IEEE.org | IEEE Xplore Digital Library | IEEE Communications Society | IEEE Spectrum Online | More IEEE Sites           
 

Monday, 10 June 2013 11:00-12:30

CIS-01: Cloud and distributed application security (Duna Salon I)

CIS-02: Anomaly and Intrusion Detection - I (Lanchid A)

Monday, 10 June 2013 14:00-15:30

CIS-03: Internet Security (Lanchid A)

Monday, 10 June 2013 16:00-18:00

CIS-04: Anonymity and Privacy (Margit B)

Tuesday, 11 June 2013 09:00-10:30

CIS-05: Anomaly and Intrusion Detection - II (Duna Salon I)

Tuesday, 11 June 2013 14:00-15:30

CIS-06: Wireless Network Security - I (Duna Salon I)

CIS-P1: Fundamentals of Information Security (poster) (Buda, Budapest, Pest)

Wednesday, 12 June 2013 09:00-10:30

CIS-07: Wireless Network Security - II (Duna Salon I)

Wednesday, 12 June 2013 14:00-15:30

CIS-08: Wireless Communications Security - I (Duna Salon I)

Wednesday, 12 June 2013 16:00-18:00

CIS-09: Wireless Communications Security - II (Ballroom II)


Monday, 10 June 2013 11:00-12:30

CIS-01: Cloud and distributed application security (Duna Salon I)

Chairs: Alex Borges Vieira (Brazil Universidade Federal de Juiz de Fora)

11:00-11:18 Ensuring Data Privacy by Hybrid Cloud
   Xueli Huang (Temple University, USA), Xiaojiang Du (Temple University, USA)

11:18-11:36 A General Cloud Firewall Framework with Dynamic Resource Allocation
   Shui Yu (Deakin University, Australia), Robin Doss (Deakin University, Australia), Wanlei Zhou (Deakin University, Australia), Song Guo (The University of Aizu, Japan)

11:36-11:54 Privacy-Preserving Public Auditing for Shared Cloud Data Supporting Group Dynamics
   Boyang Wang (Xidian University & Utah State University, P.R. China), Hui Li (Xidian University, P.R. China), Ming Li (Utah State University, USA)

11:54-12:12 A Privacy Preserving Distributed Reputation Mechanism
   Emmanuelle Anceaume (IRISA, France), Gilles Guette (University of Rennes 1, France), Paul Lajoie-Mazenc (University of Rennes 1, France), Nicolas Prigent (SUPELEC, France), Valérie Viet Triem Tong (SUPELEC, France)

12:12-12:30 A Performance Prediction Scheme for Computation-Intensive Applications on Cloud
   Hongli Zhang (Harbin Institute of Technology, P.R. China), Panpan Li (Harbin Institute of Technology, P.R. China), Zhigang Zhou (Harbin Institute of Technology, P.R. China), Xiaojiang Du (Temple University, USA), Weizhe Zhang (Harbin Institute of Technology, P.R. China)

CIS-02: Anomaly and Intrusion Detection - I (Lanchid A)

Chairs: Ilona Murynets (USA AT&T Security Research Center)

11:00-11:18 Intrusion detection in distributed systems, an approach based on taint marking
   Christophe Hauser (Supélec, France), Frédéric Tronel (Supélec, France), Colin Fidge (Queensland University of Technology, Australia), Ludovic Mé (SUPELEC, France)

11:18-11:36 Improved Detection and Correlation of Multi-Stage VoIP Attack Patterns by using a Dynamic Honeynet System
   Dirk Hoffstadt (University of Duisburg-Essen, Germany), Niels Wolff (University of Duisburg-Essen, Germany), Stefan Monhof (University of Duisburg-Essen, Germany), Erwin P. Rathgeb (Universität Duisburg-Essen, Germany)

11:36-11:54 Model Checking Invariant Security Properties in OpenFlow
   Sooel Son (The University of Texas at Austin, USA), Seungwon Shin (Texas A&M University, USA), Vinod Yegneswaran (SRI International, USA), Phillip A Porras (SRI International, USA), Guofei Gu (Texas A&M University, USA)

