yang Yang , College of Mathematics and Computer Science, Fuzhou University, Fuzhou, Fujian Province China (e-mail: yang.yang.research@gmail.com)
Ximeng Liu , SCHOOL OF INFORMATION SYSTEMS, Singapore Management University, Singapore, Singapore Singapore (e-mail: snbnix@gmail.com)
Robert H. Deng , School of Information Systems, Singapore Management University, Singapore, Singapore Singapore (e-mail: robertdeng@smu.edu.sg)
Yingjiu Li , School of Information Systems, Singapore Management University, Singapore, Singapore Singapore 178902 (e-mail: yjli@smu.edu.sg)

Adaptive Compiler Strategies for Mitigating Timing Side Channel Attacks (Abstract)

Jeroen Van Cleemput , Computer Systems Lab, Ghent University, Gent, Oost-Vlaanderen Belgium (e-mail: jeroen.ugent@gmail.com)
Bjorn De Sutter , Electronics and Information Systems, Ghent University, Gent, Oost-Vlaanderen Belgium 9052 (e-mail: bjorn.desutter@ugent.be)
Koen De Bosschere , Electronics and Information Systems, Ghent University, Gent, Oost-Vlaanderen Belgium (e-mail: Koen.DeBosschere@UGent.be)

Rollback Mechanisms for Cloud Management APIs using AI planning (Abstract)

Suhrid Satyal , Architecture and Analytics Platforms, Data61, CSIRO, Eveleigh, New South Wales Australia 2015 (e-mail: suhridsatyal@gmail.com)
Ingo Weber , Architecture and Analytics Platforms, Data61, CSIRO, Eveleigh, New South Wales Australia (e-mail: Ingo.Weber@nicta.com.au)
Len Bass , -, Carnegie Mellon University, 6612 Pittsburgh, Pennsylvania United States (e-mail: len.bass@gmail.com)
Min Fu , Department of Computing, Macquarie University, Sydney, New South Wales Australia (e-mail: Min.Fu@nicta.com.au)

Secure Inter-domain Forwarding Loop Test in Software Defined Networks (Abstract)

Yuan Zhang , Computer Science and Technology, Nanjing University, Nanjing, Jiangsu China (e-mail: zhangyuan05@gmail.com)
Boyu Zhu , Computer Science and Technology, Nanjing University, 12581 Nanjing, Jiangsu China (e-mail: zoeleeeeeeee@gmail.com)
Yixin Fang , CST, Nanjing University, Nanjing, Jiangsu China (e-mail: star.fang1990@gmail.com)
Suxin Guo , Computer Science and Engineering, University at Buffalo, Buffalo, New York United States (e-mail: suxinguo@buffalo.edu)
Aidong Zhang , Computer Science and Engineering, State University of New York at Buffalo, Buffalo, New York United States 14260-2000 (e-mail: azhang@buffalo.edu)
Sheng Zhong , CST, Nanjing University, Nanjing, Jiangsu China (e-mail: zhongsheng@nju.edu.cn)

An Immunization Framework for Social Networks through Big Data Based Influence Modeling (Abstract)

Sancheng Peng , School of Informatics, Guangdong University of Foreign Studies, 12385 Guangzhou, Guangdong China (e-mail: psc346@aliyun.com)
Guojun Wang , Department of Computer Science, School of Information Science and Engineering, Changsha, Hunan Province China (e-mail: csgjwang@gmail.com)
Yongmei Zhou , Software Engineering, Guangdong University of Foreign Studies, 12385 Guangzhou, Guangdong China (e-mail: yongmeizhou@163.com)
Cong Wan , school of computer and communication Engineering, Northeastern University - Qinhuangdao Campus, 74749 Qinhuangdao, Hebei China 066004 (e-mail: 10000cong@163.com)
Cong Wang , School of Computer and Communication Engineering, Northeastern University - Qinhuangdao Campus, 74749 Qinhuangdao, Hebei China 066004 (e-mail: congw@neuq.edu.cn)
Shui Yu , School of Information Technology, Deakin University, Burwood, Victoria Australia (e-mail: syu@deakin.edu.au)

Sensitivity Analysis for Non-Interactive Differential Privacy: Bounds and Efficient Algorithms (Abstract)

Ali Inan , Computer Engineering, Adana Bilim ve Teknoloji Universitesi, 365074 Adana, Adana Turkey 01180 (e-mail: inanxali@gmail.com)
Mehmet Emre Gursoy , Computer Science, Georgia Institute of Technology, Atlanta, Georgia United States (e-mail: memregursoy@gatech.edu)
Yucel Saygin , Computer Engineering, Sabanci University, Orhanli, 81474, Tuzla Turkey 34956 (e-mail: ysaygin@sabanciuniv.edu)

Resiliency of HPC Interconnects: A Case Study of Interconnect Failures and Recovery in Blue Waters (Abstract)

Saurabh Jha , Computer Science, University of Illinois at Urbana-Champaign, 14589 Urbana, Illinois United States 61801-3028 (e-mail: sjha8@illinois.edu)
Valerio Formicola , Electrical and Computer Engineering, University of Illinois at Urbana-Champaign, 14589 Urbana, Illinois United States 61801 (e-mail: valeform@illinois.edu)
Catello Di Martino , NAACS, Alcatel-Lucent Bell Labs, 5676 New Providence, New Jersey United States 07974 (e-mail: lelio.di_martino@nokia-bell-labs.com)
Mark Dalton , System Management, Cray Inc, Seattle, Minnesota United States (e-mail: markwdalton@gmail.com)
William T. Kramer , National Center for Supercomputing Applicaons, University of Illinois Urbana Champaign, Urbana, Illinois United States 61901 (e-mail: wtkramer@illinois.edu)
Zbigniew Kalbarczyk , Coordinated Science Laboratory, Center for Reliable and High-Performance Computing, Urbana, Illinois United States 61801 (e-mail: kalbarcz@illinois.edu)
Ravishankar K. Iyer , Coordinated Science Laboratory, University of Illinois, Urbana, Illinois United States 61801 (e-mail: rkiyer@illinois.edu)

TaintMan: an ART-Compatible Dynamic Taint Analysis Framework on Unmodified and Non-Rooted Android Devices (Abstract)

Wei You , School of Information, Renmin University of China, Beijing, Beijing China (e-mail: youwei@ruc.edu.cn)
Bin Liang , School of Information, Renmin University of China, 12471 Beijing, BEIJING China (e-mail: liangb@ruc.edu.cn)
Wenchang Shi , School of Information, Remin University of China, Beijing, Beijing China (e-mail: wenchang@ruc.edu.cn)
Peng Wang , School of Information, Renmin University of China, 12471 Beijing, BEIJING China (e-mail: pengwang@ruc.edu.cn)
Xiangyu Zhang , Computer Science, Purdue University, West Lafayette, Indiana United States 47907 (e-mail: xyzhang@cs.purdue.edu)

EC2: Ensemble Clustering and Classification for Predicting Android Malware Families (Abstract)

Tanmoy Chakraborty , Dept of Computer Science, University of Maryland at College Park, 1068 College Park, Maryland United States (e-mail: tanchak@umiacs.umd.edu)
Fabio Pierazzi , Computer Engineering, University of Modena and Reggio Emilia, Modena, Modena Italy 41125 (e-mail: fabio.pierazzi@unimore.it)
V. S. Subrahmanian , Computer Science, Dartmouth College, Hanover, New Hampshire United States (e-mail: vs@cs.umd.edu)

Detection of Repackaged Android Malware with Code-Heterogeneity Features (Abstract)

Ke Tian , Computer Science, Virginia Polytechnic Institute and State University, 1757 Blacksburg, Virginia United States 24061-0131 (e-mail: ketian@vt.edu)
Danfeng (Daphne) Yao , Computer Science`, Virginia Tech, Blacksburg, Virginia United States 24060 (e-mail: danfeng@vt.edu)
Barbara G. Ryder , Computer Science, Virginia Tech, Blacksburg, Virginia United States 24061 (e-mail: ryder@cs.vt.edu)
G. Tan , Computer Science and Engineering, Pennsylvania State University, 8082 University Park, Pennsylvania United States (e-mail: gtan@cse.psu.edu)
Guojun Peng , Computer Science, Wuhan University, 12390 Wuhan, Hubei China (e-mail: guojpeng@vt.edu)

How to Fillet a Penguin: Runtime Data Driven Partitioning of Linux Code (Abstract)

Oliver Schwahn , Computer Science, Technische Universitat Darmstadt, 26536 Darmstadt, Hessen Germany 64289 (e-mail: os@cs.tu-darmstadt.de)
Stefan Winter , DEEDS, TU Darmstadt, Darmstadt, Hessen Germany (e-mail: sw@cs.tu-darmstadt.de)
Nicolas Coppik , DEEDS Group, TU Darmstadt, Darmstadt, Hesse Germany 64289 (e-mail: nc@cs.tu-darmstadt.de)
Neeraj Suri , Dept. of Computer Science, TU Darmstadt, Darmstadt, Hessen Germany (e-mail: suri@cs.tu-darmstadt.de)

