(11) CISS - Communication and Information Systems Security Symposium

Time ICC Capital Hall 2 ICC Capital Hall Interactive 4 ICC Capital Suite 5

Tuesday, June 9

09:00-10:30 CISS-01: Big Data Security and Privacy    
14:30-16:00 CISS-02: Firewall, Intrusion Detection and Other Topics    
16:30-17:15   CISS-I01: Operating Systems and Application Security  
17:15-18:00   CISS-I02: Network Security Metrics and their Performance Evaluation  

Wednesday, June 10

09:00-10:30 CISS-03: Security of Cyber-physical Systems    
14:30-16:00 CISS-04: Mobile and Wireless Network Security    
16:30-18:00 CISS-05: Security and Privacy of VANETs and Sensor Networks    

Thursday, June 11

09:00-10:30   CISS-I03: Physical Layer Security CISS-06: Privacy and Privacy Enhancing Technologies
14:30-16:00     CISS-07: Cryptography and Evaluation
16:30-18:00 CISS-08: Cloud and Large-scale System Security    

Tuesday, June 9

CISS-01: Big Data Security and Privacy

Room: ICC Capital Hall 2
Chairs: Maria Luisa Merani (University of Modena and Reggio Emilia, Italy), Chao Chen (Deakin University, Australia)
6 Million Spam Tweets: A Large Ground Truth for Timely Twitter Spam Detection
Chao Chen, Jun Zhang, Xiao Chen, Yang Xiang and Wanlei Zhou (Deakin University, Australia)
pp. 8683-8688
Game Theoretic Data Privacy Preservation: Equilibrium and Pricing
Lei Xu and Chunxiao Jiang (Tsinghua University, Beijing, P.R. China); Jian Wang (Tsinghua University, P.R. China); Yong Ren (Tsinghua University, Beijing, P.R. China); Jian Yuan (Tsinghua University, P.R. China); Mohsen Guizani (QU, USA)
pp. 8689-8694
Limited Dictionary Builder: An Approach to Select Representative Tokens for Malicious URLs Detection
Hongzhou Sha (Beijing University of Posts and Telecommunications, P.R. China); Zhou Zhou, Qingyun Liu, Tingwen Liu and Chao Zheng (Institute of Information Engineering, Chinese Academy of Sciences, P.R. China)
pp. 8695-8700
On Binary Decomposition based Privacy-preserving Aggregation Schemes in Real-time Monitoring Systems
Xuebin Ren, Xinyu Yang and Jie Lin (Xi'an Jiaotong University, P.R. China); Wei Yu (Towson University, USA)
pp. 8701-8706
SPLWAH: a bitmap index compression scheme for searching in archival Internet traffic
Jiahui Chang (Tsinghua University, P.R. China); Zhen Chen (Tsinghua University & Tsinghua National Lab for Information Science and Technologies, P.R. China); Wenxun Zheng, Yuhao Wen, Guodong Peng and Junwei Cao (Tsinghua University, P.R. China); Wen-liang Huang (China Unicom, P.R. China)
pp. 8707-8712
Multi-Cloud Privacy Preserving Schemes for Linear Data Mining
Maria Luisa Merani (University of Modena and Reggio Emilia, Italy); Cettina Barcellona (Università degli Studi di Palermo & Università degli Studi di Modena e Reggio Emilia, Italy); Ilenia Tinnirello (University of Palermo, Italy)
pp. 8713-8719

