Poster Session

18:30 - 20:30 October 14, 2013

Simulating Attack Behaviors in Enterprise Networks

Stephen Moskal (Rochester Institute of Technology, USA); Derek Kreider (Rochester Institute of Technology, USA); Lydia Hays (Rochester Institute of Technology, USA); Ben Wheeler (Rochester Institute of Technology, USA); Shanchieh Jay Yang (Rochester Institute of Technology, USA); Michael Kuhl (Rochester Institute of Technology, USA)


Performance of Interval-based Features for Anomaly Detection in Network Traffic

Kriangkrai Limthong (The Graduate University for Advanced Studies (Sokendai), Japan)


ISP Traceback - Attack Path Detection

Björn Stelte (Universität der Bundeswehr München, Germany)


DNSSEC: Security and Availability Challenges

Amir Herzberg (Bar-Ilan University, Israel); Haya Shulman (Bar Ilan University, Israel)


Provenance of Exposure: Identifying Sources of Leaked Documents

Christian Collberg (Arizona University, USA); Aaron Gibson (Arizona University, USA); Amir Herzberg (Bar-Ilan University, Israel); Sam Martin (Arizona University, USA); Nitin Shinde (Arizona University, USA); Haya Shulman (Bar Ilan University, Israel)


FADEC: Fast Authentication for Dynamic Electric Vehicle Charging

Hongyang Li (University of Illinois at Urbana-Champaign, USA); György Dán (KTH, Royal Institute of Technology, Sweden); Klara Nahrstedt (University of Illinois, USA)


Cloud of Secure Elements, Perpectives for Mobile and Cloud Applications Security

Pascal Urien (Télécom ParisTech, France)


Privacy-Preserving Handover Mechanism in 4G

Hasen Nicanfar (The University of British Columbia, Canada); Javad Hajipour (The University of British Columbia, Canada); Farshid Agharebparast (University of British Columbia, Canada); Peyman TalebiFard (The University of British Columbia, Canada); Victor CM Leung (The University of British Columbia, Canada)


Design and Implementation of a Skype Protocol Analyzer

Ray-Guang Cheng (National Taiwan University of Science and Technology, Taiwan); Chia-Liang Lian (National Taiwan University of Science and Technology, Taiwan); Ping-Chen Lin (National Taiwan University of Science and Technology, Taiwan); Po-Yao Tsai (National Taiwan University of Science and Technology, Taiwan); Tse-Han Liu (National Taiwan University of Science and Technology, Taiwan); Hsien-Cheng Chou (National Taiwan University, Taiwan); Shiao-Li Tsao (National Chiao Tung University, Taiwan); Shanchieh Jay Yang (Rochester Institute of Technology, USA)


S-Match: An Efficient Privacy-preserving Profile Matching Scheme

Xiaojing Liao (Georgia Institute of Technology, USA); Selcuk Uluagac (Georgia Institute of Technology, USA); Raheem Beyah (Georgia Institute of Technology, USA)


A Novel Detection Scheme for Malicious Nodes in Smart Meter System

Hong Wen (UESTC, P.R. China); Yixin Jiang (University of Waterloo, Canada)


Dynamic Control for Cooperative Jamming with a Non-altruistic Node

Yunus Sarikaya (Sabanci University, Turkey); Ozgur Ercetin (Sabanci University, Turkey); Ozgur Gurbuz (Sabanci University, Turkey)


The Security Issue of WSNs Based on Cloud Computing

Hong Wen (UESTC, P.R. China); Yixin Jiang (University of Waterloo, Canada)


Locating Tor hidden services through an interval-based traffic-correlation attack

Juan Elices (University of New Mexico, USA); Fernando Pérez-González (University of Vigo, Spain)


Characterization of the Dynamics and Interactions of Domain Names and Name Server

Mansurul Bhuiyan (IUPUI, USA); Aziz Mohaisen (Verisign Labs, USA); Yannis Labrou (Verisign, Inc., USA)


Sequential Modeling for Obfuscated Network Attack Action Sequences

Haitao Du (Rochester Institute of Technology, USA); Shanchieh Jay Yang (Rochester Institute of Technology, USA)


User-adaptive Energy-aware Security for Mobile Devices

Sriram Sankaran (University at Buffalo, USA); Ramalingam Sridhar (University at Buffalo, USA)


Providing context-based security for inter-organizational electronic business processes

Maurizio Talamo (University of Rome Tor Vergata and Nestor Laboratory, Italy); Franco Arcieri (Nestor Laboratory, University of Rome Tor Vergata, Italy); Christian Schunck (Nestor Laboratory, University of Rome Tor Vergata, Italy); Andrea Callia D'Iddio (Tor Vergata University of Rome, Italy)


A P2P Recommended Trust Nodes Selection Algorithm Based on Topological Potential

Hong Wen (UESTC, P.R. China); Yixin Jiang (University of Waterloo, Canada)


Secure Zones: an Attribute-Based Encryption Advisory System for Safe Firearms

Marcos Portnoi (University of Delaware, USA); Chien-Chung Shen (University of Delaware, USA)

ADAM: Automated Detection and Attribution of Malicious Webpages

Ahmed E. Kosba (University of Maryland, College Park, USA); Aziz Mohaisen (Verisign Labs, USA); Andrew West (University of Pennsylvania, USA); Trevor Tonn (Verisign, USA)


Maintaining Trajectory Privacy in Mobile Wireless Sensor Networks

Osman Kiraz (Sabanci University, Turkey); Albert Levi (Sabanci University, Turkey)


An Architecture for Supervising COTS Products

Robert Koch (Universität der Bundeswehr München, Germany); Mario Golling (Universität der Bundeswehr München, Germany); Gabi Dreo Rodosek (Universität der Bundeswehr München, Germany)


Location-Aware Sign-on and Key Exchange using Attribute-Based Encryption and Bluetooth Beacons

Marcos Portnoi (University of Delaware, USA); Chien-Chung Shen (University of Delaware, USA)


Babble: Identifying Malware by Its Dialects

Aziz Mohaisen (Verisign Labs, USA); Omar Alrawi (Qatar Foundation, USA); Andrew West (University of Pennsylvania, USA); Allison Mankin (U.S. National Science Foundation, USA)


Attracting Sophisticated Attacks to Secure Systems: A new Honeypot Architecture

Robert Koch (Universität der Bundeswehr München, Germany); Mario Golling (Universität der Bundeswehr München, Germany); Gabi Dreo Rodosek (Universität der Bundeswehr München, Germany)


NICE: Network Introspection by Collaborating Endpoints

Darrell Kienzle (Symantec, USA); Nathan S. Evans (Symantec, USA); Matthew C. Elder (Symantec, USA)


An Efficient and Secure Search Database Scheme for Cloud Computing in Smart Grid

Yixin Jiang (University of Waterloo, Canada); Xiaobin Guo (EPRI, China Southern Power Grid Co. Ltd., P.R. China); Chao Li (Tsinghua University, P.R. China); Hong Wen (UESTC, P.R. China); Lei Cai (Yunnan YundianTongfang Technology Co. Ltd, P.R. China); Rui Zhang (Yunnan Power Grid Corporation, P.R. China)

 
 
The website is maintained by the webmaster.