SAS: Semantics Aware Signature Generation for Polymorphic Worm Detection / Deguang Kong ; Yoon-Chan Jhi ; Tao Gong ; Sencun Zhu ; Peng Liu ; Hongsheng Xi
Analyzing and Exploiting Network Behaviors of Malware / Jose Andre Morales ; Areej Al-Bataineh ; Shouhuai Xu ; Ravi Sandhu
Inexpensive Email Addresses An Email Spam-Combating System / Aram Yegenian ; Tassos Dimitriou
Anonymity and Privacy
Privacy Administration in Distributed Service Infrastructure / Nabil Ajam ; Nora Cuppens-Boulahia ; Frederic Cuppens
On the Formation of Historically k-Anonymous Anonymity Sets in a Continuous LBS / Rinku Dewri ; Indrakshi Ray ; Indrajit Ray ; Darrell Whitley
Securing Personal Health Records in Cloud Computing: Patient-Centric and Fine-Grained Data Access Control in Multi-owner Settings / Ming Li ; Shucheng Yu ; Kui Ren ; Wenjing Lou
Wireless Security
A Study on False Channel Condition Reporting Attacks in Wireless Networks / Dongho Kim ; Yih-Chun Hu
Characterizing the Security Implications of Third-Party Emergency Alert Systems over Cellular Text Messaging Services / Patrick Traynor
Saving Energy on WiFi with Required IPsec / Youngsang Shin ; Steven Myers ; Minaxi Gupta
Systems Security - I
Transparent Protection of Commodity OS Kernels Using Hardware Virtualization / Michael Grace ; Zhi Wang ; Deepa Srinivasan ; Jinku Li ; Xuxian Jiang ; Zhenkai Liang ; Siarhei Liakh
A Generic Construction of Dynamic Single Sign-on with Strong Security / Jinguang Han ; Yi Mu ; Willy Susilo ; Jun Yan
DeCore: Detecting Content Repurposing Attacks on Client' Systems / Smitha Sundareswaran ; Anna C. Squicciarini
Network Security - I
Realizing a Source Authentic Internet / Toby Ehrenkranz ; Jun Li ; Patrick McDaniel
Partial Deafness: A Novel Denial-of-Service Attack in 802.11 Networks / Jihyuk Choi ; Jerry T. Chiang
Attacking Beacon-Enabled 802.15.4 Networks / Sang Shin Jung ; Marco Valero ; Anu Bourgeois ; Raheem Beyah
Supporting Publication and Subscription Confidentiality in Pub/Sub Networks / Mihaela Ion ; Giovanni Russello ; Bruno Crispo
Security Protocols - I
Impossibility of Finding Any Third Family of Server Protocols Integrating Byzantine Quorum Systems with Threshold Signature Schemes / Luciana Marconi ; Mauro Conti ; Roberto Di Pietro ; Jingqiang Lin ; Jiwu Jing ; Qiongxiao Wang
Context-Aware Usage Control for Android / Guangdong Bai ; Liang Gu ; Tao Feng ; Yao Guo ; Xiangqun Chen
System Security - II
Efficient Isolation of Trusted Subsystems in Embedded Systems / Raoul Strackx ; Frank Piessens ; Bart Preneel
Enhancing Host Security Using External Environment Sensors / Ee-Chien Chang ; Liming Lu ; Yongzheng Wu ; Roland H.C. Yap ; Jie Yu
FADE: Secure Overlay Cloud Storage with File Assured Deletion / Yang Tang ; Patrick P.C. Lee ; John C.S. Lui ; Radia Perlman
Security Protocols - II
A New Information Leakage Measure for Anonymity Protocols / Sami Zhioua
Hidden Markov Models for Automated Protocol Learning / Sean Whalen ; Matt Bishop ; James P. Crutchfield
Epistemic Model Checking for Knowledge-Based Program Implementation: An Application to Anonymous Broadcast / Omar I. Al-Bataineh ; Ronr van der Meyden
Network Security - II
Surveying DNS Wildcard Usage among the Good, the Bad, and the Ugly / Andrew Kalafut ; Pairoj Rattadilok ; Pragneshkumar Patel
The Hitchhiker's Guide to DNS Cache Poisoning / Sooel Son ; Vitaly Shmatikou
A Formal Definition of Online Abuse-Freeness / Ralf Küsters ; Henning Schnoor ; Tomasz Truderung
Author Index
Malware and Email Security
SAS: Semantics Aware Signature Generation for Polymorphic Worm Detection / Deguang Kong ; Yoon-Chan Jhi ; Tao Gong ; Sencun Zhu ; Peng Liu ; Hongsheng Xi
Analyzing and Exploiting Network Behaviors of Malware / Jose Andre Morales ; Areej Al-Bataineh ; Shouhuai Xu ; Ravi Sandhu
