Conference Program

Program at-a-glance

Monday 14 October 2013
8:30 - 10:00

Opening Session and Keynote 1
"Secure Fragmentation for Content-Centric Networks", by Gene Tsudik
National Harbor 2 &3

10:00 - 10:30
Networking Break
10:30 - 12:30
Technical Session A.1
Cognitive Radio Security
National Harbor 2
Technical Session B.1
Internet Security I
National Harbor 3
12:30 - 14:00
Lunch
National Harbor 10 & 11
14:00 - 15:30
moderator: Wade Trappe
National Harbor 2&3
15:30 - 16:00
Networking Break
16:00 - 18:00
Technical Session A.2
Security and Privacy in Emerging Networks
National Harbor 2
Technical Session B.2
Security and Privacy in Cloud Computing
National Harbor 2
18:30 - 20:30
Tuesday 15 October 2013
8:45 - 10:00 
10:00 - 10:30
Networking Break
10:30 - 12:30
Technical Session A.3
Information Theoretical Security
National Harbor 2
Technical Session B.3
Internet Security II
National Harbor 3
12:30 - 14:00
Lunch
National Harbor 10 & 11
14:00 - 15:30
moderator: Massimiliano Albanese
National Harbor 2&3
15:30 - 16:00
Networking Break
16:00 - 18:00
Technical Session A.4
Wireless Network Security
National Harbor 2
Technical Session B.4
Intrusion Detection
National Harbor 3
Wednesday 16 October 2013
9:00 - 10:30 
Workshop SafeConfig
National Harbor 7
Workshop SPCC
National Harbor 15
10:30 - 11:00
Networking Break
11:00 - 12:30
Workshop SafeConfig cont.
National Harbor 7
Workshop SPCC cont.
National Harbor 15
12:30 - 14:00
Lunch
Cherry Blossom Ballroom
14:00 - 15:30
Workshop SafeConfig cont.
National Harbor 7
Workshop SPCC cont.
National Harbor 15
15:30 - 16:00
Networking Break
16:00 - 17:30
Workshop SafeConfig cont.
National Harbor 7
Workshop SPCC cont.
National Harbor 15

 

Detailed Program

 

Monday, October 14

8:30 - 10:00 Opening Session and Keynote 1

"Secure Fragmentation for Content-Centric Networks", by Gene Tsudik

Room: National Harbor 2&3

 

10:30 - 12:30 Session A.1: Cognitive Radio Security

Session Chair: Yingying Chen (Stevens Institute of Technology, USA)

Room: National Harbor 2

Dynamic Adaptive Anti-Jamming via Controlled Mobility
Xiaofan He (North Carolina State University, USA); Huaiyu Dai (NC State University, USA); Peng Ning (North Carolina State University, USA)

PHY-Layer Authentication by Introducing Controlled Inter Symbol Interference
Vireshwar Kumar (Virginia Polytechnic Institute and State University, USA); Jung-Min Park (Virginia Polytechnic Institute and State University, USA); T. Charles Clancy (Virginia Tech, USA); Kaigui Bian (Peking University, P.R. China)

Secure Cooperative Spectrum Sensing in Cognitive Radio Networks Using Interference Signatures
Seunghyun Choi (University of Michigan, USA); Kang G. Shin (University of Michigan, USA)

Competing Mobile Network Game: Embracing Antijamming and Jamming Strategies
Youngjune L Gwon (Harvard University, USA); Siamak Dastangoo (MIT Lincoln Lab, USA); Carl E. Fossa (MIT Lincoln Laboratory, USA); Ht Kung (Harvard University, USA)

T -dominance: Prioritized Defense Deployment for BYOD Security
Wei Peng (Indiana University-Purdue University Indianapolis, USA); Feng Li (Indiana University-Purdue University Indianapolis, USA); Keesook J Han (Air Force Research Laboratory, USA); Xukai Zou (School of Science, Purdue University-Indianapolis, USA); Jie Wu (Temple University, USA)

10:30 - 12:30 Session B.1: Internet Security I                          

Session Chair: Raheem Beyah (Georgia Institute of Technology, USA)

Room: National Harbor 3

On the Impact of Social Botnets for Spam Distribution and Digital-influence Manipulation
Jinxue Zhang (Arizona State University, USA); Rui Zhang (University of Hawaii, USA); Yanchao Zhang (Arizona State University, USA); Guanhua Yan (Los Alamos National Laboratory, USA)

NOMAD: Towards Non-Intrusive Moving-Target Defense against Web Bots
Shardul Vikram (Texas A&M University, USA); Chao Yang (Texas A&M University, USA); Guofei Gu (Texas A&M University, USA)

Gangs of the Internet: Towards Automatic Discovery of Peer-to-Peer Communities
Liyun Li (Polytechnic Institute of NYU, USA); Suhas Mathur (AT&T Labs, USA); Baris Coskun (AT&T Labs, Security Research Center, USA)

