The Community for Technology Leaders
Green Image
TABLE OF CONTENTS
ISSN: 1545-5971

Reducing Timing Side-channel Information Leakage using 3D Integration (Abstract)

Chongxi Bao , Department of Electrical and Computer Engineering, University of Maryland, College Park, MD 20742.(email:chongxi.bao@gmail.com)

Secure and Efficient Initialization and Authentication Protocols for SHIELD (Abstract)

Chenglu Jin , Department of Electrical and Computer Engineering, University of Connecticut, Storrs, CT, 06269.(email:chenglu.jin@uconn.edu)

Stochastic model checking for predicting component failures and service availability (Abstract)

Michele Sevegnani , School of Computing Science, University of Glasgow, Glasgow, G12 8RZ, UK.(email:michele.sevegnanig@glasgow.ac.uk)

SADI: A Novel Model to Study the Propagation of Social Worms in Hierarchical Networks (Abstract)

Yang Xiang , Beijing Key Laboratory of Network Technology, Beihang University, Beijing, China, 100191 (e-mail: yang@deakin.edu.au).

Advancing the State-of-the-Art in Hardware Trojans Detection (Abstract)

Syed Kamran Haider , Department of Electrical and Computer Engineering, University of Connecticut, Storrs, CT, 06279.(email:syed.haider@uconn.edu)

Refinement-based Specification and Security Analysis of Separation Kernels (Abstract)

Yongwang Zhao , School of Computer Science and Engineering, Beihang Univerisity, Beijing, China (e-mail: zhaoyw@buaa.edu.cn).

AccConF: An Access Control Framework for Leveraging In-network Cached Data in the ICN-Enabled Wireless Edge (Abstract)

Reza Tourani , Computer Science Department, New Mexico State University, Las Cruces, New Mexico (e-mail: rtourani@cs.nmsu.edu).

Design and Implementation of SecPod, A Framework for Virtualization-based Security Systems (Abstract)

Xiaoguang Wang , Department of Computer Science, Xi’an Jiaotong University, Xi’an, 710049 China (e-mail: xiaoguang@stu.xjtu.edu.cn)

Privacy-Aware Caching in Information-Centric Networking (Abstract)

Gene Tsudik , Department of Computer Science, University of California, Irvine, CA, 92697.
Christopher Wood , Department of Computer Science, University of California, Irvine, CA, 92697.

Security Pricing as Enabler of Cyber-Insurance A First Look at Differentiated Pricing Markets (Abstract)

Ranjan Pal , Department of Computer Science, University of Southern California, CA, USA. (e-mail: rpal@usc.edu)

FastGeo: Efficient Geometric Range Queries on Encrypted Spatial Data (Abstract)

Boyang Wang , Department of Electrical and Computer Engineering, The University of Arizona, Tucson, AZ 85721.(email:boyangwang@email.arizona.edu)

Investigating the Multi-Ciphersuite and Backwards-Compatibility Security of the Upcoming TLS 1.3 (Abstract)

Xiao Lan , State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100093, China (e-mail: lanxiao@iie.ac.cn)

Exact Inference Techniques for the Analysis of Bayesian Attack Graphs (PDF)

Luis Munoz-Gonzalez , Department of Computing at Imperial College London, 180 Queen’s Gate, SW7 2AZ, London, UK.(email:l.munoz@imperial.ac.uk

On the Security of a Variant of ElGamal Encryption Scheme (Abstract)

Fang-Yu Rao , Department of Computer Science,West Lafayette,Indiana, IN, 47907.(email:raof@purdue.edu)

Optimal Spot-Checking for Collusion Tolerance in Computer Grids (Abstract)

Gregory Levitin , Collaborative Autonomic Computing Laboratory, School of Computer Science, University of Electronic Science and Technology of China, and with The Israel Electric Corporation, P. O. Box 10, Haifa 31000, Israel.(email:levitin@iec.co.il)

Cryptographic Solutions for Credibility and Liability Issues of Genomic Data (Abstract)

Erman Ayday , Computer Engineering Department, Bilkent University, Ankara, Turkey (e-mail: erman@cs.bilkent.edu.tr).

Fault-Tolerant Adaptive Routing in Dragonfly Networks (Abstract)

Dong Xiang , School of Software, Tsinghua University, Beijing 100084, China.

Privacy-Preserving Multi-keyword Top-k Similarity Search Over Encrypted Data (Abstract)

Hai Jin , Services Computing Technology and System Lab, Cluster and Grid Computing Lab, the School of Computer Science and Technology, Huazhong University of Science and Technology, Wuhan 430074, China (e-mail: hjin@hust.edu.cn).

Social Network De-Anonymization and Privacy Inference with Knowledge Graph Model (Abstract)

Jianwei Qian , Department of Computer Science, Illinois Institute of Technology, Chicago, IL 60616 USA (e-mail: jqian15@hawk.iit.edu)

Anonymization of Sensitive Quasi-Identifiers for l-diversity and t-closeness (Abstract)

Yuichi Sei , University of Electro- Communications, Tokyo 182-8585, Japan (e-mail: seiuny@uec.ac.jp).

Yes, Machine Learning Can Be More Secure! A Case Study on Android Malware Detection (Abstract)

Battista Biggio , Dept. of Electrical and Electronic Eng., University of Cagliari, Piazza d’Armi, 09123 Cagliari, Italy.(email:battista.biggio@diee.unica.it)

Efficient Multi-Factor Authenticated Key Exchange Scheme for Mobile Communications (Abstract)

Yuting Xiao , State Key Laboratory of Information Security (SKLOIS), Institute of Information Engineering (IIE), Chinese Academy of Sciences (CAS) and School of Cyber Security, University of Chinese Academy of Sciences (e-mail: xiaoyuting@iie.ac.cn)

A Markov Random Field Framework for Modeling Malware Propagation in Complex Communications Networks (Abstract)

Vasileios Karyotis , NETMODE Lab of the School of Electrical & Computer Engineering, National Technical University of Athens (NTUA), Zografou, 15780, Greece. (e-mail: vassilis@netmode.ntua.gr).

RAW-Tag: Replicating in Altered Cache Ways for Correcting Multiple-Bit Errors in Tag Array (Abstract)

Hamed Farbeh , Department of Computer Engineering, Sharif University of Technology, Tehran 11155-11365, Iran (e-mail: miremadi@sharif.edu).

Efficient Delegated Private Set Intersection on Outsourced Private Datasets (Abstract)

Changyu Dong , School of Computing Science, Newcastle University, Newcastle Upon Tyne, UK ( email: changyu.dong@newcastle.ac.uk).

De-SAG: On the De-anonymization of Structure-Attribute Graph Data (Abstract)

Shouling Ji , College of Computer Science and Technology, Zhejiang University, Hangzhou, Zhejiang 310027, China (E-mail: sji@zju.edu.cn)

A Privacy Mechanism for Access Controlled Graph Data (Abstract)

Muhammad U. Arshad , School of Electrical and Computer Engineering, Purdue University, and Center for Education and Research in Information Assurance and Security (CERIAS) (e-mail: marshad@purdue.edu).

Empirical Analysis and Validation of Security Alerts Filtering Techniques (Abstract)

Antonio Pecchia , Dipartimento di Ingegneria Elettrica e Tecnologie dell’Informazione (DIETI), Universit`a degli Studi di Napoli Federico II, via Claudio 21, 80125, Napoli, Italy.(email:antonio.pecchiag@unina.it)

AP-PRE: Autonomous Path Proxy Re-encryption and Its Application (Abstract)

Hongbing Wang , School of Computer Science, Fudan University, Shanghai, China.(email:wanghongbing@fudan.edu.cn)

Privacy-Preserving Fine-Grained Data Retrieval Schemes For Mobile Social Networks (Abstract)

Mohamed Mahmoud , Department of Electrical & Computer Engineering, Tennessee Tech University, Cookeville, TN 38505 USA.(email:mmahmoud@tntech.edu)

Efficient Nonprofiling 2nd-Order Power Analysis on Masked Devices Utilizing Multiple Leakage Points (Abstract)

Liwei Zhang , Department of Mathematics, Northeastern University, Boston, MA, 02115. (e-mail: zhang.liw@husky.neu.edu)
Aidong Adam Ding , Department of Mathematics, Northeastern University, Boston, MA, 02115. (e-mail: a.ding@neu.edu)
Yunsi Fei , Department of Electrical and Computer Engineering, Northeastern University, Boston, MA, 02115. (e-mail: yfei@ece.neu.edu)
Pei Luo , Department of Electrical and Computer Engineering, Northeastern University, Boston, MA, 02115. (e-mail: silenceluo@gmail.com)

Multitenant Access Control for Cloud-Aware Distributed Filesystems (Abstract)

Giorgos Kappes , Department of Computer Science and Engineering, University of Ioannina, Ioannina, Ioannina Greece (e-mail: gkappes@cs.uoi.gr)
Andromachi Hatzieleftheriou , Systems and Networking, Microsoft Research Ltd, 10438 Cambridge, Cambridgeshire United Kingdom of Great Britain and Northern Ireland (e-mail: ahatziel@cs.uoi.gr)
V. Stergios Anastasiadis , Department of Computer Science and Engineering, University of Ioannina, Ioannina, Ioannina Greece (e-mail: stergios@cs.uoi.gr)

Di-PriDA: Differentially Private Distributed Load Balancing Control for the Smart Grid (Abstract)

Xiaojing Liao , Computer Science, College of William and Mary, 8604 Williamsburg, Virginia United States (e-mail: xiaojing@wm.edu)
Preethi Srinivasan , Electrical and Computer Engineering, Georgia Institute of Technology, Atlanta, Georgia United States (e-mail: preethisrinivasan@gatech.edu)
David Formby , Electrical and Computer Engineering, Georgia Institute of Technology, Atlanta, Georgia United States (e-mail: djformby@gatech.edu)
A. Raheem Beyah , ECE, Georgia Tech, Atlanta, Georgia United States 30318 (e-mail: rbeyah@ece.gatech.edu)

Emerging-Image Motion CAPTCHAs: Vulnerabilities of Existing Designs, and Countermeasures (Abstract)

Song Gao , Software Engineer, Google Inc, 93176 Mountain View, California United States (e-mail: gaos@uab.edu)
Manar Mohamed , Computer & Information Sciences, Temple University, 6558 Philadelphia, Pennsylvania United States (e-mail: manar.kasem.mohamed@temple.edu)
Nitesh Saxena , Department of Computer and Information Sciences, University of Alabama at Birmingham, Birmingham, Alabama United States (e-mail: saxena@uab.edu)
Chengcui Zhang , Department of Computer and Information Sciences, University of Alabama at Birmingham, Birmingham, Alabama United States (e-mail: czhang02@uab.edu)

Supersingular Isogeny Diffie-Hellman Key Exchange on 64-bit ARM (Abstract)

Amir Jalali , Computer and Electrical Engineering and Computer Science, Florida Atlantic University, 1782 Boca Raton, Florida United States (e-mail: ajalali2016@fau.edu)
Reza Azarderakhsh , Computer and Electrical Engineering and Computer Science, Florida Atlantic University, 1782 Boca Raton, Florida United States (e-mail: razarderakhsh@fau.edu)
Mehran Mozaffari Kermani , Electrical and Microelectronic Engineering, Rochester Institute of Technology, Rochester, New York United States 14623 (e-mail: mmkeme@rit.edu)
Daivd Jao , Mathematics, University of Waterloo, 8430 Waterloo, Ontario Canada (e-mail: djao@uwaterloo.ca)

High-Performance Memory Snapshotting for Real-Time, Consistent, Hypervisor-Based Monitors (Abstract)

Peter Klemperer , Computer Science, Mount Holyoke College, South Hadley, Massachusetts United States 01075 (e-mail: pklemper@mtholyoke.edu)
Hye Yoon Jeon , Computer Science, Mount Holyoke College, South Hadley, Massachusetts United States (e-mail: jeon22h@mtholyoke.edu)
Bryan D. Payne , Product & Application Security, Netflix Inc, Los Gatos, California United States (e-mail: bdpayne@gmail.com)
James C. Hoe , Electrical and Computer Engineering, Carnegie Mellon University, 6612 Pittsburgh, Pennsylvania United States (e-mail: jhoe@cmu.edu)

A Novel Security Protocol Attack Detection Logic with Unique Fault Discovery Capability for Freshness Attacks and Interleaving Session Attacks (Abstract)

Anca Jurcut , Electronic & Computer Engineering, University of Limerick, Limerick, Limerick Ireland (e-mail: ancadeliajurcut@gmail.com)
Tom Coffey , Electronic and Computer Engineering, University of Limerick, Limerick, Limerick Ireland (e-mail: tom.coffey@ul.ie)
Reiner Dojen , Faculty od Science & Engineering, Department of Electronic and Computer Engineering, University of Limerick, Limerick, Limerick Ireland (e-mail: reiner.dojen@ul.ie)

Brew: A Security Policy Analysis Framework for Distributed SDN-Based Cloud Environments (Abstract)

Sandeep Pisharody , CIDSE, Arizona State University, 7864 Tempe, Arizona United States 85281 (e-mail: spishar1@asu.edu)
Janakarajan Natarajan , CIDSE, Arizona State University, 7864 Tempe, Arizona United States (e-mail: jnatara1@asu.edu)
Ankur Chowdhary , CIDSE, Arizona State University Ira A Fulton Schools of Engineering, 145951 Tempe, Arizona United States 85287-9309 (e-mail: achaud16@asu.edu)
Abdullah Alshalan , CIDSE, Arizona State University, 7864 Tempe, Arizona United States (e-mail: aalshala@asu.edu)
Dijiang Huang , Computer Science and Engineering, Arizona State University, Tempe, Arizona United States 85281 (e-mail: dijiang@asu.edu)

Block Design-based Key Agreement for Group Data Sharing in Cloud Computing (Abstract)

Jian Shen , School of Computer and Software, Nanjing University of Information Science and Technology, 71127 Nanjing, Jiangsu China 210044 (e-mail: s_shenjian@126.com)
Tianqi Zhou , School of Computer and Software, Nanjing University of Information Science & Technology, Nanjing, Jiangsu China (e-mail: tq_zhou@126.com)
Debiao He , State Key Lab of Software Engineering, Wuhan University, Wuhan, HuBei China 430072 (e-mail: hedebiao@163.com)
Yuexin Zhang , School of Information Technology, Deakin University, Melbourne, Victoria Australia (e-mail: yuexinz@deakin.edu.au)
Xingming Sun , College of Computer and Software, Nanjing University of Information Science & Technology, Nanjing, Jiangsu Province China (e-mail: sunnudt@163.com)
Yang Xiang , School of Information Technology, Deakin University, Burwood, Victoria Australia (e-mail: yang@deakin.edu.au)

Relating Extra Connectivity and Extra Conditional Diagnosability in Regular Networks (Abstract)

Limei Lin , Faculty of Computer Science and Information Technology, Fujian Agriculture and Forestry University, 12449 Fuzhou, Fujian China (e-mail: putianlinlimei@163.com)
Li Xu , School of Mathematics and Computer Science, Fujian Normal University, Fuzhou, Fujian China (e-mail: xuli@fjnu.edu.cn)
Riqing Chen , aculty of Computer Science and Information Technology, Fujian Agriculture and Forestry University, 12449 Fuzhou, Fujian China 350002 (e-mail: riqing.chen@fafu.edu.cn)
Sun-Yuan Hsieh , Computer Science and Information Engineering, National Cheng Kung University, Tainan, Taiwan Taiwan Taiwan 70101 (e-mail: hsiehsy@mail.ncku.edu.tw)
Dajin Wang , Department of Computer Science, Montclair State University, Upper Montclair, New Jersey United States 07043 (e-mail: wangd@mail.montclair.edu)

A Logical Key Hierarchy Based approach to preserve content privacy in Decentralized Online Social Networks (Abstract)

Andrea De Salve , Department of Computer Science, Universita degli Studi di Pisa, 9310 Pisa, Pisa Italy 56100 (e-mail: andreadesalve@gmail.com)
Roberto Di Pietro , Cyber Security Research, Bell Labs, Paris, Paris France (e-mail: roberto.di_pietro@alcatel-lucent.com)
Paolo Mori , Istituto di Informatica e Telematica, IIT-CNR, Pisa, Pisa Italy (e-mail: paolo.mori@iit.cnr.it)
Laura Ricci , Department of Computer Science, Universita degli Studi di Pisa, 9310 Pisa, Toscana Italy (e-mail: laura.ricci@unipi.it)

