18:30 - 20:30 October 14, 2013
Simulating Attack Behaviors in Enterprise Networks
Stephen Moskal (Rochester Institute of Technology, USA); Derek Kreider (Rochester Institute of Technology, USA); Lydia Hays (Rochester Institute of Technology, USA); Ben Wheeler (Rochester Institute of Technology, USA); Shanchieh Jay Yang (Rochester Institute of Technology, USA); Michael Kuhl (Rochester Institute of Technology, USA)
Performance of Interval-based Features for Anomaly Detection in Network Traffic
Kriangkrai Limthong (The Graduate University for Advanced Studies (Sokendai), Japan)
ISP Traceback - Attack Path Detection
Björn Stelte (Universität der Bundeswehr München, Germany)
DNSSEC: Security and Availability Challenges
Amir Herzberg (Bar-Ilan University, Israel); Haya Shulman (Bar Ilan University, Israel)
Provenance of Exposure: Identifying Sources of Leaked Documents
Christian Collberg (Arizona University, USA); Aaron Gibson (Arizona University, USA); Amir Herzberg (Bar-Ilan University, Israel); Sam Martin (Arizona University, USA); Nitin Shinde (Arizona University, USA); Haya Shulman (Bar Ilan University, Israel)
FADEC: Fast Authentication for Dynamic Electric Vehicle Charging
Hongyang Li (University of Illinois at Urbana-Champaign, USA); György Dán (KTH, Royal Institute of Technology, Sweden); Klara Nahrstedt (University of Illinois, USA)
Cloud of Secure Elements, Perpectives for Mobile and Cloud Applications Security
Pascal Urien (Télécom ParisTech, France)
Privacy-Preserving Handover Mechanism in 4G
Hasen Nicanfar (The University of British Columbia, Canada); Javad Hajipour (The University of British Columbia, Canada); Farshid Agharebparast (University of British Columbia, Canada); Peyman TalebiFard (The University of British Columbia, Canada); Victor CM Leung (The University of British Columbia, Canada)
Design and Implementation of a Skype Protocol Analyzer
Ray-Guang Cheng (National Taiwan University of Science and Technology, Taiwan); Chia-Liang Lian (National Taiwan University of Science and Technology, Taiwan); Ping-Chen Lin (National Taiwan University of Science and Technology, Taiwan); Po-Yao Tsai (National Taiwan University of Science and Technology, Taiwan); Tse-Han Liu (National Taiwan University of Science and Technology, Taiwan); Hsien-Cheng Chou (National Taiwan University, Taiwan); Shiao-Li Tsao (National Chiao Tung University, Taiwan); Shanchieh Jay Yang (Rochester Institute of Technology, USA)
S-Match: An Efficient Privacy-preserving Profile Matching Scheme
Xiaojing Liao (Georgia Institute of Technology, USA); Selcuk Uluagac (Georgia Institute of Technology, USA); Raheem Beyah (Georgia Institute of Technology, USA)
A Novel Detection Scheme for Malicious Nodes in Smart Meter System
Hong Wen (UESTC, P.R. China); Yixin Jiang (University of Waterloo, Canada)
Dynamic Control for Cooperative Jamming with a Non-altruistic Node
Yunus Sarikaya (Sabanci University, Turkey); Ozgur Ercetin (Sabanci University, Turkey); Ozgur Gurbuz (Sabanci University, Turkey)
The Security Issue of WSNs Based on Cloud Computing
Hong Wen (UESTC, P.R. China); Yixin Jiang (University of Waterloo, Canada)
Locating Tor hidden services through an interval-based traffic-correlation attack
Juan Elices (University of New Mexico, USA); Fernando Pérez-González (University of Vigo, Spain)
Characterization of the Dynamics and Interactions of Domain Names and Name Server
Mansurul Bhuiyan (IUPUI, USA); Aziz Mohaisen (Verisign Labs, USA); Yannis Labrou (Verisign, Inc., USA)
Sequential Modeling for Obfuscated Network Attack Action Sequences
Haitao Du (Rochester Institute of Technology, USA); Shanchieh Jay Yang (Rochester Institute of Technology, USA)
User-adaptive Energy-aware Security for Mobile Devices
Sriram Sankaran (University at Buffalo, USA); Ramalingam Sridhar (University at Buffalo, USA)
Providing context-based security for inter-organizational electronic business processes
Maurizio Talamo (University of Rome Tor Vergata and Nestor Laboratory, Italy); Franco Arcieri (Nestor Laboratory, University of Rome Tor Vergata, Italy); Christian Schunck (Nestor Laboratory, University of Rome Tor Vergata, Italy); Andrea Callia D'Iddio (Tor Vergata University of Rome, Italy)
A P2P Recommended Trust Nodes Selection Algorithm Based on Topological Potential
Hong Wen (UESTC, P.R. China); Yixin Jiang (University of Waterloo, Canada)
Secure Zones: an Attribute-Based Encryption Advisory System for Safe Firearms
Marcos Portnoi (University of Delaware, USA); Chien-Chung Shen (University of Delaware, USA)
ADAM: Automated Detection and Attribution of Malicious Webpages
Ahmed E. Kosba (University of Maryland, College Park, USA); Aziz Mohaisen (Verisign Labs, USA); Andrew West (University of Pennsylvania, USA); Trevor Tonn (Verisign, USA)
Maintaining Trajectory Privacy in Mobile Wireless Sensor Networks
Osman Kiraz (Sabanci University, Turkey); Albert Levi (Sabanci University, Turkey)
An Architecture for Supervising COTS Products
Robert Koch (Universität der Bundeswehr München, Germany); Mario Golling (Universität der Bundeswehr München, Germany); Gabi Dreo Rodosek (Universität der Bundeswehr München, Germany)
Location-Aware Sign-on and Key Exchange using Attribute-Based Encryption and Bluetooth Beacons
Marcos Portnoi (University of Delaware, USA); Chien-Chung Shen (University of Delaware, USA)
Babble: Identifying Malware by Its Dialects
Aziz Mohaisen (Verisign Labs, USA); Omar Alrawi (Qatar Foundation, USA); Andrew West (University of Pennsylvania, USA); Allison Mankin (U.S. National Science Foundation, USA)
Attracting Sophisticated Attacks to Secure Systems: A new Honeypot Architecture
Robert Koch (Universität der Bundeswehr München, Germany); Mario Golling (Universität der Bundeswehr München, Germany); Gabi Dreo Rodosek (Universität der Bundeswehr München, Germany)
NICE: Network Introspection by Collaborating Endpoints
Darrell Kienzle (Symantec, USA); Nathan S. Evans (Symantec, USA); Matthew C. Elder (Symantec, USA)
An Efficient and Secure Search Database Scheme for Cloud Computing in Smart Grid
Yixin Jiang (University of Waterloo, Canada); Xiaobin Guo (EPRI, China Southern Power Grid Co. Ltd., P.R. China); Chao Li (Tsinghua University, P.R. China); Hong Wen (UESTC, P.R. China); Lei Cai (Yunnan YundianTongfang Technology Co. Ltd, P.R. China); Rui Zhang (Yunnan Power Grid Corporation, P.R. China)
|