Friday, April 15

8:30 AM - 10:30 AM

System Security

Chair: Xiaohui Liang (University of Waterloo, Canada)
Contextual Role-based Security Enhancement Mechanism for 2G-RFID Systems
Wan Tang (South-Central University for Nationalities, P.R. China); Jin Ni (Henan University, P.R. China); Min Chen (Seoul National University, Korea); XiMin Yang (South-Central University for Nationalities, P.R. China)
Browsing Behavior Mimicking Attacks on Popular Web Sites for Large Botnets
Shui Yu (Deakin University, Australia); Guofeng Zhao (Chonqing University of Posts and Telecommunications, P.R. China); Song Guo (University of Aizu, Japan); Yang Xiang (Deakin University, Australia); Athanasios Vasilakos (University of Western Macedonia, Greece)
Discriminating DDoS Attack Traffic from Flash Crowd through Packet Arrival Patterns
Theerasak Thapngam (Deakin University, Australia); Shui Yu (Deakin University, Australia); Wanlei Zhou (Deakin University, Australia); Gleb Beliakov (Deakin University, Australia)
EagleEye: A Logging Framework for Accountable Distributed and Networked Systems
Nandhakumar Kathiresshan (The University of Alabama, USA); Zhifeng Xiao (The University of Alabama, USA); Yang Xiao (The University of Alabama, USA)
Stepping Stone Detection at The Server Side
Ruei-Min Lin (Academia Sinica, Taiwan); Yi-Chun Chou (National Taiwan University, Taiwan); Kuan-Ta Chen (Academia Sinica, Taiwan)
PEACE: An Efficient and Secure Patient-centric Access Control Scheme for eHealth Care System
Mrinmoy Barua (University of Waterloo, Canada); Xiaohui Liang (University of Waterloo, Canada); Rongxing Lu (University of Waterloo, Canada); Sherman Shen (University of Waterloo, Canada)
L-WMxD: Lexical based Webmail XSS Discoverer
Zhushou Tang (Shanghai Jiao Tong University, P.R. China); Haojin Zhu (Shanghai Jiao Tong University, P.R. China); Zhenfu Cao (Shanghai Jiao Tong University, P.R. China); Shuai Zhao (Shanghai Jiao Tong University, P.R. China)
How Resilient are Individual ASes against AS-Level Link Failures?
Wenping Deng (National University of Defense Technology, P.R. China); Peidong Zhu (NUDT, P.R. China); Naixue Xiong (Georgia State University, US, USA); Yang Xiao (The University of Alabama, USA); Xiaofeng Hu (National University of Defense Technology, P.R. China)

11:00 AM - 12:30 PM

Security and Privacy

Chair: Xu Li (University of Waterloo, Canada)
Concealing of the Sink Location in WSNs by Artificially Homogenizing Traffic Intensity
Bidi Ying (University of Ottawa, Canada); Jose R. Gallardo (University of Ottawa, Canada); Dimitrios Makrakis (University of Ottawa, Canada); Hussein Mouftah (University of Ottawa, Canada)
A Three-Dimensional Approach Towards Measuring Sender Anonymity
Neeraj Jaggi (Wichita State University, USA); Umesh MarappaReddy (Wichita State University, USA); Rajiv Bagai (Wichita State University, USA)
Improved IP Multimedia Subsystem Authentication Mechanism for 3G-WLAN Networks
Madhu J Sharma (University of British Columbia, Canada); Victor CM Leung (The University of British Columbia, Canada)
Lightweight Privacy-Preserving Routing and Incentive Protocol for Hybrid Ad Hoc Wireless Network
Mohamed Mahmoud (University of Waterloo, Canada); Sherman Shen (University of Waterloo, Canada)
SANC: Source Authentication Using Network Coding
Ahmed Fathy (Nile University, Egypt); Tamer ElBatt (Nile University, Egypt); Moustafa Youssef (Egypt-Japan University of Science and Technology (E-JUST), Egypt)
Towards a Light-weight Message Authentication Mechanism Tailored for Smart Grid Communications
Mostafa M. Fouda (Tohoku University, Japan); Zubair Md. Fadlullah (Tohoku University, Japan); Nei Kato (Tohoku University, Japan); Rongxing Lu (University of Waterloo, Canada); Sherman Shen (University of Waterloo, Canada)