Lightweight Sharable and Traceable Secure Mobile Health System (Abstract)

Yang Yang , College of Mathematics and Computer Science, Fuzhou University, Fuzhou, Fujian Province China (e-mail: yang.yang.research@gmail.com)
Ximeng Liu , SCHOOL OF INFORMATION SYSTEMS, Singapore Management University, Singapore, Singapore Singapore (e-mail: snbnix@gmail.com)
Robert H. Deng , School of Information Systems, Singapore Management University, Singapore, Singapore Singapore (e-mail: robertdeng@smu.edu.sg)
Yingjiu Li , School of Information Systems, Singapore Management University, Singapore, Singapore Singapore 178902 (e-mail: yjli@smu.edu.sg)

Adaptive Compiler Strategies for Mitigating Timing Side Channel Attacks (Abstract)

Jeroen Van Cleemput , Computer Systems Lab, Ghent University, Gent, Oost-Vlaanderen Belgium (e-mail: jeroen.ugent@gmail.com)
Bjorn De Sutter , Electronics and Information Systems, Ghent University, Gent, Oost-Vlaanderen Belgium 9052 (e-mail: bjorn.desutter@ugent.be)
Koen De Bosschere , Electronics and Information Systems, Ghent University, Gent, Oost-Vlaanderen Belgium (e-mail: Koen.DeBosschere@UGent.be)

Rollback Mechanisms for Cloud Management APIs using AI planning (Abstract)

Suhrid Satyal , Architecture and Analytics Platforms, Data61, CSIRO, Eveleigh, New South Wales Australia 2015 (e-mail: suhridsatyal@gmail.com)
Ingo Weber , Architecture and Analytics Platforms, Data61, CSIRO, Eveleigh, New South Wales Australia (e-mail: Ingo.Weber@nicta.com.au)
Len Bass , -, Carnegie Mellon University, 6612 Pittsburgh, Pennsylvania United States (e-mail: len.bass@gmail.com)
Min Fu , Department of Computing, Macquarie University, Sydney, New South Wales Australia (e-mail: Min.Fu@nicta.com.au)

Secure Inter-domain Forwarding Loop Test in Software Defined Networks (Abstract)

Yuan Zhang , Computer Science and Technology, Nanjing University, Nanjing, Jiangsu China (e-mail: zhangyuan05@gmail.com)
Boyu Zhu , Computer Science and Technology, Nanjing University, 12581 Nanjing, Jiangsu China (e-mail: zoeleeeeeeee@gmail.com)
Yixin Fang , CST, Nanjing University, Nanjing, Jiangsu China (e-mail: star.fang1990@gmail.com)
Suxin Guo , Computer Science and Engineering, University at Buffalo, Buffalo, New York United States (e-mail: suxinguo@buffalo.edu)
Aidong Zhang , Computer Science and Engineering, State University of New York at Buffalo, Buffalo, New York United States 14260-2000 (e-mail: azhang@buffalo.edu)
Sheng Zhong , CST, Nanjing University, Nanjing, Jiangsu China (e-mail: zhongsheng@nju.edu.cn)

An Immunization Framework for Social Networks through Big Data Based Influence Modeling (Abstract)

Sancheng Peng , School of Informatics, Guangdong University of Foreign Studies, 12385 Guangzhou, Guangdong China (e-mail: psc346@aliyun.com)
Guojun Wang , Department of Computer Science, School of Information Science and Engineering, Changsha, Hunan Province China (e-mail: csgjwang@gmail.com)
Yongmei Zhou , Software Engineering, Guangdong University of Foreign Studies, 12385 Guangzhou, Guangdong China (e-mail: yongmeizhou@163.com)
Cong Wan , school of computer and communication Engineering, Northeastern University - Qinhuangdao Campus, 74749 Qinhuangdao, Hebei China 066004 (e-mail: 10000cong@163.com)
Cong Wang , School of Computer and Communication Engineering, Northeastern University - Qinhuangdao Campus, 74749 Qinhuangdao, Hebei China 066004 (e-mail: congw@neuq.edu.cn)
Shui Yu , School of Information Technology, Deakin University, Burwood, Victoria Australia (e-mail: syu@deakin.edu.au)

Sensitivity Analysis for Non-Interactive Differential Privacy: Bounds and Efficient Algorithms (Abstract)

Ali Inan , Computer Engineering, Adana Bilim ve Teknoloji Universitesi, 365074 Adana, Adana Turkey 01180 (e-mail: inanxali@gmail.com)
Mehmet Emre Gursoy , Computer Science, Georgia Institute of Technology, Atlanta, Georgia United States (e-mail: memregursoy@gatech.edu)
Yucel Saygin , Computer Engineering, Sabanci University, Orhanli, 81474, Tuzla Turkey 34956 (e-mail: ysaygin@sabanciuniv.edu)

TaintMan: an ART-Compatible Dynamic Taint Analysis Framework on Unmodified and Non-Rooted Android Devices (Abstract)

Wei You , School of Information, Renmin University of China, Beijing, Beijing China (e-mail: youwei@ruc.edu.cn)
Bin Liang , School of Information, Renmin University of China, 12471 Beijing, BEIJING China (e-mail: liangb@ruc.edu.cn)
Wenchang Shi , School of Information, Remin University of China, Beijing, Beijing China (e-mail: wenchang@ruc.edu.cn)
Peng Wang , School of Information, Renmin University of China, 12471 Beijing, BEIJING China (e-mail: pengwang@ruc.edu.cn)
Xiangyu Zhang , Computer Science, Purdue University, West Lafayette, Indiana United States 47907 (e-mail: xyzhang@cs.purdue.edu)

EC2: Ensemble Clustering and Classification for Predicting Android Malware Families (Abstract)

Tanmoy Chakraborty , Dept of Computer Science, University of Maryland at College Park, 1068 College Park, Maryland United States (e-mail: tanchak@umiacs.umd.edu)
Fabio Pierazzi , Computer Engineering, University of Modena and Reggio Emilia, Modena, Modena Italy 41125 (e-mail: fabio.pierazzi@unimore.it)
V. S. Subrahmanian , Computer Science, Dartmouth College, Hanover, New Hampshire United States (e-mail: vs@cs.umd.edu)

Detection of Repackaged Android Malware with Code-Heterogeneity Features (Abstract)

Ke Tian , Computer Science, Virginia Polytechnic Institute and State University, 1757 Blacksburg, Virginia United States 24061-0131 (e-mail: ketian@vt.edu)
Danfeng (Daphne) Yao , Computer Science`, Virginia Tech, Blacksburg, Virginia United States 24060 (e-mail: danfeng@vt.edu)
Barbara G. Ryder , Computer Science, Virginia Tech, Blacksburg, Virginia United States 24061 (e-mail: ryder@cs.vt.edu)
G. Tan , Computer Science and Engineering, Pennsylvania State University, 8082 University Park, Pennsylvania United States (e-mail: gtan@cse.psu.edu)
Guojun Peng , Computer Science, Wuhan University, 12390 Wuhan, Hubei China (e-mail: guojpeng@vt.edu)

A Security Analysis and Revised Security Extension for the Precision Time Protocol (Abstract)

Eyal Itkin , School of Computer Science, Tel Aviv University, Ramat Aviv, Israel Israel (e-mail: eyalit@post.tau.ac.il)
Avishai Wool , School of Electrical Engineering Systems, Tel Aviv University, Ramat Aviv, Israel Israel 69978 (e-mail: yash@eng.tau.ac.il)

Wormhole: The Hidden Virus Propagation Power of a Search Engine in Social Networks (Abstract)

Cai Fu , Computer School, Huazhong University of Science and Technology, Wuhan, China, 430074
Xiao-Yang Liu , Computer School, Shanghai Jiao Tong University, Shanghai, China, 200240, and Electrical Engineering Department, Columbia University, New York, NY, USA 10027
Jia Yang , Computer School, Huazhong University of Science and Technology, Wuhan, China, 430074
Laurence T. Yang , Computer School, Huazhong University of Science and Technology, Wuhan, China, 430074, and Department of Computer Science. St. Francis Xavier University, Antigonish, Canada, NS, B2G 2W5
Shui Yu , Information Technology School, Deakin University, Burwood, Victoria, Australia, 3125
Tianqing Zhu , Information Technology School, Deakin University, Burwood, Victoria, Australia, 3125

Real-time multistep attack prediction based on Hidden Markov Models (Abstract)

Pilar Holgado , DIT, Universidad Politecnica de Madrid, 16771 Madrid, Madrid Spain 28040 (e-mail: pilarholgado@dit.upm.es)
VICTOR A. VILLAGRA , DIT, Technical University of Madrid - UPM, Madrid, Madrid Spain (e-mail: villagra@dit.upm.es)
Luis Vazquez , DIT, Universidad Politecnica de Madrid, 16771 Madrid, Comunidad de Madrid Spain (e-mail: lvazquez@dit.upm.es)

Secure outsourcing SIFT: Efficient and Privacy-preserving Image Feature Extraction in the Encrypted Domain (Abstract)

Linzhi Jiang , School of Computer Science and Engineering, University of Electronic Science and Technology of China - Qingshuihe Campus, 272021 Chengdu, Sichuan China (e-mail: linzjiang@hotmail.com)
Chunxiang Xu , School of Computer Science and Engineering, University of Electronic Science and Technology of China - Qingshuihe Campus, 272021 Chengdu, Sichuan China (e-mail: linzhij1988@163.com)
Xiaofang Wang , School of Telecommunications Engineering, Xidian University, 47905 Xian, Shaanxi China (e-mail: qizi19801980@163.com)
Bo Luo , EECS, The University of Kansas, Lawrence, Kansas United States (e-mail: bluo@ku.edu)
Huaqun Wang , School of Computer Science and Engineering, Nanjing University of Posts and Telecommunications, 12577 Nanjing, Jiangsu China (e-mail: asusjiang@gmail.com)

Strong stationary times and its use in cryptography (Abstract)

Pawel Lorek , Faculty of Mathematics and Computer Science, Wrocław University, Wrocław, Dolnoslaskie Poland (e-mail: Pawel.Lorek@math.uni.wroc.pl)
Filip Zagorski , Katedra Informatyki, Politechnika Wroclawska Wydzial Podstawowych Problemow Techniki, 414290 Wroclaw, dolnoslaskie Poland (e-mail: filip.zagorski@gmail.com)
Michal Kulis , Faculty of Mathematics and Computer Science, Politechnika Wroclawska, 49567 Wroclaw, dolnoslaskie Poland (e-mail: svenuto9@gmail.com)

Message Integrity Protection over Wireless Channel: Countering Signal Cancellation via Channel Randomization (Abstract)

Yanjun Pan , ECE, University of Arizona, Tucson, Arizona United States (e-mail: yanjunpan@email.arizona.edu)
Yantian Hou , Computer Science, Boise State University, 1791 Boise, Idaho United States (e-mail: yantianhou@boisestate.edu)
Ming Li , ECE, University of Arizona, Tucson, Arizona United States 85721 (e-mail: lim@email.arizona.edu)
Ryan M. Gerdes , ECE, Virginia Polytechnic Institute and State University, Blacksburg, Virginia United States (e-mail: rgerdes@vt.edu)
Kai Zeng , ECE, George Mason University, Fairfax, Virginia United States 22030 (e-mail: kzeng2@gmu.edu)
Md. A. Towfiq , ECE, Utah State University, 4606 Logan, Utah United States (e-mail: aztowfiq@aggiemail.usu.edu)
Bedri A. Cetiner , ECE, Utah State University, 4606 Logan, Utah United States (e-mail: bedri.cetiner@usu.edu)

Challenge-Response Authentication using In-Air Handwriting Style Verification (Abstract)

Jing Tian , Computer Science and Engineering, University of South Carolina, 2629 Columbia, South Carolina United States 29208-0001 (e-mail: tian9@email.sc.edu)
Yu Cao , Computer Science and Engineering, University of South Carolina, 2629 Columbia, South Carolina United States (e-mail: math_yu_cao@hotmail.com)
Wenyuan Xu , Dept. of CSE, University of South Carolina, Columbia, South Carolina United States (e-mail: wyxu@cse.sc.edu)
Song Wang , Computer Science and Engineering, University of South Carolina, Columbia, South Carolina United States 29208 (e-mail: songwang@cec.sc.edu)

Privacy-Aware and Efficient Mobile Crowdsensing with Truth Discovery (Abstract)

Yifeng Zheng , Computer Science, City University of Hong Kong, 53025 Kowloon, Hong Kong Hong Kong (e-mail: yifeng.zheng@my.cityu.edu.hk)
Huayi Duan , Computer Science, City University of Hong Kong, 53025 Kowloon, Hong Kong Hong Kong (e-mail: hduan2-c@my.cityu.edu.hk)
Xingliang Yuan , Faculty of Information Technology, Monash University, Melbourne, Victoria Australia (e-mail: xingliang.yuan@monash.edu)
Cong Wang , Computer Science, City University of Hong Kong, Hong Kong, Hong Kong Hong Kong (e-mail: congwang@cityu.edu.hk)

Markov Regenerative Models of WebServers for Their User-Perceived Availability and Bottlenecks (Abstract)

Zheng Zheng , Automation Science and Electrical Engineering, Beihang university, Beijing, Beijing China (e-mail: zhengz@buaa.edu.cn)
Kishor S. Trivedi , Department of Electrical and Computer Engineering, Duke University, Durham, North Carolina United States (e-mail: wangnangg@gmail.com)
Nan Wang , Department of Electrical and Computer Engineering, Duke University, Durham, North Carolina United States (e-mail: ktrivedi@duke.edu)
Kun Qiu , Automation Science and Electrical Engineering, Beihang university, Beijing, Beijing China (e-mail: qiukun@buaa.edu.cn)

Group Signatures with Time-bound Keys Revisited: A New Model, an Efficient Construction, and its Implementation (Abstract)

Keita Emura , Security Fundamentals Laboratory, National Institute of Information and Communications Technology, Koganei, Tokyo Japan (e-mail: keita.emura@gmail.com)
Takuya Hayashi , Department of Electrical and Electric Engineering, Kobe University, Rokko-dai, Kobe Japan (e-mail: t-hayashi@eedept.kobe-u.ac.jp)
Ai Ishida , Department of Mathematical and Computing Sciences, Tokyo Institute of Technology, Meguro-ku, Tokyo Japan (e-mail: ishida0@is.titech.ac.jp)

Privacy Leakage via De-anonymization and Aggregation in Heterogeneous Social Networks (Abstract)

Huaxin Li , Computer Science & Engineering, Shanghai Jiao Tong University, Shanghai, Shanghai China (e-mail: lihuaxin003@sjtu.edu.cn)
Qingrong Chen , Computer Science and Engineering, Shanghai Jiao Tong University, 12474 Shanghai, shanghai China (e-mail: chenqingrong@sjtu.edu.cn)
Haojin Zhu , Computer Science & Engineering, Shanghai Jiao Tong University, shanghai, ShangHai China (e-mail: zhu-hj@cs.sjtu.edu.cn)
Di Ma , Computer and Information Sciences, University of Michigan-Dearborn, Dearborn, Michigan United States (e-mail: dmadma@umich.edu)
Hong Wen , National Key Laboratory of Science and Technology on Communications, University of Electronic Science and Technology of China, Chengdu, Sichuan China (e-mail: sunlike@uestc.edu.cn)
Xuemin Sherman Shen , Department of Electrical and Computer Engineering, University of Waterloo, Waterloo, Ontario Canada (e-mail: sshen@uwaterloo.ca)

Authenticated Outlier Mining for Outsourced Databases (Abstract)

Boxiang Dong , Computer Science, Montclair State University, 8087 Montclair, New Jersey United States (e-mail: bdong@stevens.edu)
Hui Wendy Wang , Computer Science, Stevens Institute of Technology, Hoboken, New Jersey United States (e-mail: hui.wang@stevens.edu)
Anna Monreale , Computer Science, University of Pisa, Pisa, PI Italy (e-mail: annam@di.unipi.it)
Dino Pedreschi , Dipartimento di Informatica, Universita di Pisa, Pisa, PI Italy 56127 (e-mail: pedre@di.unipi.it)
Fosca Giannotti , Istituto di Scienza e Tecnologie dell'Informazione, CNR, Pisa, Pisa Italy 56124 (e-mail: fosca.giannotti@isti.cnr.it)
Wenge Guo , Department of Mathematical Sciences, New Jersey Institute of Technology, 5965 Newark, New Jersey United States (e-mail: wenge.guo@njit.edu)