11:54-12:12 Dynamic Probing for Intrusion Detection under Resource Constraints
   Keqin Liu (University of California, Davis, USA), Qing Zhao (University of California at Davis, USA), Ananthram Swami (Army Research Lab., USA)

12:12-12:30 Spectrum Analysis for Detecting Slow-Paced Persistent Activities in Network Security
   Li Ming Chen (Academia Sinica, Taiwan), Meng Chang Chen (Academia Sinica, Taiwan), Yeali S Sun (National Taiwan University, Taiwan), Wanjiun Liao (National Taiwan University, Taiwan)

Monday, 10 June 2013 14:00-15:30

CIS-03: Internet Security (Lanchid A)

Chairs: Meng Chang Chen (Taiwan Academia Sinica)

14:00-14:18 Protect Sensitive Sites from Phishing Attacks Using Features Extractable from Inaccessible Phishing URLs
   Weibo Chu (Xi'an Jiaotong University, P.R. China), Bin Benjamin Zhu (Microsoft, P.R. China), Feng Xue (Microsoft Research Asia, P.R. China), Xiaohong Guan (Xi’an Jiaotong University & Tsinghua University, P.R. China), Zhongmin Cai (Xi'an Jiaotong University, P.R. China)

14:18-14:36 An Empirical Analysis of Family in the Tor Network
   Wang Xiao (Institute of Computing Technology, Chinese Academy of Sciences & 1 Institute of Information Engineering Chinese Academy of Sciences 2 National Engineering Laboratory, P.R. China), Jinqiao Shi (Institute of Information Engineering, Chinese Academy of Sciences, P.R. China), Binxing Fang (Institute of Computing Technology, Chinese Academy of Sciences, P.R. China), Li Guo (Institute of Information Engineering, Chinese Academy of Sciences, P.R. China)

14:36-14:54 RobuRec: Robust Sybil Attack Defense in Online Recommender Systems
   Giseop Noh (Seoul National University, Korea), Chong-kwon Kim (Seoul National University, Korea)

14:54-15:12 Pollution and Whitewashing Attacks in a P2P Live Streaming System: Analysis and Counter-Attack
   Rafael Almeida (Federal University of Juiz de Fora, Brazil), José Augusto Miranda Nacif (Universidade Federal de Viçosa, Brazil), Ana Paula da Silva (Universidade Federal de Minas Gerais, Brazil), Alex Borges Vieira (Universidade Federal de Juiz de Fora, Brazil)

15:12-15:30 On Effective Localization Attacks Against Internet Threat Monitors
   Wei Yu (Towson University, USA), Sixiao Wei (Towson University, USA), Guanhui Ma (Towson University, USA), Xinwen Fu (University of Massachusetts Lowell, USA), Nan Zhang (The George Washington University, USA)

Monday, 10 June 2013 16:00-18:00

CIS-04: Anonymity and Privacy (Margit B)

Chairs: Pramode K. Verma (USA The University of Oklahoma)

16:00-16:20 Geocast into the Past: Towards a Privacy-Preserving Spatiotemporal Multicast for Cellular Networks
   Sander Wozniak (Ilmenau University of Technology, Germany), Michael Rossberg (Ilmenau University of Technology, Germany), Franz Girlich (Ilmenau University of Technology, Germany), Guenter Schaefer (Technische Universitaet Ilmenau, Germany)

16:20-16:40 Privacy-Preserving Scheme in Smart Grid Communication Using Enhanced Network Coding
   Hasen Nicanfar (The University of British Columbia, Canada), Peyman TalebiFard (The University of British Columbia, Canada), Amr Alasaad (University of British Columbia, Canada), Victor CM Leung (The University of British Columbia, Canada)

16:40-17:00 Smart Meter Privacy in the Presence of an Alternative Energy Source
   Deniz Gündüz (Imperial College London, United Kingdom), Jesús Gómez-Vilardebó (Centre Tecnològic de Telecomunicacions de Catalunya (CTTC), Spain)

17:00-17:20 Mobility Data Anonymization by Obfuscating the Cellular Network Topology Graph
   Eduardo Baena Martinez (Czech Technical University in Prague, Czech Republic), Michal Ficek (Czech Technical University in Prague, Czech Republic), Lukas Kencl (Czech Technical University in Prague, Czech Republic)

