Malware and Email Security |
SAS: Semantics Aware Signature Generation for Polymorphic Worm Detection / Deguang Kong ; Yoon-Chan Jhi ; Tao Gong ; Sencun Zhu ; Peng Liu ; Hongsheng Xi |
Analyzing and Exploiting Network Behaviors of Malware / Jose Andre Morales ; Areej Al-Bataineh ; Shouhuai Xu ; Ravi Sandhu |
Inexpensive Email Addresses An Email Spam-Combating System / Aram Yegenian ; Tassos Dimitriou |
Anonymity and Privacy |
Privacy Administration in Distributed Service Infrastructure / Nabil Ajam ; Nora Cuppens-Boulahia ; Frederic Cuppens |
On the Formation of Historically k-Anonymous Anonymity Sets in a Continuous LBS / Rinku Dewri ; Indrakshi Ray ; Indrajit Ray ; Darrell Whitley |
Securing Personal Health Records in Cloud Computing: Patient-Centric and Fine-Grained Data Access Control in Multi-owner Settings / Ming Li ; Shucheng Yu ; Kui Ren ; Wenjing Lou |
Wireless Security |
A Study on False Channel Condition Reporting Attacks in Wireless Networks / Dongho Kim ; Yih-Chun Hu |
Characterizing the Security Implications of Third-Party Emergency Alert Systems over Cellular Text Messaging Services / Patrick Traynor |
Saving Energy on WiFi with Required IPsec / Youngsang Shin ; Steven Myers ; Minaxi Gupta |
Systems Security - I |
Transparent Protection of Commodity OS Kernels Using Hardware Virtualization / Michael Grace ; Zhi Wang ; Deepa Srinivasan ; Jinku Li ; Xuxian Jiang ; Zhenkai Liang ; Siarhei Liakh |
A Generic Construction of Dynamic Single Sign-on with Strong Security / Jinguang Han ; Yi Mu ; Willy Susilo ; Jun Yan |
DeCore: Detecting Content Repurposing Attacks on Client' Systems / Smitha Sundareswaran ; Anna C. Squicciarini |
Network Security - I |
Realizing a Source Authentic Internet / Toby Ehrenkranz ; Jun Li ; Patrick McDaniel |
Partial Deafness: A Novel Denial-of-Service Attack in 802.11 Networks / Jihyuk Choi ; Jerry T. Chiang |
Attacking Beacon-Enabled 802.15.4 Networks / Sang Shin Jung ; Marco Valero ; Anu Bourgeois ; Raheem Beyah |
Supporting Publication and Subscription Confidentiality in Pub/Sub Networks / Mihaela Ion ; Giovanni Russello ; Bruno Crispo |
Security Protocols - I |
Impossibility of Finding Any Third Family of Server Protocols Integrating Byzantine Quorum Systems with Threshold Signature Schemes / Luciana Marconi ; Mauro Conti ; Roberto Di Pietro ; Jingqiang Lin ; Jiwu Jing ; Qiongxiao Wang |
Context-Aware Usage Control for Android / Guangdong Bai ; Liang Gu ; Tao Feng ; Yao Guo ; Xiangqun Chen |
System Security - II |
Efficient Isolation of Trusted Subsystems in Embedded Systems / Raoul Strackx ; Frank Piessens ; Bart Preneel |
Enhancing Host Security Using External Environment Sensors / Ee-Chien Chang ; Liming Lu ; Yongzheng Wu ; Roland H.C. Yap ; Jie Yu |
FADE: Secure Overlay Cloud Storage with File Assured Deletion / Yang Tang ; Patrick P.C. Lee ; John C.S. Lui ; Radia Perlman |
Security Protocols - II |
A New Information Leakage Measure for Anonymity Protocols / Sami Zhioua |
Hidden Markov Models for Automated Protocol Learning / Sean Whalen ; Matt Bishop ; James P. Crutchfield |
Epistemic Model Checking for Knowledge-Based Program Implementation: An Application to Anonymous Broadcast / Omar I. Al-Bataineh ; Ronr van der Meyden |
Network Security - II |
Surveying DNS Wildcard Usage among the Good, the Bad, and the Ugly / Andrew Kalafut ; Pairoj Rattadilok ; Pragneshkumar Patel |
The Hitchhiker's Guide to DNS Cache Poisoning / Sooel Son ; Vitaly Shmatikou |
A Formal Definition of Online Abuse-Freeness / Ralf Küsters ; Henning Schnoor ; Tomasz Truderung |
Author Index |
Malware and Email Security |
SAS: Semantics Aware Signature Generation for Polymorphic Worm Detection / Deguang Kong ; Yoon-Chan Jhi ; Tao Gong ; Sencun Zhu ; Peng Liu ; Hongsheng Xi |
Analyzing and Exploiting Network Behaviors of Malware / Jose Andre Morales ; Areej Al-Bataineh ; Shouhuai Xu ; Ravi Sandhu |