Program at-a-glance
Monday 14 October 2013 |
8:30 - 10:00 |
|
10:00 - 10:30 |
Networking Break |
10:30 - 12:30 |
Technical Session A.1
Cognitive Radio Security
National Harbor 2
|
Technical Session B.1
Internet Security I
National Harbor 3 |
12:30 - 14:00 |
Lunch
National Harbor 10 & 11 |
14:00 - 15:30 |
moderator: Wade Trappe
National Harbor 2&3 |
15:30 - 16:00 |
Networking Break |
16:00 - 18:00 |
Technical Session A.2
Security and Privacy in Emerging Networks
National Harbor 2 |
Technical Session B.2
Security and Privacy in Cloud Computing
National Harbor 2 |
18:30 - 20:30 |
|
|
Tuesday 15 October 2013 |
8:45 - 10:00 |
|
10:00 - 10:30 |
Networking Break |
10:30 - 12:30 |
Technical Session A.3
Information Theoretical Security
National Harbor 2 |
Technical Session B.3
Internet Security II
National Harbor 3 |
12:30 - 14:00 |
Lunch
National Harbor 10 & 11 |
14:00 - 15:30 |
moderator: Massimiliano Albanese
National Harbor 2&3 |
15:30 - 16:00 |
Networking Break |
16:00 - 18:00 |
Technical Session A.4
Wireless Network Security
National Harbor 2 |
Technical Session B.4
Intrusion Detection
National Harbor 3 |
|
Wednesday 16 October 2013 |
9:00 - 10:30 |
Workshop
SafeConfig
National Harbor 7
|
Workshop
SPCC
National Harbor 15 |
10:30 - 11:00 |
Networking Break |
11:00 - 12:30 |
Workshop
SafeConfig cont.
National Harbor 7 |
Workshop
SPCC cont.
National Harbor 15 |
12:30 - 14:00 |
Lunch
Cherry Blossom Ballroom |
14:00 - 15:30 |
Workshop
SafeConfig cont.
National Harbor 7 |
Workshop
SPCC cont.
National Harbor 15 |
15:30 - 16:00 |
Networking Break |
16:00 - 17:30 |
Workshop
SafeConfig cont.
National Harbor 7 |
Workshop
SPCC cont.
National Harbor 15 |
Detailed Program
Monday, October 14
8:30 - 10:00 Opening Session and Keynote 1
"Secure Fragmentation for Content-Centric Networks", by Gene Tsudik
Room: National Harbor 2&3
10:30 - 12:30 Session A.1: Cognitive Radio Security
Session Chair: Yingying Chen (Stevens Institute of Technology, USA)
Room: National Harbor 2
Dynamic Adaptive Anti-Jamming via Controlled Mobility
Xiaofan He (North Carolina State University, USA); Huaiyu Dai (NC State University, USA); Peng Ning (North Carolina State University, USA)
PHY-Layer Authentication by Introducing Controlled Inter Symbol Interference
Vireshwar Kumar (Virginia Polytechnic Institute and State University, USA); Jung-Min Park (Virginia Polytechnic Institute and State University, USA); T. Charles Clancy (Virginia Tech, USA); Kaigui Bian (Peking University, P.R. China)
Secure Cooperative Spectrum Sensing in Cognitive Radio Networks Using Interference Signatures
Seunghyun Choi (University of Michigan, USA); Kang G. Shin (University of Michigan, USA)
Competing Mobile Network Game: Embracing Antijamming and Jamming Strategies
Youngjune L Gwon (Harvard University, USA); Siamak Dastangoo (MIT Lincoln Lab, USA); Carl E. Fossa (MIT Lincoln Laboratory, USA); Ht Kung (Harvard University, USA)
T -dominance: Prioritized Defense Deployment for BYOD Security
Wei Peng (Indiana University-Purdue University Indianapolis, USA); Feng Li (Indiana University-Purdue University Indianapolis, USA); Keesook J Han (Air Force Research Laboratory, USA); Xukai Zou (School of Science, Purdue University-Indianapolis, USA); Jie Wu (Temple University, USA)
10:30 - 12:30 Session B.1: Internet Security I
Session Chair: Raheem Beyah (Georgia Institute of Technology, USA)
Room: National Harbor 3
On the Impact of Social Botnets for Spam Distribution and Digital-influence Manipulation
Jinxue Zhang (Arizona State University, USA); Rui Zhang (University of Hawaii, USA); Yanchao Zhang (Arizona State University, USA); Guanhua Yan (Los Alamos National Laboratory, USA)
NOMAD: Towards Non-Intrusive Moving-Target Defense against Web Bots
Shardul Vikram (Texas A&M University, USA); Chao Yang (Texas A&M University, USA); Guofei Gu (Texas A&M University, USA)
Gangs of the Internet: Towards Automatic Discovery of Peer-to-Peer Communities
Liyun Li (Polytechnic Institute of NYU, USA); Suhas Mathur (AT&T Labs, USA); Baris Coskun (AT&T Labs, Security Research Center, USA)
A Game-Theoretic Approach for Defending Remote Operating System Fingerprinting
Mohammad Ashiqur Rahman (University of North Carolina at Charlotte, USA); Mohammad Hossein Manshaei (EPFL, Switzerland); Ehab Al-Shaer (University of North Carolina Charlotte, USA)