A Security Analysis and Revised Security Extension for the Precision Time Protocol (Abstract)

Eyal Itkin , School of Computer Science, Tel Aviv University, Ramat Aviv, Israel Israel (e-mail: eyalit@post.tau.ac.il)
Avishai Wool , School of Electrical Engineering Systems, Tel Aviv University, Ramat Aviv, Israel Israel 69978 (e-mail: yash@eng.tau.ac.il)

Wormhole: The Hidden Virus Propagation Power of a Search Engine in Social Networks (Abstract)

Cai Fu , Computer School, Huazhong University of Science and Technology, Wuhan, China, 430074
Xiao-Yang Liu , Computer School, Shanghai Jiao Tong University, Shanghai, China, 200240, and Electrical Engineering Department, Columbia University, New York, NY, USA 10027
Jia Yang , Computer School, Huazhong University of Science and Technology, Wuhan, China, 430074
Laurence T. Yang , Computer School, Huazhong University of Science and Technology, Wuhan, China, 430074, and Department of Computer Science. St. Francis Xavier University, Antigonish, Canada, NS, B2G 2W5
Shui Yu , Information Technology School, Deakin University, Burwood, Victoria, Australia, 3125
Tianqing Zhu , Information Technology School, Deakin University, Burwood, Victoria, Australia, 3125

Real-time multistep attack prediction based on Hidden Markov Models (Abstract)

Pilar Holgado , DIT, Universidad Politecnica de Madrid, 16771 Madrid, Madrid Spain 28040 (e-mail: pilarholgado@dit.upm.es)
VICTOR A. VILLAGRA , DIT, Technical University of Madrid - UPM, Madrid, Madrid Spain (e-mail: villagra@dit.upm.es)
Luis Vazquez , DIT, Universidad Politecnica de Madrid, 16771 Madrid, Comunidad de Madrid Spain (e-mail: lvazquez@dit.upm.es)

Secure outsourcing SIFT: Efficient and Privacy-preserving Image Feature Extraction in the Encrypted Domain (Abstract)

Linzhi Jiang , School of Computer Science and Engineering, University of Electronic Science and Technology of China - Qingshuihe Campus, 272021 Chengdu, Sichuan China (e-mail: linzjiang@hotmail.com)
Chunxiang Xu , School of Computer Science and Engineering, University of Electronic Science and Technology of China - Qingshuihe Campus, 272021 Chengdu, Sichuan China (e-mail: linzhij1988@163.com)
Xiaofang Wang , School of Telecommunications Engineering, Xidian University, 47905 Xian, Shaanxi China (e-mail: qizi19801980@163.com)
Bo Luo , EECS, The University of Kansas, Lawrence, Kansas United States (e-mail: bluo@ku.edu)
Huaqun Wang , School of Computer Science and Engineering, Nanjing University of Posts and Telecommunications, 12577 Nanjing, Jiangsu China (e-mail: asusjiang@gmail.com)

Strong stationary times and its use in cryptography (Abstract)

Pawel Lorek , Faculty of Mathematics and Computer Science, Wrocław University, Wrocław, Dolnoslaskie Poland (e-mail: Pawel.Lorek@math.uni.wroc.pl)
Filip Zagorski , Katedra Informatyki, Politechnika Wroclawska Wydzial Podstawowych Problemow Techniki, 414290 Wroclaw, dolnoslaskie Poland (e-mail: filip.zagorski@gmail.com)
Michal Kulis , Faculty of Mathematics and Computer Science, Politechnika Wroclawska, 49567 Wroclaw, dolnoslaskie Poland (e-mail: svenuto9@gmail.com)

Message Integrity Protection over Wireless Channel: Countering Signal Cancellation via Channel Randomization (Abstract)

Yanjun Pan , ECE, University of Arizona, Tucson, Arizona United States (e-mail: yanjunpan@email.arizona.edu)
Yantian Hou , Computer Science, Boise State University, 1791 Boise, Idaho United States (e-mail: yantianhou@boisestate.edu)
Ming Li , ECE, University of Arizona, Tucson, Arizona United States 85721 (e-mail: lim@email.arizona.edu)
Ryan M. Gerdes , ECE, Virginia Polytechnic Institute and State University, Blacksburg, Virginia United States (e-mail: rgerdes@vt.edu)
Kai Zeng , ECE, George Mason University, Fairfax, Virginia United States 22030 (e-mail: kzeng2@gmu.edu)
Md. A. Towfiq , ECE, Utah State University, 4606 Logan, Utah United States (e-mail: aztowfiq@aggiemail.usu.edu)
Bedri A. Cetiner , ECE, Utah State University, 4606 Logan, Utah United States (e-mail: bedri.cetiner@usu.edu)

Challenge-Response Authentication using In-Air Handwriting Style Verification (Abstract)

Jing Tian , Computer Science and Engineering, University of South Carolina, 2629 Columbia, South Carolina United States 29208-0001 (e-mail: tian9@email.sc.edu)
Yu Cao , Computer Science and Engineering, University of South Carolina, 2629 Columbia, South Carolina United States (e-mail: math_yu_cao@hotmail.com)
Wenyuan Xu , Dept. of CSE, University of South Carolina, Columbia, South Carolina United States (e-mail: wyxu@cse.sc.edu)
Song Wang , Computer Science and Engineering, University of South Carolina, Columbia, South Carolina United States 29208 (e-mail: songwang@cec.sc.edu)

Privacy-Aware and Efficient Mobile Crowdsensing with Truth Discovery (Abstract)

Yifeng Zheng , Computer Science, City University of Hong Kong, 53025 Kowloon, Hong Kong Hong Kong (e-mail: yifeng.zheng@my.cityu.edu.hk)
Huayi Duan , Computer Science, City University of Hong Kong, 53025 Kowloon, Hong Kong Hong Kong (e-mail: hduan2-c@my.cityu.edu.hk)
Xingliang Yuan , Faculty of Information Technology, Monash University, Melbourne, Victoria Australia (e-mail: xingliang.yuan@monash.edu)
Cong Wang , Computer Science, City University of Hong Kong, Hong Kong, Hong Kong Hong Kong (e-mail: congwang@cityu.edu.hk)

Markov Regenerative Models of WebServers for Their User-Perceived Availability and Bottlenecks (Abstract)

Zheng Zheng , Automation Science and Electrical Engineering, Beihang university, Beijing, Beijing China (e-mail: zhengz@buaa.edu.cn)
Kishor S. Trivedi , Department of Electrical and Computer Engineering, Duke University, Durham, North Carolina United States (e-mail: wangnangg@gmail.com)
Nan Wang , Department of Electrical and Computer Engineering, Duke University, Durham, North Carolina United States (e-mail: ktrivedi@duke.edu)
Kun Qiu , Automation Science and Electrical Engineering, Beihang university, Beijing, Beijing China (e-mail: qiukun@buaa.edu.cn)

Group Signatures with Time-bound Keys Revisited: A New Model, an Efficient Construction, and its Implementation (Abstract)

Keita Emura , Security Fundamentals Laboratory, National Institute of Information and Communications Technology, Koganei, Tokyo Japan (e-mail: keita.emura@gmail.com)
Takuya Hayashi , Department of Electrical and Electric Engineering, Kobe University, Rokko-dai, Kobe Japan (e-mail: t-hayashi@eedept.kobe-u.ac.jp)
Ai Ishida , Department of Mathematical and Computing Sciences, Tokyo Institute of Technology, Meguro-ku, Tokyo Japan (e-mail: ishida0@is.titech.ac.jp)

Privacy Leakage via De-anonymization and Aggregation in Heterogeneous Social Networks (Abstract)

Huaxin Li , Computer Science & Engineering, Shanghai Jiao Tong University, Shanghai, Shanghai China (e-mail: lihuaxin003@sjtu.edu.cn)
Qingrong Chen , Computer Science and Engineering, Shanghai Jiao Tong University, 12474 Shanghai, shanghai China (e-mail: chenqingrong@sjtu.edu.cn)
Haojin Zhu , Computer Science & Engineering, Shanghai Jiao Tong University, shanghai, ShangHai China (e-mail: zhu-hj@cs.sjtu.edu.cn)
Di Ma , Computer and Information Sciences, University of Michigan-Dearborn, Dearborn, Michigan United States (e-mail: dmadma@umich.edu)
Hong Wen , National Key Laboratory of Science and Technology on Communications, University of Electronic Science and Technology of China, Chengdu, Sichuan China (e-mail: sunlike@uestc.edu.cn)
Xuemin Sherman Shen , Department of Electrical and Computer Engineering, University of Waterloo, Waterloo, Ontario Canada (e-mail: sshen@uwaterloo.ca)