Known Sample Attacks on Relation Preserving Data Transformations (Abstract)

Emre Kaplan , Computer Engineering, Sabanci University, Istanbul, NA Turkey 34956 (e-mail: emrekaplan@sabanciuniv.edu)
Mehmet Emre Gursoy , Computer Science, Georgia Institute of Technology, Atlanta, Georgia United States (e-mail: memregursoy@gatech.edu)
Mehmet Ercan Nergiz , R&D, Acadsoft, Gaziantep, Gaziantep Turkey (e-mail: nergiz@gmail.com)
Yucel Saygin , Computer Engineering, Sabanci University, Orhanli, 81474, Tuzla Turkey 34956 (e-mail: ysaygin@sabanciuniv.edu)

Robust Fuzzy Extractors and Helper Data Manipulation Attacks Revisited: Theory vs Practice (Abstract)

Georg T. Becker , Digital Society Institute, European School of Management and Technology, 120306 Berlin, Berlin Germany (e-mail: georg.becker@ruhr-uni-bochum.de)

Exploiting Dissent: Towards Fuzzing-based Differential Black Box Testing of TLS Implementations (Abstract)

Andreas Walz , Institute of Reliable Embedded Systems and Communication Electronics (ivESK), Hochschule fur Technik Wirtschaft und Medien Offenburg, 64369 Offenburg, Baden-Wurttemberg Germany 77652 (e-mail: andreas.walz@hs-offenburg.de)
Axel Sikora , Institute of Reliable Embedded Systems and Communication Electronics (ivESK), Hochschule fur Technik Wirtschaft und Medien Offenburg, 64369 Offenburg, Baden-Wurttemberg Germany (e-mail: axel.sikora@hs-offenburg.de)

Private Compound Wildcard Queries using Fully Homomorphic Encryption (Abstract)

Myungsun Kim , Department of Information Security, The University of Suwon, Hwaseong-si, Gyeonggi-do Korea (the Republic of) 18323 (e-mail: msunkim@suwon.ac.kr)
Hyung Tae Lee , Division of Computer Science and Engineering, Chonbuk National University, 26714 Jeonju, Jeollabuk-do Korea (the Republic of) (e-mail: hyungtaelee@chonbuk.ac.kr)
San Ling , School of Physical and Mathematical Science, Nanyang Technological University, Singapore, sinagpore Singapore (e-mail: lingsan@ntu.edu.sg)
Benjamin Hong Meng Tan , School of Physical and Mathematical Science, Nanyang Technological University, Singapore, sinagpore Singapore (e-mail: TANH0199@e.ntu.edu.sg)
Huaxiong Wang , Division of Mathematical Sciences, Nanyang Technological University, Singapore, Singapore Singapore (e-mail: hxwang@ntu.edu.sg)

Secure Remote User Authenticated Key Establishment Protocol for Smart Home Environment (Abstract)

Mohammad Wazid , Center for Security, Theory and Algorithmic Research, International Institute of Information Technology, Hyderabad, Hyderabad, Telangana India (e-mail: mohammad.wazid@research.iiit.ac.in)
Ashok Kumar Das , Center for Security, Theory and Algorithmic Research, International Institute of Information Technology, Hyderabad, Hyderabad, Telangana India 500 032 (e-mail: iitkgp.akdas@gmail.com)
Vanga Odelu , Department of Mathematics, Indian Institute of Technology Kharagpur, Kharagpur, West Bengal India (e-mail: odelu.vanga@gmail.com)
Neeraj Kumar , CSED, Thapar University, Patiala, Patiala, Punjab India (e-mail: neeraj.kumar@thapar.edu)
Willy Susilo , School of Computing and IT, U. Wollongong, Wollongong, New South Wales Australia 2522 (e-mail: wsusilo@uow.edu.au)

I sense you by Breath: Speaker Recognition via Breath Biometrics (Abstract)

Li Lu , School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu, Sichuan China 611731 (e-mail: luli2009@uestc.edu.cn)
Lingshuang Liu , School of Computer Science and Engineering, University of Electronic Science and Technology of China, 12599 Chengdu, Sichuan China (e-mail: lsliu@std.uestc.edu.cn)
Muhammad Jawad Hussain , School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu, Sichuan China (e-mail: j19197@gmail.com)
Yongshuai Liu , School of Computer Science and Engineering, University of Electronic Science and Technology of China, 12599 Chengdu, Sichuan China (e-mail: liuys@std.uestc.edu.cn)

senDroid: Auditing Sensor Access in Android System-wide (Abstract)

Weili Han , Software School, Fudan University, Shanghai, ShangHai China 201203 (e-mail: wlhan@fudan.edu.cn)
Chang Cao , Software School, Fudan University, 12478 Shanghai, Shanghai China (e-mail: 16212010001@fudan.edu.cn)
Hao Chen , School of Information Science and Technology, ShanghaiTech University, 387433 Shanghai, Shanghai China (e-mail: chenhao@shanghaitech.edu.cn)
Dong Li , Software School, Fudan University, 12478 Shanghai, Shanghai China (e-mail: 14212010008@fudan.edu.cn)
Zheran Fang , Software School, Fudan University, 12478 Shanghai, Shanghai China (e-mail: 13212010002@fudan.edu.cn)
Wenyuan Xu , Department of Electronic Engineering, Zhejiang University, Hangzhou, Zhejiang Province China (e-mail: xuwenyuan@zju.edu.cn)
Xiaoyang Sean Wang , School of Computer Science, Fudan University, Shanghai, ShangHai China (e-mail: xywangCS@fudan.edu.cn)

Pattern-Growth based Mining Mouse-Interaction Behavior for an Active User Authentication System (Abstract)

Chao Shen , Department of Aotomation, Xi'an Jiaotong University, 12480 Xi'an, Shaanxi China 710049 (e-mail: chaoshen@mail.xjtu.edu.cn)
Yufei Chen , Department of Aotomation, Xi'an Jiaotong University, 12480 Xi'an, Shaanxi China (e-mail: yfchen@sei.xjtu.edu.cn)
Xiaohong Guan , Department of automation, Xi'an Jiaotong University, Xi'an, Shaanxi China (e-mail: xhguan@sei.xjtu.edu.cn)
Roy Maxion , Computer Science, Carnegie Mellon University, Pittsburgh, Pennsylvania United States (e-mail: maxion@cs.cmu.edu)

Cross-Rack-Aware Single Failure Recovery for Clustered File Systems (Abstract)

Zhirong Shen , Computer Scinece and Technology, High-performance Computing, Beijing, Beijing China (e-mail: zhirong.shen2601@gmail.com)
Patrick P. C. Lee , Department of Computer Science and Engineering, The Chinese University of Hong Kong, Shatin, N.T. Hong Kong (e-mail: pclee@cse.cuhk.edu.hk)
Jiwu Shu , Computer Scinece and Technology, High-performance Computing, Beijing, Beijing China 100086 (e-mail: shujw@tsinghua.edu.cn)
Wenzhong Guo , Mathematics and Computer Science, Fuzhou University, Fuzhou, Fuzhou China 350108 (e-mail: guowenzhong@fzu.edu.cn)

Secure Dependency Enforcement in Package Management Systems (Abstract)

Luigi Catuogno , Informatica, Universita' di Salerno, Fisciano, SA Italy I-84084 (e-mail: luicat@dia.unisa.it)
Clemente Galdi , Ingegneria Elettrica e Tecnologie dell'Informazione, Universita' di Napoli, Napoli, NA Italy 80125 (e-mail: clemente.galdi@unina.it)
Pino Persiano , Scienze Aziendali - Management e Information Systems, Universita di Salerno, Fisciano, Salerno Italy (e-mail: giuper@dia.unisa.it)

Connecting the Dots: Privacy Leakage via Write-Access Patterns to the Main Memory (Abstract)

Tara Merin John , Electrical & Computer Engineering, University of Connecticut, 7712 Storrs, Connecticut United States (e-mail: tara.john@uconn.edu)
Syed Kamran Haider , Electrical & Computer Engineering, University of Connecticut, 7712 Storrs, Connecticut United States (e-mail: syed.haider@uconn.edu)
Hamza Omar , Electrical & Computer Engineering, University of Connecticut, 7712 Storrs, Connecticut United States (e-mail: hamza.omar@uconn.edu)
Marten Van Dijk , Electrical & Computer Engineering, University of Connecticut, 7712 Storrs, Connecticut United States (e-mail: marten.van_dijk@uconn.edu)

Bilateral Privacy-preserving Utility Maximization Protocol in Database-driven Cognitive Radio Networks (Abstract)

Zhikun Zhang , Department of Control, Zhejiang University, Hangzhou, Zhejiang China (e-mail: zhangzhk@zju.edu.cn)
Heng Zhang , Mathematics, Huaihai Institute of Technology, Lianyungang, Jiangsu China (e-mail: ezhangheng@gmail.com)
Shibo He , Control science and engineering, Zhejiang University, 12377 Hangzhou, Zhejiang China (e-mail: s18he@zju.edu.cn)
Peng Cheng , dept. of control, zhejiang univ., hangzhou, Zhejiang China (e-mail: saodiseng@gmail.com)

Privacy-Preserving Data Processing with Flexible Access Control (PDF)

Wenxiu Ding , School of Cyber Engineering, Xidian University, 47905 Xian, Shaanxi China (e-mail: wenxiuding_1989@126.com)
Zheng Yan , Department of Communications and Networking, Aalto University, Espoo, Helsinki area Finland (e-mail: zhengyan.pz@gmail.com)
Robert Deng , School of Information Systems, Singapore Management University, Singapore, Singapore Singapore (e-mail: robertdeng@smu.edu.sg)

Multi-user Multi-Keyword Rank Search over Encrypted Data in Arbitrary Language (Abstract)

Yang Yang , College of Mathematics and Computer Science, Fuzhou University, Fuzhou, Fujian Province China (e-mail: yang.yang.research@gmail.com)
Ximeng Liu , SCHOOL OF INFORMATION SYSTEMS, Singapore Management University, Singapore, Singapore Singapore (e-mail: snbnix@gmail.com)
Robert Deng , School of Information Systems, Singapore Management University, Singapore, Singapore Singapore (e-mail: robertdeng@smu.edu.sg)

The Overhead from Combating Side-Channels in Cloud Systems using VM-Scheduling (Abstract)

Nahid Juma , ECE, University of Waterloo, Waterloo, Ontario Canada (e-mail: ndawood@uwaterloo.ca)
Jonathan Shahen , ECE, University of Waterloo, Waterloo, Ontario Canada (e-mail: jmshahen@uwaterloo.ca)
Khalid Bijon , Engineering, MosaixSoft, Los Altos, California United States (e-mail: khalid@mosaixsoft.com)
Mahesh V. Tripunitara , ECE, University of Waterloo, Waterloo, Ontario Canada N2L 3G1 (e-mail: tripunit@uwaterloo.ca)

Providing Task Allocation and Secure Deduplication for Mobile Crowdsensing via Fog Computing (Abstract)

Jianbing Ni , Electrical and Computer Engineering, University of Waterloo, 8430 Waterloo, Ontario Canada (e-mail: j25ni@uwaterloo.ca)
Kuan Zhang , Department of Electrical and Computer Engineering, University of Nebraska-Lincoln, 14719 Lincoln, Nebraska United States (e-mail: k52zhang@uwaterloo.ca)
Yong Yu , School of Computer Science, Shaanxi Normal University, 12401 Xi'an, Shaanxi China (e-mail: yuyong@snnu.edu.cn)
Xiaodong Lin , Department of Physics and Computer Science, Wilfrid Laurier University, 8431 Waterloo, Ontario Canada (e-mail: Xiaodong.Lin@uoit.ca)
Xuemin Sherman Shen , Electrical and Computer Engineering, University of Waterloo, Waterloo, Ontario Canada N2L 3G1 (e-mail: xshen@bbcr.uwaterloo.ca)

Privacy Protection in Interactive Content Based Image Retrieval (Abstract)

Yonggang Huang , School of Computer Science and Technology, Beijing Institute of Technology, 47833 Beijing, Beijing China (e-mail: yonggang.h@gmail.com)
Jun Zhang , School of Software and Electrical Engineering, Swinburne University of Technology, 3783 Hawthorn, Victoria Australia (e-mail: junzhang@swin.edu.au)
Lei Pan , School of Information Technology, Deakin University, 2104 Burwood, Victoria Australia (e-mail: l.pan@deakin.edu.au)
Yang Xiang , School of Software and Electrical Engineering, Swinburne University of Technology, Hawthorn, Victoria Australia (e-mail: yxiang@swin.edu.au)

Privacy-Preserving Cloud Establishment and Data Dissemination Scheme for Vehicular Cloud (Abstract)

Lei Zhang , Software Engineering Institute, East China Normal University, Shanghai, ShangHai China (e-mail: leizhang@sei.ecnu.edu.cn)
Xinyu Men , School of Computer Science and Software Engineering, East China Normal University, 12655 Shanghai, Shanghai China (e-mail: 51164500111@stu.ecnu.edu.cn)
Kim-Kwang Raymond Choo , Department of Information Systems and Cyber Security, University of Texas at San Antonio, 12346 San Antonio, Texas United States 78249-1644 (e-mail: raymond.choo@fulbrightmail.org)
Yuanfei Zhang , School of Computer Science and Software Engineering, East China Normal University, 12655 Shanghai, Shanghai China (e-mail: 51151500152@stu.ecnu.edu.cn)
Feifei Dai , Software Engineering Institute, East China Normal University, Shanghai, ShangHai China (e-mail: dffscu@163.com)

Distributed Group Key Management for Event Notification Confidentiality among Sensors (Abstract)

Christian Esposito , Department of Computer Science, University of Salerno, Fisciano, Salerno Italy (e-mail: christian.esposito@dia.unisa.it)
Massimo Ficco , Industrial and Information Engineering, Second University of Naples (SUN), Aversa, caserta Italy 81031 (e-mail: massimo.ficco@unina2.it)
Aniello Castiglione , Department of Computer Science, University of Salerno, Fisciano, Salerno Italy 84084 (e-mail: castiglione@ieee.org)
Francesco Palmieri , Department of Computer Science, University of Salerno, Fisciano, Salerno Italy (e-mail: fpalmieri@unisa.it)
Alfredo De Santis , Dipartimento di Informatica, Università di Salerno, Fisciano (SA), Fisciano Italy (e-mail: ads@unisa.it)

FourQ on embedded devices with strong countermeasures against side-channel attacks (Abstract)

Zhe Liu , N/A, Universite du Luxembourg, 81872 Luxembourg, N/A Luxembourg (e-mail: zhelu.liu@uwaterloo.ca)
Patrick Longa , MSR Security and Cryptography, Microsoft Research, Redmond, Washington United States (e-mail: plonga@microsoft.com)
Geovandro Pereira , Institute for Quantum Computing, University of Waterloo, Waterloo, Ontario Canada (e-mail: geovandro.pereira@uwaterloo.ca)
Oscar Reparaz , COSIC, KU Leuven, Leuven, Leuven Belgium (e-mail: oscar.reparaz@esat.kuleuven.be)
Hwajeong Seo , N/A, Hansung University, 34952 Seoul, N/A Korea (the Republic of) (e-mail: hwajeong84@gmail.com)

BVPSMS: A Batch Verification Protocol for End-to-End Secure SMS for Mobile Users (Abstract)

Neetesh Saxena , School of Electrical and Computer Engineering, Georgia Institute of Technology, 1372 Atlanta, Georgia United States 30332-0002 (e-mail: neetesh.saxena1@gmail.com)
Hong Shen , Computer Science, University of Adelaide, 1066 Adelaide, South Australia Australia (e-mail: hong.shen@adelaide.edu.au)
Nikos Komninos , Computer Science, INTO City University London, 425941 London, London United Kingdom of Great Britain and Northern Ireland (e-mail: nikos.komninos.1@city.ac.uk)
Kim-Kwang Raymond Choo , Department of Information Systems and Cyber Security, University of Texas at San Antonio, 12346 San Antonio, Texas United States 78249-1644 (e-mail: raymond.choo@fulbrightmail.org)
Narendra S. Chaudhari , Computer Science & Engineering, Visvesvaraya National Institute of Technology, 29583 Nagpur, Maharashtra India (e-mail: nsc0183@gmail.com)