17:20-17:40 Fake Point Location Privacy Scheme for Mobile Public Hotspots in NEMO based VANETs
   Sanaa Taha (University of Waterloo & Cairo University, Canada), Sherman Shen (University of Waterloo, Canada)

17:40-18:00 d^2 Deleting Diaspora: Practical Attacks for Profile Discovery and Deletion
   Stephan Schulz (Mercedes-Benz Research, USA), Thorsten Strufe (TU Darmstadt, Germany)

Tuesday, 11 June 2013 09:00-10:30

CIS-05: Anomaly and Intrusion Detection - II (Duna Salon I)

Chairs: Shui Yu (Australia Deakin University)

09:00-09:18 Characterization and Visualization of Sophisticated Scanning Attacks
   Maggie Cheng (Missouri University of Science and Technology, USA), Quanmin Ye (Missouri University of Science and Technology, USA), Robert F. Erbacher (US Army Research Laboratory, USA)

09:18-09:36 P3D: A Parallel 3D Coordinate Visualization for Advanced Network Scans
   Troy Nunnally (Georgia Institute of Technology, USA), Penyen Chi (Georgia Institute of Technology, USA), Kulsoom Abdullah (Georgia Institute of Technology, USA), Selcuk Uluagac (Georgia Institute of Technology & The School of ECE, USA), John A. Copeland (Georgia Institute of Techonology, USA), Raheem Beyah (Georgia Institute of Technology, USA)

09:36-09:54 Network Traffic Clustering Using Random Forest Proximities
   Yu Wang (Deakin University, Australia), Yang Xiang (Deakin University, Australia), Jun Zhang (Deakin University, Australia)

09:54-10:12 An unsupervised behavior-based method for BGP anomaly detection and attribution
   Georgios Theodoridis (Centre for Research and Technology Hellas, Greece), Orestis Tsigkas (Informatics and Telematics Institute & Alexander TEI of Thessaloniki, Greece), Dimitrios Tzovaras (Informatics and Telematics Institute, Greece)

10:12-10:30 SPIT Callers Detection with Unsupervised Random Forests Classifier
   Kentaroh Toyoda (Keio University, Japan), Iwao Sasase (Keio University, Japan)

Tuesday, 11 June 2013 14:00-15:30

CIS-06: Wireless Network Security - I (Duna Salon I)

Chairs: Xiaojun Yuan (Hong Kong The Chinese University of Hong Kong)

14:00-14:18 SDTP+: Securing a Distributed Transport Protocol for WSNs using Merkle Trees and Hash Chains
   Amit Dvir (K&CG Lab Department of Computer Science Ariel University Center, Ariel, Israel), Levente Buttyan (Budapest University of Technology and Economics, Hungary), Ta Vinh Thong (Budapest, University of Technology and Economics & Laboratory of Cryptography and Systems Security, Hungary)

14:18-14:36 HaG: Hash Graph Based Key Predistribution Scheme for Multiphase Wireless Sensor Networks
   Salim Sarimurat (Sabanci University, Turkey), Albert Levi (Sabanci University, Turkey)

14:36-14:54 Robust and Scalable Secure Neighbor Discovery for Wireless Ad Hoc Networks
   Somayeh Taheri (Uni Goettingen, Germany), Dieter Hogrefe (University of Goettingen, Germany)

14:54-15:12 A Secrecy Evaluation Scheme for Infrastructure Deployment in Radio Access Network
   Li Wang (Beijing University of Posts and Telecommunications, P.R. China), Xi Zhang (Texas A&M University, ECE Department, USA), Jingwei Mo (BUPT, P.R. China), Mei Song (Array, P.R. China)

15:12-15:30 A Game-Theoretic View on The Physical Layer Security of Cognitive Radio Networks
   Ali K Houjeij (University of Illinois at Urbana-Champaign, USA), Walid Saad (University of Miami, USA), Tamer Başar (University of Illinois at Urbana-Champaign, USA)

CIS-P1: Fundamentals of Information Security (poster) (Buda, Budapest, Pest)

Chairs: Iwao Sasase (Japan Keio University)

14:00-14:15 Secure Network Coding: Dependency of Efficiency on Network Topology
   Stefan Pfennig (TU Dresden, Germany), Elke Franz (Technische Universität Dresden, Germany)