Authenticated Outlier Mining for Outsourced Databases (Abstract)

Boxiang Dong , Computer Science, Montclair State University, 8087 Montclair, New Jersey United States (e-mail: bdong@stevens.edu)
Hui Wendy Wang , Computer Science, Stevens Institute of Technology, Hoboken, New Jersey United States (e-mail: hui.wang@stevens.edu)
Anna Monreale , Computer Science, University of Pisa, Pisa, PI Italy (e-mail: annam@di.unipi.it)
Dino Pedreschi , Dipartimento di Informatica, Universita di Pisa, Pisa, PI Italy 56127 (e-mail: pedre@di.unipi.it)
Fosca Giannotti , Istituto di Scienza e Tecnologie dell'Informazione, CNR, Pisa, Pisa Italy 56124 (e-mail: fosca.giannotti@isti.cnr.it)
Wenge Guo , Department of Mathematical Sciences, New Jersey Institute of Technology, 5965 Newark, New Jersey United States (e-mail: wenge.guo@njit.edu)

Known Sample Attacks on Relation Preserving Data Transformations (Abstract)

Emre Kaplan , Computer Engineering, Sabanci University, Istanbul, NA Turkey 34956 (e-mail: emrekaplan@sabanciuniv.edu)
Mehmet Emre Gursoy , Computer Science, Georgia Institute of Technology, Atlanta, Georgia United States (e-mail: memregursoy@gatech.edu)
Mehmet Ercan Nergiz , R&D, Acadsoft, Gaziantep, Gaziantep Turkey (e-mail: nergiz@gmail.com)
Yucel Saygin , Computer Engineering, Sabanci University, Orhanli, 81474, Tuzla Turkey 34956 (e-mail: ysaygin@sabanciuniv.edu)

Towards Automated Log Parsing for Large-Scale Log Data Analysis (Abstract)

Pinjia He , Computer Science and Engineering, The Chinese University of Hong Kong, Hong Kong, Shatin Hong Kong (e-mail: pinjiahe@gmail.com)
Jieming Zhu , CS, CUHK, Shatin, HK Hong Kong (e-mail: jmzhu@cse.cuhk.edu.hk)
Shilin He , Computer Science and Engineering, The Chinese University of Hong Kong, Hong Kong, Shatin Hong Kong (e-mail: slhe@cse.cuhk.edu.hk)
Jian Li , Computer Science and Engineering, The Chinese University of Hong Kong, Hong Kong, Shatin Hong Kong (e-mail: jianli@cse.cuhk.edu.hk)
Michael R. Lyu , Computer Science & Engineering, The Chinese University of Hong Kong, Shatin, Hong Kong Hong Kong 00000 (e-mail: lyu@cse.cuhk.edu.hk)

Robust Fuzzy Extractors and Helper Data Manipulation Attacks Revisited: Theory vs Practice (Abstract)

Georg T. Becker , Digital Society Institute, European School of Management and Technology, 120306 Berlin, Berlin Germany (e-mail: georg.becker@ruhr-uni-bochum.de)

Scale Inside-out: Rapid Mitigation of Cloud DDoS Attacks (Abstract)

Gaurav Somani , CSE, Central University of Rajasthan, Ajmer, Rajasthan India (e-mail: gaurav@curaj.ac.in)
Manoj Singh Gaur , Computer Science and Engineering, Malaviya National Institute of Technology, Jaipur, Rajasthan India 302017 (e-mail: gaurms@gmail.com)
Dheeraj Sanghi , CSE, Indian Institute of technology, Kanpur, Kanpur, UP India (e-mail: dheeraj@cse.iitk.ac.in)
Mauro Conti , Mathematics, University of Padua, Padua, Italy Italy 35131 (e-mail: conti@math.unipd.it)
Muttukrishnan Rajarajan , Engineering, City University London, London, London United Kingdom of Great Britain and Northern Ireland (e-mail: R.Muttukrishnan@city.ac.uk)

Exploiting Dissent: Towards Fuzzing-based Differential Black Box Testing of TLS Implementations (Abstract)

Andreas Walz , Institute of Reliable Embedded Systems and Communication Electronics (ivESK), Hochschule fur Technik Wirtschaft und Medien Offenburg, 64369 Offenburg, Baden-Wurttemberg Germany 77652 (e-mail: andreas.walz@hs-offenburg.de)
Axel Sikora , Institute of Reliable Embedded Systems and Communication Electronics (ivESK), Hochschule fur Technik Wirtschaft und Medien Offenburg, 64369 Offenburg, Baden-Wurttemberg Germany (e-mail: axel.sikora@hs-offenburg.de)

Private Compound Wildcard Queries using Fully Homomorphic Encryption (Abstract)

Myungsun Kim , Department of Information Security, The University of Suwon, Hwaseong-si, Gyeonggi-do Korea (the Republic of) 18323 (e-mail: msunkim@suwon.ac.kr)
Hyung Tae Lee , Division of Computer Science and Engineering, Chonbuk National University, 26714 Jeonju, Jeollabuk-do Korea (the Republic of) (e-mail: hyungtaelee@chonbuk.ac.kr)
San Ling , School of Physical and Mathematical Science, Nanyang Technological University, Singapore, sinagpore Singapore (e-mail: lingsan@ntu.edu.sg)
Benjamin Hong Meng Tan , School of Physical and Mathematical Science, Nanyang Technological University, Singapore, sinagpore Singapore (e-mail: TANH0199@e.ntu.edu.sg)
Huaxiong Wang , Division of Mathematical Sciences, Nanyang Technological University, Singapore, Singapore Singapore (e-mail: hxwang@ntu.edu.sg)

Secure Remote User Authenticated Key Establishment Protocol for Smart Home Environment (Abstract)

Mohammad Wazid , Center for Security, Theory and Algorithmic Research, International Institute of Information Technology, Hyderabad, Hyderabad, Telangana India (e-mail: mohammad.wazid@research.iiit.ac.in)
Ashok Kumar Das , Center for Security, Theory and Algorithmic Research, International Institute of Information Technology, Hyderabad, Hyderabad, Telangana India 500 032 (e-mail: iitkgp.akdas@gmail.com)
Vanga Odelu , Department of Mathematics, Indian Institute of Technology Kharagpur, Kharagpur, West Bengal India (e-mail: odelu.vanga@gmail.com)
Neeraj Kumar , CSED, Thapar University, Patiala, Patiala, Punjab India (e-mail: neeraj.kumar@thapar.edu)
Willy Susilo , School of Computing and IT, U. Wollongong, Wollongong, New South Wales Australia 2522 (e-mail: wsusilo@uow.edu.au)

I sense you by Breath: Speaker Recognition via Breath Biometrics (Abstract)

Li Lu , School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu, Sichuan China 611731 (e-mail: luli2009@uestc.edu.cn)
Lingshuang Liu , School of Computer Science and Engineering, University of Electronic Science and Technology of China, 12599 Chengdu, Sichuan China (e-mail: lsliu@std.uestc.edu.cn)
Muhammad Jawad Hussain , School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu, Sichuan China (e-mail: j19197@gmail.com)
Yongshuai Liu , School of Computer Science and Engineering, University of Electronic Science and Technology of China, 12599 Chengdu, Sichuan China (e-mail: liuys@std.uestc.edu.cn)

A System Architecture for the Detection of Insider Attacks in Big Data Systems (Abstract)

Santosh Aditham , Computer Science and Engineering, University of South Florida, 7831 Tampa, Florida United States 33620-9951 (e-mail: saditham@mail.usf.edu)
Nagarajan Ranganathan , CSE, University of South Florida, ENB 118, Tampa, Florida United States 33620-5399 (e-mail: ranganat@cse.usf.edu)

senDroid: Auditing Sensor Access in Android System-wide (Abstract)

Weili Han , Software School, Fudan University, Shanghai, ShangHai China 201203 (e-mail: wlhan@fudan.edu.cn)
Chang Cao , Software School, Fudan University, 12478 Shanghai, Shanghai China (e-mail: 16212010001@fudan.edu.cn)
Hao Chen , School of Information Science and Technology, ShanghaiTech University, 387433 Shanghai, Shanghai China (e-mail: chenhao@shanghaitech.edu.cn)
Dong Li , Software School, Fudan University, 12478 Shanghai, Shanghai China (e-mail: 14212010008@fudan.edu.cn)
Zheran Fang , Software School, Fudan University, 12478 Shanghai, Shanghai China (e-mail: 13212010002@fudan.edu.cn)
Wenyuan Xu , Department of Electronic Engineering, Zhejiang University, Hangzhou, Zhejiang Province China (e-mail: xuwenyuan@zju.edu.cn)
Xiaoyang Sean Wang , School of Computer Science, Fudan University, Shanghai, ShangHai China (e-mail: xywangCS@fudan.edu.cn)

Pattern-Growth based Mining Mouse-Interaction Behavior for an Active User Authentication System (Abstract)