CISS-02: Firewall, Intrusion Detection and Other Topics

Room: ICC Capital Hall 2
Chairs: Otto Carlos M. B. Duarte (Universidade Federal do Rio de Janeiro, Brazil), Xiaodong Lin (University of Ontario Institute of Technology, Canada)
Hide-and-Seek: Face Recognition in Private
Yogachandran Rahulamathavan and Muttukrishnan Rajarajan (City University London, United Kingdom)
pp. 8720-8725
Blurred License Plate Recognition based on Single Snapshot from Drive Recorder
Chunhe Song and Xiaodong Lin (University of Ontario Institute of Technology, Canada)
pp. 8726-8731
Matrix-based parallel pattern matching method
Hongli Zhang and Dongliang Xu (Harbin Institute of Technology, P.R. China); Lei Zhang (Henan University, P.R. China); Yanbin Sun (Harbin Institute of Technology, P.R. China)
pp. 8732-8737
Providing Elasticity to Intrusion Detection Systems in Virtualized Software Defined Networks
Martin E. Andreoni Lopez (Federal University of Rio de Janeiro & UFRJ, Brazil); Otto Carlos M. B. Duarte (Universidade Federal do Rio de Janeiro, Brazil)
pp. 8738-8743
StegoP2P: Oblivious User-driven Unobservable Communications
Qingfeng Tan (Institute of Information Engineering, Chinese Academy of Sciences & Graduated University, Chinese Academy of Sciences, P.R. China); Jinqiao Shi, Binxing Fang, Wentao Zhang and Xuebin Wang (Institute of Information Engineering, Chinese Academy of Sciences, P.R. China)
pp. 8744-8749
InterSec: An Interaction System for Network Security Applications
Troy Nunnally (Georgia Institute of Technology, USA); A. Selcuk Uluagac (Florida International University & Electrical and Computer Engineering, USA); Raheem Beyah (Georgia Institute of Technology, USA)
pp. 8750-8756

CISS-I01: Operating Systems and Application Security

Room: ICC Capital Hall Interactive 4
Chairs: Yogachandran Rahulamathavan (City University London, United Kingdom), Yang Xiao (The University of Alabama, USA)
TapLock: Exploit Finger Tap Events for Enhancing Attack Resilience of Smartphone Password
Hongji Yang (Peking University, P.R. China); Lin Chen (Yale University, USA); Kaigui Bian and Yang Tian (Peking University, P.R. China); Fan Ye (Stony Brook University, USA); Wei Yan, Tong Zhao and XiaoMing Li (Peking University, P.R. China)
pp. 8757-8762
AppTrace: Dynamic Trace on Android Devices
Lingzhi Qiu, Zixiong Zhang, Ziyi Shen and Guozi Sun (Nanjing University of Posts and Telecommunications, P.R. China)
pp. 8763-8768
Dump and Analysis of Android Volatile Memory on Wechat
Fan Zhou (Nanjing University of Posts and Telecommunications, P.R. China); Yitao Yang (Nanjing University of Posts & Telecommunications, P.R. China); Zhaokun Ding (PLA University of Science and Technology, P.R. China); Guozi Sun (Nanjing University of Posts and Telecommunications, P.R. China)
pp. 8769-8774
Secure Mobile Crowdsensing Game
Liang Xiao, Jinliang Liu and Qiangda Li (Xiamen University, P.R. China); H. Vincent Poor (Princeton University, USA)
pp. 8775-8780
Accountable Logging in Operating Systems
Lei Zeng and Yang Xiao (The University of Alabama, USA); Hui Chen (Virginia State University, USA)
pp. 8781-8785
Linux Auditing: Overhead and Adaptation
Lei Zeng and Yang Xiao (The University of Alabama, USA); Hui Chen (Virginia State University, USA)
pp. 8786-8791