14:15-14:30 Robust Image Watermarking Based On Quantization Index Modulation
   Mohsen Zareian (Amirkabir University of Technology, Iran), Hamed Hasani (Universidad Tecnica de Lisboa, Instituto Superior Tecnico, Portugal)

14:30-14:45 Multi-Photon Tolerant Secure Quantum Communication - >From Theory to Practice
   Yuhua Chen (University of Houston, USA), Subhash Kak (Oklahoma State University, USA), Pramode K. Verma (The University of Oklahoma, USA), Gregory Macdonald (University of Oklahoma, USA), Mayssaa El Rifai (The University of Oklahoma, USA), Nikhil Punekar (University of Oklahoma, USA)

14:45-15:00 An Anti-Steganographic Approach for Removing Secret Information in Digital Audio Data hidden by Spread Spectrum Methods
   Fahimeh Rezaei (University of Nebraska Lincoln, USA), Tao Ma (University of Nebraska-Lincoln, USA), Michael Hempel (University of Nebraska-Lincoln, USA), Dongming Peng (University Nebraska - Lincoln, USA), Hamid Sharif (University of Nebraska-Lincoln, USA)

15:00-15:15 Iris Code Hashing
   Umarani Jayaraman (IIT Kanpur, India), Phalguni Gupta (Indian institue of Technology Kanpur, India)

15:15-15:30 No More Backups: Toward Efficient Embedding of Survivable Virtual Networks
   Rodrigo Ruas Oliveira (Federal University of Rio Grande do Sul (UFRGS), Brazil), Daniel Stefani Marcon (Federal University of Rio Grande do Sul, Brazil), Leonardo R Bays (Federal University of Rio Grande do Sul, Brazil), Miguel Neves (Federal University of Rio Grande do Sul (UFRGS), Brazil), Luciana Salete Buriol (Federal University of Rio Grande do Sul, Brazil), Luciano Paschoal Gaspary (Federal University of Rio Grande do Sul, Brazil), Marinho P. Barcellos (Federal University of Rio Grande do Sul, Brazil)

Wednesday, 12 June 2013 09:00-10:30

CIS-07: Wireless Network Security - II (Duna Salon I)

Chairs: Amit Dvir (Israel The College of Management Academic Studies)

09:00-09:18 Detect and Identify Blocker Tags in Tree-based RFID Systems
   Fei Wang (The Hong Kong Polytechnic University, Hong Kong), Bin Xiao (The Hong Kong Polytechnic University, Hong Kong), Kai Bu (The Hong Kong Polytechnic University, Hong Kong), Jinshu Su (National University of Defence Technology, P.R. China)

09:18-09:36 Anomaly detection in cellular Machine-to-Machine communications
   Ilona Murynets (AT&T Security Research Center, USA), Roger Piqueras Jover (AT&T Security Research Center, USA)

09:36-09:54 QuantDroid: Quantitative Approach towards Mitigating Privilege Escalation on Android
   Tobias Markmann (HAW Hamburg, Germany), Dennis Gessner (NEC Laboratories Europe, Germany), Dirk Westhoff (Hochschule Furtwangen, Germany)

09:54-10:12 SanAdBox: Sandboxing Third Party Advertising Libraries in a Mobile Application
   Hideaki Kawabata (KDDI R&D Laboratories Inc., Japan), Takamasa Isohara (KDDI R&D Laboratories Inc., Japan), Keisuke Takemori (KDDI R&D Laboratories Inc., Japan), Ayumu Kubota (KDDI R&D Laboratories Inc., Japan), Junya Kani (Shizuoka University, Japan), Harunobu Agematsu (Shizuoka University, Japan), Masakatsu Nishigaki (Shizuoka University, Japan)

10:12-10:30 Smartphone Strategic Sampling in Defending Enterprise Network Security
   Feng Li (Indiana University-Purdue University Indianapolis, USA), Wei Peng (Indiana University-Purdue University Indianapolis, USA), Chin-Tser Huang (University of South Carolina, USA), Xukai Zou (School of Science, Purdue University-Indianapolis, USA)

Wednesday, 12 June 2013 14:00-15:30

CIS-08: Wireless Communications Security - I (Duna Salon I)