How to Construct Interval Encryption from Binary Tree Encryption / Huang Lin ; Zhenfu Cao ; Xiaohui Liang ; Muxin Zhou ; Haojin Zhu ; Dongsheng Xing
Shrinking the Keys of Discrete-Log-Type Lossy Trapdoor Functions / Xavier Boyen ; Brent Waters
Digital Signature
Trapdoor Sanitizable Signatures Made Easy / Dae Hyun Yum ; Jae Woo Seo ; Pil Joong Lee
Generic Constructions for Verifiably Encrypted Signatures without Random Oracles or NIZKs / Markus Rückert ; Michael Schneider ; Dominique Schröder
Redactable Signatures for Tree-Structured Data: Definitions and Constructions / Christina Brzuska ; Heike Busch ; Oezguer Dagdelen ; Marc Fischlin ; Martin Franz ; Stefan Katzenbeisser ; Mark Manulis ; Cristina Onete ; Andreas Peter ; Bertram Poettering
Block Ciphers and Hash Functions
Impossible Differential Cryptanalysis on Feistel Ciphers with S P and S P S Round Functions / Yuechuan Wei ; Ping Li ; Bing Sun ; Chao Li
Okamoto-Tanaka Revisited: Fully Authenticated Diffie-Hellman with Minimal Overhead / Rosario Gennaro ; Hugo Krawczyk ; Tal Rabin
Deniable Internet Key Exchange / Andrew C. Yao ; Yunlei Zhao
Authentication and Identification
A New Human Identification Protocol and Coppersmith's Baby-Step Giant-Step Algorithm / Hassan Jameel Asghar ; Josef Pieprzyk ; Huaxiong Wang
Secure Sketch for Multiple Secrets / Chengfang Fang ; Qiming Li ; Ee-Chien Chang
A Message Recognition Protocol Based on Standard Assumptions / Atefeh Mashatan ; Serge Vaudenay
Privacy and Anonymity
Affiliation-Hiding Key Exchange with Untrusted Group Authorities / Gene Tsudik
Privacy-Preserving Group Discovery with Linear Complexity / Benny Pinkas
Two New Efficient PIR-writing Protocols / Helger Lipmaa ; Bingsheng Zhang
Regulatory Compliant Oblivious RAM / Bogdan Carbunar ; Radu Sion
RFID Security and Privacy
Revisiting Unpredictability-Based RFID Privacy Models / Junzuo Lai ; Robert H. Deng ; Yingjiu Li
On RFID Privacy with Mutual Authentication and Tag Corruption / Frederik Armknecht ; Ahmad-Reza Sadeghi ; Ivan Visconti ; Christian Wachsmann
Internet Security
Social Network-Based Botnet Command-and-Control: Emerging Threats and Countermeasures / Erhan J. Kartaltepe ; Jose Andre Morales ; Shouhuai Xu ; Ravi Sandhu
COP: A Step toward Children Online Privacy / Wei Xu ; Sencun Zhu ; Heng Xu
A Hybrid Method to Detect Deflation Fraud in Cost-Per-Action Online Advertising / Xuhua Ding
Mitigating DoS Attacks on the Paging Channel by Efficient Encoding in Page Messages / Liang Cai ; Gabriel Maganis ; Hui Zang ; Hao Chen
FIJI: Fighting Implicit Jamming in 802.11 WLANs / Ioannis Broustis ; Konstantinos Pelechrinis ; Dimitris Syrivelis ; Srikanth V. Krishnamurthy ; Leandros Tassiulas
Deny-by-Default Distributed Security Policy Enforcement in Mobile Ad Hoc Networks / Mansoor Alicherry ; Angelos D. Keromytis ; Angelos Stavrou
Network Intrusion Detection
Baiting Inside Attackers Using Decoy Documents / Brian M. Bowen ; Shlomo Hershkop ; Salvatore J. Stolfo
MULAN: Multi-Level Adaptive Network Filter / Shimrit Tzur-David ; Danny Dolev ; Tal Anker
Automated Classification of Network Traffic Anomalies / Guilherme Fernandes ; Philippe Owezarski
Security and Privacy for the General Internet
Formal Analysis of FPH Contract Signing Protocol Using Colored Petri Nets / Magdalena Payeras-Capellà ; Macià Mut-Puigserver ; Andreu Pere Isern-Deyà ; Josep L. Ferrer-Gomila ; Llorenç Huguet-Rotger
On the Security of Bottleneck Bandwidth Estimation Techniques / Ghassan Karame ; David Gubler ; Srdjan čapkun
An Eavesdropping Game with SINR as an Objective Function / Andrey Garnaev ; Wade Trappe
Malware and Misbehavior
Ensemble: Community-Based Anomaly Detection for Popular Applications / Feng Qian ; Zhiyun Qian ; Z. Morley Mao ; Atul Prakash
Using Failure Information Analysis to Detect Enterprise Zombies / Zhaosheng Zhu ; Vinod Yegneswaran ; Yan Chen