Chao Shen , Department of Aotomation, Xi'an Jiaotong University, 12480 Xi'an, Shaanxi China 710049 (e-mail: chaoshen@mail.xjtu.edu.cn)
Yufei Chen , Department of Aotomation, Xi'an Jiaotong University, 12480 Xi'an, Shaanxi China (e-mail: yfchen@sei.xjtu.edu.cn)
Xiaohong Guan , Department of automation, Xi'an Jiaotong University, Xi'an, Shaanxi China (e-mail: xhguan@sei.xjtu.edu.cn)
Roy Maxion , Computer Science, Carnegie Mellon University, Pittsburgh, Pennsylvania United States (e-mail: maxion@cs.cmu.edu)

Cross-Rack-Aware Single Failure Recovery for Clustered File Systems (Abstract)

Zhirong Shen , Computer Scinece and Technology, High-performance Computing, Beijing, Beijing China (e-mail: zhirong.shen2601@gmail.com)
Patrick P. C. Lee , Department of Computer Science and Engineering, The Chinese University of Hong Kong, Shatin, N.T. Hong Kong (e-mail: pclee@cse.cuhk.edu.hk)
Jiwu Shu , Computer Scinece and Technology, High-performance Computing, Beijing, Beijing China 100086 (e-mail: shujw@tsinghua.edu.cn)
Wenzhong Guo , Mathematics and Computer Science, Fuzhou University, Fuzhou, Fuzhou China 350108 (e-mail: guowenzhong@fzu.edu.cn)

Secure Dependency Enforcement in Package Management Systems (Abstract)

Luigi Catuogno , Informatica, Universita' di Salerno, Fisciano, SA Italy I-84084 (e-mail: luicat@dia.unisa.it)
Clemente Galdi , Ingegneria Elettrica e Tecnologie dell'Informazione, Universita' di Napoli, Napoli, NA Italy 80125 (e-mail: clemente.galdi@unina.it)
Pino Persiano , Scienze Aziendali - Management e Information Systems, Universita di Salerno, Fisciano, Salerno Italy (e-mail: giuper@dia.unisa.it)

Connecting the Dots: Privacy Leakage via Write-Access Patterns to the Main Memory (Abstract)

Tara Merin John , Electrical & Computer Engineering, University of Connecticut, 7712 Storrs, Connecticut United States (e-mail: tara.john@uconn.edu)
Syed Kamran Haider , Electrical & Computer Engineering, University of Connecticut, 7712 Storrs, Connecticut United States (e-mail: syed.haider@uconn.edu)
Hamza Omar , Electrical & Computer Engineering, University of Connecticut, 7712 Storrs, Connecticut United States (e-mail: hamza.omar@uconn.edu)
Marten Van Dijk , Electrical & Computer Engineering, University of Connecticut, 7712 Storrs, Connecticut United States (e-mail: marten.van_dijk@uconn.edu)

Bilateral Privacy-preserving Utility Maximization Protocol in Database-driven Cognitive Radio Networks (Abstract)

Zhikun Zhang , Department of Control, Zhejiang University, Hangzhou, Zhejiang China (e-mail: zhangzhk@zju.edu.cn)
Heng Zhang , Mathematics, Huaihai Institute of Technology, Lianyungang, Jiangsu China (e-mail: ezhangheng@gmail.com)
Shibo He , Control science and engineering, Zhejiang University, 12377 Hangzhou, Zhejiang China (e-mail: s18he@zju.edu.cn)
Peng Cheng , dept. of control, zhejiang univ., hangzhou, Zhejiang China (e-mail: saodiseng@gmail.com)

Privacy-Preserving Data Processing with Flexible Access Control (PDF)

Wenxiu Ding , School of Cyber Engineering, Xidian University, 47905 Xian, Shaanxi China (e-mail: wenxiuding_1989@126.com)
Zheng Yan , Department of Communications and Networking, Aalto University, Espoo, Helsinki area Finland (e-mail: zhengyan.pz@gmail.com)
Robert Deng , School of Information Systems, Singapore Management University, Singapore, Singapore Singapore (e-mail: robertdeng@smu.edu.sg)

Multi-user Multi-Keyword Rank Search over Encrypted Data in Arbitrary Language (Abstract)

Yang Yang , College of Mathematics and Computer Science, Fuzhou University, Fuzhou, Fujian Province China (e-mail: yang.yang.research@gmail.com)
Ximeng Liu , SCHOOL OF INFORMATION SYSTEMS, Singapore Management University, Singapore, Singapore Singapore (e-mail: snbnix@gmail.com)
Robert Deng , School of Information Systems, Singapore Management University, Singapore, Singapore Singapore (e-mail: robertdeng@smu.edu.sg)

The Overhead from Combating Side-Channels in Cloud Systems using VM-Scheduling (Abstract)

Nahid Juma , ECE, University of Waterloo, Waterloo, Ontario Canada (e-mail: ndawood@uwaterloo.ca)
Jonathan Shahen , ECE, University of Waterloo, Waterloo, Ontario Canada (e-mail: jmshahen@uwaterloo.ca)
Khalid Bijon , Engineering, MosaixSoft, Los Altos, California United States (e-mail: khalid@mosaixsoft.com)
Mahesh V. Tripunitara , ECE, University of Waterloo, Waterloo, Ontario Canada N2L 3G1 (e-mail: tripunit@uwaterloo.ca)

Providing Task Allocation and Secure Deduplication for Mobile Crowdsensing via Fog Computing (Abstract)

Jianbing Ni , Electrical and Computer Engineering, University of Waterloo, 8430 Waterloo, Ontario Canada (e-mail: j25ni@uwaterloo.ca)
Kuan Zhang , Department of Electrical and Computer Engineering, University of Nebraska-Lincoln, 14719 Lincoln, Nebraska United States (e-mail: k52zhang@uwaterloo.ca)
Yong Yu , School of Computer Science, Shaanxi Normal University, 12401 Xi'an, Shaanxi China (e-mail: yuyong@snnu.edu.cn)
Xiaodong Lin , Department of Physics and Computer Science, Wilfrid Laurier University, 8431 Waterloo, Ontario Canada (e-mail: Xiaodong.Lin@uoit.ca)
Xuemin Sherman Shen , Electrical and Computer Engineering, University of Waterloo, Waterloo, Ontario Canada N2L 3G1 (e-mail: xshen@bbcr.uwaterloo.ca)

Privacy Protection in Interactive Content Based Image Retrieval (Abstract)

Yonggang Huang , School of Computer Science and Technology, Beijing Institute of Technology, 47833 Beijing, Beijing China (e-mail: yonggang.h@gmail.com)
Jun Zhang , School of Software and Electrical Engineering, Swinburne University of Technology, 3783 Hawthorn, Victoria Australia (e-mail: junzhang@swin.edu.au)
Lei Pan , School of Information Technology, Deakin University, 2104 Burwood, Victoria Australia (e-mail: l.pan@deakin.edu.au)
Yang Xiang , School of Software and Electrical Engineering, Swinburne University of Technology, Hawthorn, Victoria Australia (e-mail: yxiang@swin.edu.au)

Privacy-Preserving Cloud Establishment and Data Dissemination Scheme for Vehicular Cloud (Abstract)

Lei Zhang , Software Engineering Institute, East China Normal University, Shanghai, ShangHai China (e-mail: leizhang@sei.ecnu.edu.cn)
Xinyu Men , School of Computer Science and Software Engineering, East China Normal University, 12655 Shanghai, Shanghai China (e-mail: 51164500111@stu.ecnu.edu.cn)
Kim-Kwang Raymond Choo , Department of Information Systems and Cyber Security, University of Texas at San Antonio, 12346 San Antonio, Texas United States 78249-1644 (e-mail: raymond.choo@fulbrightmail.org)
Yuanfei Zhang , School of Computer Science and Software Engineering, East China Normal University, 12655 Shanghai, Shanghai China (e-mail: 51151500152@stu.ecnu.edu.cn)
Feifei Dai , Software Engineering Institute, East China Normal University, Shanghai, ShangHai China (e-mail: dffscu@163.com)

Distributed Group Key Management for Event Notification Confidentiality among Sensors (Abstract)

Christian Esposito , Department of Computer Science, University of Salerno, Fisciano, Salerno Italy (e-mail: christian.esposito@dia.unisa.it)
Massimo Ficco , Industrial and Information Engineering, Second University of Naples (SUN), Aversa, caserta Italy 81031 (e-mail: massimo.ficco@unina2.it)
Aniello Castiglione , Department of Computer Science, University of Salerno, Fisciano, Salerno Italy 84084 (e-mail: castiglione@ieee.org)
Francesco Palmieri , Department of Computer Science, University of Salerno, Fisciano, Salerno Italy (e-mail: fpalmieri@unisa.it)
Alfredo De Santis , Dipartimento di Informatica, Università di Salerno, Fisciano (SA), Fisciano Italy (e-mail: ads@unisa.it)