GaitLock: Protect Virtual and Augmented Reality Headsets Using Gait (Abstract)

Yiran Shen , College of Computer Science and Technology, Harbin University of Engineering, Harbin, Heilongjiang China 150001 (e-mail: shenyiran@hrbeu.edu.cn)
Hongkai Wen , Department of Computer Science, University of Warwick, 2707 Coventry, West Midlands United Kingdom of Great Britain and Northern Ireland (e-mail: hongkai.wen@dcs.warwick.ac.uk)
Chengwen Luo , College of Computer Science and Software Engineering, Shenzhen University, 47890 Shenzhen, Guangdong China 518060 (e-mail: chengwen@szu.edu.cn)
Weitao Xu , College of Computer Science and Software Engineering, Shenzhen University, 47890 Shenzhen, Guangdong China (e-mail: xuweitao005@gmail.com)
Tao Zhang , College of Computer Science and Technology, Harbin Engineering University, 12428 Harbin, Heilongjiang China (e-mail: cstzhang@hrbeu.edu.cn)
Wen Hu , School of Computer Science and Engineering, University of New South Wales, Sydney, New South Wales Australia (e-mail: wen.hu@unsw.edu.au)
Daniela Rus , Department of Electrical Engineering and Computer Science, MIT, Cambridge, Massachusetts United States (e-mail: rus@mit.edu)

Anonymity Services Tor, I2P, JonDonym: Classifying in the Dark (Web) (Abstract)

Antonio Pescape , Ingegneria Elettrica e delle Tecnologie dell'Informazione, University of Napoli Federico II, Napoli, Italy Italy 80125 (e-mail: pescape@unina.it)
Antonio Montieri , DIETI, University of Napoli Federico II, Napoli, Italy Italy (e-mail: antonio.montieri@unina.it)
Giuseppe Aceto , Dipartimanto di Ingegneria Elettrica e Tecnologie dell'Informazione, University of Napoli ‘Federico II’, Napoli, NA Italy (e-mail: giuseppe.aceto@unina.it)
Domenico Ciuonzo , DIETI, Universita degli Studi di Napoli Federico II, 9307 Napoli, Napoli Italy 80138 (e-mail: domenico.ciuonzo@gmail.com)

Impact of Failure Prediction on Availability: Modeling and Comparative Analysis of Predictive and Reactive Methods (Abstract)

Igor Kaitovic , Faculty of Informatics, ALaRI, University of Lugano, Lugano, Ticino Switzerland 6900 (e-mail: igor.kaitovic@usi.ch)
Miroslaw Malek , Institut für Informatik, Humboldt-Universitat zu Berlin, 9373 Berlin, Berlin Germany (e-mail: miroslaw.malek@usi.ch)

Impact of Stealthy Attacks on Optimal Power Flow: A Simulink-Driven Formal Analysis (Abstract)

Mohammad Ashiqur Rahman , Computer Science, Tennessee Technological University, Cookeville, Tennessee United States 38505 (e-mail: marahman@tntech.edu)
Amarjit Datta , Computer Science, Tennessee Technological University, Cookeville, Tennessee United States (e-mail: adatta42@students.tntech.edu)

Dynamic Packet Forwarding Verification in SDN (Abstract)

Qi Li , Computer Science and Technology, Graduate School at Shenzhen, Tsinghua University, Shenzhen, Guangdong China (e-mail: qi.li@sz.tsinghua.edu.cn)
Xiaoyue Zou , Graduate School at Shenzhen, Tsinghua University, 12442 Beijing, Beijing China (e-mail: zouxy16@mails.tsinghua.edu.cn)
Qun Huang , Department of Computer Science and Engineering, The Chinese University of Hong Kong, Shatin, N.T. Hong Kong (e-mail: huangqun@ict.ac.cn)
Jing Zheng , Dept. of Computer Science, Tsinghua University, 12442 Beijing, Beijing China (e-mail: zhengj14@mails.tsinghua.edu.cn)
Patrick P. C. Lee , Department of Computer Science and Engineering, The Chinese University of Hong Kong, Shatin, N.T. Hong Kong (e-mail: pclee@cse.cuhk.edu.hk)

HAL- The Missing Piece of the Puzzle for Hardware Reverse Engineering, Trojan Detection and Insertion (Abstract)

Marc Fyrbiak , Electrical Engineering and Information Technology, Ruhr University Bochum, Bochum, NRW Germany 44801 (e-mail: marc.fyrbiak@rub.de)
Sebastian Wallat , Computer and Electrical Engineering, University of Massachusetts Amherst, 14707 Amherst, Massachusetts United States (e-mail: swallat@umass.edu)
Pawel Swierczynski , Chair for Embedded Security, Ruhr-University Bochum, Bochum, NRW Germany 44801 (e-mail: pawel.swierczynski@rub.de)
Max Hoffmann , Horst Gortz Institute for IT-Security, Ruhr-University Bochum, Bochum, NRW Germany (e-mail: max.hoffmann@rub.de)
Sebastian Hoppach , Horst Gortz Institute for IT-Security, Ruhr-University Bochum, Bochum, NRW Germany (e-mail: sebastian.hoppach@rub.de)
Matthias Wilhelm , Horst Gortz Institute for IT-Security, Ruhr-University Bochum, Bochum, NRW Germany (e-mail: matthias.wilhelm@rub.de)
Tobias Weidlich , Horst Gortz Institute for IT-Security, Ruhr-University Bochum, Bochum, NRW Germany (e-mail: tobias.weidlich@rub.de)
Russell Tessier , Computer and Electrical Engineering, University of Massachusetts Amherst, 14707 Amherst, Massachusetts United States (e-mail: tessier@umass.edu)
Christof Paar , Horst Gortz Institute for IT-Security, Ruhr-University Bochum, Bochum, NRW Germany (e-mail: christof.paar@rub.de)

Key based Artificial Fingerprint Generation for Privacy Protection (Abstract)

Sheng Li , School of Computer Science, Fudan University, 12478 Shanghai, Shanghai China (e-mail: lisheng@fudan.edu.cn)
Xinpeng Zhang , School of Computer Science, Fudan University, 12478 Shanghai, Shanghai China (e-mail: xzhang@shu.edu.cn)
Zhenxing Qian , School of Computer Science, Fudan University, 12478 Shanghai, Shanghai China (e-mail: zxqian@shu.edu.cn)
Guorui Feng , School of Communication and Information Engineering, Shanghai University, 34747 Shanghai, Shanghai China (e-mail: grfeng@shu.edu.cn)
Yanli Ren , School of Communication and Information Engineering, Shanghai University, Shanghai, Shanghai China (e-mail: renyanli@shu.edu.cn)

SDN-based Privacy Preserving Cross Domain Routing (Abstract)

Qingjun Chen , Computer, Nanjing University, Nanjing, Jiangsu China (e-mail: knight.chan319@gmail.com)
Shouqian Shi , Computer Engineering, University of California Santa Cruz Department of Computer Engineering, 370790 Santa Cruz, California United States (e-mail: sshi27@ucsc.edu)
Xin Li , Department of Computer Science, University of Kentucky, 4530 Lexington, Kentucky United States 40506 (e-mail: xli178@ucsc.edu)
Chen Qian , the Department of Computer Engineering, University of California, Santa Cruz, California United States (e-mail: cqian12@ucsc.edu)
Sheng Zhong , CST, Nanjing University, Nanjing, Jiangsu China (e-mail: zhongsheng@nju.edu.cn)

AdCapsule: Practical Confinement of Advertisements in Android Applications (Abstract)

Xiaonan Zhu , School of Cyber Engineering, Xidian University, Xi'an, Shaanxi China (e-mail: xnzhu@stu.xidian.edu.cn)
Jinku Li , School of Cyber Engineering, Xidian University, Xi'an, Shaanxi China (e-mail: jkli@xidian.edu.cn)
Yajin Zhou , Cyber Security Research Institute and College of Computer Science and Technology, Zhejiang University, Hangzhou, Zhejiang China (e-mail: yajin@vm-kernel.org)
Jianfeng Ma , School of Cyber Engineering, Xidian University, Xi'an, Shaanxi China (e-mail: jfma@mail.xidian.edu.cn)

Look-aside At Your Own Risk: Privacy Implications of DNSSEC Look-aside Validation (Abstract)

Aziz Mohaisen , Computer Science, University of Central Florida, Orlando, Florida United States (e-mail: amohaisen@gmail.com)
Zhongshu Gu , Research, IBM, NYC, New York United States (e-mail: gzs715@gmail.com)
Kui Ren , CSE, SUNY at Buffalo, Buffalo, New York United States 14260 (e-mail: kuiren@buffalo.edu)
Zhenhua Li , School of Software, Tsinghua University, Beijing, Beijing China (e-mail: lizhenhua1983@tsinghua.edu.cn)
Laurent Njilla , RIGA, AFRL, Rome, New York United States (e-mail: laurent.njilla@us.af.mil)
Charles Alexandre Kamhoua , Information Directorate, Air Force Research Laboratory, Rome, New York United States 13440 (e-mail: charles.kamhoua.1@us.af.mil)
DaeHun Nyang , Graduate School of Information Technology and Telecommunications, InHa University, Inchoen, Incheon Korea, Republic of 402-751 (e-mail: nyang@inha.ac.kr)

Automatic Privacy and Utility Preservation for Mobility Data: A Nonlinear Model-Based Approach (Abstract)

Sophie Cerf , control department, GIPSA-Lab, 84297 Saint Martin d'Heres, Auvergne Rhone Alpes France (e-mail: sophie.cerf@gipsa-lab.fr)
Sara Bouchenak , DRIM, Laboratoire d'Informatique en Images et Systemes d'Information, 131797 Villeurbanne, Rhône-Alpes France (e-mail: Sara.Bouchenak@insa-lyon.fr)
Bogdan Robu , SISCO-Automatic, University of Grenoble - GIPSA lab, Grenoble, Rhone-Alpes France (e-mail: bogdan.robu@gipsa-lab.fr)
Nicolas Marchand , Control Department, GIPSA-lab, Grenoble, Grenoble France (e-mail: nicolas.marchand@gipsa-lab.fr)
Vincent Primault , Information Security Group, University College London Department of Computer Science, 206999 London, London United Kingdom of Great Britain and Northern Ireland (e-mail: vincent.primault@insa-lyon.fr)
Sonia Ben Mokhtar , Computer Science, CNRS, LIRIS, Villeurbanne, MS' France (e-mail: sonia.ben-mokhtar@liris.cnrs.fr)
Antoine Boutet , Privatics, CENTRE OF INNOVATION IN TELECOMMUNICATIONS AND INTEGRATION OF SERVICE, Lyon, Rhone Alpes France (e-mail: Antoine.Boutet@inria.fr)
Lydia Y. Chen , Cloud System, IBM Research GmbH, Zurich Research Lab, Ruschlikon, ZH Switzerland (e-mail: lydiaychen@ieee.org)

Privacy-Preserving Outsourced Calculation Toolkit in the Cloud (Abstract)

Ximeng Liu , SCHOOL OF INFORMATION SYSTEMS, Singapore Management University, Singapore, Singapore Singapore (e-mail: snbnix@gmail.com)
Robert Deng , School of Information Systems, Singapore Management University, Singapore, Singapore Singapore (e-mail: robertdeng@smu.edu.sg)
Kim-Kwang Raymond Choo , Department of Information Systems and Cyber Security, University of Texas at San Antonio, 12346 San Antonio, Texas United States 78249-1644 (e-mail: raymond.choo@fulbrightmail.org)
Yang Yang , College of Mathematics and Computer Science, Fuzhou University, Fuzhou, Fujian Province China (e-mail: yang.yang.research@gmail.com)
HweeHwa Pang , School of Information Systems, Singapore Management University, Singapore, Singapore Singapore 178902 (e-mail: hhpang@smu.edu.sg)

High rate robust codes with low implementation complexity (Abstract)

Hila Rabii , Faculty of Engineering, Universitat Bar-Ilan, 26731 Ramat Gan, Israel Israel (e-mail: hila.rabii@live.biu.ac.il)
Yaara Neumeier , Faculty of Engineering, Universitat Bar-Ilan, 26731 Ramat Gan, Israel Israel (e-mail: yaara.neumeier@biu.ac.il)
Osnat Keren , Faculty of Engineering, Universitat Bar-Ilan, 26731 Ramat Gan, Israel Israel (e-mail: osnat.keren@biu.ac.il)

CAFE: A Virtualization-Based Approach to Protecting Sensitive Cloud Application Logic Confidentiality (Abstract)

Sungjin Park , System Research Division, The Attached Institute of ETRI, Daejeon, Daejeon Korea (the Republic of) (e-mail: taiji@nsr.re.kr)
Chung Hwan Kim , Computer Security Department, NEC Labs America, Princeton, New Jersey United States (e-mail: chungkim@nec-labs.com)
Junghwan Rhee , Autonomic Management, NEC Labs America, Princeton, New Jersey United States 08540 (e-mail: rhee@nec-labs.com)
Jong-Jin Won , System Research Division, The Attached Institute of ETRI, Daejeon, Daejeon Korea (the Republic of) (e-mail: wonjj@nsr.re.kr)
Taisook Han , School of Computing, Korea Advanced Institute of Science and Technology, 34968 Daejeon, Daejeon Korea (the Republic of) (e-mail: han@cs.kaist.ac.kr)
Dongyan Xu , Department of Computer Sciences, Purdue University, West Lafayette, Indiana United States 47907-2107 (e-mail: dxu@cs.purdue.edu)

Automatic Extraction of Access Control Policies from Natural Language Documents (Abstract)

Masoud Narouei , Computer Science and Engineering, University of North Texas, 3404 Denton, Texas United States (e-mail: masoudnarouei@my.unt.edu)
Hassan Takabi , Computer Science and Engineering, University Of North texas, Denton, Texas United States (e-mail: Hassan.takabi@unt.edu)
Rodney Nielsen , Computer Science and Engineering, University Of North texas, Denton, Texas United States (e-mail: Rodney.Nielsen@unt.edu)

Detecting and Mitigating Target Link-Flooding Attacks Using SDN (Abstract)

Juan Wang , School of Cyber Science and Engineering, Wuhan University, Wuhan, Hubei China (e-mail: jwang@whu.edu.cn)
Ru Wen , School of Cyber Science and Engineering, Wuhan University, Wuhan, Hubei China (e-mail: ruyulh@whu.edu.cn)
Jiangqi Li , School of Cyber Science and Engineering, Wuhan University, Wuhan, Hubei China (e-mail: lijqi@whu.edu.cn)
Fei Yan , School of Cyber Science and Engineering, Wuhan University, Wuhan, Hubei China (e-mail: yanfei@whu.edu.cn)
Bo Zhao , School of Cyber Science and Engineering, Wuhan University, Wuhan, Hubei China (e-mail: zhaobo@whu.edu.cn)
Fajiang Yu , School of Cyber Science and Engineering, Wuhan University, Wuhan, Hubei China (e-mail: fjyug@whu.edu.cn)

Forward Private Searchable Symmetric Encryption with Optimized I/O Efficiency (Abstract)

Xiangfu Song , School of computer science and technology, Shandong University, 12589 Jinan, Shandong China (e-mail: bintasong@gmail.com)
Changyu Dong , School of Computing Sciences, Newcastle University, 5994 Newcastle upon Tyne, Glasgow United Kingdom of Great Britain and Northern Ireland NE1 7RU (e-mail: changyu.dong@newcastle.ac.uk)
Ddadan Yuan , School of Computer Science and Technology, Shandong University, 12589 Jinan, Shandong China (e-mail: dandanyuan.sdu@gmail.com)
Qiuliang Xu , School of computer science and technology, Shandong University, 12589 Jinan, Shandong China (e-mail: xql@sdu.edu.cn)
Minghao Zhao , School of Software, Tsinghua University, 12442 Beijing, Beijing China (e-mail: mh-zhao17@mails.tsinghua.edu.cn)

Misbehavior in Multi-channel MAC Protocols (Abstract)