CISS-I02: Network Security Metrics and their Performance Evaluation

Room: ICC Capital Hall Interactive 4
Chairs: Eduard Jorswieck (TU Dresden, Germany), Pin-Hsun Lin (TU Dresden, Germany)
A Unified Framework for Wireless Connectivity Study subject to General Interference Attack
Yang Liu (Beijing University of Posts and Telecommunications, P.R. China); Chengzhi Li (Qualcomm, USA); Changchuan Yin (Beijing University of Posts and Telecommunications, P.R. China); Huaiyu Dai (NC State University, USA)
pp. 8792-8797
Bayesian Mechanisms and Learning for Wireless Networks Security with QoS Requirements
Anil Kumar Chorppath (Technical University of Munich, Germany); Fei Shen (TU Dresden, Germany); Tansu Alpcan (The University of Melbourne, Australia); Eduard Jorswieck (TU Dresden, Germany); Holger Boche (Technical University Munich, Germany)
pp. 8798-8803
Towards a Multiobjective Framework for Evaluating Network Security under Exploit Attacks
Fangfang Dai (Information Security Center, Beijing University of Posts and Telecommunications, P.R. China); Kangfeng Zheng and Shoushan Luo (Beijing University of Posts and Telecommunications, P.R. China); Bin Wu (Information Security Center, Beijing University of Posts and Telecommunications, P.R. China)
pp. 8804-8809
Towards real-time route leak events detection
Shen Su (Harbin Institute of Technology, P.R. China); Beichuan Zhang (University of Arizona, USA); Lin Ye and Hongli Zhang (Harbin Institute of Technology, P.R. China); Nathan Yee (University of Arizona, USA)
pp. 8810-8815
A Novel High-Speed IP-Timing Covert Channel: Design and Evaluation
Hermine Hovhannisyan (City University of Hong Kong, Hong Kong); Kejie Lu (University of Puerto Rico at Mayaguez, Puerto Rico); Jianping Wang (City University of Hong Kong, Hong Kong)
pp. 8816-8821
Detection of DoS Attacks through Fourier Transform and Mutual Information
Maurizio Mongelli (National Research Council of Italy, Italy); Maurizio Aiello (National Research Council, CNR-IEIIT, Italy); Enrico Cambiaso (National Research Council, CNR-IEIIT & Università degli Studi di Genova, Italy); Gianluca Papaleo (National Research Council, CNR-IEIIT, Italy)
pp. 8822-8827

Wednesday, June 10

CISS-03: Security of Cyber-physical Systems

Room: ICC Capital Hall 2
Chairs: Rongxing Lu (Nanyang Technological University, Singapore), Xiang Lu (Institute of Information Engineering, CAS, P.R. China)
A Two-Stage Attacking Scheme for Low-Sparsity Unobservable False Data Injection in Smart Grid
Junjie Yang (Gangdong University of Technology, P.R. China); Rong Yu (Guangdong University of Technology, P.R. China); Yi Liu (Guangdong University of Technology, Singapore); Shengli Xie (Guangdong University of Technology, P.R. China); Yan Zhang (Simula Research Laboratory and University of Oslo, Norway)
pp. 8828-8833
Smart Meter Privacy with an Energy Harvesting Device and Instantaneous Power Constraints
Giulio Giaconi and Deniz Gündüz (Imperial College London, United Kingdom); H. Vincent Poor (Princeton University, USA)
pp. 8834-8839
On False Data Injection Attacks against the Dynamic Microgrid Partition in the Smart Grid
Xialei Zhang, Xinyu Yang and Jie Lin (Xi'an Jiaotong University, P.R. China); Wei Yu (Towson University, USA)
pp. 8840-8845
BCGI: A Fast Approach to Detect Malicious Meters in Neighborhood Area Smart Grid
Xiaofang Xia (SIA, USA); Wei Liang (Shenyang Institute of Automation, P.R. China); Yang Xiao (The University of Alabama, USA); Meng Zheng (Shenyang Institute of Automation, Chinese Academy of Sciences, P.R. China)
pp. 8846-8851
Cryptanalysis and Improvement of two RFID-OT Protocols Based on Quadratic Residues
Yongming Jin, Hongsong Zhu and Zhiqiang Shi (Institute of Information Engineering, Chinese Academy of Sciences, P.R. China); Xiang Lu (Institute of Information Engineering, CAS, P.R. China); Limin Sun (Institute of Information Engineering, China Academy of Science, Beijing, P.R. China)
pp. 8852-8857
DDPFT: Secure Data Aggregation Scheme with Differential Privacy and Fault Tolerance
Haiyong Bao and Rongxing Lu (Nanyang Technological University, Singapore)
pp. 8858-8863

