Accepted Paper List

 
  • Fragmentation Considered Poisonous, or: One-Domain-to-Rule-them-All.ORG
    Amir Herzberg (Bar-Ilan University, Israel); Haya Shulman (Bar Ilan University, Israel)

  • EasyScale: Easy Mapping for Large-Scale Network Security Experiments
    Wei-Min Yao (Purdue University, USA); Sonia Fahmy (Purdue University, USA); Jiahong Zhu (Purdue, USA)

  • Scalable Hardware Monitors to Protect Network Processors from Data Plane Attacks
    Kekai Hu (University of Massachusetts Amherst, USA); Harikrishnan Chandrikakutty (University of Massachusetts, USA); Russell Tessier (University of Massachusetts, USA); Tilman Wolf (University of Massachusetts, USA)

  • Using Instruction Sequence Abstraction for Shellcode Detection and Attribution
    Ziming Zhao (Arizona State University, USA); Gail-Joon Ahn (Arizona State University, USA)

  • On the Impact of Social Botnets for Spam Distribution and Digital-influence Manipulation
    Jinxue Zhang (Arizona State University, USA); Rui Zhang (University of Hawaii, USA); Yanchao Zhang (Arizona State University, USA); Guanhua Yan (Los Alamos National Laboratory, USA)

  • Certificateless Public Auditing for Data Integrity in the Cloud
    Boyang Wang (Xidian University, P.R. China); Baochun Li (University of Toronto, Canada); Hui Li (Xidian University, P.R. China); Fenghua Li (Xidian University, P.R. China)

  • Energy-Efficient, Secure Group Key Agreement for Ad Hoc Networks
    Thomas R Halford (TrellisWare Technologies, Inc., USA); Thomas Courtade (Stanford University, USA); Keith M Chugg (University of Southern California, USA)

  • Limitations to Threshold Random Walk Scan Detection and Mitigating Enhancements
    Peter Mell (National Institute of Standards and Technology, USA); Richard Harang (ICF International, USA)

  • Privacy-Preserving Item-Based Collaborative Filtering Using Semi-Distributed Belief Propagation
    Jun Zou (Georgia Institute of Technology, USA); Arash Einolghozati (Georgia Tech, USA); Faramarz Fekri (Georgia Institute of Technology, USA)

  • Exponential Secrecy Against Unbounded Adversary using Joint Encryption and Privacy Amplification
    Yahya Khiabani (Louisiana State University, USA); Shuangqing Wei (Louisiana State University, USA)

  • Low-Complexity Secure Protocols to Defend Cyber-Physical Systems Against Network Isolation Attacks
    Dong-Hoon Shin (Arizona State University, USA); Jinkyu Koo (Purdue University, USA); Lei Yang (Arizona State University, USA); Xiaojun Lin (Purdue University, USA); Saurabh Bagchi (Purdue University, USA); Junshan Zhang (Arizona State University, USA)

  • Secure and Constant Cost Public Cloud Storage Auditing with Deduplication
    Jiawei Yuan (University of Arkansas at Little Rock, USA); Shucheng Yu (University of Arkansas at Little Rock, USA)

  • T -dominance: Prioritized Defense Deployment for BYOD Security
    Wei Peng (Indiana University-Purdue University Indianapolis, USA); Feng Li (Indiana University-Purdue University Indianapolis, USA); Keesook J Han (Air Force Research Laboratory, USA); Xukai Zou (School of Science, Purdue University-Indianapolis, USA); Jie Wu (Temple University, USA)

  • A Cooperative Botnet Profiling and Detection in Virtualized Environment
    Shun-Wen Hsiao (Academia Sinica, Taiwan); Yi-Ning Chen (National Taiwan University, Taiwan); Yeali S. Sun (National Taiwan University, Taiwan); Meng Chang Chen (Academia Sinica, Taiwan)

  • Secure Pervasive Social Networking based on Multi-Dimensional Trust Levels
    Zheng Yan (Xidian University, P.R. China); Mingjun Wang (Xidian University, P.R. China); Valtteri Niemi (University of Turku, Finland); Raimo Kantola (Aalto University, Finland)

  • A Vulnerability Study of Geographic Routing in Underwater Acoustic Networks
    Michael Zuba (University of Connecticut, USA); Michael Fagan (University of Connecticut, USA); Jun-Hong Cui (University of Connecticut, USA); Zhijie Shi (University of Connecticut, USA)

  • A Moving Target Defense Mechanism for MANETs Based on Identity Virtualization
    Massimiliano Albanese (George Mason University, USA); Alessandra De Benedictis (University of Naples Federico II, Italy); Sushil Jajodia (George Mason University, USA); Kun Sun (George Mason University, USA)

  • Privacy-preserving Revocable Content Sharing in Geosocial Networks
    Linke Guo (University of Florida, USA); Chi Zhang (University of Science of Technology of China, USA); Yuguang Fang (University of Florida, USA)

  • LISA: Location Information ScrAmbler for Privacy Protection on Smartphones
    Zhigang Chen (University of Michigan, USA); Xin Hu (IBM Research, USA); Xiaoen Ju (University of Michigan, Ann Arbor, USA); Kang G. Shin (University of Michigan, USA)

  • Dynamic Adaptive Anti-Jamming via Controlled Mobility
    Xiaofan He (North Carolina State University, USA); Huaiyu Dai (NC State University, USA); Peng Ning (North Carolina State University, USA)