FourQ on embedded devices with strong countermeasures against side-channel attacks (Abstract)

Zhe Liu , N/A, Universite du Luxembourg, 81872 Luxembourg, N/A Luxembourg (e-mail: zhelu.liu@uwaterloo.ca)
Patrick Longa , MSR Security and Cryptography, Microsoft Research, Redmond, Washington United States (e-mail: plonga@microsoft.com)
Geovandro Pereira , Institute for Quantum Computing, University of Waterloo, Waterloo, Ontario Canada (e-mail: geovandro.pereira@uwaterloo.ca)
Oscar Reparaz , COSIC, KU Leuven, Leuven, Leuven Belgium (e-mail: oscar.reparaz@esat.kuleuven.be)
Hwajeong Seo , N/A, Hansung University, 34952 Seoul, N/A Korea (the Republic of) (e-mail: hwajeong84@gmail.com)

BVPSMS: A Batch Verification Protocol for End-to-End Secure SMS for Mobile Users (Abstract)

Neetesh Saxena , School of Electrical and Computer Engineering, Georgia Institute of Technology, 1372 Atlanta, Georgia United States 30332-0002 (e-mail: neetesh.saxena1@gmail.com)
Hong Shen , Computer Science, University of Adelaide, 1066 Adelaide, South Australia Australia (e-mail: hong.shen@adelaide.edu.au)
Nikos Komninos , Computer Science, INTO City University London, 425941 London, London United Kingdom of Great Britain and Northern Ireland (e-mail: nikos.komninos.1@city.ac.uk)
Kim-Kwang Raymond Choo , Department of Information Systems and Cyber Security, University of Texas at San Antonio, 12346 San Antonio, Texas United States 78249-1644 (e-mail: raymond.choo@fulbrightmail.org)
Narendra S. Chaudhari , Computer Science & Engineering, Visvesvaraya National Institute of Technology, 29583 Nagpur, Maharashtra India (e-mail: nsc0183@gmail.com)

GaitLock: Protect Virtual and Augmented Reality Headsets Using Gait (Abstract)

Yiran Shen , College of Computer Science and Technology, Harbin University of Engineering, Harbin, Heilongjiang China 150001 (e-mail: shenyiran@hrbeu.edu.cn)
Hongkai Wen , Department of Computer Science, University of Warwick, 2707 Coventry, West Midlands United Kingdom of Great Britain and Northern Ireland (e-mail: hongkai.wen@dcs.warwick.ac.uk)
Chengwen Luo , College of Computer Science and Software Engineering, Shenzhen University, 47890 Shenzhen, Guangdong China 518060 (e-mail: chengwen@szu.edu.cn)
Weitao Xu , College of Computer Science and Software Engineering, Shenzhen University, 47890 Shenzhen, Guangdong China (e-mail: xuweitao005@gmail.com)
Tao Zhang , College of Computer Science and Technology, Harbin Engineering University, 12428 Harbin, Heilongjiang China (e-mail: cstzhang@hrbeu.edu.cn)
Wen Hu , School of Computer Science and Engineering, University of New South Wales, Sydney, New South Wales Australia (e-mail: wen.hu@unsw.edu.au)
Daniela Rus , Department of Electrical Engineering and Computer Science, MIT, Cambridge, Massachusetts United States (e-mail: rus@mit.edu)

Anonymity Services Tor, I2P, JonDonym: Classifying in the Dark (Web) (Abstract)

Antonio Pescape , Ingegneria Elettrica e delle Tecnologie dell'Informazione, University of Napoli Federico II, Napoli, Italy Italy 80125 (e-mail: pescape@unina.it)
Antonio Montieri , DIETI, University of Napoli Federico II, Napoli, Italy Italy (e-mail: antonio.montieri@unina.it)
Giuseppe Aceto , Dipartimanto di Ingegneria Elettrica e Tecnologie dell'Informazione, University of Napoli ‘Federico II’, Napoli, NA Italy (e-mail: giuseppe.aceto@unina.it)
Domenico Ciuonzo , DIETI, Universita degli Studi di Napoli Federico II, 9307 Napoli, Napoli Italy 80138 (e-mail: domenico.ciuonzo@gmail.com)

Impact of Failure Prediction on Availability: Modeling and Comparative Analysis of Predictive and Reactive Methods (Abstract)

Igor Kaitovic , Faculty of Informatics, ALaRI, University of Lugano, Lugano, Ticino Switzerland 6900 (e-mail: igor.kaitovic@usi.ch)
Miroslaw Malek , Institut für Informatik, Humboldt-Universitat zu Berlin, 9373 Berlin, Berlin Germany (e-mail: miroslaw.malek@usi.ch)

Impact of Stealthy Attacks on Optimal Power Flow: A Simulink-Driven Formal Analysis (Abstract)

Mohammad Ashiqur Rahman , Computer Science, Tennessee Technological University, Cookeville, Tennessee United States 38505 (e-mail: marahman@tntech.edu)
Amarjit Datta , Computer Science, Tennessee Technological University, Cookeville, Tennessee United States (e-mail: adatta42@students.tntech.edu)

Dynamic Packet Forwarding Verification in SDN (Abstract)

Qi Li , Computer Science and Technology, Graduate School at Shenzhen, Tsinghua University, Shenzhen, Guangdong China (e-mail: qi.li@sz.tsinghua.edu.cn)
Xiaoyue Zou , Graduate School at Shenzhen, Tsinghua University, 12442 Beijing, Beijing China (e-mail: zouxy16@mails.tsinghua.edu.cn)
Qun Huang , Department of Computer Science and Engineering, The Chinese University of Hong Kong, Shatin, N.T. Hong Kong (e-mail: huangqun@ict.ac.cn)
Jing Zheng , Dept. of Computer Science, Tsinghua University, 12442 Beijing, Beijing China (e-mail: zhengj14@mails.tsinghua.edu.cn)
Patrick P. C. Lee , Department of Computer Science and Engineering, The Chinese University of Hong Kong, Shatin, N.T. Hong Kong (e-mail: pclee@cse.cuhk.edu.hk)

HAL- The Missing Piece of the Puzzle for Hardware Reverse Engineering, Trojan Detection and Insertion (Abstract)

Marc Fyrbiak , Electrical Engineering and Information Technology, Ruhr University Bochum, Bochum, NRW Germany 44801 (e-mail: marc.fyrbiak@rub.de)
Sebastian Wallat , Computer and Electrical Engineering, University of Massachusetts Amherst, 14707 Amherst, Massachusetts United States (e-mail: swallat@umass.edu)
Pawel Swierczynski , Chair for Embedded Security, Ruhr-University Bochum, Bochum, NRW Germany 44801 (e-mail: pawel.swierczynski@rub.de)
Max Hoffmann , Horst Gortz Institute for IT-Security, Ruhr-University Bochum, Bochum, NRW Germany (e-mail: max.hoffmann@rub.de)
Sebastian Hoppach , Horst Gortz Institute for IT-Security, Ruhr-University Bochum, Bochum, NRW Germany (e-mail: sebastian.hoppach@rub.de)
Matthias Wilhelm , Horst Gortz Institute for IT-Security, Ruhr-University Bochum, Bochum, NRW Germany (e-mail: matthias.wilhelm@rub.de)
Tobias Weidlich , Horst Gortz Institute for IT-Security, Ruhr-University Bochum, Bochum, NRW Germany (e-mail: tobias.weidlich@rub.de)
Russell Tessier , Computer and Electrical Engineering, University of Massachusetts Amherst, 14707 Amherst, Massachusetts United States (e-mail: tessier@umass.edu)
Christof Paar , Horst Gortz Institute for IT-Security, Ruhr-University Bochum, Bochum, NRW Germany (e-mail: christof.paar@rub.de)

Key based Artificial Fingerprint Generation for Privacy Protection (Abstract)

Sheng Li , School of Computer Science, Fudan University, 12478 Shanghai, Shanghai China (e-mail: lisheng@fudan.edu.cn)
Xinpeng Zhang , School of Computer Science, Fudan University, 12478 Shanghai, Shanghai China (e-mail: xzhang@shu.edu.cn)
Zhenxing Qian , School of Computer Science, Fudan University, 12478 Shanghai, Shanghai China (e-mail: zxqian@shu.edu.cn)
Guorui Feng , School of Communication and Information Engineering, Shanghai University, 34747 Shanghai, Shanghai China (e-mail: grfeng@shu.edu.cn)
Yanli Ren , School of Communication and Information Engineering, Shanghai University, Shanghai, Shanghai China (e-mail: renyanli@shu.edu.cn)

SDN-based Privacy Preserving Cross Domain Routing (Abstract)