Yan Zhang , Electrical and Computer Engineering, University of Arizona, TUCSON, Arizona United States 85721 (e-mail: yanzhang@email.arizona.edu)
Loukas Lazos , Electrical and Computer Engineering, University of Arizona, Tucson, Arizona United States (e-mail: llazos@ece.arizona.edu)

Detecting Fault Injection Attacks Based on Compressed Sensing and Integer Linear Programming (Abstract)

Huiyun Li , Automotive Electronics Research Center, Shenzhen Institute of Advanced Technology, Chinese Academy of Sciences, Shenzhen, Guangdong China (e-mail: hy.li@siat.ac.cn)
Cuiping Shao , Shenzhen College of Advanced Technology, University of the Chinese Academy of Sciences, 74519 Shenzhen, Guangdong China (e-mail: cp.shao@siat.ac.cn)
Zheng Wang , Automotive Electronics Research Center, Shenzhen Institute of Advanced Technology, Chinese Academy of Sciences, Shenzhen, Guangdong China (e-mail: zheng.wang@siat.ac.cn)

A Secure Exception Mode for Fault-Attack-Resistant Processing (Abstract)

Bilgiday Yuce , Electrical and Computer Engineering, Virginia Tech, Blacksburg, Virginia United States (e-mail: bilgiday@vt.edu)
Chinmay Deshpande , Electrical and Computer Engineering, Virginia Tech, Blacksburg, Virginia United States (e-mail: chinmay@vt.edu)
Marjan Ghodrati , Electrical and Computer Engineering, Virginia Tech, Blacksburg, Virginia United States (e-mail: marjang@vt.edu)
Abhishek Bendre , Electrical and Computer Engineering, Virginia Tech, Blacksburg, Virginia United States (e-mail: abhi94@vt.edu)
Leyla Nazhandali , Electrical and Computer Engineering, Virginia Tech, Blacksburg, Virginia United States 24061 (e-mail: leyla@vt.edu)
Patrick Robert Schaumont , Electrical and Computer Engineering, Virginia Tech, Blacksburg, Virginia United States 24061 (e-mail: schaum@vt.edu)

▵Breakpad: Diversified Binary Crash Reporting (Abstract)

Bert Abrath , Computer Systems Lab, Ghent University, Ghent, Oost-Vlaanderen Belgium (e-mail: bert.abrath@ugent.be)
Bart Coppens , Computer Systems Lab, Ghent University, Ghent, Oost-Vlaanderen Belgium (e-mail: bart.coppens@ugent.be)
Mohit Mishra , Computer Systems Lab, Ghent University, Ghent, Oost-Vlaanderen Belgium (e-mail: mmishra23@gmail.com)
Jens Van den Broeck , Computer Systems Lab, Ghent University, Ghent, Oost-Vlaanderen Belgium (e-mail: jens.vandenbroeck@ugent.be)
Bjorn De Sutter , Electronics and Information Systems, Ghent University, Gent, Oost-Vlaanderen Belgium 9052 (e-mail: bjorn.desutter@ugent.be)

Decay-Based DRAM PUFs in Commodity Devices (Abstract)

Andre Schaller , Security Engineering, Technische Universitat Darmstadt Fachbereich Informatik, 233371 Darmstadt, Hessen Germany 64283 (e-mail: schaller@seceng.informatik.tu-darmstadt.de)
Wenjie Xiong , Electrical Engineering, Yale University Department of Electrical Engineering, 198907 New Haven, Connecticut United States (e-mail: wenjie.xiong@yale.edu)
Nikolaos Athanasios Anagnostopoulos , Security Engineering, Technische Universitat Darmstadt Fachbereich Informatik, 233371 Darmstadt, Hessen Germany (e-mail: anagnostopoulos@seceng.informatik.tu-darmstadt.de)
Muhammad Umair Saleem , Information and Communication Engineering, Technische Universitat Darmstadt Fachbereich Elektrotechnik und Informationstechnik, 235714 Darmstadt, Hessen Germany (e-mail: muhammadumair.saleem@stud.tu-darmstadt.de)
Sebastian Gabmeyer , Computer Science Department, Technische Universitat Darmstadt Fachbereich Informatik, 233371 Darmstadt, Hessen Germany (e-mail: gabmeyer@seceng.informatik.tu-darmstadt.de)
Boris Skoric , Dept. of Mathematics and Computer Science, Eindhoven University of Technology, Eindhoven, . Netherlands (e-mail: b.skoric@tue.nl)
Stefan Katzenbeisser , Computer Science Department, Technische Universität Darmstadt, Darmstadt, - Germany 64283 (e-mail: katzenbeisser@seceng.informatik.tu-darmstadt.de)
Jakub Szefer , Electrical Engineering, Yale University, New Haven, Connecticut United States (e-mail: jakub.szefer@yale.edu)

Memory-Efficient Implementation of Elliptic Curve Cryptography for the Internet-of-Things (Abstract)

Zhe Liu , Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, 47854 Nanjing, Jiangsu China (e-mail: sduliuzhe@gmail.com)
Hwajeong Seo , Dept. of Computer Science & Engineering, Pusan National University, Busan, Busan Korea (the Republic of) (e-mail: hwajeong@pusan.ac.kr)
Aniello Castiglione , Department of Computer Science, University of Salerno, Fisciano, Salerno Italy 84084 (e-mail: castiglione@ieee.org)
Kim-Kwang Raymond Choo , Department of Information Systems and Cyber Security, University of Texas at San Antonio, 12346 San Antonio, Texas United States 78249-1644 (e-mail: raymond.choo@fulbrightmail.org)
Howon Kim , Dept. of Computer Science & Engineering, Pusan National University, Busan, Busan Korea (the Republic of) (e-mail: howonkim@pusan.ac.kr)

Another Look at Anonymous Communication (Abstract)

Russell W. F. Lai , Chair of Applied Cryptography, Friedrich-Alexander-Universitat Erlangen-Nurnberg Technische Fakultat, 88768 Erlangen, Bayern Germany (e-mail: russell.lai@cs.fau.de)
Kam-Fung Cheung , Systems Engineering and Engineering Management, Chinese University of Hong Kong, 26451 New Territories, Hongkong Hong Kong (e-mail: kfcheung@link.cuhk.edu.hk)
Sherman S.M. Chow , Department of Information Engineering, Chinese University of Hong Kong, 26451 New Territories, Hongkong Hong Kong (e-mail: smchow@ie.cuhk.edu.hk)
Anthony M.C. So , Dept of Systems Engineering and Engineering Management, The Chinese University of Hong Kong, Shatin, NT Hong Kong (e-mail: manchoso@se.cuhk.edu.hk)

Cloud Centric Authentication for Wearable Healthcare Monitoring System (Abstract)

J Srinivas , Cyber Security, IIT Hyderabad, hyderabad, Andhra Pradesh India (e-mail: getsrinunow1@gmail.com)
Ashok Kumar Das , Center for Security, Theory and Algorithmic Research, International Institute of Information Technology, Hyderabad, Hyderabad, Telangana India 500 032 (e-mail: iitkgp.akdas@gmail.com)
Neeraj Kumar , CSED, Thapar University, Patiala, Patiala, Punjab India (e-mail: neeraj.kumar@thapar.edu)
Joel Rodrigues , Post-graduation, National Institute of Telecommunications (Inatel), Santa Rita do Sapucaí, MG Brazil 37540-000 (e-mail: joeljr@ieee.org)

Enabling Efficient User Revocation in Identity-based Cloud Storage Auditing for Shared Big Data (Abstract)

Yue Zhang , College of Computer Science and Technique, Qingdao University, 12593 Qingdao, Shandong China (e-mail: 136299762@qq.com)
Jia Yu , College of Information Engineering, Qingdao University, Qingdao, Shandong China (e-mail: qduyujia@gmail.com)
Rong Hao , College of Computer Science and Technology, Qingdao University, 12593 Qingdao, Shandong China (e-mail: hr@qdu.edu.cn)
Cong Wang , Computer Science, City University of Hong Kong, Hong Kong, Hong Kong Hong Kong (e-mail: congwang@cityu.edu.hk)
Kui Ren , CSE, SUNY at Buffalo, Buffalo, New York United States 14260 (e-mail: kuiren@buffalo.edu)

Learning with Physical Noise or Errors (Abstract)

Dina Kamel , ICTEAM, Université catholique de Louvain, Louvain-la-Neuve, Wallonia Belgium (e-mail: dina.kamel@uclouvain.be)
Francois-Xavier Standaert , Microelectronics, Universite Catholoique de Louvain, Louvain-la-Neuve, Brabant Belgium 1348 (e-mail: fstandae@uclouvain.be)
Alexandre Duc , LASEC, Ecole polytechnique federale de Lausanne Section de Mathematiques, 30682 Lausanne, VD Switzerland (e-mail: alexandre.aduc@gmail.com)
Denis Flandre , ICTEAM, Universite Catholique de Louvain Ecole Polytechnique de Louvain, 54518 Louvain-la-Neuve, Wallonia Belgium (e-mail: denis.flandre@uclouvain.be)
Francesco Berti , ICTEAM, Universite Catholique de Louvain Ecole Polytechnique de Louvain, 54518 Louvain-la-Neuve, Wallonia Belgium (e-mail: francesco.berti@uclouvain.be)

Building PUF based Authentication and Key Exchange Protocol for IoT without Explicit CRPs in Verifier Database (Abstract)

Urbi Chatterjee , Computer Science and Engineering, Indian Institute of Technology Kharagpur, 30133 Kharagpur, West Bengal India 721302 (e-mail: urbi.ism@gmail.com)
Vidya Govindan , Computer Science and Technology, Indian Institute of Technology Kharagpur, 30133 Kharagpur, West Bengal India 721302 (e-mail: vidya.govindan@iitkgp.ac.in)
Rajat Sadhukhan , Computer Science and Engineering, Indian Institute of Technology Kharagpur, 30133 Kharagpur, West Bengal India 721302 (e-mail: rajat.sadhukhan@iitkgp.ac.in)
Debdeep Mukhopadhyay , Computer Sc. and Eng., ITT, Kharagpur, WB India 721302 (e-mail: debdeep@cse.iitkgp.ernet.in)
Rajat Subhra Chakraborty , Computer Science and Engineering, Indian Institute of Technology, Kharagpur, Kharagpur, West Bengal India 721302 (e-mail: rschakraborty@cse.iitkgp.ernet.in)
Debashis Mahata , Product Engineering Service, Wipro Limited, 113418 Kolkata, West Bengal India 700091 (e-mail: debashismahata@gmail.com)
Mukesh M. Prabhu , Product Engineering Services, Wipro Limited, 113418 Bangalore, karnataka India 560035 (e-mail: m_prabhu1@yahoo.com)

Multi-CDN: Towards Privacy in Content Delivery Networks (Abstract)

Shujie Cui , Department of Computer Science, The University of Auckland, Auckland, Auckland New Zealand (e-mail: scui379@aucklanduni.ac.nz)
Muhammad Rizwan Asghar , Department of Computer Science, The University of Auckland, Auckland, Auckland New Zealand (e-mail: r.asghar@auckland.ac.nz)
Giovanni Russello , Department of Computer Science, University of Auckland, Auckland, Auckland New Zealand (e-mail: g.russello@auckland.ac.nz)

MARP: A Distributed MAC Layer Attack Resistant Pseudonym Scheme for VANET (Abstract)

Zishan Liu , School of Information and Communication Engineering, Beijing University of Posts and Telecommunications, 12472 Beijing, Beijing China 100088 (e-mail: liuzishan@bupt.edu.cn)
Zhenyu Liu , Key Laboratory of Universal Wireless Communications, Beijing University of Posts and Telecommunications, 12472 Beijing, Beijing China (e-mail: lzyu@bupt.edu.cn)
Lin Zhang , School of Information and Communication Engineering, Beijing University of Posts and Telecommunications, Beijing, Beijing China (e-mail: zhanglin@bupt.edu.cn)
Xiaodong Lin , FBIT, UOIT, Oshawa, Ontario Canada (e-mail: xlin@wlu.ca)

Safety Decidability for Pre-Authorization Usage Control with Identifier Attribute Domains (Abstract)

Rajkumar P.V. , Information Systems, Texas Southern University, Houston, Texas United States (e-mail: rajkumarpv@gmail.com)
Ravi Sandhu , Institute for Cyber Security, Univeristy of Texas at San Antonio, San Antonio, Texas United States 78249 (e-mail: ravi.sandhu@utsa.edu)

Retrofitting the Partially Privileged Mode for TEE Communication Channel Protection (Abstract)

Jinsoo Jang , Graduate School of Information Security, Korea Advanced Institute of Science and Technology, 34968 Daejeon, N/A Korea (the Republic of) 305-701 (e-mail: jisjang@kaist.ac.kr)
Brent Byunghoon Kang , Graduate School of Information Security, Korea Advanced Institute of Science and Technology, 34968 Yuseong-gu, Deajeon Korea (the Republic of) 305-701 (e-mail: brentkang@kaist.ac.kr)

Energy-efficient Superconductor Bloom Filters for Streaming Data Inspection (Abstract)

Mikhail Dorojevets , Electrical and Computer Eng., Stony Brook University, 12301 Stony Brook, New York United States 11794-2350 (e-mail: mikhail.dorojevets@stonybrook.edu)

Efficient Fine-Grained Data Sharing Mechanism for Electronic Medical Record Systems with Mobile Devices (Abstract)

Hui Ma , State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, Beijing China 100093 (e-mail: mahui@iie.ac.cn)
Rui Zhang , School of Cyber Security, University of the Chinese Academy of Sciences, 74519 Beijing, Beijing China (e-mail: r-zhang@iie.ac.cn)
Guomin Yang , School of Computing and Information Technology, University of Wollongong, Wollongong, New South Wales Australia (e-mail: gyang@uow.edu.au)
Zishuai Song , State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, Beijing China (e-mail: songzishuai@iie.ac.cn)
Kai He , State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, Beijing China (e-mail: hekai@iie.ac.cn)
Yuting Xiao , State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, Beijing China (e-mail: xiaoyuting@iie.ac.cn)

The cost of scaling a reliable interconnection topology (Abstract)

Rachid Guerraoui , Computer Science, Swiss Federal Inst. of Tech, Lausanne, Lausanne, VD Switzerland (e-mail: rachid.guerraoui@epfl.ch)
Alexandre Maurer , IC, EPFL, Lausanne, VD Switzerland (e-mail: alexandre.maurer@epfl.ch)

Service Outsourcing in F2C Architecture with Attribute-based Anonymous Access Control and Bounded Service Number (Abstract)

Jianan Hong , Department of Electronic Engineer and Information Science Hefei, University of Science and Technology of China, Hefei, Anhui China (e-mail: hongjn@mail.ustc.edu.cn)
Kaiping Xue , Department of Electronic Engineer and Information Science, University of Science and Technology of China, Hefei, Anhui China (e-mail: kpxue@ustc.edu.cn)
Na Gai , Department of Electronic Engineer and Information Science, University of Science and Technology of China, Hefei, Anhui China (e-mail: gn1996@mail.ustc.edu.cn)
David Wei , Department of Computer & Information Sciences, FordHam University, New York, New York United States (e-mail: wei@cis.fordham.edu)
Peilin Hong , Electronic Engineering and Information Science, University of Science and Technology of China, Hefei, Anhui China (e-mail: plhong@ustc.edu.cn)

Understanding JavaScript Vulnerabilities in Large Real-World Android Applications (Abstract)

Wei Song , School of Computer Science and Engineering, Nanjing University of Science and Technology, Nanjing, Jiangsu China 210094 (e-mail: wsong@njust.edu.cn)
Qingqing Huang , School of Computer Science and Engineering, Nanjing University of Science and Technology, Nanjing, Jiangsu China (e-mail: staryellow20151010@gmail.com)
Jeff Huang , Texas A&M University, The Department of Computer Science & Engineering, College Station, Texas United States 77843 (e-mail: jeff@cse.tamu.edu)

Physical Layer based Message Authentication with Secure Channel Codes (Abstract)