Chairs: Amit Dvir (Israel The College of Management Academic Studies)

14:00-14:18 The Eavesdropping and Jamming Dilemma in Multi-Channel Communications
   Andrey Garnaev (St.-Petersburg State University, Russia), Wade Trappe (WINLAB, Rutgers University, USA)

14:18-14:36 Stochastic Optimization of Flow-Jamming Attacks in Multichannel Wireless Networks
   Yu Seung Kim (Carnegie Mellon University, USA), Bruce DeBruhl, II (Carnegie Mellon University, USA), Patrick Tague (Carnegie Mellon University, USA)

14:36-14:54 Sequence Sensing Jamming Attacks against Modular-Based Channel Hopping Rendezvous Algorithms for Cognitive Ratio Networks
   Young-Hyun Oh (North Carolina State University, USA), David Thuente (North Carolina State University, USA)

14:54-15:12 Performance Impact of Asynchronous Off-tone Jamming Attacks Against OFDM
   Chowdhury Shahriar (Virginia Tech, USA), Shabnam Sodagari (Virginia Tech, USA), Robert McGwier (Virginia Tech & AMSAT, Inc. and Flex Radio System, Inc., USA), T. Charles Clancy (Virginia Tech, USA)

15:12-15:30 Intercept Probability Analysis of Cooperative Wireless Networks with Best Relay Selection in the Presence of Eavesdropping Attack
   Yulong Zou (University of Western Ontario, Canada), Xianbin Wang (The University of Western Ontario, Canada), Weiming Shen (University of Western Ontario, Canada)

Wednesday, 12 June 2013 16:00-18:00

CIS-09: Wireless Communications Security - II (Ballroom II)

Chairs: T. Charles Clancy (USA Virginia Tech)

16:00-16:24 Cooperative Jamming Protocols in Two Hop Amplify-and-Forward Wiretap Channels
   Dong Fang (University of York, United Kingdom), Nan Yang (University of New South Wales, Australia), Maged Elkashlan (Queen Mary, University of London, United Kingdom), Phee Lep Yeoh (University of Melbourne, Australia), Jinhong Yuan (University of New South Wales, Australia)

16:24-16:48 Joint Power Allocation and Artificial Noise Design for Multiuser Wiretap OFDM Channels
   Haohao Qin (Tsinghua University, P.R. China), Xiang Chen (Tsinghua University, P.R. China), Xiaofeng Zhong (Tsinghua University, P.R. China), Fei He (Tsinghua University, P.R. China), Ming Zhao (Tsinghua University, P.R. China), Jing Wang (EE. Tsinghua University, P.R. China)

16:48-17:12 Cross-Layer Security in Two-Hop Wireless Gaussian Relay Network with Untrusted Relays
   Michal Kaliszan (Technische Universität Berlin, Germany), Jafar Mohammadi (Technical University of Berlin & Fraunhofer Heinrich-Hertz-Institute, Germany), Slawomir Stanczak (Fraunhofer Heinrich Hertz Institute & Technische Universität Berlin, Germany)

17:12-17:36 Examining the Characteristics and Implications of Sensor Side Channels
   Venkatachalam Subramanian (Georgia Institute of Technology, USA), Selcuk Uluagac (Georgia Institute of Technology & The School of ECE, USA), Raheem Beyah (Georgia Institute of Technology, USA), Hasan Cam (Army Research Laboratory, USA)

17:36-18:00 DFT-Based Physical Layer Encryption for Achieving Perfect Secrecy
   Suzhi Bi (The Chinese University of Hong Kong, Hong Kong), Xiaojun Yuan (The Chinese University of Hong Kong, Hong Kong), Ying Jun (Angela) Zhang (The Chinese University of Hong Kong, Hong Kong)

 
PROGRAM AT A GLANCE >>

KEYNOTE SPEAKERS >>

INVITED SPEAKERS >>

TECHNICAL SYMPOSIA >>

INDUSTRY & BUSINESS PANELS >>

TUTORIALS >>

WORKSHOPS >>

SOCIAL EVENTS >>

home I  about  I  call for papers I  registration  I   program  I  committee I  visitor information  I  non-discrimination policy                  © 2013 IEEE Communications Society