Dealing with Liars: Misbehavior Identification via Rényi-Ulam Games / William Kozma Jr. ; Loukas Lazos
Wireless Network Security II, Sensor Networks
Multichannel Protocols for User-Friendly and Scalable Initialization of Sensor Networks / Toni Perković ; Ivo Stančić ; Luka MaliÜa ; Mario Čagalj
Sec-TMP: A Secure Topology Maintenance Protocol for Event Delivery Enforcement in WSN / Andrea Gabrielli ; Maura Conti ; Roberto Di Pietro ; Luigi V. Mancini
Hierarchical Self-healing Key Distribution for Heterogeneous Wireless Sensor Networks / Yanjiang Yang ; Jianying Zhou ; Robert H. Deng ; Feng Bao
Key Management, Credentials, Authentications
User-Centric Identity Using ePassports / Martijn Oostdijk ; Dirk-Jan van Dijk ; Maarten Wegdam
Defending against Key Abuse Attacks in KP-ABE Enabled Broadcast Systems / Shucheng Yu ; Kui Ren ; Wenjing Lou ; Jin Li
Breaking and Building of Group Inside Signature / S. Sree Vivek ; S. Sharmila Deva Selvi ; S. Gopi Nath ; C. Pandu Rangan
Use of ID-Based Cryptography for the Efficient Verification of the Integrity and Authenticity of Web Resources / Thanassis Tiropanis ; Tassos Dimitriou
Wireless Network Security III
Self-organized Anonymous Authentication in Mobile Ad Hoc Networks / Julien Freudiger ; Maxim Raya ; Jean-Pierre Hubaux
An Active Global Attack Model for Sensor Source Location Privacy: Analysis and Countermeasures / Yi Yang ; Sencun Zhu ; Guohong Cao ; Thomas LaPorta
Rogue Access Point Detection Using Innate Characteristics of the 802.11 MAC / Aravind Venkataraman ; Raheem Beyah
Secure Multicast, Emerging Technologies
A Novel Architecture for Secure and Scalable Multicast over IP Network / Yawen Wei ; Zhen Yu ; Yong Guan
Reliable Resource Searching in P2P Networks / Michael T. Goodrich ; Jonathan Z. Sun ; Roberto Tamassia ; Nikos Triandopoulos
The Frog-Boiling Attack: Limitations of Anomaly Detection for Secure Network Coordinate Systems / Eric Chan-Tin ; Daniel Feldman ; Nicholas Hopper ; Yongdae Kim
Author Index
Wireless Network Security I
Mitigating DoS Attacks on the Paging Channel by Efficient Encoding in Page Messages / Liang Cai ; Gabriel Maganis ; Hui Zang ; Hao Chen
FIJI: Fighting Implicit Jamming in 802.11 WLANs / Ioannis Broustis ; Konstantinos Pelechrinis ; Dimitris Syrivelis ; Srikanth V. Krishnamurthy ; Leandros Tassiulas
Multi-party Computation from Any Linear Secret Sharing Scheme Unconditionally Secure against Adaptive Adversary: The Zero-Error Case / Ventzislav Nikov ; Svetla Nikova ; Bart Preneel
Using Feedback to Improve Masquerade Detection / Kwong H. Yung
Efficient Presentation of Multivariate Audit Data for Intrusion Detection of Web-Based Internet Services / Zhi Guo ; Kwok-Yan Lam ; Siu-Leung Chung ; Ming Gu ; Jia-Guang Sun
An IP Traceback Scheme Integrating DPM and PPM / Fan Min ; Jun-yan Zhang ; Guo-wie Yang
Cryptographic Algorithms
Improved Scalable Hash Chain Traversal / Sung-Ryul Kim
Round Optimal Distributed Key Generation of Threshold Cryptosystem Based on Discrete Logarithm Problem / Rui Zhang ; Hideki Imai
On the Security of Two Threshold Signature Schemes with Traceable Signers / Guilin Wang ; Xiaoxi Han ; Bo Zhu
Digital Signature
Proxy and Threshold One-Time Signatures / Mohamed Al-Ibrahim ; Anton Cerny
A Threshold GQ Signature Scheme / Li-Shan Liu ; Cheng-Kang Chu ; Wen-Guey Tzeng
Generalized Key-Evolving Signature Schemes or How to Foil an Armed Adversary / Gene Itkis ; Peng Xie
A Ring Signature Scheme Based on the Nyberg-Rueppel Signature Scheme / Chong-zhi Gao ; Zheng-an Yao ; Lei Li
Security Modelling
Modelling and Evaluating Trust Relationships in Mobile Agents Based Systems / Ching Lin ; Vijay Varadharajan
An Authorization Model for E-consent Requirement in a Health Care Application / Chun Ruan