A Game-Theoretic Approach for Defending Remote Operating System Fingerprinting
Mohammad Ashiqur Rahman (University of North Carolina at Charlotte, USA); Mohammad Hossein Manshaei (EPFL, Switzerland); Ehab Al-Shaer (University of North Carolina Charlotte, USA)

Leveraging the Crowds to Disrupt Phishing
Jason Gustafson (University of Oregon, USA); Jun Li (University of Oregon, USA)

 

14:00 - 15:30

Panel I : "Security for Clean Slate and Future Internet Architecture"
Moderator: Wade Trappe (Rutgers University, USA)

Room: National Harbor 2&3

16:00 - 18:00 Session A.2: Security and Privacy in Emerging Networks

Session Chair: Jun Li (University of Oregon, USA) 

Room: National Harbor 2

Low-Complexity Secure Protocols to Defend Cyber-Physical Systems Against Network Isolation Attacks
Dong-Hoon Shin (Arizona State University, USA); Jinkyu Koo (Purdue University, USA); Lei Yang (Arizona State University, USA); Xiaojun Lin (Purdue University, USA); Saurabh Bagchi (Purdue University, USA); Junshan Zhang (Arizona State University, USA)

Secure Pervasive Social Networking based on Multi-Dimensional Trust Levels
Zheng Yan (Xidian University, P.R. China); Mingjun Wang (Xidian University, P.R. China); Valtteri Niemi (University of Turku, Finland); Raimo Kantola (Aalto University, Finland)

A Vulnerability Study of Geographic Routing in Underwater Acoustic Networks
Michael Zuba (University of Connecticut, USA); Michael Fagan (University of Connecticut, USA); Jun-Hong Cui (University of Connecticut, USA); Zhijie Shi (University of Connecticut, USA)

Privacy-preserving Revocable Content Sharing in Geosocial Networks
Linke Guo (University of Florida, USA); Chi Zhang (University of Science of Technology of China, USA); Yuguang Fang (University of Florida, USA)

Towards Self-Healing Smart Grid via Intelligent Local Controller Switching under Jamming
Hongbo Liu (Stevens Institute of Technology, USA); Yingying Chen (Stevens Institute of Technology, USA); Mooi Choo Chuah (Lehigh University, USA); Jie Yang (Oakland University, USA)


16:00 - 18:00 Session B.2: Security and privacy in Cloud Computing

Session Chair: Ming Li (Utah State University, USA)

Room: National Harbor 3

Certificateless Public Auditing for Data Integrity in the Cloud
Boyang Wang (Xidian University, P.R. China); Baochun Li (University of Toronto, Canada); Hui Li (Xidian University, P.R. China); Fenghua Li (Xidian University, P.R. China)

Secure and Constant Cost Public Cloud Storage Auditing with Deduplication
Jiawei Yuan (University of Arkansas at Little Rock, USA); Shucheng Yu (University of Arkansas at Little Rock, USA)

A Cooperative Botnet Profiling and Detection in Virtualized Environment
Shun-Wen Hsiao (Academia Sinica, Taiwan); Yi-Ning Chen (National Taiwan University, Taiwan); Yeali S. Sun (National Taiwan University, Taiwan); Meng Chang Chen (Academia Sinica, Taiwan)

A Lightweight Argument System with Efficient Verifier
Gang Xu (Iowa State University, USA); George T Amariucai (Iowa State University, USA); Yong Guan (Iowa State University, USA)

CloudSafe: Securing Data Processing within Vulnerable Virtualization Environment in Cloud
Huijun Xiong (Virginia Tech, USA); Qingji Zheng (University of Texas at San Antonio, USA); Xinwen Zhang (Huawei, USA); Danfeng Yao (Virginia Tech, USA)

 

18:30 - 20:30  Welcome Reception and Poster Session


Tuesday, October 15

 

8:45 - 10:00 Announcement and Keynote 2

"Secure and Resilient Network Architectures", by Vipin Swarup

Room: National Harbor 2&3

10:30 - 12:30 Session A.3: Information Theoretical Security

Session Chair: Albert Levi (Sabanci University, Turkey)

Room: National Harbor 2

Energy-Efficient, Secure Group Key Agreement for Ad Hoc Networks
Thomas R Halford (TrellisWare Technologies, Inc., USA); Thomas Courtade (Stanford University, USA); Keith M Chugg (University of Southern California, USA)

Privacy-Preserving Item-Based Collaborative Filtering Using Semi-Distributed Belief Propagation
Jun Zou (Georgia Institute of Technology, USA); Arash Einolghozati (Georgia Tech, USA); Faramarz Fekri (Georgia Institute of Technology, USA)

Exponential Secrecy Against Unbounded Adversary using Joint Encryption and Privacy Amplification
Yahya Khiabani (Louisiana State University, USA); Shuangqing Wei (Louisiana State University, USA)

On the Secrecy Capacity of the Space-Division Multiplexed Fiber Optical Communication Systems
Kyle C Guan (Bell Labs, Alcatel-Lucent, USA); Peter Winzer (Lucent Technologies, USA); Emina Soljanin (Bell Labs, Alcatel - Lucent, USA); Antonia Tulino (Bell Labs, USA)