Qingjun Chen , Computer, Nanjing University, Nanjing, Jiangsu China (e-mail: knight.chan319@gmail.com)
Shouqian Shi , Computer Engineering, University of California Santa Cruz Department of Computer Engineering, 370790 Santa Cruz, California United States (e-mail: sshi27@ucsc.edu)
Xin Li , Department of Computer Science, University of Kentucky, 4530 Lexington, Kentucky United States 40506 (e-mail: xli178@ucsc.edu)
Chen Qian , the Department of Computer Engineering, University of California, Santa Cruz, California United States (e-mail: cqian12@ucsc.edu)
Sheng Zhong , CST, Nanjing University, Nanjing, Jiangsu China (e-mail: zhongsheng@nju.edu.cn)

AdCapsule: Practical Confinement of Advertisements in Android Applications (Abstract)

Xiaonan Zhu , School of Cyber Engineering, Xidian University, Xi'an, Shaanxi China (e-mail: xnzhu@stu.xidian.edu.cn)
Jinku Li , School of Cyber Engineering, Xidian University, Xi'an, Shaanxi China (e-mail: jkli@xidian.edu.cn)
Yajin Zhou , Cyber Security Research Institute and College of Computer Science and Technology, Zhejiang University, Hangzhou, Zhejiang China (e-mail: yajin@vm-kernel.org)
Jianfeng Ma , School of Cyber Engineering, Xidian University, Xi'an, Shaanxi China (e-mail: jfma@mail.xidian.edu.cn)

Look-aside At Your Own Risk: Privacy Implications of DNSSEC Look-aside Validation (Abstract)

Aziz Mohaisen , Computer Science, University of Central Florida, Orlando, Florida United States (e-mail: amohaisen@gmail.com)
Zhongshu Gu , Research, IBM, NYC, New York United States (e-mail: gzs715@gmail.com)
Kui Ren , CSE, SUNY at Buffalo, Buffalo, New York United States 14260 (e-mail: kuiren@buffalo.edu)
Zhenhua Li , School of Software, Tsinghua University, Beijing, Beijing China (e-mail: lizhenhua1983@tsinghua.edu.cn)
Laurent Njilla , RIGA, AFRL, Rome, New York United States (e-mail: laurent.njilla@us.af.mil)
Charles Alexandre Kamhoua , Information Directorate, Air Force Research Laboratory, Rome, New York United States 13440 (e-mail: charles.kamhoua.1@us.af.mil)
DaeHun Nyang , Graduate School of Information Technology and Telecommunications, InHa University, Inchoen, Incheon Korea, Republic of 402-751 (e-mail: nyang@inha.ac.kr)

Privacy-Preserving Outsourced Calculation Toolkit in the Cloud (Abstract)

Ximeng Liu , SCHOOL OF INFORMATION SYSTEMS, Singapore Management University, Singapore, Singapore Singapore (e-mail: snbnix@gmail.com)
Robert Deng , School of Information Systems, Singapore Management University, Singapore, Singapore Singapore (e-mail: robertdeng@smu.edu.sg)
Kim-Kwang Raymond Choo , Department of Information Systems and Cyber Security, University of Texas at San Antonio, 12346 San Antonio, Texas United States 78249-1644 (e-mail: raymond.choo@fulbrightmail.org)
Yang Yang , College of Mathematics and Computer Science, Fuzhou University, Fuzhou, Fujian Province China (e-mail: yang.yang.research@gmail.com)
HweeHwa Pang , School of Information Systems, Singapore Management University, Singapore, Singapore Singapore 178902 (e-mail: hhpang@smu.edu.sg)

High rate robust codes with low implementation complexity (Abstract)

Hila Rabii , Faculty of Engineering, Universitat Bar-Ilan, 26731 Ramat Gan, Israel Israel (e-mail: hila.rabii@live.biu.ac.il)
Yaara Neumeier , Faculty of Engineering, Universitat Bar-Ilan, 26731 Ramat Gan, Israel Israel (e-mail: yaara.neumeier@biu.ac.il)
Osnat Keren , Faculty of Engineering, Universitat Bar-Ilan, 26731 Ramat Gan, Israel Israel (e-mail: osnat.keren@biu.ac.il)

CAFE: A Virtualization-Based Approach to Protecting Sensitive Cloud Application Logic Confidentiality (Abstract)

Sungjin Park , System Research Division, The Attached Institute of ETRI, Daejeon, Daejeon Korea (the Republic of) (e-mail: taiji@nsr.re.kr)
Chung Hwan Kim , Computer Security Department, NEC Labs America, Princeton, New Jersey United States (e-mail: chungkim@nec-labs.com)
Junghwan Rhee , Autonomic Management, NEC Labs America, Princeton, New Jersey United States 08540 (e-mail: rhee@nec-labs.com)
Jong-Jin Won , System Research Division, The Attached Institute of ETRI, Daejeon, Daejeon Korea (the Republic of) (e-mail: wonjj@nsr.re.kr)
Taisook Han , School of Computing, Korea Advanced Institute of Science and Technology, 34968 Daejeon, Daejeon Korea (the Republic of) (e-mail: han@cs.kaist.ac.kr)
Dongyan Xu , Department of Computer Sciences, Purdue University, West Lafayette, Indiana United States 47907-2107 (e-mail: dxu@cs.purdue.edu)

Automatic Extraction of Access Control Policies from Natural Language Documents (Abstract)

Masoud Narouei , Computer Science and Engineering, University of North Texas, 3404 Denton, Texas United States (e-mail: masoudnarouei@my.unt.edu)
Hassan Takabi , Computer Science and Engineering, University Of North texas, Denton, Texas United States (e-mail: Hassan.takabi@unt.edu)
Rodney Nielsen , Computer Science and Engineering, University Of North texas, Denton, Texas United States (e-mail: Rodney.Nielsen@unt.edu)

Detecting and Mitigating Target Link-Flooding Attacks Using SDN (Abstract)

Juan Wang , School of Cyber Science and Engineering, Wuhan University, Wuhan, Hubei China (e-mail: jwang@whu.edu.cn)
Ru Wen , School of Cyber Science and Engineering, Wuhan University, Wuhan, Hubei China (e-mail: ruyulh@whu.edu.cn)
Jiangqi Li , School of Cyber Science and Engineering, Wuhan University, Wuhan, Hubei China (e-mail: lijqi@whu.edu.cn)
Fei Yan , School of Cyber Science and Engineering, Wuhan University, Wuhan, Hubei China (e-mail: yanfei@whu.edu.cn)
Bo Zhao , School of Cyber Science and Engineering, Wuhan University, Wuhan, Hubei China (e-mail: zhaobo@whu.edu.cn)
Fajiang Yu , School of Cyber Science and Engineering, Wuhan University, Wuhan, Hubei China (e-mail: fjyug@whu.edu.cn)

Forward Private Searchable Symmetric Encryption with Optimized I/O Efficiency (Abstract)

Xiangfu Song , School of computer science and technology, Shandong University, 12589 Jinan, Shandong China (e-mail: bintasong@gmail.com)
Changyu Dong , School of Computing Sciences, Newcastle University, 5994 Newcastle upon Tyne, Glasgow United Kingdom of Great Britain and Northern Ireland NE1 7RU (e-mail: changyu.dong@newcastle.ac.uk)
Ddadan Yuan , School of Computer Science and Technology, Shandong University, 12589 Jinan, Shandong China (e-mail: dandanyuan.sdu@gmail.com)
Qiuliang Xu , School of computer science and technology, Shandong University, 12589 Jinan, Shandong China (e-mail: xql@sdu.edu.cn)
Minghao Zhao , School of Software, Tsinghua University, 12442 Beijing, Beijing China (e-mail: mh-zhao17@mails.tsinghua.edu.cn)

Misbehavior in Multi-channel MAC Protocols (Abstract)

Yan Zhang , Electrical and Computer Engineering, University of Arizona, TUCSON, Arizona United States 85721 (e-mail: yanzhang@email.arizona.edu)
Loukas Lazos , Electrical and Computer Engineering, University of Arizona, Tucson, Arizona United States (e-mail: llazos@ece.arizona.edu)

Detecting Fault Injection Attacks Based on Compressed Sensing and Integer Linear Programming (Abstract)

Huiyun Li , Automotive Electronics Research Center, Shenzhen Institute of Advanced Technology, Chinese Academy of Sciences, Shenzhen, Guangdong China (e-mail: hy.li@siat.ac.cn)
Cuiping Shao , Shenzhen College of Advanced Technology, University of the Chinese Academy of Sciences, 74519 Shenzhen, Guangdong China (e-mail: cp.shao@siat.ac.cn)
Zheng Wang , Automotive Electronics Research Center, Shenzhen Institute of Advanced Technology, Chinese Academy of Sciences, Shenzhen, Guangdong China (e-mail: zheng.wang@siat.ac.cn)

A Secure Exception Mode for Fault-Attack-Resistant Processing (Abstract)