PLI: A New Framework to Protect Digital Content for P2P Networks / Guofei Gu ; Bin B. Zhu ; Shipeng Li ; Shiyong Zhang
Common Vulnerability Markup Language / Haitao Tian ; Liusheng Huang ; Zhi Zhou ; Hui Zhang
Trust on Web Browser: Attack vs. Defense / Tie-Yan Li ; Yongdong Wu
Security Protocols
Security Protocols for Biometrics-Based Cardholder Authentication in Smartcards / Luciano Rila ; Chris J. Mitchell
Does It Need Trusted Third Party? Design of Buyer-Seller Watermarking Protocol without Trusted Third Party / Jae-Gwi Choi ; Kouichi Sakurai ; Ji-Hwan Park
Differential Fault Analysis on A.E.S / Pierre Dusart ; Gilles Letourneux ; Olivier Vivolo
Side-Channel Attack on Substitution Blocks / Roman Novak
Timing Attack against Implementation of a Parallel Algorithm for Modular Exponentiation / Yasuyuki Sakai
A Fast Correlation Attack for LFSR-Based Stream Ciphers / Sarbani Palit ; Bimal K. Roy ; Arindom De
Key Management
Making the Key Agreement Protocol in Mobile Ad Hoc Network
More Efficient / Gang Yao ; Kui Ren ; Feng Bao ; Robert H. Deng ; Dengguo Feng
An Efficient Tree-Based Group Key Agreement Using Bilinear Map / Sangwon Lee ; Yongdae Kim ; Kwangjo Kim ; Dae-Hyun Ryu
A Key Recovery Mechanism for Reliable Group Key Management / Taenam Cho ; Sang-Ho Lee
Efficient Implementations
Efficient Software Implementation of LFSR and Boolean Function and Its Application in Nonlinear Combiner Model / Sandeepan Chowdhury ; Subhamoy Maitra
Efficient Distributed Signcryption Scheme as Group Signcryption / DongJin Kwak ; SangJae Moon
Architectural Enhancements for Montgomery Multiplication on Embedded RISC Processors / Johann Großschädl ; Guy-Armand Kamendje
Author Index
Cryptographic Applications
Multi-party Computation from Any Linear Secret Sharing Scheme Unconditionally Secure against Adaptive Adversary: The Zero-Error Case / Ventzislav Nikov ; Svetla Nikova ; Bart Preneel
How to Construct Interval Encryption from Binary Tree Encryption / Huang Lin ; Zhenfu Cao ; Xiaohui Liang ; Muxin Zhou ; Haojin Zhu ; Dongsheng Xing
Shrinking the Keys of Discrete-Log-Type Lossy Trapdoor Functions / Xavier Boyen ; Brent Waters
Digital Signature
Trapdoor Sanitizable Signatures Made Easy / Dae Hyun Yum ; Jae Woo Seo ; Pil Joong Lee
Generic Constructions for Verifiably Encrypted Signatures without Random Oracles or NIZKs / Markus Rückert ; Michael Schneider ; Dominique Schröder
Redactable Signatures for Tree-Structured Data: Definitions and Constructions / Christina Brzuska ; Heike Busch ; Oezguer Dagdelen ; Marc Fischlin ; Martin Franz ; Stefan Katzenbeisser ; Mark Manulis ; Cristina Onete ; Andreas Peter ; Bertram Poettering
Block Ciphers and Hash Functions
Impossible Differential Cryptanalysis on Feistel Ciphers with S P and S P S Round Functions / Yuechuan Wei ; Ping Li ; Bing Sun ; Chao Li
Okamoto-Tanaka Revisited: Fully Authenticated Diffie-Hellman with Minimal Overhead / Rosario Gennaro ; Hugo Krawczyk ; Tal Rabin
Deniable Internet Key Exchange / Andrew C. Yao ; Yunlei Zhao
Authentication and Identification
A New Human Identification Protocol and Coppersmith's Baby-Step Giant-Step Algorithm / Hassan Jameel Asghar ; Josef Pieprzyk ; Huaxiong Wang
Secure Sketch for Multiple Secrets / Chengfang Fang ; Qiming Li ; Ee-Chien Chang
A Message Recognition Protocol Based on Standard Assumptions / Atefeh Mashatan ; Serge Vaudenay
Privacy and Anonymity
Affiliation-Hiding Key Exchange with Untrusted Group Authorities / Gene Tsudik
Privacy-Preserving Group Discovery with Linear Complexity / Benny Pinkas
Two New Efficient PIR-writing Protocols / Helger Lipmaa ; Bingsheng Zhang
Regulatory Compliant Oblivious RAM / Bogdan Carbunar ; Radu Sion
RFID Security and Privacy
Revisiting Unpredictability-Based RFID Privacy Models / Junzuo Lai ; Robert H. Deng ; Yingjiu Li