Dajiang Chen , Department of information and software engineering, University of Electronic Science and Technology of China, 12599 Chengdu, Sichuan China 610054 (e-mail: dajiang.chen@uwaterloo.ca)
Ning Zhang , Computing Sciences, Texas A&M University Corpus Christi, 14738 Corpus Christi, Texas United States 78412 (e-mail: ning.zhang@tamucc.edu)
Nan Cheng , Department of Electrical and Computer Engineering, University of Waterloo, 8430 Waterloo, Ontario Canada (e-mail: n5cheng@uwaterloo.ca)
Kuan Zhang , Department of Electrical and Computer Engineering, University of Nebraska-Lincoln, 14719 Lincoln, Nebraska United States (e-mail: kuan.zhang@unl.edu)
Zhiguang Qin , School of Communication and Information Engineering, University of Electronic Science and Technology of China, Chengdou, Sichuan China (e-mail: qinzg@uestc.edu.cn)
Xuemin Sherman Shen , Department of Electrical and Computer Engineering, University of Waterloo, Waterloo, Ontario Canada (e-mail: sshen@uwaterloo.ca)

CPU Elasticity to Mitigate Cross-VM Runtime Monitoring (Abstract)

Zeyu Mi , School of Software, Shanghai Jiao Tong University, Institute of Parallel and Distributed Systems, Shanghai, Shanghai China 200240 (e-mail: yzmizeyu@gmail.com)
Haibo Chen , Institute of Parallel and Distributed Systems, Shanghai Jiao Tong University, Shanghai, ShangHai China 200240 (e-mail: haibochen@sjtu.edu.cn)
Yinqian Zhang , Computer Science, The Ohio State University, Columbus, Ohio United States (e-mail: yinqian@cse.ohio-state.edu)
Shuanghe Peng , Beijing Jiaotong University, School of Computer and Information Technology, Beijing, Beijing China (e-mail: shhpeng@m.bjtu.edu.cn)
XiaoFeng Wang , School of Informatics and Computer Science Department, Indiana University at Bloomington, Bloomington, Indiana United States 47406 (e-mail: xw7@indiana.edu)
Michael Reiter , Department of Computer Science, University of North Carolina, Chapel Hill, North Carolina United States 27599-3175 (e-mail: reiter@cs.unc.edu)

Design and Analysis of Secure and Dependable Automotive CPS: A Steer-by-Wire Case Study (Abstract)

Arslan Munir , Computer Science, Kansas State University College of Engineering, 306736 Manhattan, Kansas United States (e-mail: amunir@ksu.edu)
Farinaz Koushanfar , Electrical and Computer Engineering, University of California San Diego, 8784 La Jolla, California United States 92093 (e-mail: fkoushanfar@eng.ucsd.edu)

ASAP: An Anonymous Smart-parking and Payment Scheme in Vehicular Networks (Abstract)

Liehuang Zhu , School of Computer Science and Technology, Beijing Institute of Technology, Beijing, Beijing China (e-mail: liehuangz@bit.edu.cn)
Meng Li , School of Computer Science and Technology, Beijing Institute of Technology, 47833 Beijing, Beijing China (e-mail: menglibit@bit.edu.cn)
Zijian Zhang , School of Computer Science and Technology, Beijing Institute of Technology, Beijing, Beijing China (e-mail: zhangzijian@bit.edu.cn)
Zhan Qin , Department of Electrical and Computer Engineering, The University of Texas at San Antonio, San Antonio, Texas United States (e-mail: zhan.qin@utsa.edu)

Releasing Correlated Trajectories: Towards High Utility and Optimal Differential Privacy (Abstract)

Lu Ou , College of Computer Science and Electronic Engineering, Hunan University, Changsha, Hunan China (e-mail: oulu9676@gmail.com)
Zheng Qin , College of Computer Science and Electronic Engineering, Hunan University, Changsha, Hunan China (e-mail: zqin@hnu.edu.cn)
Shaolin Liao , Nuclear Science & Engineering, Argonne National Laboratory, 1291 Argonne, Illinois United States (e-mail: sliao@anl.gov)
Yuan Hong , Computer Science, Illinois Institute of Technology, Chicago, Illinois United States 60616 (e-mail: yuan.hong@iit.edu)
Xiaohua Jia , computer science, City University of Hong Kong, Hong Kong, Hong Kong Hong Kong 0 (e-mail: csjia@cityu.edu.hk)

Secure and Efficient Two-Party Signing Protocol for the Identity-Based Signature Scheme in the IEEE P1363 Standard for Public Key Cryptography (Abstract)

Debiao He , State Key Lab of Software Engineering, Wuhan University, Wuhan, HuBei China 430072 (e-mail: hedebiao@163.com)
Yudi Zhang , Computer School, Wuhan University, Wuhan, Hubei China (e-mail: zhangyudi007@gmail.com)
Ding Wang , School of EECS, Peking University, Beijing, Beijing China 100871 (e-mail: wangdingg@yeah.net)
Kim-Kwang Raymond Choo , Department of Information Systems and Cyber Security, University of Texas at San Antonio, 12346 San Antonio, Texas United States 78249-1644 (e-mail: raymond.choo@fulbrightmail.org)

Explicit Modelling and Treatment of Repair in Prediction of Dependability (Abstract)

Jose Ignacio Ignacio Aizpurua Unanue , Electronic and Electrical Engineering, University of Strathclyde, 3527 Glasgow, Glasgow City United Kingdom of Great Britain and Northern Ireland G1 1XQ (e-mail: jose.aizpurua@strath.ac.uk)
Yiannis Papadopoulos , Computer Science, University of Hull, Hull, East Yorkshire United Kingdom of Great Britain and Northern Ireland HU67RX (e-mail: Y.I.Papadopoulos@hull.ac.uk)
Guillaume Merle , Engineering Science, Sino-French Engineering School, Beijing, Beijing China (e-mail: guillaume.merle@gmail.com)

Anonymous Lightweight Chaotic Map-Based Authenticated Key Agreement Protocol for Industrial Internet of Things (Abstract)

Jangirala Srinivas , Mathematics, Indian Institute of Technology Kharagpur, 30133 Kharagpur, West Bengal India 721302 (e-mail: jangiralasrinivas@maths.iitkgp.ernet.in)
Ashok Kumar Das , Center for Security, Theory and Algorithmic Research, International Institute of Information Technology, Hyderabad, Hyderabad, Telangana India 500 032 (e-mail: iitkgp.akdas@gmail.com)
Mohammad Wazid , Cyber Security and Networks Lab, Innopolis University, Innopolis, Innopolis Russian Federation (e-mail: wazidkec2005@gmail.com)
Neeraj Kumar , CSED, Thapar University, Patiala, Patiala, Punjab India (e-mail: neeraj.kumar@thapar.edu)

Atlas: Application Confidentiality in Compromised Embedded Systems (Abstract)

Pieter Maene , ESAT/COSIC, KU Leuven, Leuven, Vlaams-Brabant Belgium (e-mail: pieter.maene@esat.kuleuven.be)
Johannes Gotzfried , Department of Computer Science, FAU Erlangen-Nurnberg, Erlangen, Bavaria Germany (e-mail: johannes.goetzfried@cs.fau.de)
Tilo Muller , Department of Computer Science, FAU Erlangen-Nurnberg, Erlangen, Bavaria Germany (e-mail: tilo.mueller@cs.fau.de)
Ruan de Clercq , ESAT/COSIC, KU Leuven, Leuven, Vlaams-Brabant Belgium (e-mail: ruan.declercq@esat.kuleuven.be)
Felix Freiling , Department of Computer Science, FAU Erlangen-Nurnberg, Erlangen, Bavaria Germany (e-mail: felix.freiling@cs.fau.de)
Ingrid Verbauwhede , ESAT/COSIC, KU Leuven, Leuven, Vlaams-Brabant Belgium (e-mail: Ingrid.Verbauwhede@esat.kuleuven.be)

Ciphertext-only Fault Analysis on the LED Lightweight Cryptosystem in the Internet of Things (Abstract)

Wei Li , School of Computer Science and Technology, Donghua University, Shanghai, ShangHai China (e-mail: liwei.cs.cn@gmail.com)
Linfeng Liao , School of Computer Science and Technology, Donghua University, Shanghai, Shanghai China (e-mail: lfliaos23@163.com)
Dawu Gu , Department of Computer Science and Engineering, Shanghai Jiao Tong Universary, Shanghai, Shanghai China (e-mail: dwgu@sjtu.edu.cn)
Chaoyun Li , Dept. of Electrical Engineering ESAT/COSIC, Katholieke Universiteit Leuven, 26657 Leuven, Leuven Belgium (e-mail: chaoyun.li@esat.kuleuven.be)
Chenyu Ge , School of Computer Science and Technology, Donghua Univeristy, Shanghai, Shanghai China (e-mail: joygcy@126.com)
Zheng Guo , School of Microelectronics, Shanghai Jiao Tong University, Shanghai, Shanghai China (e-mail: guozheng@sjtu.edu.cn)
Ya Liu , Department of Computer Science and Engineering, University of Shanghai for Science and Technology, Shanghai, Shanghai China (e-mail: liuyaloccs@gmail.com)
Zhiqiang Liu , Department of Computer Science and Engineering, Shanghai Jiao Tong Universary, Shanghai, ShangHai China (e-mail: ilu_zq@sjtu.edu.cn)

Building a Trustworthy Execution Environment to Defeat Exploits from both Cyber Space and Physical Space for ARM (Abstract)

Le Guan , College of IST, Penn State University, State College, Pennsylvania United States (e-mail: guanle.iie@outlook.com)
Chen Cao , College of IST, Penn State University, State College, Pennsylvania United States (e-mail: cuc96@ist.psu.edu)
Peng Liu , College of IST, Penn State, University Park, Pennsylvania United States 16802 (e-mail: pliu@ist.psu.edu)
Xinyu Xing , College of IST, Penn State University, State College, Pennsylvania United States (e-mail: xxing@ist.psu.edu)
Xinyang Ge , Security and Privacy Research Group, Microsoft Research, 214606 Redmond, Washington United States (e-mail: xing@microsoft.com)
Shengzhi Zhang , Department of Computer Science, Metropolitan College at Boston University, Boston, Massachusetts United States (e-mail: zhangs@cs.fit.edu)
Meng Yu , Computer Science, Roosevelt University, 2460 Chicago, Illinois United States (e-mail: meng.yu@utsa.edu)
Trent Jaeger , CSE Dept, Pennsylvania State University, University Park, Pennsylvania United States 16802 (e-mail: tjaeger@cse.psu.edu)

Sparse Matrix Masking-based Non-Interactive Verifiable (Outsourced) Computation, Revisited (Abstract)

Liang Zhao , College of Cybersecurity, Sichuan University, Chengdu, Sichuan China (e-mail: zhaoliangjapan@scu.edu.cn)
Liqun Chen , Computer Science, University of Surrey, 3660 Guildford, Surrey United Kingdom of Great Britain and Northern Ireland (e-mail: liqun.chen@surrey.ac.uk)

Attribute-Based Hybrid Boolean Keyword Search over Outsourced Encrypted Data (Abstract)

Kai He , School of Computer Science and Network Security, Dongguan University of Technology, 74549 Dongguan, Guangdong China (e-mail: kaihe1214@163.com)
Jun Guo , School of Computer Science and Network Security, Dongguan University of Technology, 74549 Dongguan, Guangdong China (e-mail: guojun@dgut.edu.cn)
Jian Weng , Department of Computer Science, Jinan University, Tianhe, GuangZhou China 510632 (e-mail: cryptjweng@gmail.com)
Jiasi Weng , Department of Computer Science, Jinan University, 47885 Guangzhou, Guangdong China (e-mail: Wengjiasi@gmail.com)
Joseph K. Liu , Faculty of Information Technology, Monash University, Melbourne, Victoria Australia (e-mail: ksliu9@gmail.com)
Xun Yi , School of Computer Science and Information Technology, RMIT University, Melbourne, Victoria Australia 3001 (e-mail: xun.yi@rmit.edu.au)

A Highly Efficient Side Channel Attack with Profiling through Relevance-Learning on Physical Leakage Information (Abstract)

Ali Akbar Pammu , Engineering, Nanyang Technological University, 54761 Singapore, Singapore Singapore 639798 (e-mail: ali1@e.ntu.edu.sg)
Kwen-Siong Chong , School of Electrical and Electronic Engineering, Nanyang Technological University, Singapore, Singapore Singapore (e-mail: kschong@ntu.edu.sg)
Yi Wang , R&D, Continental Automotive Singapore, Singapore, Singapore Singapore (e-mail: estelle.ywang@gmail.com)
Bah-Hwee Gwee , School of Electrical and Electronic Engineering, Nanyang Technological University, Singapore, Singapore Singapore (e-mail: ebhgwee@ntu.edu.sg)

Applying Chaos Theory for Runtime Hardware Trojan Monitoring and Detection (Abstract)

Hong Zhao , School of Computer Sciences and Engineering, Fairleigh Dickinson University, Teaneck, New Jersey United States (e-mail: zhao@fdu.edu)
Luke Kwiat , Financial and risk advisory, Deloitte, Arlington, Virginia United States (e-mail: kwiatluke@gmail.com)
Kevin A. Kwiat , Haloed Sun TEK, Haloed Sun TEK, Sarasota, Florida United States (e-mail: kevin.kwiat@us.af.mil)
Charles Alexandre Kamhoua , Network Security Branch, US Army Research Laboratory, 1024 Adelphi, Maryland United States (e-mail: charles.kamhoua.1@us.af.mil)
Laurent Njilla , Information Directorate, Air Force Research Laboratory Information Directorate, 97040 Rome, New York United States (e-mail: laurent.njilla@us.af.mil)

You Can Access But You Cannot Leak: Defending against Illegal Content Redistribution in Encrypted Cloud Media Center (Abstract)

Leo Yu Zhang , Department of Electronic Engineering, City University of Hong Kong, Kowloon, Kowloon Hong Kong (e-mail: leocityu@gmail.com)
Yifeng Zheng , Computer Science, City University of Hong Kong, 53025 Kowloon, Hong Kong Hong Kong (e-mail: yifeng.zheng@my.cityu.edu.hk)
Jian Weng , Department of Computer Science, Jinan University, Tianhe, GuangZhou China 510632 (e-mail: cryptjweng@gmail.com)
Cong Wang , Computer Science, City University of Hong Kong, Hong Kong, Hong Kong Hong Kong (e-mail: congwang@cityu.edu.hk)
Zihao Shan , Computer Science and Engineering, University at Buffalo - The State University of New York, 12292 Buffalo, New York United States 14228 (e-mail: zihaosha@buffalo.edu)
Kui Ren , CSE, SUNY at Buffalo, Buffalo, New York United States 14260 (e-mail: kuiren@buffalo.edu)

Design, Analysis and Application of Embedded Resistive RAM based Strong Arbiter PUF (Abstract)

Rekha Govindaraj , Computer Science and Engineering, University of South Florida, 7831 Tampa, Florida United States 33620-9951 (e-mail: rekhag@mail.usf.edu)
Swaroop Ghosh , Computer Science and Engineering, Pennsylvania State University, 8082 University Park, Pennsylvania United States (e-mail: szg212@psu.edu)
Srinivas Katkoori , Computer Science and Engineering, University of South Florida, 7831 Tampa, Florida United States (e-mail: skatkoori@cse.usf.edu)

Benchmarking the Capability of Symbolic Execution Tools with Logic Bombs (Abstract)

Hui Xu , Dept. of Computer Science and Engineering, The Chinese University of Hong Kong, Hong Kong, Hong Kong Hong Kong (e-mail: hxu@cse.cuhk.edu.hk)
Zirui Zhao , Physics, University of Science and Technology Chittagong, 185965 Hefei, Anhui China (e-mail: zzrcxb@mail.ustc.edu.cn)
Yangfan Zhou , School of Computer Science, Fudan University, Shanghai, Shanghai China (e-mail: zyf@fudan.edu.cn)
Michael R. Lyu , Computer Science & Engineering, The Chinese University of Hong Kong, Shatin, Hong Kong Hong Kong 00000 (e-mail: lyu@cse.cuhk.edu.hk)

A Bayesian Game Theoretic Approach for Inspecting Web-based Malvertising (Abstract)

Chin-Tser Huang , Computer Science and Engineering, University of South Carolina, Columbia, South Carolina United States 29208 (e-mail: huangct@cse.sc.edu)
Muhammad Nazmus Sakib , Computer Science and Engineering, University of South Carolina, Columbia, South Carolina United States (e-mail: sakib@email.sc.edu)
Charles. Kamhoua , Network Security Branch, US Army Research Laboratory, 1024 Adelphi, Maryland United States (e-mail: charles.a.kamhoua.civ@mail.mil)
Kevin A. Kwiat , CAESAR Group Affiliate, Haloed Sun TEK, LLC, Sarasota, Florida United States (e-mail: kevink@caesargroup.org)
Laurent Njilla , Information Directorate, Air Force Research Laboratory, Rome, New York United States (e-mail: laurent.njilla@us.af.mil)