Leveraging the Crowds to Disrupt Phishing
Jason Gustafson (University of Oregon, USA); Jun Li (University of Oregon, USA)
14:00 - 15:30
Panel I : "Security for Clean Slate and Future Internet
Architecture"
Moderator: Wade Trappe (Rutgers University, USA)
Room: National Harbor 2&3
16:00 - 18:00 Session A.2: Security and Privacy in Emerging Networks
Session Chair: Jun Li (University of Oregon, USA)
Room: National Harbor 2
Low-Complexity Secure Protocols to Defend Cyber-Physical Systems Against Network Isolation Attacks
Dong-Hoon Shin (Arizona State University, USA); Jinkyu Koo (Purdue University, USA); Lei Yang (Arizona State University, USA); Xiaojun Lin (Purdue University, USA); Saurabh Bagchi (Purdue University, USA); Junshan Zhang (Arizona State University, USA)
Secure Pervasive Social Networking based on Multi-Dimensional Trust Levels
Zheng Yan (Xidian University, P.R. China); Mingjun Wang (Xidian University, P.R. China); Valtteri Niemi (University of Turku, Finland); Raimo Kantola (Aalto University, Finland)
A Vulnerability Study of Geographic Routing in Underwater Acoustic Networks
Michael Zuba (University of Connecticut, USA); Michael Fagan (University of Connecticut, USA); Jun-Hong Cui (University of Connecticut, USA); Zhijie Shi (University of Connecticut, USA)
Privacy-preserving Revocable Content Sharing in Geosocial Networks
Linke Guo (University of Florida, USA); Chi Zhang (University of Science of Technology of China, USA); Yuguang Fang (University of Florida, USA)
Towards Self-Healing Smart Grid via Intelligent Local Controller Switching under Jamming
Hongbo Liu (Stevens Institute of Technology, USA); Yingying Chen (Stevens Institute of Technology, USA); Mooi Choo Chuah (Lehigh University, USA); Jie Yang (Oakland University, USA)
16:00 - 18:00 Session B.2: Security and privacy in Cloud Computing
Session Chair: Ming Li (Utah State University, USA)
Room: National Harbor 3
Certificateless Public Auditing for Data Integrity in the Cloud
Boyang Wang (Xidian University, P.R. China); Baochun Li (University of Toronto, Canada); Hui Li (Xidian University, P.R. China); Fenghua Li (Xidian University, P.R. China)
Secure and Constant Cost Public Cloud Storage Auditing with Deduplication
Jiawei Yuan (University of Arkansas at Little Rock, USA); Shucheng Yu (University of Arkansas at Little Rock, USA)
A Cooperative Botnet Profiling and Detection in Virtualized Environment
Shun-Wen Hsiao (Academia Sinica, Taiwan); Yi-Ning Chen (National Taiwan University, Taiwan); Yeali S. Sun (National Taiwan University, Taiwan); Meng Chang Chen (Academia Sinica, Taiwan)
A Lightweight Argument System with Efficient Verifier
Gang Xu (Iowa State University, USA); George T Amariucai (Iowa State University, USA); Yong Guan (Iowa State University, USA)
CloudSafe: Securing Data Processing within Vulnerable Virtualization Environment in Cloud
Huijun Xiong (Virginia Tech, USA); Qingji Zheng (University of Texas at San Antonio, USA); Xinwen Zhang (Huawei, USA); Danfeng Yao (Virginia Tech, USA)
18:30 - 20:30 Welcome Reception and Poster Session
Tuesday, October 15
8:45 - 10:00
Announcement and Keynote 2
"Secure and Resilient Network Architectures", by Vipin Swarup
Room: National Harbor 2&3
10:30 - 12:30 Session A.3: Information Theoretical Security
Session Chair: Albert Levi (Sabanci University, Turkey)
Room: National Harbor 2
Energy-Efficient, Secure Group Key Agreement for Ad Hoc Networks
Thomas R Halford (TrellisWare Technologies, Inc., USA); Thomas Courtade (Stanford University, USA); Keith M Chugg (University of Southern California, USA)
Privacy-Preserving Item-Based Collaborative Filtering Using Semi-Distributed Belief Propagation
Jun Zou (Georgia Institute of Technology, USA); Arash Einolghozati (Georgia Tech, USA); Faramarz Fekri (Georgia Institute of Technology, USA)
Exponential Secrecy Against Unbounded Adversary using Joint Encryption and Privacy Amplification
Yahya Khiabani (Louisiana State University, USA); Shuangqing Wei (Louisiana State University, USA)
On the Secrecy Capacity of the Space-Division Multiplexed Fiber Optical Communication Systems
Kyle C Guan (Bell Labs, Alcatel-Lucent, USA); Peter Winzer (Lucent Technologies, USA); Emina Soljanin (Bell Labs, Alcatel - Lucent, USA); Antonia Tulino (Bell Labs, USA)