Efficient Codes for Limited View Adversarial Channels
Reihaneh Safavi-Naini (University of Calgary, Canada); Pengwei Wang (University of Calgary, Canada)

 

10:30 - 12:30 Session B.3: Internet security II

Session Chair: Yingfei Dong (University of Hawaii, USA)

Room: National Harbor 2&3

Fragmentation Considered Poisonous, or: One-Domain-to-Rule-them-All.ORG
Amir Herzberg (Bar-Ilan University, Israel); Haya Shulman (Bar Ilan University, Israel)

Secure Hierarchical Virtual Private LAN Services for Provider Provisioned Networks
Madhusanka Liyanage (University of Oulu, Finland); Mika Ylianttila (University of Oulu, Finland); Andrei Gurtov (University of Oulu, Finland)

Byzantine Robustness, Hierarchy, and Scalability
Radia Perlman (Intel Laboratories, USA); Charlie Kaufman (Microsoft, USA)

A Viewable E-voting Scheme for Environments with Conflict of Interest
Huian Li (Purdue University Indianapolis, USA); Yan Sui (Purdue University Indianapolis, USA); Wei Peng (Indiana University-Purdue University Indianapolis, USA); Xukai Zou (School of Science, Purdue University-Indianapolis, USA); Feng Li (Indiana University-Purdue University Indianapolis, USA)

Efficient Random Route Mutation Considering Flow and Network Constraints
Qi Duan (University of North Carolina at Charlotte, USA); Ehab Al-Shaer (University of North Carolina Charlotte, USA); Jafar Haadi Jafarian (CyberDNA, UNC Charlotte, USA)

 

14:00 - 15:30

Panel II : "Metrics and Tools for Cyber Situation Awareness"

Moderator: Massimiliano Albanese (George Mason University, USA)

Room: National Harbor 2&3

    16:00 - 18:00 Session A.4: Wireless network security

    Session Chair: Min Song (The University of Toledo, USA)

    Room: National Harbor 2

    EasyScale: Easy Mapping for Large-Scale Network Security Experiments
    Wei-Min Yao (Purdue University, USA); Sonia Fahmy (Purdue University, USA); Jiahong Zhu (Purdue, USA)

    A Moving Target Defense Mechanism for MANETs Based on Identity Virtualization
    Massimiliano Albanese (George Mason University, USA); Alessandra De Benedictis (University of Naples Federico II, Italy); Sushil Jajodia (George Mason University, USA); Kun Sun (George Mason University, USA)

    Identifying High-Cardinality Hosts from Network-wide Traffic Measurements
    Yang Liu (Iowa State University, USA); Wenji Chen (Iowa State University, USA); Yong Guan (Iowa State University, USA)

    LISA: Location Information ScrAmbler for Privacy Protection on Smartphones
    Zhigang Chen (University of Michigan, USA); Xin Hu (IBM Research, USA); Xiaoen Ju (University of Michigan, Ann Arbor, USA); Kang G. Shin (University of Michigan, USA)

    A Passive Technique for Fingerprinting Wireless Devices with Wired-side Observations
    Selcuk Uluagac (Georgia Institute of Technology, USA); Sakthi Vignesh Radhakrishnan (Georgia Institute of Technology, USA); Cherita L Corbett (Johns Hopkins University Applied Physics Lab, USA); Antony Baca (JHUAPL, USA); Raheem Beyah (Georgia Institute of Technology, USA)

     

    16:00 - 18:00 Session B.4: Intrusion Detection

    Session Chair: Nan Zhang (The George Washington University, USA)

    Room: National Harbor 3

    Scalable Hardware Monitors to Protect Network Processors from Data Plane Attacks
    Kekai Hu (University of Massachusetts Amherst, USA); Harikrishnan Chandrikakutty (University of Massachusetts, USA); Russell Tessier (University of Massachusetts, USA); Tilman Wolf (University of Massachusetts, USA)

    Using Instruction Sequence Abstraction for Shellcode Detection and Attribution
    Ziming Zhao (Arizona State University, USA); Gail-Joon Ahn (Arizona State University, USA)

    Limitations to Threshold Random Walk Scan Detection and Mitigating Enhancements
    Peter Mell (National Institute of Standards and Technology, USA); Richard Harang (ICF International, USA)

    Harvesting Unique Characteristics in Packet Sequences for Effective Application Classification
    Zhenlong Yuan (Tsinghua University, P.R. China); Yibo Xue (Tsinghua university, P.R. China); Yingfei Dong (University of Hawaii, USA)

    Sketch-based Multidimensional IDS: a New Approach for Network Anomaly Detection
    Christian Callegari (University of Pisa, Italy); Alessandro Casella (University of Pisa, Italy); Stefano Giordano (University of Pisa, Italy); Michele Pagano (University of Pisa, Italy); Teresa Pepe (University of Pisa, Italy)

     
     
    The website is maintained by the webmaster.