CISS-04: Mobile and Wireless Network Security

Room: ICC Capital Hall 2
Chairs: Yue Gao (Queen Mary University of London, United Kingdom), Qingqi Pei (Xidian University, P.R. China)
UGHA:Uniform Group-based Handover Authentication for MTC within E-UTRAN in LTE-A Networks
Jin Cao and Hui Li (Xidian University, P.R. China); Maode Ma (Nanyang Technological University, Singapore); Fenghua Li (State Key Laboratory of Information Security, Institute of Information Engineering, CAS, P.R. China)
pp. 8864-8869
Uncoordinated Frequency Hopping for Secrecy with Broadband Jammers and Eavesdroppers
João Sousa and Joao P. Vilela (University of Coimbra, Portugal)
pp. 8870-8874
Online Learning for Unreliable Passive Monitoring in Multi-Channel Wireless Networks
Jing Xu (Huazhong University of Science and Technology, P.R. China); Kai Zeng (George Mason University, USA); Wei Liu (Huazhong University of Science and Technology, P.R. China)
pp. 8875-8880
Jammer Assisted Sum Rate and Fairness Improvement in Secure OFDMA
Ravikant Saini, Abhishek Jindal and Swades De (Indian Institute of Technology Delhi, India)
pp. 8881-8886
Reputation-based Coalitional Games for Spectrum Allocation in Distributed Cognitive Radio Networks
Qingqi Pei, Lichuan Ma, Hongning Li, Zi Li, Dingyu Yan and Zhao Li (Xidian University, P.R. China)
pp. 8887-8892
Secrecy-oriented Partner Selection Based on Social Trust in Device-to-Device Communications
Li Wang and Huaqing Wu (Beijing University of Posts and Telecommunications, P.R. China); Lu Liu (Illinois Institute of Technology, USA); Mei Song (Beijing University of Posts and Telecommunications, P.R. China); Yu Cheng (Illinois Institute of Technology, USA)
pp. 8893-8897

CISS-05: Security and Privacy of VANETs and Sensor Networks

Room: ICC Capital Hall 2
Chair: Mohamed M E A Mahmoud (Tennessee Tech University, USA)
A Secure and Privacy-Preserving Payment System for Electric Vehicles
Tianyu Zhao and Chi Zhang (University of Science and Technology of China, P.R. China); Lingbo Wei (Shanghai Jiao Tong University, P.R. China); Yanchao Zhang (Arizona State University, USA)
pp. 8898-8903
Privacy-Preserving Route Reporting Scheme for Traffic Management in VANETs
Khaled Rabieh (Tennessee Technological University, USA); Mohamed M E A Mahmoud (Tennessee Tech University, USA); Mohamed Younis (University of Maryland Baltimore County, USA)
pp. 8904-8909
Pseudonym Changes Scheme based on Candidate-Location-List in Vehicular Networks
Bidi Ying (Zhejiang Gongshang University, P.R. China); Dimitrios Makrakis (University of Ottawa, Canada)
pp. 8910-8915
Cross-Layer Scheme for Detecting Large-scale Colluding Sybil Attack in VANETs
Khaled Rabieh (Tennessee Technological University, USA); Mohamed M E A Mahmoud and Terry Guo (Tennessee Tech University, USA); Mohamed Younis (University of Maryland Baltimore County, USA)
pp. 8916-8921
Network Steganography based on Traffic Behavior in Wireless Sensor Networks
Xiangyu Niu, Jinyuan Sun and Husheng Li (University of Tennessee, USA)
pp. 8922-8927
A Systematic Key Management Mechanism for Practical Body Sensor Networks
Xinyu Yang and Cong Zhao (Xi'an Jiaotong University, P.R. China); Shusen Yang (University of Liverpool, United Kingdom); Xinwen Fu (University of Massachusetts Lowell, USA); Julie McCann (Imperial College London, United Kingdom)
pp. 8928-8933