Efficient Codes for Limited View Adversarial Channels
Reihaneh Safavi-Naini (University of Calgary, Canada); Pengwei Wang (University of Calgary, Canada)
10:30 - 12:30 Session B.3: Internet security II
Session Chair: Yingfei Dong (University of Hawaii, USA)
Room: National Harbor 2&3
Fragmentation Considered Poisonous, or: One-Domain-to-Rule-them-All.ORG
Amir Herzberg (Bar-Ilan University, Israel); Haya Shulman (Bar Ilan University, Israel)
Secure Hierarchical Virtual Private LAN Services for Provider Provisioned Networks
Madhusanka Liyanage (University of Oulu, Finland); Mika Ylianttila (University of Oulu, Finland); Andrei Gurtov (University of Oulu, Finland)
Byzantine Robustness, Hierarchy, and Scalability
Radia Perlman (Intel Laboratories, USA); Charlie Kaufman (Microsoft, USA)
A Viewable E-voting Scheme for Environments with Conflict of Interest
Huian Li (Purdue University Indianapolis, USA); Yan Sui (Purdue University Indianapolis, USA); Wei Peng (Indiana University-Purdue University Indianapolis, USA); Xukai Zou (School of Science, Purdue University-Indianapolis, USA); Feng Li (Indiana University-Purdue University Indianapolis, USA)
Efficient Random Route Mutation Considering Flow and Network Constraints
Qi Duan (University of North Carolina at Charlotte, USA); Ehab Al-Shaer (University of North Carolina Charlotte, USA); Jafar Haadi Jafarian (CyberDNA, UNC Charlotte, USA)
14:00 - 15:30
Panel II : "Metrics and Tools for Cyber Situation Awareness"
Moderator: Massimiliano Albanese (George Mason
University, USA)
Room: National Harbor 2&3
16:00 - 18:00 Session A.4: Wireless network security
Session Chair: Min Song (The University of Toledo, USA)
Room: National Harbor 2
EasyScale: Easy Mapping for Large-Scale Network Security Experiments
Wei-Min Yao (Purdue University, USA); Sonia Fahmy (Purdue University, USA); Jiahong Zhu (Purdue, USA)
A Moving Target Defense Mechanism for MANETs Based on Identity Virtualization
Massimiliano Albanese (George Mason University, USA); Alessandra De Benedictis (University of Naples Federico II, Italy); Sushil Jajodia (George Mason University, USA); Kun Sun (George Mason University, USA)
Identifying High-Cardinality Hosts from Network-wide Traffic Measurements
Yang Liu (Iowa State University, USA); Wenji Chen (Iowa State University, USA); Yong Guan (Iowa State University, USA)
LISA: Location Information ScrAmbler for Privacy Protection on Smartphones
Zhigang Chen (University of Michigan, USA); Xin Hu (IBM Research, USA); Xiaoen Ju (University of Michigan, Ann Arbor, USA); Kang G. Shin (University of Michigan, USA)
A Passive Technique for Fingerprinting Wireless Devices with Wired-side Observations
Selcuk Uluagac (Georgia Institute of Technology, USA); Sakthi Vignesh Radhakrishnan (Georgia Institute of Technology, USA); Cherita L Corbett (Johns Hopkins University Applied Physics Lab, USA); Antony Baca (JHUAPL, USA); Raheem Beyah (Georgia Institute of Technology, USA)
16:00 - 18:00 Session B.4: Intrusion Detection
Session Chair: Nan Zhang (The George Washington University, USA)
Room: National Harbor 3
Scalable Hardware Monitors to Protect Network Processors from Data Plane Attacks
Kekai Hu (University of Massachusetts Amherst, USA); Harikrishnan Chandrikakutty (University of Massachusetts, USA); Russell Tessier (University of Massachusetts, USA); Tilman Wolf (University of Massachusetts, USA)
Using Instruction Sequence Abstraction for Shellcode Detection and Attribution
Ziming Zhao (Arizona State University, USA); Gail-Joon Ahn (Arizona State University, USA)
Limitations to Threshold Random Walk Scan Detection and Mitigating Enhancements
Peter Mell (National Institute of Standards and Technology, USA); Richard Harang (ICF International, USA)
Harvesting Unique Characteristics in Packet Sequences for Effective Application Classification
Zhenlong Yuan (Tsinghua University, P.R. China); Yibo Xue (Tsinghua university, P.R. China); Yingfei Dong (University of Hawaii, USA)
Sketch-based Multidimensional IDS: a New Approach for Network Anomaly Detection
Christian Callegari (University of Pisa, Italy); Alessandro Casella (University of Pisa, Italy); Stefano Giordano (University of Pisa, Italy); Michele Pagano (University of Pisa, Italy); Teresa Pepe (University of Pisa, Italy) |