Bilgiday Yuce , Electrical and Computer Engineering, Virginia Tech, Blacksburg, Virginia United States (e-mail: bilgiday@vt.edu)
Chinmay Deshpande , Electrical and Computer Engineering, Virginia Tech, Blacksburg, Virginia United States (e-mail: chinmay@vt.edu)
Marjan Ghodrati , Electrical and Computer Engineering, Virginia Tech, Blacksburg, Virginia United States (e-mail: marjang@vt.edu)
Abhishek Bendre , Electrical and Computer Engineering, Virginia Tech, Blacksburg, Virginia United States (e-mail: abhi94@vt.edu)
Leyla Nazhandali , Electrical and Computer Engineering, Virginia Tech, Blacksburg, Virginia United States 24061 (e-mail: leyla@vt.edu)
Patrick Robert Schaumont , Electrical and Computer Engineering, Virginia Tech, Blacksburg, Virginia United States 24061 (e-mail: schaum@vt.edu)

▵Breakpad: Diversified Binary Crash Reporting (Abstract)

Bert Abrath , Computer Systems Lab, Ghent University, Ghent, Oost-Vlaanderen Belgium (e-mail: bert.abrath@ugent.be)
Bart Coppens , Computer Systems Lab, Ghent University, Ghent, Oost-Vlaanderen Belgium (e-mail: bart.coppens@ugent.be)
Mohit Mishra , Computer Systems Lab, Ghent University, Ghent, Oost-Vlaanderen Belgium (e-mail: mmishra23@gmail.com)
Jens Van den Broeck , Computer Systems Lab, Ghent University, Ghent, Oost-Vlaanderen Belgium (e-mail: jens.vandenbroeck@ugent.be)
Bjorn De Sutter , Electronics and Information Systems, Ghent University, Gent, Oost-Vlaanderen Belgium 9052 (e-mail: bjorn.desutter@ugent.be)

Decay-Based DRAM PUFs in Commodity Devices (Abstract)

Andre Schaller , Security Engineering, Technische Universitat Darmstadt Fachbereich Informatik, 233371 Darmstadt, Hessen Germany 64283 (e-mail: schaller@seceng.informatik.tu-darmstadt.de)
Wenjie Xiong , Electrical Engineering, Yale University Department of Electrical Engineering, 198907 New Haven, Connecticut United States (e-mail: wenjie.xiong@yale.edu)
Nikolaos Athanasios Anagnostopoulos , Security Engineering, Technische Universitat Darmstadt Fachbereich Informatik, 233371 Darmstadt, Hessen Germany (e-mail: anagnostopoulos@seceng.informatik.tu-darmstadt.de)
Muhammad Umair Saleem , Information and Communication Engineering, Technische Universitat Darmstadt Fachbereich Elektrotechnik und Informationstechnik, 235714 Darmstadt, Hessen Germany (e-mail: muhammadumair.saleem@stud.tu-darmstadt.de)
Sebastian Gabmeyer , Computer Science Department, Technische Universitat Darmstadt Fachbereich Informatik, 233371 Darmstadt, Hessen Germany (e-mail: gabmeyer@seceng.informatik.tu-darmstadt.de)
Boris Skoric , Dept. of Mathematics and Computer Science, Eindhoven University of Technology, Eindhoven, . Netherlands (e-mail: b.skoric@tue.nl)
Stefan Katzenbeisser , Computer Science Department, Technische Universität Darmstadt, Darmstadt, - Germany 64283 (e-mail: katzenbeisser@seceng.informatik.tu-darmstadt.de)
Jakub Szefer , Electrical Engineering, Yale University, New Haven, Connecticut United States (e-mail: jakub.szefer@yale.edu)

Memory-Efficient Implementation of Elliptic Curve Cryptography for the Internet-of-Things (Abstract)

Zhe Liu , Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, 47854 Nanjing, Jiangsu China (e-mail: sduliuzhe@gmail.com)
Hwajeong Seo , Dept. of Computer Science & Engineering, Pusan National University, Busan, Busan Korea (the Republic of) (e-mail: hwajeong@pusan.ac.kr)
Aniello Castiglione , Department of Computer Science, University of Salerno, Fisciano, Salerno Italy 84084 (e-mail: castiglione@ieee.org)
Kim-Kwang Raymond Choo , Department of Information Systems and Cyber Security, University of Texas at San Antonio, 12346 San Antonio, Texas United States 78249-1644 (e-mail: raymond.choo@fulbrightmail.org)
Howon Kim , Dept. of Computer Science & Engineering, Pusan National University, Busan, Busan Korea (the Republic of) (e-mail: howonkim@pusan.ac.kr)

Another Look at Anonymous Communication (Abstract)

Russell W. F. Lai , Chair of Applied Cryptography, Friedrich-Alexander-Universitat Erlangen-Nurnberg Technische Fakultat, 88768 Erlangen, Bayern Germany (e-mail: russell.lai@cs.fau.de)
Kam-Fung Cheung , Systems Engineering and Engineering Management, Chinese University of Hong Kong, 26451 New Territories, Hongkong Hong Kong (e-mail: kfcheung@link.cuhk.edu.hk)
Sherman S.M. Chow , Department of Information Engineering, Chinese University of Hong Kong, 26451 New Territories, Hongkong Hong Kong (e-mail: smchow@ie.cuhk.edu.hk)
Anthony M.C. So , Dept of Systems Engineering and Engineering Management, The Chinese University of Hong Kong, Shatin, NT Hong Kong (e-mail: manchoso@se.cuhk.edu.hk)

Cloud Centric Authentication for Wearable Healthcare Monitoring System (Abstract)

J Srinivas , Cyber Security, IIT Hyderabad, hyderabad, Andhra Pradesh India (e-mail: getsrinunow1@gmail.com)
Ashok Kumar Das , Center for Security, Theory and Algorithmic Research, International Institute of Information Technology, Hyderabad, Hyderabad, Telangana India 500 032 (e-mail: iitkgp.akdas@gmail.com)
Neeraj Kumar , CSED, Thapar University, Patiala, Patiala, Punjab India (e-mail: neeraj.kumar@thapar.edu)
Joel Rodrigues , Post-graduation, National Institute of Telecommunications (Inatel), Santa Rita do Sapucaí, MG Brazil 37540-000 (e-mail: joeljr@ieee.org)

Enabling Efficient User Revocation in Identity-based Cloud Storage Auditing for Shared Big Data (Abstract)

Yue Zhang , College of Computer Science and Technique, Qingdao University, 12593 Qingdao, Shandong China (e-mail: 136299762@qq.com)
Jia Yu , College of Information Engineering, Qingdao University, Qingdao, Shandong China (e-mail: qduyujia@gmail.com)
Rong Hao , College of Computer Science and Technology, Qingdao University, 12593 Qingdao, Shandong China (e-mail: hr@qdu.edu.cn)
Cong Wang , Computer Science, City University of Hong Kong, Hong Kong, Hong Kong Hong Kong (e-mail: congwang@cityu.edu.hk)
Kui Ren , CSE, SUNY at Buffalo, Buffalo, New York United States 14260 (e-mail: kuiren@buffalo.edu)
Papers

CipherXRay: Exposing Cryptographic Operations and Transient Secrets from Monitored Binary Execution (Abstract)

Xin Li , George Mason University, Fairfax
Xinyuan Wang , George Mason University, Fairfax
Wentao Chang , George Mason University, Fairfax
Regular Papers

A Large-Scale Study of the Time Required to Compromise a Computer System (Abstract)

Hannes Holm , The Royal Institute of Technology, Stockholm

Secure Two-Party Differentially Private Data Release for Vertically-Partitioned Data (Abstract)

Noman Mohammed , McGill University, Montreal
Dima Alhadidi , Concordia University, Montreal
Benjamin C. M. Fung , Concordia University, Montreal
Mourad Debbabi , Concordia University, Montreal

k-Zero Day Safety: A Network Security Metric for Measuring the Risk of Unknown Vulnerabilities (Abstract)

Lingyu Wang , Concordia University, Montreal
Sushil Jajodia , George Mason University, Fairfax
Anoop Singhal , National Institute of Standards and Technology, Gaithersburg
Pengsu Cheng , Concordia University, Montreal
Steven Noel , George Mason University, Fairfax
Papers

Comment on "Remote Physical Device Fingerprinting" (Abstract)

Libor Polcak , Brno University of Technology, Brno
Jakub Jirasek , Brno University of Technology, Brno
Petr Matousek , Brno University of Technology, Brno
Regular Papers

Fault-Tolerant Network Interfaces for Networks-on-Chip (Abstract)

Leandro Fiorin , Faculty of Lugano, Lugano
Mariagiovanna Sami , Politecnico di Milano, Milano
Papers

Process Authentication for High System Assurance (PDF)

Hussain M.J. Almohri , Virginia Tech, Blacksburg
Danfeng Daphne Yao , Virginia Tech, Blacksburg
Dennis Kafura , Virginia Tech, Blacksburg
Regular Papers

Security Games for Node Localization through Verifiable Multilateration (Abstract)