Thursday, June 11

CISS-06: Privacy and Privacy Enhancing Technologies

Room: ICC Capital Suite 5
Chairs: Ben Niu (State Key Laboratory of Information Security, Institute of Information Engineering, CAS, P.R. China), Jian Ren (Michigan State University, USA)
Privacy-Preserving Distributed Cooperative Spectrum Sensing in Multi-Channel Cognitive Radio MANETs
Behzad Kasiri, Ioannis Lambadaris and F. Richard Yu (Carleton University, Canada); Helen Tang (DRDC Ottawa, Canada)
pp. 8934-8939
Lightweight and Privacy-Preserving Agent Data Transmission for Mobile Healthcare
Shunrong Jiang, Xiaoyan Zhu, Ripei Hao, Haotian Chi and Hui Li (Xidian University, P.R. China); Liangmin Wang (Anhui University, P.R. China)
pp. 8940-8945
Privacy-Preserving Strategies in Service Quality Aware Location-Based Services
Weihao Li (Xidian University, P.R. China); Ben Niu (State Key Laboratory of Information Security, Institute of Information Engineering, CAS, P.R. China); Hui Li (Xidian University, P.R. China); Fenghua Li (State Key Laboratory of Information Security, Institute of Information Engineering, CAS, P.R. China)
pp. 8946-8952
R-STaR Destination-Location Privacy Schemes in Wireless Sensor Networks
Leron J Lightfoot and Jian Ren (Michigan State University, USA)
pp. 8953-8958
An Evolutionary Game-Theoretic Framework for Cyber-threat Information Sharing
Deepak Tosh and Shamik Sengupta (University of Nevada, Reno, USA); Charles A Kamhoua (Air Force Research Laboratory & Information Directorate, USA); Kevin Kwiat (Air Force Research Laboratory, USA); Andrew Martin (University of Oxford, United Kingdom)
pp. 8959-8964
PAPERS: Private and Precise Range Search for Location Based Services
Di Chen and Peng Zhang (Xi'an Jiaotong University, P.R. China); Chengchen Hu (Xi'an Jiaotong University & NTNU, P.R. China); Huanzhao Wang (Xi'an Jiaotong University, P.R. China); Shun Wu and Ningzhe Xing (State Grid Corp. of China, P.R. China)
pp. 8965-8970

CISS-I03: Physical Layer Security

Room: ICC Capital Hall Interactive 4
Chairs: Nan Yang (Australian National University, Australia), Xin Ge (The University of British Columbia, Canada)
Performance Analysis of Secrecy Capacity for Two Hop AF Relay Networks with Zero Forcing
Abdelhamid Salem, Khairi A. Hamdi and Khaled M. Rabie (University of Manchester, United Kingdom)
pp. 8971-8976
Physical Layer Security in Cognitive Relay Networks with Multiple Antennas
Pengwei Zhang and Xing Zhang (Beijing University of Posts and Telecommunications, P.R. China); Yan Zhang (Simula Research Laboratory and University of Oslo, Norway); Yue Gao (Queen Mary University of London, United Kingdom); Zhenhai Zhang and Wenbo Wang (Beijing University of Posts and Telecommunications, P.R. China)
pp. 8977-8982
Secrecy Capacity Enhancement in Two-hop DF Relaying Systems in the Presence of Eavesdropper
Elham Nosrati, Xianbin Wang and Arash Khabbazibasmenj (Western University, Canada)
pp. 8983-8987
Secrecy Analysis of Multiuser Downlink Wiretap Networks with Opportunistic Scheduling
Xin Ge (The University of British Columbia, Canada); Peiran Wu (University of British Columbia, Canada); Hu Jin (Hanyang University, Korea); Victor CM Leung (The University of British Columbia, Canada)
pp. 8988-8993
Confidential Broadcasting via Coordinated Beamforming in Two-Cell Networks
Biao He (The Australian National University, Australia); Nan Yang (Australian National University, Australia); Xiangyun Zhou (The Australian National University, Australia); Jinhong Yuan (University of New South Wales, Australia)
pp. 8994-9000
Secure MIMO Transmission via Compressive Sensing
Chia-Hua Lin, Shang-Ho Tsai and Yuan-Pei Lin (National Chiao Tung University, Taiwan)
pp. 9001-9005