On RFID Privacy with Mutual Authentication and Tag Corruption / Frederik Armknecht ; Ahmad-Reza Sadeghi ; Ivan Visconti ; Christian Wachsmann
Internet Security
Social Network-Based Botnet Command-and-Control: Emerging Threats and Countermeasures / Erhan J. Kartaltepe ; Jose Andre Morales ; Shouhuai Xu ; Ravi Sandhu
COP: A Step toward Children Online Privacy / Wei Xu ; Sencun Zhu ; Heng Xu
A Hybrid Method to Detect Deflation Fraud in Cost-Per-Action Online Advertising / Xuhua Ding
Mitigating DoS Attacks on the Paging Channel by Efficient Encoding in Page Messages / Liang Cai ; Gabriel Maganis ; Hui Zang ; Hao Chen
FIJI: Fighting Implicit Jamming in 802.11 WLANs / Ioannis Broustis ; Konstantinos Pelechrinis ; Dimitris Syrivelis ; Srikanth V. Krishnamurthy ; Leandros Tassiulas
Deny-by-Default Distributed Security Policy Enforcement in Mobile Ad Hoc Networks / Mansoor Alicherry ; Angelos D. Keromytis ; Angelos Stavrou
Network Intrusion Detection
Baiting Inside Attackers Using Decoy Documents / Brian M. Bowen ; Shlomo Hershkop ; Salvatore J. Stolfo
MULAN: Multi-Level Adaptive Network Filter / Shimrit Tzur-David ; Danny Dolev ; Tal Anker
Automated Classification of Network Traffic Anomalies / Guilherme Fernandes ; Philippe Owezarski
Security and Privacy for the General Internet
Formal Analysis of FPH Contract Signing Protocol Using Colored Petri Nets / Magdalena Payeras-Capellà ; Macià Mut-Puigserver ; Andreu Pere Isern-Deyà ; Josep L. Ferrer-Gomila ; Llorenç Huguet-Rotger
On the Security of Bottleneck Bandwidth Estimation Techniques / Ghassan Karame ; David Gubler ; Srdjan čapkun
An Eavesdropping Game with SINR as an Objective Function / Andrey Garnaev ; Wade Trappe
Malware and Misbehavior
Ensemble: Community-Based Anomaly Detection for Popular Applications / Feng Qian ; Zhiyun Qian ; Z. Morley Mao ; Atul Prakash
Using Failure Information Analysis to Detect Enterprise Zombies / Zhaosheng Zhu ; Vinod Yegneswaran ; Yan Chen
Dealing with Liars: Misbehavior Identification via Rényi-Ulam Games / William Kozma Jr. ; Loukas Lazos
Wireless Network Security II, Sensor Networks
Multichannel Protocols for User-Friendly and Scalable Initialization of Sensor Networks / Toni Perković ; Ivo Stančić ; Luka MaliÜa ; Mario Čagalj
Sec-TMP: A Secure Topology Maintenance Protocol for Event Delivery Enforcement in WSN / Andrea Gabrielli ; Maura Conti ; Roberto Di Pietro ; Luigi V. Mancini
Hierarchical Self-healing Key Distribution for Heterogeneous Wireless Sensor Networks / Yanjiang Yang ; Jianying Zhou ; Robert H. Deng ; Feng Bao
Key Management, Credentials, Authentications
User-Centric Identity Using ePassports / Martijn Oostdijk ; Dirk-Jan van Dijk ; Maarten Wegdam
Defending against Key Abuse Attacks in KP-ABE Enabled Broadcast Systems / Shucheng Yu ; Kui Ren ; Wenjing Lou ; Jin Li
Breaking and Building of Group Inside Signature / S. Sree Vivek ; S. Sharmila Deva Selvi ; S. Gopi Nath ; C. Pandu Rangan
Use of ID-Based Cryptography for the Efficient Verification of the Integrity and Authenticity of Web Resources / Thanassis Tiropanis ; Tassos Dimitriou
Wireless Network Security III
Self-organized Anonymous Authentication in Mobile Ad Hoc Networks / Julien Freudiger ; Maxim Raya ; Jean-Pierre Hubaux
An Active Global Attack Model for Sensor Source Location Privacy: Analysis and Countermeasures / Yi Yang ; Sencun Zhu ; Guohong Cao ; Thomas LaPorta
Rogue Access Point Detection Using Innate Characteristics of the 802.11 MAC / Aravind Venkataraman ; Raheem Beyah
Secure Multicast, Emerging Technologies
A Novel Architecture for Secure and Scalable Multicast over IP Network / Yawen Wei ; Zhen Yu ; Yong Guan
Reliable Resource Searching in P2P Networks / Michael T. Goodrich ; Jonathan Z. Sun ; Roberto Tamassia ; Nikos Triandopoulos
The Frog-Boiling Attack: Limitations of Anomaly Detection for Secure Network Coordinate Systems / Eric Chan-Tin ; Daniel Feldman ; Nicholas Hopper ; Yongdae Kim