2:00 PM - 3:30 PM

Secure Algorithm

Chair: Sherman S. M. Chow (University of Waterloo, Canada)
A New Enforcement on Declassification with Reachability Analysis
Cong Sun (Peking University, P.R. China); Liyong Tang (Peking University, P.R. China); Zhong Chen (School of Electronics Engineering and Computer Science, Peking University, P.R. China)
Speeding up Pattern Matching by Optimal Partial String Extraction
Tan Jianlong (Institute of Computing Technology, Chinese Academy of Sciences, P.R. China); Liu Xia (Institute of Computing Technology, Chinese Academy of Sciences, P.R. China); Liu Yanbing (Institute of Computing Technology, Chinese Academy of Sciences, P.R. China); Liu Ping (Institute of Computing Technology, Chinese Academy of Sciences, P.R. China)
Traffic-aware Top-N Firewall Approximation Algorithm
Ho-Yu Lam (Polytechnic Institute of New York University, USA); Donghan Wang (Carnegie Mellon University, USA); H. Jonathan Chao (Polytechnic Institute of New York University, USA)
A Novel Data Streaming Method Detecting Superpoints
Weijiang Liu (Dalian Maritime University, P.R. China); Wenyu Qu (Dalian Maritime University, P.R. China); Gong Jian (Southeast University, P.R. China); Li Keqiu (Dalian University of Technology, P.R. China)
Exclusion-Intersection Encryption
Sherman S. M. Chow (University of Waterloo, Canada); Siu Ming Yiu (The University of Hong Kong, Hong Kong)
Identifying Bad Measurements Via Separation in Compressive Sensing
Ht Kung (Harvard University, USA); Tsung-Han Lin (Harvard University, USA); Dario Vlah (Harvard University, USA)

4:00 PM - 5:30 PM

Trustable Service

Chair: Haojin Zhu (Shanghai Jiao Tong University, P.R. China)
SDSM: A Secure Data Service Mechanism in Mobile Cloud Computing
Weiwei Jia (Hohai University, P.R. China); Haojin Zhu (Shanghai Jiao Tong University, P.R. China); Zhenfu Cao (Shanghai Jiao Tong University, P.R. China); Lifei Wei (Shanghai Jiao Tong University, P.R. China); Xiaodong Lin (University of Ontario Institute of Technology, Canada)
Rendezvous Based Trust Propagation to Enhance Distributed Network Security
Ningning Cheng (University of California, Davis, USA); Kannan Govindan (University of California Davis, USA); Prasant Mohapatra (University of California, Davis, USA)
Enforce Truth-Telling in Wireless Relay Networks for Secure Communication
Shuhang Liu (Peking University, P.R. China); Rongqing Zhang (Peking University, P.R. China); Lingyang Song (Peking University, P.R. China); Zhu Han (University of Houston, USA); Bingli Jiao (Peking University, P.R. China)
Attacks on Correlated Peer-to-Peer Networks: An Analytical Study
Animesh Srivastava (Indian Institute of Technology Kharagpur, India); Bivas Mitra (CREA, CNRS/Ecole Polytechnique, France); Fernando Peruani (Max Planck Institute for the Physics of Complex Systems, Germany); Niloy Ganguly (Indian Institute of Technology Kharagpur, India)
Accountable MapReduce in Cloud Computing
Zhifeng Xiao (The University of Alabama, USA); Yang Xiao (The University of Alabama, USA)
RepHi: A Novel Attack against P2P Reputation Systems
Jingyu Feng (Xidian University, P.R. China); Yuqing Zhang (Graduate University of Chinese Academy of Sciences, P.R. China); Shenlong Chen (Graduate University of Chinese Academy of Sciences, P.R. China); Anmin Fu (Key Lab of Computer Networks and Information Security of Ministry of Education, P.R. China)