CISS-07: Cryptography and Evaluation

Room: ICC Capital Suite 5
Chairs: Mort Naraghi-Pour (Louisiana State University, USA), Richard Bassous (Oakland University, USA)
A Low Complexity Cryptosystem Based on Nonsystematic Turbo Codes
Kamran Ghavami and Mort Naraghi-Pour (Louisiana State University, USA)
pp. 9006-9011
Ambiguous Multi-Symmetric Cryptography
Richard Bassous, Roger Bassous and Huirong Fu (Oakland University, USA); Ye Zhu (Cleveland State University, USA)
pp. 9012-9017
AuthPaper: Protecting Paper-based Documents and Credentials using Authenticated 2D Barcodes
Chak Man Li, Pili Hu and Wing Cheong Lau (The Chinese University of Hong Kong, Hong Kong)
pp. 9018-9024
Sum-Capacity Optimal Spread-Spectrum Data Hiding in Video Streams
Lili Wei and Geng Wu (Intel Corporation, USA); Rose Qingyang Hu (Utah State University, USA)
pp. 9025-9030
Quantum Key Distribution over Combined Atmospheric Fading Channels
Nedasadat Hosseinidehaj and Robert Malaney (University of New South Wales, Australia)
pp. 9031-9037
Arbitrated Secure Authentication realized by using quantum principles
Helena Bruyninckx (Université Libre de Bruxelles & Royal Military Academy - Brussels, Belgium); Dirk Van Heule (Royal Military Academy, Belgium)
pp. 9038-9043

CISS-08: Cloud and Large-scale System Security

Room: ICC Capital Hall 2
Chairs: Zhigang Zhou (Harbin Institute of Technology, P.R. China), Wenjuan Li (City University of Hong Kong, Hong Kong)
Large-Scale Active Measurements of DNS Entries Related to E-Mail System Security
Ivan Gojmerac (AIT - Austrian Institute of Technology, Austria); Patrick Zwickl (University of Vienna, Austria); Gabriel Kovacs (Faculty of Computer Science, University of Vienna, Austria); Christoph Steindl (University of Vienna, Austria)
pp. 9044-9050
M-NOTE: A Multi-part Ballot based E-voting System with Clash Attack Protection
Haijun Pan and Edwin Hou (New Jersey Institute of Technology, USA); Nirwan Ansari (NJIT, USA)
pp. 9051-9055
An Empirical Study on Email Classification Using Supervised Machine Learning in Real Environments
Wenjuan Li (City University of Hong Kong, Hong Kong); Weizhi Meng (Institute for Infocomm Research (I2R), Singapore)
pp. 9056-9061
EVOC: More Efficient Verifiable Outsourced Computation from Any One-way Trapdoor Function
Jun Zhou, Zhenfu Cao and Xiaolei Dong (Shanghai Jiao Tong University, P.R. China); Xiaodong Lin (University of Ontario Institute of Technology, Canada)
pp. 9062-9067
Achieving Authorized and Ranked Multi-keyword Search over Encrypted Cloud Data
Hongwei Li, Dongxiao Liu and Kun Jia (University of Electronic Science and Technology of China, P.R. China); Xiaodong Lin (University of Ontario Institute of Technology, Canada)
pp. 9068-9073
Audit Meets Game Theory: Verifying Reliable Execution of SLA for Compute-Intensive Program in Cloud
Zhigang Zhou, Hongli Zhang, Xiangzhan Yu and Junwu Guo (Harbin Institute of Technology, P.R. China)
pp. 9074-9079