Author Index
Wireless Network Security I
Mitigating DoS Attacks on the Paging Channel by Efficient Encoding in Page Messages / Liang Cai ; Gabriel Maganis ; Hui Zang ; Hao Chen
FIJI: Fighting Implicit Jamming in 802.11 WLANs / Ioannis Broustis ; Konstantinos Pelechrinis ; Dimitris Syrivelis ; Srikanth V. Krishnamurthy ; Leandros Tassiulas
SAS: Semantics Aware Signature Generation for Polymorphic Worm Detection / Deguang Kong ; Yoon-Chan Jhi ; Tao Gong ; Sencun Zhu ; Peng Liu ; Hongsheng Xi
Analyzing and Exploiting Network Behaviors of Malware / Jose Andre Morales ; Areej Al-Bataineh ; Shouhuai Xu ; Ravi Sandhu
Inexpensive Email Addresses An Email Spam-Combating System / Aram Yegenian ; Tassos Dimitriou
Anonymity and Privacy
Privacy Administration in Distributed Service Infrastructure / Nabil Ajam ; Nora Cuppens-Boulahia ; Frederic Cuppens
On the Formation of Historically k-Anonymous Anonymity Sets in a Continuous LBS / Rinku Dewri ; Indrakshi Ray ; Indrajit Ray ; Darrell Whitley
Securing Personal Health Records in Cloud Computing: Patient-Centric and Fine-Grained Data Access Control in Multi-owner Settings / Ming Li ; Shucheng Yu ; Kui Ren ; Wenjing Lou
Wireless Security
A Study on False Channel Condition Reporting Attacks in Wireless Networks / Dongho Kim ; Yih-Chun Hu
Characterizing the Security Implications of Third-Party Emergency Alert Systems over Cellular Text Messaging Services / Patrick Traynor
Saving Energy on WiFi with Required IPsec / Youngsang Shin ; Steven Myers ; Minaxi Gupta
Systems Security - I
Transparent Protection of Commodity OS Kernels Using Hardware Virtualization / Michael Grace ; Zhi Wang ; Deepa Srinivasan ; Jinku Li ; Xuxian Jiang ; Zhenkai Liang ; Siarhei Liakh
A Generic Construction of Dynamic Single Sign-on with Strong Security / Jinguang Han ; Yi Mu ; Willy Susilo ; Jun Yan
DeCore: Detecting Content Repurposing Attacks on Client' Systems / Smitha Sundareswaran ; Anna C. Squicciarini
Network Security - I
Realizing a Source Authentic Internet / Toby Ehrenkranz ; Jun Li ; Patrick McDaniel
Partial Deafness: A Novel Denial-of-Service Attack in 802.11 Networks / Jihyuk Choi ; Jerry T. Chiang
Attacking Beacon-Enabled 802.15.4 Networks / Sang Shin Jung ; Marco Valero ; Anu Bourgeois ; Raheem Beyah
Supporting Publication and Subscription Confidentiality in Pub/Sub Networks / Mihaela Ion ; Giovanni Russello ; Bruno Crispo
Security Protocols - I
Impossibility of Finding Any Third Family of Server Protocols Integrating Byzantine Quorum Systems with Threshold Signature Schemes / Luciana Marconi ; Mauro Conti ; Roberto Di Pietro ; Jingqiang Lin ; Jiwu Jing ; Qiongxiao Wang
Context-Aware Usage Control for Android / Guangdong Bai ; Liang Gu ; Tao Feng ; Yao Guo ; Xiangqun Chen
System Security - II
Efficient Isolation of Trusted Subsystems in Embedded Systems / Raoul Strackx ; Frank Piessens ; Bart Preneel
Enhancing Host Security Using External Environment Sensors / Ee-Chien Chang ; Liming Lu ; Yongzheng Wu ; Roland H.C. Yap ; Jie Yu
FADE: Secure Overlay Cloud Storage with File Assured Deletion / Yang Tang ; Patrick P.C. Lee ; John C.S. Lui ; Radia Perlman
Security Protocols - II
A New Information Leakage Measure for Anonymity Protocols / Sami Zhioua
Hidden Markov Models for Automated Protocol Learning / Sean Whalen ; Matt Bishop ; James P. Crutchfield
Epistemic Model Checking for Knowledge-Based Program Implementation: An Application to Anonymous Broadcast / Omar I. Al-Bataineh ; Ronr van der Meyden
Network Security - II
Surveying DNS Wildcard Usage among the Good, the Bad, and the Ugly / Andrew Kalafut ; Pairoj Rattadilok ; Pragneshkumar Patel
The Hitchhiker's Guide to DNS Cache Poisoning / Sooel Son ; Vitaly Shmatikou