Nicola Basilico , University of California, Merced
Nicola Gatti , Politecnico di Milano, Milan
Mattia Monga , Università degli Studi di Milano, Milan
Sabrina Sicari , Università degli Studi dell'Insubria, Varese
Papers

Efficient and Privacy-Aware Data Aggregation in Mobile Sensing (Abstract)

Qinghua Li , The Pennsylvania State University, University Park
Guohong Cao , The Pennsylvania State University, University Park
Thomas F. La Porta , The Pennsylvania State University, University Park

STARS: A Statistical Traffic Pattern Discovery System for MANETs (Abstract)

Yang Qin , FaceBook, Menlo Park
Dijiang Huang , Arizona State University, Tempe
Bing Li , Arizona State University, Tempe

Human Effects of Enhanced Privacy Management Models (Abstract)

Gorrell P. Cheek , University of North Carolina at Charlotte, Charlotte
Mohamed Shehab , University of North Carolina at Charlotte, Charlotte

Private Searching on Streaming Data Based on Keyword Frequency (Abstract)

Xun Yi , Victoria University, Melbourne
Elisa Bertino , Purdue University, West Lafayette
Jaideep Vaidya , Rutgers University, Newark
Chaoping Xing , Nanyang Technological University, Singapore

Analysis of Field Data on Web Security Vulnerabilities (Abstract)

José Fonseca , Institute Polytechnic of Guarda, Guarda and University of Coimbra, Coimbra
Nuno Seixas , University of Coimbra, Coimbra
Marco Vieira , University of Coimbra, Coimbra
Henrique Madeira , University of Coimbra, Coimbra

Ensuring the Performance of Apahche HTTP Server Affected by Aging (Abstract)

jing zhao , Harbin Engineering University, Harbin
Kishor S. Trivedi , Duke University, Durham
Michael Grottke , Friedrich-Alexander-Universität Erlangen-Nürnberg, Nürnberg
Javier Alonso , Duke University, Durham
Yanbin Wang , Harbin Institude of Technology, Harbin

Key-Recovery Attacks on KIDS, a Keyed Anomaly Detection System (Abstract)

Juan E. Tapiador , Universidad Carlos III de Madrid, Madrid
Agustín Orfila , Universidad Carlos III de Madrid, Madrid
Arturo Ribagorda , Universidad Carlos III de Madrid, Madrid
Benjamín Ramos , Universidad Carlos III de Madrid, Madrid

Control Flow-based Malware Variant Detection (Abstract)

Silvio Cesare , Deakin University, Burwood
Yang Xiang , Deakin University, Burwood
Wanlei Zhou , Deakin University, Burwood

Abductive Analysis of Administrative Policies in Rule-based Access Control (Abstract)

Puneet Gupta , Google, Inc., Mountain View
Scott D. Stoller , Stony Brook University, Stony Brook
Zhongyuan Xu , Stony Brook University, Stony Brook

Low-Priced and Energy-Efficient Detection of Replicas for Wireless Sensor Networks (Abstract)

Kwantae Cho , Electronics and Telecommunications Research Institute, Daejeon
Byung-Gil Lee , Electronics and Telecommunications Research Institute, Daejeon
Dong Hoon Lee , Korea University, Seoul

A Random Decision Tree Framework for Privacy-preserving Data Mining (Abstract)

Jaideep Vaidya , Rutgers University, Newark
Basit Shafiq , Lahore University of Management Sciences, Lahore
Wei Fan , Huawei Noah's Ark Lab, Hong Kong
Danish Mehmood , Lahore University of Management Sciences, Lahore
David Lorenzi , Rutgers University, Newark

Mobiflage: Deniable Storage Encryption for Mobile Devices (Abstract)

Adam Skillen , Carleton University, Ottawa and Concordia University, Montreal
Mohammad Mannan , Concordia University, Montreal

Software-Level Approaches to Implementing Fault-Tolerant Systems on Coarse-Grained Reconfigurable Architecture (Abstract)

Kyuseung Han , Seoul National University, Seoul
Ganghee Lee , Samsung Electronics Co., Gyeonggi
Kiyoung Choi , Seoul National University, Seoul

Security Analysis and Related Usability of Motion-based CAPTCHAs: Decoding Codewords in Motion (Abstract)

Yi Xu , University of North Carolina at Chapel Hill, Chapel Hill
Gerardo Reynaga , Carleton University, Ottawa
Sonia Chiasson , Carleton University, Ottawa
Jan-Michael Frahm , University of North Carolina at Chapel Hill, Chapel Hill
Fabian Monrose , University of North Carolina at Chapel Hill, Chapel Hill
Paul Van Oorschot , Carleton University, Ottawa

Privacy-Preserving Multi-Class Support Vector Machine for Outsourcing the Data Classification in Cloud (Abstract)

Yogachandran Rahulamathavan , City University London, London
Raphael C.-W. Phan , Multimedia University, Cyberjaya
Suresh Veluru , City University London, London
Kanapathippillai Cumanan , Newcastle University, Newcastle upon tyne
Muttukrishnan Rajarajan , City University London, London

A Note On "Orchestrating an Ensemble of MapReduce Jobs for Minimizing Their Makespan" (Abstract)

Wenhong Tian , University of Electronic Science and Technology of China, Chengdu
Yu Chen , University of Electronic Science and Technology of China, Chengdu
Xinyang Wang , University of Electronic Science and Technology of China, Chengdu

HyperCheck: A Hardware-Assisted Integrity Monitor (Abstract)

Fengwei Zhang , George Mason University, Fairfax
Jiang Wang , Riverbed Technology, Sunnyvale
Kun Sun , George Mason University, Fairfax
Angelos Stavrou , George Mason University, Fairfax

Hiding in the Mobile Crowd: Location Privacy through Collaboration (Abstract)

Reza Shokri , ETH Zurich, Zurich
George Theodorakopoulos , Cardiff University, Cardiff
Panos Papadimitratos , KTH, Stockholm
Ehsan Kazemi , EPFL, Lausanne
Jean-Pierre Hubaux , EPFL, Lausanne

Effective Risk Communication for Android Apps (Abstract)

Christopher S. Gates , Purdue University, West Lafayette
Jing Chen , Purdue University, West Lafayette
Ninghui Li , Purdue University, West Lafayette
Robert W. Proctor , Purdue University, West Lafayette

A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet Drop Attacks in Wireless Sensor Networks (Abstract)

Salmin Sultana , Purdue University, West Lafayette
Gabriel Ghinita , University of Massachusetts, Boston
Elisa Bertino , Purdue University, West Lafayette
Mohamed Shehab , University of North Carolina at Charlotte, Charlotte

Evaluation of Web Security Mechanisms using Vulnerability and Attack Injection (Abstract)

José Fonseca , UDI of the Institute Polytechnic of Guarda, Guarda and the CISUC
Marco Vieira , University of Coimbra, Coimbra
Henrique Madeira , University of Coimbra, Coimbra

Efficient Tagging of Remote Peers During Child Pornography Investigations (Abstract)

Marc Liberatore , University of Massachusetts Amherst, Amherst
Brian Neil Levine , University of Massachusetts Amherst, Amherst
Clay Shields , Georgetown University, Washington
Brian Lynn , University of Massachusetts Amherst, Amherst

MINT: A Reliability Modeling Framework for Energy-Efficient Parallel Disk Systems (Abstract)

Shu Yin , Hunan University, Changsha
Xiaojun Ruan , West Chester University of Pennsylvania, West Chester
Adam Manzanares , California State University - Chico, Chico
Xiao Qin , Auburn University, Auburn
Kenli Li , Hunan University, Changsha

Enforcing Obligations within Relational Database Management Systems (Abstract)

Pietro Colombo , Università degli Studi dell'Insubria, Varese
Elena Ferrari , Università degli Studi dell'Insubria, Varese

Modeling and Analysis on the Propagation Dynamics of Modern Email Malware (Abstract)

Sheng Wen , Deakin University, Melbourne
Wei Zhou , Deakin University, Melbourne
Jun Zhang , Deakin University, Melbourne
Yang Xiang , Deakin University, Melbourne
Wanlei Zhou , Deakin University, Melbourne
Weijia Jia , City University of Hong Kong, Hong Kong
Cliff C. Zou , University of Central Florida, Orlando

Performance and Availability Modeling of IT Systems with Data Backup and Restore (Abstract)

Ruofan Xia , Duke university, Durham
Xiaoyan Yin , Duke University, Durham
Javier Alonso , Duke University, Durham
Fumio Machida , NEC Corporation, Kawasaki
Kishor S. Trivedi , Duke University, Durham

MOSES: Supporting and Enforcing Security Profiles on Smartphones (Abstract)

Yury Zhauniarovich , Yury Zhauniarovich is with the University of Trento, Trento, 38123, Italy (email: yury.zhauniarovich@unitn.it).
92 ms
(Ver 3.3 (11022016))