Lattice-Based Public Key Searchable Encryption from Experimental Perspectives (Abstract)

Rouzbeh Behnia , Electrical Engineering and Computer Science, Oregon State University, 2694 Corvallis, Oregon United States 97331-4501 (e-mail: behniar@oregonstate.edu)
Muslum Ozgur Ozmen , EECS, Oregon State University, 2694 Corvallis, Oregon United States 97331-4501 (e-mail: ozmenmu@oregonstate.edu)
Attila Altay Yavuz , Computer Science and Engineering, University of South Florida, 7831 Tampa, Florida United States 33620-9951 (e-mail: attilaayavuz@usf.edu)

Pagoda: A Hybrid Approach to Enable Efficient Real-time Provenance Based Intrusion Detection in Big Data Environments (Abstract)

Yulai Xie , School of Computer science, Huazhong Univeristy of Science and Technology, Wuhan, Hubei China (e-mail: ylxie@hust.edu.cn)
Dan Feng , Division of Data Storage System, Wuhan National Laboratory for Optoelectronics, Huazhong University of Science and Technology, Wuhan, Wuhan China (e-mail: dfeng@hust.edu.cn)
Yuchong Hu , Computer Software and Theory, Huazhong University of Science and Technology, School of Computer School of Computer, Huazhong University of Science and Technology,Wuhan, China, Wuhan, Hubei China (e-mail: yuchonghu@hust.edu.cn)
Yan Li , Computer Science, TuneUp.ai, San Francisco Bay Area, California United States (e-mail: yanli@tuneup.ai)
Staunton Sample , Computer Engineering, University of California, Santa Cruz, Santa Cruz, California United States (e-mail: sbsample@ucsc.edu)
Darrell Long , Computer Engineering, University of California, Santa Cruz, Santa Cruz, California United States (e-mail: darrell@ucsc.edu)

DNIC Architectural Developments for 0-Knowledge Detection of OPC Malware (Abstract)

Julian Rrushi , Computer Science and Engineering, Oakland University, Rochester, Michigan United States (e-mail: rrushi@oakland.edu)

Noisy Vibrational Pairing of IoT Devices (Abstract)

S Abhishek Anand , Computer Science, University of Alabama at Birmingham, Birmingham, Alabama United States 35294 (e-mail: anandab@uab.edu)
Nitesh Saxena , Department of Computer and Information Sciences, University of Alabama at Birmingham, Birmingham, Alabama United States (e-mail: saxena@uab.edu)

Preventing Overshadowing Attacks in Self-Jamming Audio Channels (Abstract)

Qiao HU , Computer Science, City University of Hong Kong, Kowloon, Hong Kong Hong Kong (e-mail: huqiao394@gmail.com)
Yuanzhen Liu , Computer Science, City University of Hong Kong, HongKong, Kowloon Hong Kong (e-mail: yuanzhliu3@cityu.edu.hk)
Anjia Yang , College of Information Science and Technology, Jinan University, 47885 Guangzhou, Guangdong China 510632 (e-mail: anjiayang@gmail.com)
Gerhard Hancke , Department of Computer Science, City University of Hong Kong, Kowloon, Hong Kong Hong Kong (e-mail: gp.hancke@cityu.edu.hk)

Secure Secret Sharing Enabled b-band Mini Vaults Bio-Cryptosystem for Vectorial Biometrics (Abstract)

Yenlung Lai , School of Information Technology, Monash University - Malaysia Campus, 65210 Bandar Sunway, Selangor Malaysia (e-mail: yenlung.lai@monash.edu)
Jung Yeon Hwang , Information Security Research Division, Electronics and Telecommunications Research Institute, Seoul, Seoul Korea, Republic of (e-mail: videmot@etri.re.kr)
Zhe Jin , School of Information Technology, Monash University - Malaysia Campus, 65210 Bandar Sunway, Selangor Malaysia (e-mail: jin.zhe@monash.edu)
Soo-Hyung Kim , Information Security Research Division, Electronics and Telecommunications Research Institute, Seoul, Seoul Korea (the Republic of) (e-mail: lifewsky@etri.re.kr)
Sangrae Cho , Information Security Research Division, Electronics and Telecommunications Research Institute, Seoul, Seoul Korea (the Republic of) (e-mail: sangrae@etri.re.kr)
Andrew Beng Jin Beng Jin Teoh , EEE, Yonsei University, Seoul, Seoul Korea (the Republic of) (e-mail: bjteoh@yonsei.ac.kr)

Detecting Adversarial Image Examples in Deep Neural Networks with Adaptive Noise Reduction (Abstract)

Bin Liang , School of Information, Renmin University of China, 12471 Beijing, BEIJING China (e-mail: liangb@ruc.edu.cn)
Hongcheng Li , School of Information, Renmin University of China, 12471 Beijing, BEIJING China 100872 (e-mail: owenlee@ruc.edu.cn)
Miaoqiang Su , School of Information, Renmin University of China, 12471 Beijing, BEIJING China (e-mail: sumiaoqiang@ruc.edu.cn)
Xirong Li , Key Lab of Data Engineering and Knowledge Engineering, Renmin University of China, Haidian, Beijing China 100872 (e-mail: xirong@ruc.edu.cn)
Wenchang Shi , School of Information, Remin University of China, Beijing, Beijing China (e-mail: wenchang@ruc.edu.cn)
XiaoFeng Wang , School of Informatics and Computer Science Department, Indiana University at Bloomington, Bloomington, Indiana United States 47406 (e-mail: xw7@indiana.edu)

Distributed Attack Detection in a Water Treatment Plant: Method and Case Study (Abstract)

Sridhar Adepu , Information Systems Technology and Design, Singapore University of Technology and Design, 233793 Singapore, Singapore Singapore 487372 (e-mail: adepu_sridhar@mymail.sutd.edu.sg)
Aditya Mathur , Information Systems Technology and Design, Singapore University of Technology and Design, 233793 Singapore, Singapore Singapore (e-mail: aditya_mathur@sutd.edu.sg)

Dependability integration in cloud-hosted telecommunication services (Abstract)

Wiem Abderrahim , Communication Networks, The higher school of communications of tunis, Tunis, Ghazala Tunisia (e-mail: wiem.abderrahim@supcom.tn)
Zied Choukair , Communication networks, The higher school of communications of tunis, Tunis, Ghazala Tunisia (e-mail: zied.chouakir@supcom.tn)

Proxy-Free Privacy-Preserving Task Matching with Efficient Revocation in Crowdsourcing (Abstract)

Jiangang Shu , Department of Computer Science, City University of Hong Kong, Hong Kong, Hong Kong Hong Kong (e-mail: jiangangshu@gmail.com)
Kan Yang , Department of Computer Science, University of Memphis, Memphis, Tennessee United States (e-mail: kan.yang@memphis.edu)
Xiaohua Jia , computer science, City University of Hong Kong, Hong Kong, Hong Kong Hong Kong 0 (e-mail: csjia@cityu.edu.hk)
Ximeng Liu , SCHOOL OF INFORMATION SYSTEMS, Singapore Management University, Singapore, Singapore Singapore (e-mail: snbnix@gmail.com)
Cong Wang , Computer Science, City University of Hong Kong, Hong Kong, Hong Kong Hong Kong (e-mail: congwang@cityu.edu.hk)
Robert Deng , School of Information Systems, Singapore Management University, Singapore, Singapore Singapore (e-mail: robertdeng@smu.edu.sg)

oGBAC--A Group Based Access Control Framework for Information Sharing in Online Social Networks (Abstract)

Donghui Hu , College of Computer Science and Information Engineering, Hefei University of Technology, 12513 Hefei, China/Anhui China (e-mail: hudh@hfut.edu.cn)
Chunya Hu , Institute of Information Engineering, Chinese Academy of Sciences, Hefei, Anhui China (e-mail: hcy_0323@163.com)
Yuqi Fan , College of Computer Science and Information Engineering, Hefei University of Technology, 12513 Hefei, Anhui China (e-mail: yuqi.fan@hfut.edu.cn)
Xintao Wu , Computer Science and Computer Engineering, University of Arkansas, Fayetteville, Arkansas United States 72701 (e-mail: xintaowu@uark.edu)

Clock Auction Inspired Privacy Preserving Emergency Demand Response in Colocation Data Centers (Abstract)

Sai Mounika Errapotu , Electrical and Computer Engineering, University of Houston, Houston, Texas United States (e-mail: serrapotu@uh.edu)
Hongning Li , School of Telecommunications Engineering, Xidian University, 47905 Xian, Shaanxi China (e-mail: hnli@xidian.edu.cn)
Rong Yu , Aumomation Faculty, Guangdong University of Technology, 47870 Guangzhou, Guangdong China 510006 (e-mail: yurong@ieee.org)
Shaolei Ren , Department of Electrical and Computer Engineering, University of California, Riverside, Riverside, California United States (e-mail: sren@ece.ucr.edu)
Qingqi Pei , Computer Science, Xidian University, xi'an, shaanxi province China (e-mail: qqpei@mail.xidian.edu.cn)
Miao Pan , Electrical and Computer Engineering, University of Houston, Houston, Texas United States (e-mail: mpan2@uh.edu)
Zhu Han , Electrical and Computer Engineering, University of Houston, Houston, Texas United States 77004 (e-mail: hanzhu22@gmail.com)

Detection and Defense of Cache Pollution Attacks Using Clustering in Named Data Networks (Abstract)

Lin Yao , School of Software, Dalian University of Technology, DaLian, Liaoning China (e-mail: yaolin@dlut.edu.cn)
Zhenzhen Fan , School of Software, Dalian University of Technology, 12399 Dalian, Liaoning China (e-mail: fzz123hd@mail.dlut.edu.cn)
Jing Deng , Department of Computer Science, University of North Carolina at Greensboro, Greensboro, North Carolina United States (e-mail: jing.deng@uncg.edu)
Xin Fan , School of Software Technology, Dalian University of Technology, Dalian, Liaoning China (e-mail: xin.fan@dlut.edu.cn)
Guowei Wu , School of Software, Dalian University of Technology, Dalian, Liaoning China (e-mail: wgwdut@dlut.edu.cn)

Multi-user Verifiable Searchable Symmetric Encryption for Cloud Storage (Abstract)

Xueqiao Liu , School of Computer Science and Software Engineering, University of Wollongong, Wollongong, New South Wales Australia (e-mail: xl691@uowmail.edu.au)
Guomin Yang , School of Computer Science and Software Engineering, University of Wollongong, Wollongong, New South Wales Australia (e-mail: gyang@uow.edu.au)
Yi Mu , Fujian Provincial Key Laboratory of Network Security and Cryptology, Fujian Normal University, 12425 Fuzhou, Fujian China (e-mail: ymu@uow.edu.au)
Robert Deng , School of Information Systems, Singapore Management University, Singapore, Singapore Singapore (e-mail: robertdeng@smu.edu.sg)

Enabling Reliable Keyword Search in Encrypted Decentralized Storage with Fairness (Abstract)

Chengjun Cai , Computer Science, City University of Hong Kong, Hong Kong, Hong Kong Hong Kong (e-mail: chencai-c@my.cityu.edu.hk)
Jian Weng , Department of Computer Science, Jinan University, Tianhe, GuangZhou China 510632 (e-mail: cryptjweng@gmail.com)
Xingliang Yuan , Faculty of Information Technology, Monash University, Melbourne, Victoria Australia (e-mail: xingliang.yuan@monash.edu)
Cong Wang , Computer Science, City University of Hong Kong, Hong Kong, Hong Kong Hong Kong (e-mail: congwang@cityu.edu.hk)

Accountable Proxy Re-Encryption for Secure Data Sharing (Abstract)

Hui Guo , State Key Laboratory of Cryptology, State Key Laboratory of Cryptology, Beijing, Beijing China (e-mail: guohtech@foxmail.com)
Zhenfeng Zhang , Trusted Computing and Information Assurance Laboratory, Institute of Software, Chinese Academy of Sciences, Beijing, Beijing China (e-mail: zfzhang@tca.iscas.ac.cn)
Jing Xu , Institute of Software, Chinese Academy of Sciences, Beijing, Beijing China (e-mail: xujing@tca.iscas.ac.cn)
Ningyu An , State Grid Corporation Joint Laboratory of Artificial Intelligence on Electric Power System, Global Energy Interconnection Research Institute, Beijng, Beijng China (e-mail: anningyu@geiri.sgcc.com.cn)
Xiao Lan , Cybersecurity Research Institute, Sichuan University, 12530 Chengdu, Sichuan China (e-mail: lanxiao@scu.edu.cn)

Stopping Memory Disclosures via Diversification and Replicated Execution (Abstract)

Kangjie Lu , Computer Science & Engineering, University of Minnesota System, 311816 Minneapolis, Minnesota United States 55455-2020 (e-mail: kjlu@umn.edu)
Meng Xu , School of Computer Science, Georgia Institute of Technology, Atlanta, Georgia United States (e-mail: meng.xu@gatech.edu)
Chengyu Song , Department of Computer Science and Engineering, University of California Riverside, 8790 Riverside, California United States (e-mail: csong@cs.ucr.edu)
Taesoo Kim , School of Computer Science, Georgia Institute of Technology, Atlanta, Georgia United States (e-mail: taesoo@gatech.edu)
Wenke Lee , School of Computer Science, Georgia Institute of Technology, Atlatnat, Georgia United States 30332 (e-mail: wenke.lee@gmail.com)

Exploiting an HMAC-SHA-1 optimization to speed up PBKDF2 (Abstract)

Andrea Visconti , Computer Science Department, Università degli Studi di Milano, Milano, Milano Italy 20135 (e-mail: andrea.visconti@unimi.it)
Federico Gorla , Computer Science Department, Università degli Studi di Milano, Milano, Milano Italy (e-mail: federico.gorla@studenti.unimi.it)

A Study on the Security Implications of Information Leakages in Container Clouds (Abstract)

Xing Gao , Computer Science, University of Memphis, Memphis, Tennessee United States (e-mail: xgao1@memphis.edu)
Benjamin Steenkamer , ECE, University of Delaware, Newark, Delaware United States (e-mail: bsteen@udel.edu)
Zhongshu Gu , Secure Systems Group, IBM Research, 74286 Yorktown Heights, New York United States (e-mail: zgu@us.ibm.com)
Mehmet Kayaalp , ELECTRICAL AND COMPUTER ENGINEERING, University of New Hampshire, 3067 Durham, New Hampshire United States (e-mail: Mehmet.Kayaalp@unh.edu)
Dimitrios Pendarakis , Secure Systems Group, IBM Research, 74286 Yorktown Heights, New York United States (e-mail: dimitris@us.ibm.com)
Haining Wang , ECE, University of Delaware, Newark, Delaware United States (e-mail: hnw@udel.edu)

Enabling Privacy-Preserving Shortest Distance Queries on Encrypted Graph Data (Abstract)

Chang Liu , Faculty of Engineering and IT, University of Technology, Sydney, Sydney, New South Wales Australia (e-mail: changliu.bit@gmail.com)
Liehuang Zhu , School of Computer Science and Technology, Beijing Institute of Technology, BEIJING, BEIJING China (e-mail: liehuangz@bit.edu.cn)
Xiangjian He , Faculty of Computing and Communications, University of Technology Sydney, Sydney, New South Wales Australia (e-mail: Xiangjian.He@uts.edu.au)
Jinjun Chen , Faculty of Science, Engineering and Technology, Swinburne University of Technology, Australia, Melbourne, Victoria Australia 3122 (e-mail: jinjun.chen@gmail.com)

Privacy-Preserving Tensor Decomposition over Encrypted Data in a Federated Cloud Environment (Abstract)

Jun Feng , School of Computer Science and Technology, Huazhong University of Science and Technology, 12443 Wuhan, Hubei China (e-mail: junfeng989@gmail.com)
Laurence T. Yang , Computer Science, St Francis Xavier University, Antigonish, Nova Scotia Canada (e-mail: ltyang@gmail.com)
Qing Zhu , School of Computer Science and Technology, Huazhong University of Science and Technology, Wuhan, Hubei China (e-mail: qingzhu2020@gmail.com)
Kim-Kwang Raymond Choo , Department of Information Systems and Cyber Security, University of Texas at San Antonio, 12346 San Antonio, Texas United States 78249-1644 (e-mail: raymond.choo@fulbrightmail.org)