A Formal Definition of Online Abuse-Freeness / Ralf Küsters ; Henning Schnoor ; Tomasz Truderung
Author Index
Malware and Email Security
SAS: Semantics Aware Signature Generation for Polymorphic Worm Detection / Deguang Kong ; Yoon-Chan Jhi ; Tao Gong ; Sencun Zhu ; Peng Liu ; Hongsheng Xi
Analyzing and Exploiting Network Behaviors of Malware / Jose Andre Morales ; Areej Al-Bataineh ; Shouhuai Xu ; Ravi Sandhu
Faster Scalar Multiplication on Koblitz Curves Combining Point Halving with the Frobenius Endomorphism / Roberto Maria Avanzi ; Mathieu Ciet ; Francesco Sica
Application of Montgomery's Trick to Scalar Multiplication for Elliptic and Hyperelliptic Curves Using a Fixed Base Point / Pradeep Kumar Mishra ; Palash Sarkar
Undeniable Signatures Based on Characters: How to Sign with One Bit / Jean Monnerat ; Serge Vaudenay
Efficient Extension of Standard Schnorr/RSA Signatures into Universal Designated-Verifier Signatures / Ron Steinfeld ; Huaxiong Wang ; Josef Pieprzyk
Constructing Committed Signatures from Strong-RSA Assumption in the Standard Complexity Model / Huafei Zhu
Constant Round Authenticated Group Key Agreement via Distributed Computation / Emmanuel Bresson ; Dario Catalano
Efficient ID-based Group Key Agreement with Bilinear Maps / Kyu Young Choi ; Jung Yeon Hwang ; Dong Hoon Lee
New Security Results on Encrypted Key Exchange / Olivier Chevassut ; David Pointcheval
New Results on the Hardness of Diffie-Hellman Bits / MarÃa Isabel González Vasco ; Mats Näslund ; Igor E. Shparlinski
Short Exponent Diffie-Hellman Problems / Takeshi Koshiba ; Kaoru Kurosawa
Efficient Signcryption with Key Privacy from Gap Diffie-Hellman Groups / Benoît Libert ; Jean-Jacques Quisquater
General Group Authentication Codes and Their Relation to "Unconditionally-Secure Signatures" / Nicolas T. Courtois ; Reihaneh Safavi-Naini ; Luke McAven ; Moti Yung
From Digital Signature to ID-based Identification/Signature / Swee-Huay Heng
Faster Scalar Multiplication on Koblitz Curves Combining Point Halving with the Frobenius Endomorphism / Roberto Maria Avanzi ; Mathieu Ciet ; Francesco Sica
Security of Blind Discrete Log Signatures against Interactive Attacks / Glaus Peter Schnorr
An Intelligent Intruder Model for Security Protocol Analysis / Dongxi Liu ; Xiaoyong Li ; Yingcai Bai
Primitive Polynomials over GF(2) - A Cryptologic Approach / Kishan Chand Gupta ; Subhamoy Maitra
Unconditionally-Secure Oblivious Transfer / Bo Yan ; Shixiong Zhu ; Yumin Wang
Cryptanalysis of the Improved User Efficient Blind Signatures / Chin-Chen Chang ; Iuon-Chang Lin
Towards the Forgery of a Group Signature without Knowing the Group Center's Secret / Kuo-Feng Hwang
Evaluation of the Image Degradation for a Typical Watermarking Algorithm in the Block-DCT Domain / Xiaochen Bo ; Lincheng Shen ; Wensen Chang
A Cyclic Window Algorithm for ECC Defined over Extension Fields / Kazumaro Aoki ; Fumitaka Hoshino ; Tetsutaro Kobayashi
Fast Scalar Multiplication on the Jacobian of a Family of Hyperelliptic Curves / Fangguo Zhang ; Futai Zhang
Attacks on Two Digital Signature Schemes Based on Error Correcting Codes / Dingfeng Ye ; Junhui Yang ; Zongduo Dai ; Haiwen Ou
A Derivative of Digital Objects and Estimation of Default Risks in Electronic Commerce / Kanta Matsuura
A New Approach for Secure Multicast Routing in a Large Scale Network / Young-Chul Shim
A Transaction Length-Sensitive Protocol Based on Altruistic Locking for Multilevel Secure Database Systems / Hee-Wan Kim ; Hae-Kyung Rhee ; Tai M. Chung ; Young Ik Eom ; Ung-Mo Kim
Dealing with Uncertainties in Risk Analysis Using Belief Functions / Sungbaek Cho ; Zbigniew Ciechanowicz
RBAC for XML Document Stores / Michael Hitchens ; Vijay Varadharajan
Applying NCP Logic to the Analysis of SSL 3.0 / Zhimin Song ; Sihan Qing