  • NOMAD: Towards Non-Intrusive Moving-Target Defense against Web Bots
    Shardul Vikram (Texas A&M University, USA); Chao Yang (Texas A&M University, USA); Guofei Gu (Texas A&M University, USA)

  • Secure Hierarchical Virtual Private LAN Services for Provider Provisioned Networks
    Madhusanka Liyanage (University of Oulu, Finland); Mika Ylianttila (University of Oulu, Finland); Andrei Gurtov (University of Oulu, Finland)

  • Gangs of the Internet: Towards Automatic Discovery of Peer-to-Peer Communities
    Liyun Li (Polytechnic Institute of NYU, USA); Suhas Mathur (AT&T Labs, USA); Baris Coskun (AT&T Labs, Security Research Center, USA)

  • On the Secrecy Capacity of the Space-Division Multiplexed Fiber Optical Communication Systems
    Kyle C Guan (Bell Labs, Alcatel-Lucent, USA); Peter Winzer (Lucent Technologies, USA); Emina Soljanin (Bell Labs, Alcatel - Lucent, USA); Antonia Tulino (Bell Labs, USA)

  • PHY-Layer Authentication by Introducing Controlled Inter Symbol Interference
    Vireshwar Kumar (Virginia Polytechnic Institute and State University, USA); Jung-Min Park (Virginia Polytechnic Institute and State University, USA); T. Charles Clancy (Virginia Tech, USA); Kaigui Bian (Peking University, P.R. China)

  • Towards Self-Healing Smart Grid via Intelligent Local Controller Switching under Jamming
    Hongbo Liu (Stevens Institute of Technology, USA); Yingying Chen (Stevens Institute of Technology, USA); Mooi Choo Chuah (Lehigh University, USA); Jie Yang (Oakland University, USA)

  • Efficient Codes for Limited View Adversarial Channels
    Reihaneh Safavi-Naini (University of Calgary, Canada); Pengwei Wang (University of Calgary, Canada)

  • Byzantine Robustness, Hierarchy, and Scalability
    Radia Perlman (Intel Laboratories, USA); Charlie Kaufman (Microsoft, USA)

  • Secure Cooperative Spectrum Sensing in Cognitive Radio Networks Using Interference Signatures
    Seunghyun Choi (University of Michigan, USA); Kang G. Shin (University of Michigan, USA)

  • A Viewable E-voting Scheme for Environments with Conflict of Interest
    Huian Li (Purdue University Indianapolis, USA); Yan Sui (Purdue University Indianapolis, USA); Wei Peng (Indiana University-Purdue University Indianapolis, USA); Xukai Zou (School of Science, Purdue University-Indianapolis, USA); Feng Li (Indiana University-Purdue University Indianapolis, USA)

  • Harvesting Unique Characteristics in Packet Sequences for Effective Application Classification
    Zhenlong Yuan (Tsinghua University, P.R. China); Yibo Xue (Tsinghua university, P.R. China); Yingfei Dong (University of Hawaii, USA)

  • A Game-Theoretic Approach for Defending Remote Operating System Fingerprinting
    Mohammad Ashiqur Rahman (University of North Carolina at Charlotte, USA); Mohammad Hossein Manshaei (EPFL, Switzerland); Ehab Al-Shaer (University of North Carolina Charlotte, USA)

  • Sketch-based Multidimensional IDS: a New Approach for Network Anomaly Detection
    Christian Callegari (University of Pisa, Italy); Alessandro Casella (University of Pisa, Italy); Stefano Giordano (University of Pisa, Italy); Michele Pagano (University of Pisa, Italy); Teresa Pepe (University of Pisa, Italy)

  • Competing Mobile Network Game: Embracing Antijamming and Jamming Strategies
    Youngjune L Gwon (Harvard University, USA); Siamak Dastangoo (MIT Lincoln Lab, USA); Carl E. Fossa (MIT Lincoln Laboratory, USA); Ht Kung (Harvard University, USA)

  • A Lightweight Argument System with Efficient Verifier
    Gang Xu (Iowa State University, USA); George T Amariucai (Iowa State University, USA); Yong Guan (Iowa State University, USA)

  • Identifying High-Cardinality Hosts from Network-wide Traffic Measurements
    Yang Liu (Iowa State University, USA); Wenji Chen (Iowa State University, USA); Yong Guan (Iowa State University, USA)

  • CloudSafe: Securing Data Processing within Vulnerable Virtualization Environment in Cloud
    Huijun Xiong (Virginia Tech, USA); Qingji Zheng (University of Texas at San Antonio, USA); Xinwen Zhang (Huawei, USA); Danfeng Yao (Virginia Tech, USA)

  • Efficient Random Route Mutation Considering Flow and Network Constraints
    Qi Duan (University of North Carolina at Charlotte, USA); Ehab Al-Shaer (University of North Carolina Charlotte, USA); Jafar Haadi Jafarian (CyberDNA, UNC Charlotte, USA)

  • A Passive Technique for Fingerprinting Wireless Devices with Wired-side Observations
    Selcuk Uluagac (Georgia Institute of Technology, USA); Sakthi Vignesh Radhakrishnan (Georgia Institute of Technology, USA); Cherita L Corbett (Johns Hopkins University Applied Physics Lab, USA); Antony Baca (JHUAPL, USA); Raheem Beyah (Georgia Institute of Technology, USA)

  • Leveraging the Crowds to Disrupt Phishing
    Jason Gustafson (University of Oregon, USA); Jun Li (University of Oregon, USA)

 
The website is maintained by the webmaster.