Reliability Equations for Cloud Storage Systems with Proactive Fault Tolerance (Abstract)

jing Li , College of Computer Science and Technology, Civil Aviation University of China, 12673 Tianjin, Tianjin China (e-mail: lijing@nbjl.nankai.edu.cn)
peng li , College of Computer and Control Engineering, Nankai University, 12538 tianjin, Tianjin China (e-mail: lipeng@nbjl.nankai.edu.cn)
Rebecca Stones , College of Computer and Control Engineering, Nankai University, 12538 Tianjin, Tianjin China (e-mail: rebecca.stones82@nbjl.nankai.edu.cn)
Gang Wang , College of Computer and Control Engineering, Nankai University, tianjin, tianjin China (e-mail: wgzwp@nbjl.nankai.edu.cn)
zhongwei Li , College of Computer and Control Engineering, Nankai University, tianjin, tianjin China (e-mail: lizhongwei@nbjl.nankai.edu.cn)
Xao-Guang Liu , Dep. of CS, Nankai University, Tianjin, Tianjin China 300071 (e-mail: liuxg@nbjl.nankai.edu.cn)

Performance Modeling of Moving Target Defenses with Reconfiguration Limits (Abstract)

Warren Connell , Center for Secure Information Systems, George Mason University, Fairfax, Virginia United States (e-mail: wconnel2@gmu.edu)
Daniel A. Menasce , Department of Computer Science, George Mason University, Fairfax, Virginia United States 22030-4444 (e-mail: menasce@gmu.edu)
Massimiliano Albanese , Applied Information Technology, George Mason University, Fairfax, Virginia United States (e-mail: malbanes@gmu.edu)

Design and Evaluation of a Reconfigurable ECU Architecture for Secure and Dependable Automotive CPS (Abstract)

Bikash Poudel , Computer Science, Kansas State University College of Engineering, 306736 Manhattan, Kansas United States (e-mail: bpoudel@ksu.edu)
Arslan Munir , Department of Computer Science, Kansas State University, 5308 Manhattan, Kansas United States (e-mail: amunir@ksu.edu)

Compact E-Cash with Efficient Coin-Tracing (Abstract)

Bin Lian , School of information science and engineering, Ningbo Institute of Technology, Zhejiang University, Ningbo, Zhejiang China (e-mail: lianbin_a@163.com)
Gongliang Chen , Information Security Engineering, Shanghai Jiao Tong University, Shanghai, Shanghai China (e-mail: chengl@sjtu.edu.cn)
Jialin Cui , Information Science and Engineering, Ningbo Institute of Technology, Zhejiang University, Ningbo, Zhejiang China (e-mail: Cuijl_jx@163.com)
Maode Ma , School of EEE, Nanyang Technological University, Singapore, Singapore Singapore (e-mail: emdma@ntu.edu.sg)

Security Model of Authentication at the Physical Layer and Performance Analysis over Fading Channels (Abstract)

Ning Xie , College of Information Engineering, Shenzhen University, Shenzhen, Shenzhen China (e-mail: ningxie@szu.edu.cn)
Changsheng Chen , College of Information Engineering, Shenzhen University, Shenzhen, Shenzhen China (e-mail: cschen@szu.edu.cn)
MING Zhong , College of Computer Science & Software Engineering, SHENZHEN University, SHENZNEN, Guangdong China (e-mail: mingz@szu.edu.cn)

The Authorization Policy Existence Problem (Abstract)

Pierre Berge , Laboratoire de Recherche en Informatique, CentraleSupelec, 435940 Chatenay-Malabry, le-de-France France (e-mail: Pierre.Berge@supelec.fr)
Jason Crampton , Mathematics, Royal Holloway, University of London, Egham, Surrey United Kingdom of Great Britain and Northern Ireland TW20 0EX (e-mail: jason.crampton@rhul.ac.uk)
Gregory Gutin , Department of Computer Science, Royal Holloway, University of London, Egham, Surrey United Kingdom of Great Britain and Northern Ireland (e-mail: g.gutin@rhul.ac.uk)
Remi Watrigant , IUT Informatique, Universite Claude Bernard Lyon 1, 27098 Villeurbanne, Auvergne-Rhne-Alpes France (e-mail: remi.watrigant@univ-lyon1.fr)

Detecting Suspicious File Migration or Replication in the Cloud (Abstract)

Adam Bowers , EECS, University of Missouri, Columbia, Missouri United States (e-mail: acbqbd@missouri.edu)
Cong Liao , Information Science and Technology, Pennsylvania State University, 8082 University Park, Pennsylvania United States (e-mail: cxl491@ist.psu.edu)
Douglas Steiert , EECS, University of Missouri, Columbia, Missouri United States (e-mail: djsg38@missouri.edu)
Dan Lin , EECS, University of Missouri, Columbia, Missouri United States (e-mail: lindan@missouri.edu)
Anna Squicciarini , Information Sciences Technology, Penn State, University Park, Pennsylvania United States (e-mail: asquicciarini@ist.psu.edu)
Ali R. Hurson , Computer Science, Missouri University of Science and Technology, Rolla, Missouri United States (e-mail: hurson@mst.edu)

Deep Learning and Visualization for Identifying Malware Families (Abstract)

Guosong Sun , School of Computer Engineering & Science, Shanghai University, 34747 Shanghai, Shanghai China (e-mail: asongsxx@foxmail.com)
Quan Qian , School of Computer Engineering & Science, Shanghai University, Shanghai, ShangHai China (e-mail: qqian@shu.edu.cn)
Papers

CipherXRay: Exposing Cryptographic Operations and Transient Secrets from Monitored Binary Execution (Abstract)

Xin Li , George Mason University, Fairfax
Xinyuan Wang , George Mason University, Fairfax
Wentao Chang , George Mason University, Fairfax
Regular Papers

A Large-Scale Study of the Time Required to Compromise a Computer System (Abstract)

Hannes Holm , The Royal Institute of Technology, Stockholm

Secure Two-Party Differentially Private Data Release for Vertically-Partitioned Data (Abstract)

Noman Mohammed , McGill University, Montreal
Dima Alhadidi , Concordia University, Montreal
Benjamin C. M. Fung , Concordia University, Montreal
Mourad Debbabi , Concordia University, Montreal

k-Zero Day Safety: A Network Security Metric for Measuring the Risk of Unknown Vulnerabilities (Abstract)

Lingyu Wang , Concordia University, Montreal
Sushil Jajodia , George Mason University, Fairfax
Anoop Singhal , National Institute of Standards and Technology, Gaithersburg
Pengsu Cheng , Concordia University, Montreal
Steven Noel , George Mason University, Fairfax
Papers

Comment on "Remote Physical Device Fingerprinting" (Abstract)

Libor Polcak , Brno University of Technology, Brno
Jakub Jirasek , Brno University of Technology, Brno
Petr Matousek , Brno University of Technology, Brno
Regular Papers

Fault-Tolerant Network Interfaces for Networks-on-Chip (Abstract)

Leandro Fiorin , Faculty of Lugano, Lugano
Mariagiovanna Sami , Politecnico di Milano, Milano
Papers

Process Authentication for High System Assurance (PDF)

Hussain M.J. Almohri , Virginia Tech, Blacksburg
Danfeng Daphne Yao , Virginia Tech, Blacksburg
Dennis Kafura , Virginia Tech, Blacksburg
Regular Papers

Security Games for Node Localization through Verifiable Multilateration (Abstract)

Nicola Basilico , University of California, Merced
Nicola Gatti , Politecnico di Milano, Milan
Mattia Monga , Università degli Studi di Milano, Milan
Sabrina Sicari , Università degli Studi dell'Insubria, Varese
Papers

Efficient and Privacy-Aware Data Aggregation in Mobile Sensing (Abstract)

Qinghua Li , The Pennsylvania State University, University Park
Guohong Cao , The Pennsylvania State University, University Park
Thomas F. La Porta , The Pennsylvania State University, University Park

STARS: A Statistical Traffic Pattern Discovery System for MANETs (Abstract)

Yang Qin , FaceBook, Menlo Park
Dijiang Huang , Arizona State University, Tempe
Bing Li , Arizona State University, Tempe

Human Effects of Enhanced Privacy Management Models (Abstract)

Gorrell P. Cheek , University of North Carolina at Charlotte, Charlotte
Mohamed Shehab , University of North Carolina at Charlotte, Charlotte

Private Searching on Streaming Data Based on Keyword Frequency (Abstract)

Xun Yi , Victoria University, Melbourne
Elisa Bertino , Purdue University, West Lafayette
Jaideep Vaidya , Rutgers University, Newark
Chaoping Xing , Nanyang Technological University, Singapore

Analysis of Field Data on Web Security Vulnerabilities (Abstract)

José Fonseca , Institute Polytechnic of Guarda, Guarda and University of Coimbra, Coimbra
Nuno Seixas , University of Coimbra, Coimbra
Marco Vieira , University of Coimbra, Coimbra
Henrique Madeira , University of Coimbra, Coimbra

Ensuring the Performance of Apahche HTTP Server Affected by Aging (Abstract)

jing zhao , Harbin Engineering University, Harbin
Kishor S. Trivedi , Duke University, Durham
Michael Grottke , Friedrich-Alexander-Universität Erlangen-Nürnberg, Nürnberg
Javier Alonso , Duke University, Durham
Yanbin Wang , Harbin Institude of Technology, Harbin

Key-Recovery Attacks on KIDS, a Keyed Anomaly Detection System (Abstract)

Juan E. Tapiador , Universidad Carlos III de Madrid, Madrid
Agustín Orfila , Universidad Carlos III de Madrid, Madrid
Arturo Ribagorda , Universidad Carlos III de Madrid, Madrid
Benjamín Ramos , Universidad Carlos III de Madrid, Madrid

Control Flow-based Malware Variant Detection (Abstract)

Silvio Cesare , Deakin University, Burwood
Yang Xiang , Deakin University, Burwood
Wanlei Zhou , Deakin University, Burwood

Abductive Analysis of Administrative Policies in Rule-based Access Control (Abstract)

Puneet Gupta , Google, Inc., Mountain View
Scott D. Stoller , Stony Brook University, Stony Brook
Zhongyuan Xu , Stony Brook University, Stony Brook

Low-Priced and Energy-Efficient Detection of Replicas for Wireless Sensor Networks (Abstract)

Kwantae Cho , Electronics and Telecommunications Research Institute, Daejeon
Byung-Gil Lee , Electronics and Telecommunications Research Institute, Daejeon
Dong Hoon Lee , Korea University, Seoul

A Random Decision Tree Framework for Privacy-preserving Data Mining (Abstract)

Jaideep Vaidya , Rutgers University, Newark
Basit Shafiq , Lahore University of Management Sciences, Lahore
Wei Fan , Huawei Noah's Ark Lab, Hong Kong
Danish Mehmood , Lahore University of Management Sciences, Lahore
David Lorenzi , Rutgers University, Newark

Mobiflage: Deniable Storage Encryption for Mobile Devices (Abstract)

Adam Skillen , Carleton University, Ottawa and Concordia University, Montreal
Mohammad Mannan , Concordia University, Montreal

Software-Level Approaches to Implementing Fault-Tolerant Systems on Coarse-Grained Reconfigurable Architecture (Abstract)

Kyuseung Han , Seoul National University, Seoul
Ganghee Lee , Samsung Electronics Co., Gyeonggi
Kiyoung Choi , Seoul National University, Seoul

Security Analysis and Related Usability of Motion-based CAPTCHAs: Decoding Codewords in Motion (Abstract)

Yi Xu , University of North Carolina at Chapel Hill, Chapel Hill
Gerardo Reynaga , Carleton University, Ottawa
Sonia Chiasson , Carleton University, Ottawa
Jan-Michael Frahm , University of North Carolina at Chapel Hill, Chapel Hill
Fabian Monrose , University of North Carolina at Chapel Hill, Chapel Hill
Paul Van Oorschot , Carleton University, Ottawa

Privacy-Preserving Multi-Class Support Vector Machine for Outsourcing the Data Classification in Cloud (Abstract)

Yogachandran Rahulamathavan , City University London, London
Raphael C.-W. Phan , Multimedia University, Cyberjaya
Suresh Veluru , City University London, London
Kanapathippillai Cumanan , Newcastle University, Newcastle upon tyne
Muttukrishnan Rajarajan , City University London, London

A Note On "Orchestrating an Ensemble of MapReduce Jobs for Minimizing Their Makespan" (Abstract)

Wenhong Tian , University of Electronic Science and Technology of China, Chengdu
Yu Chen , University of Electronic Science and Technology of China, Chengdu
Xinyang Wang , University of Electronic Science and Technology of China, Chengdu

HyperCheck: A Hardware-Assisted Integrity Monitor (Abstract)

Fengwei Zhang , George Mason University, Fairfax
Jiang Wang , Riverbed Technology, Sunnyvale
Kun Sun , George Mason University, Fairfax
Angelos Stavrou , George Mason University, Fairfax

Hiding in the Mobile Crowd: Location Privacy through Collaboration (Abstract)

Reza Shokri , ETH Zurich, Zurich
George Theodorakopoulos , Cardiff University, Cardiff
Panos Papadimitratos , KTH, Stockholm
Ehsan Kazemi , EPFL, Lausanne
Jean-Pierre Hubaux , EPFL, Lausanne

Effective Risk Communication for Android Apps (Abstract)

Christopher S. Gates , Purdue University, West Lafayette
Jing Chen , Purdue University, West Lafayette
Ninghui Li , Purdue University, West Lafayette
Robert W. Proctor , Purdue University, West Lafayette

A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet Drop Attacks in Wireless Sensor Networks (Abstract)

Salmin Sultana , Purdue University, West Lafayette
Gabriel Ghinita , University of Massachusetts, Boston
Elisa Bertino , Purdue University, West Lafayette
Mohamed Shehab , University of North Carolina at Charlotte, Charlotte

Evaluation of Web Security Mechanisms using Vulnerability and Attack Injection (Abstract)

José Fonseca , UDI of the Institute Polytechnic of Guarda, Guarda and the CISUC
Marco Vieira , University of Coimbra, Coimbra
Henrique Madeira , University of Coimbra, Coimbra

Efficient Tagging of Remote Peers During Child Pornography Investigations (Abstract)

Marc Liberatore , University of Massachusetts Amherst, Amherst
Brian Neil Levine , University of Massachusetts Amherst, Amherst
Clay Shields , Georgetown University, Washington
Brian Lynn , University of Massachusetts Amherst, Amherst

MINT: A Reliability Modeling Framework for Energy-Efficient Parallel Disk Systems (Abstract)

Shu Yin , Hunan University, Changsha
Xiaojun Ruan , West Chester University of Pennsylvania, West Chester
Adam Manzanares , California State University - Chico, Chico
Xiao Qin , Auburn University, Auburn
Kenli Li , Hunan University, Changsha

Enforcing Obligations within Relational Database Management Systems (Abstract)

Pietro Colombo , Università degli Studi dell'Insubria, Varese
Elena Ferrari , Università degli Studi dell'Insubria, Varese

Modeling and Analysis on the Propagation Dynamics of Modern Email Malware (Abstract)

Sheng Wen , Deakin University, Melbourne
Wei Zhou , Deakin University, Melbourne
Jun Zhang , Deakin University, Melbourne
Yang Xiang , Deakin University, Melbourne
Wanlei Zhou , Deakin University, Melbourne
Weijia Jia , City University of Hong Kong, Hong Kong
Cliff C. Zou , University of Central Florida, Orlando

Performance and Availability Modeling of IT Systems with Data Backup and Restore (Abstract)

Ruofan Xia , Duke university, Durham
Xiaoyan Yin , Duke University, Durham
Javier Alonso , Duke University, Durham
Fumio Machida , NEC Corporation, Kawasaki
Kishor S. Trivedi , Duke University, Durham

MOSES: Supporting and Enforcing Security Profiles on Smartphones (Abstract)

Yury Zhauniarovich , Yury Zhauniarovich is with the University of Trento, Trento, 38123, Italy (email: yury.zhauniarovich@unitn.it).
87 ms
(Ver 3.3 (11022016))