Performance of WTLS and Its Impact on an M-commerce Transaction / Ian Herwono ; Ingo Liebhardt
Enforcing Obligation with Security Monitors / Carlos Ribeiro ; Andre Zuquete ; Paulo Ferreira
Efficient Software Implementation for Finite Field Multiplication in Normal Basis / Peng Ning ; Yiqun Lisa Yin
Playing Lottery on the Internet / Jianying Zhou ; Chunfu Tan
Privacy Protection for Transactions of Digital Goods / Feng Bao ; Robert Deng
Equivalent Characterizations and Applications of Multi-output Correlation-Immune Boolean Functions / Jie-lua Xu ; Han-liang Xu ; Yan Wang ; Shu-Wang Lu
Threshold Undeniable RSA Signature Scheme / Guilin Wang ; Mingsheng Wang ; Zhanfei Zhou
Two Simple Batch Verifying Multiple Digital Signatures / Min-Shiang Hwang ; Cheng-Chi Lee ; Yuan-Liang Tang
Square Attack on Reduced Camellia Cipher / Yeping He
Generalization of Elliptic Curve Digital Signature Schemes / Lin You ; Yi Xian Yang ; Chun Qi Zhang
Reasoning about Accountability within Delegation / Bruno Crispo ; Giancarlo Ruffo
A Novel Data Hiding Method for Two-Color Images / Gang Pan ; Yijun Wu ; Zhaohui Wu
An Identification Scheme Provably Secure against Reset Attack / C.-H. Lee ; X. Deng ; H. Zhu
Estimating the Scalability of the Internet Key Exchange / Sanna Kunnari
An Efficient Information Flow Analysis of Recursive Programs Based on a Lattice Model of Security Classes / Shigeta Kuninobu ; Yoshiaki Takata ; Hiroyuki Seki ; Katsuro Inoue
Defeating Denial-of-Service Attacks on the Internet / Baoqing Ye
A Role-Based Access Control Model and Implementation for Data-Centric Enterprise Applications / Dianlong Zhang ; Harald Lukhaub ; Werner Zorn
A Unified Methodology for Verification and Synthesis of Firewall Configurations / Yongyuth Permpoontanalarp ; Chaiwat Rujimethabhas
Quantifying Network Denial of Service: A Location Service Case Study / Yan Chen ; Adam Bargteil ; David Bindel ; Randy H. Katz ; John Kubiatowicz
A Public Key Cryptosystem Based on the Subgroup Membership Problem / Juan Manuel Gonzalez Nieto ; Colin Boyd ; Ed Dawson
On a Network Security Model for the Secure Information Flow on Multilevel Secure Network / Ki-Yoong Hong ; Chul Kim
NIDS Research Based on Artificial Immunology / Wenjian Luo ; Xianbin Cao ; Xufa Wang
AMBAR Protocol: Access Management Based on Authorization Reduction / Oscar Cánovas ; Antonio F. Gómez
Chinese Remainder Theorem Based Hierarchical Access Control for Secure Group Communication / Xukai Zou ; Byrav Ramamurthy ; Spyros S. Magliveras
Dispatching Mobile Agents with Secure Routes in Parallel / Kian-Lee Tan
TH-SMS: Security Management System in Advanced Computational Infrastructure / Yu Chen ; Qian Fang ; Zhihui Du ; Zhenchun Huang ; Sanli Li
Cryptography and Middleware Security / Ulrich Lang ; Dieter Gollmann ; Rudolf Schreiner
Cryptanalysis of the Hwang-Rao Secret Error-Correcting Code Schemes / Kencheng Zeng ; Chung-Huang Yang ; T.R.N. Rao
A Role-Based Model for Access Control in Database Federations / Eric Disson ; Danielle Boulanger ; Gilles Dubois
A Useful Intrusion Detection System Prototype to Monitor Multi-processes Based on System Calls / Hongpei Li ; Lianli Chang ; Xinmei Wang
A Digital Nominative Proxy Signature Scheme for Mobile Communication / Hee-Un Park ; Im-Yeong Lee
Hierarchical Simulation Model with Animation for Large Network Security / Mi Ra Yi ; Tae Ho Cho
Fair Electronic Cash Based on a Group Signature Scheme / Greg Maitland
Fair Exchange of Digital Signatures with Offline Trusted Third Party / Chuan-Kun Wu
SECUSIM: A Tool for the Cyber-Attack Simulation / Jong Sou Park ; Jang-Se Lee ; Hwan Kuk Kim ; Jeong-Rye Jeong ; Dong-Bok Yeom ; Sung-Do Chi
A New Semantics of Authentication Logic / Yifa Li
Robust and Fragile Watermarking Techniques for Documents Using Bi-directional Diagonal Profiles / Ji Hwan Park ; Sook Ee Jeong ; Chang Soo Kim