Technical Program

IEEE CNS Detailed Technical Program
Monday 28 September 2015
08:45 - 09:00:       Opening Remarks
09:00 - 10:00:       Keynote Talk I, Adrian Perrig, ETH & CMU
10:00 - 10:30:        Coffee Break
10:30 - 12:30:        Session 1A - Mobile Security
Chair: Yanchao Zhang (Arizona State University, United States)
Critical Segment Based Real-time E-Signature for Securing Mobile Transactions   
Yanzhi Ren (Stevens Institute of Technology, USA), Chen Wang (Stevens Institute of Technology, USA), Yingying Chen (Stevens Institute of Technology, USA), Mooi Choo Chuah (Lehigh University, USA), Jie Yang (Florida State University, USA)
Activity Tracking: A New Attack on Location Privacy
Xihui Chen (University of Luxembourg, Luxemburg), Andrzej Mizera (University of Luxembourg, Luxemburg), Jun Pang (University of Luxembourg, Luxemburg)
Privacy-Aware Trustworthy Data Aggregation in Mobile Sensing 
Jingyao Fan (Pennsylvania State University, USA), Qinghua Li (University of Arkansas, USA), Guohong Cao (The Pennsylvania State University, USA)
A Novel and Scalable Communication-History Based Knapsack Authentication Framework for IEEE 802.11 Networks
Changmin Lee (The George Washington University, USA), Chen Shen (The George Washington University, USA), Gokhan Sahin (Miami University, USA), Kwanghee Choi (Korea Internet and Security Agency, USA), Hyeong-Ah Choi (The George Washington University, USA)
The Bright Side Arguments for the Coming Smartphones Crypto War: The Added Value of Device Encryption  
Daisuke Moriyama (NICT, Japan), Moti Yung (Google, USA)
10:30 - 12:30:          Session 1B - Malware & Botnets
Chair: Ashraf Matrawy (Carleton University, Canada)
Boten ELISA: A Novel Approach for Botnet C&C in Online Social Networks 
Alberto Compagno (Sapienza University of Rome, Italy), Mauro Conti (University of Padua, Italy), Daniele Lain (University of Padua, Italy), Giulio Lovisotto (Universita' di Padova, Italy), Luigi V. Mancini (Universita' di Roma "La Sapienza, Italy)
Disrupting Stealthy Botnets through Strategic Placement of Detectors   
Sridhar Venkatesan (George Mason University, USA), Massimiliano Albanese (George Mason University, USA), Sushil Jajodia (George Mason University, USA)
Early Detection of High Entropy Traffic
Han Zhang (Colorado State University, USA), Christos Papadopoulos (Colorado State University, USA)
Separation of Benign and Malicious Network Events for Accurate Malware Family Classification
Hesham Mekky (University of Minnesota, USA), Aziz Mohaisen (Verisign Labs, USA),  Zhi-Li Zhang (University of Minnesota, USA)
Unknown Malware Detection Using Network Traffic Classification 
Dmitri Bekerman (Ben-Gurion University of the Negev, Israel), Bracha Shapira (Ben-Gurion University of the Negev, Israel), Lior Rokach (Ben-Gurion University, Israel), Ariel Bar (Telekom Innovation Laboratories Ben-Gurion University of the Negev, Israel)
12:30 - 14:00:         Lunch
14:00 - 16:00:         Session 2A - Privacy Enabling Technologies
Chair: Cong Wang (City University of Hong Kong, Hong Kong)
SecNFC: Securing Inductively-Coupled Near Field Communication at Physical Layer
Rong Jin (Huazhong University of Science and Technology, P.R. China), Kai Zeng (George Mason University, USA)
SafePay - Protecting against Credit Card Forgery with Existing Magnetic Card Readers
Yinzhi Cao (Lehigh University, USA), Xiang Pan (Northwestern University, USA), Yan Chen (Northwestern University, USA)
Security and Privacy for Body Cameras Used in Law Enforcement   
Yufeng Wang (Temple University, USA), Waqas A Latif (Temple University, USA), Chiu C. Tan (Temple University, USA), Yifan Zhang (Binghamton University, USA)
Circular Range Search on Encrypted Spatial Data
Boyang Wang (University of Arizona, USA), Ming Li (University of Arizona, USA), Haitao Wang (Utah State University, USA), Hui Li (Xidian University, P.R. China)
Secure Key Agreement using Pure Biometrics 
Dilara Akdoğan (Sabanci University, Turkey), Duygu Karaoğlan Altop (Sabancı University, Turkey), Albert Levi (Sabanci University, Turkey)
14:00 - 16:00:         Session 2B - Covert & Side Channels
Chair: Sencun Zhu (The Pennsylvania State University, United States)
Modeling The Side-Channel Attacks in Data Deduplication with Game Theory   
Bing Wang (Virginia Tech, USA), Wenjing Lou (Virginia Tech & National Science Foundation, USA), Thomas Hou (Virginia Tech, USA)
Practical Covert Channels for WiFi Systems 
Jiska Classen (Technische Universität Darmstadt, Germany), Matthias Schulz (Technische Universität Darmstadt, Germany), Matthias Hollick (Technische Universität Darmstadt & Secure Mobile Networking Lab, Center for Advanced Security Research Darmstadt, Germany)
Hamming Distance as a Metric for the Detection of Side Channel in 802.11 Wireless Communications   
Visal Chea (UOIT, Canada), Miguel Vargas Martin (University of Ontario Institute of Technology, Canada), Ramiro Liscano (University of Ontario Institute of Technology, Canada)
A Novel Analytical Model and its Test Bed Verification for Network Covert Timing Channels  
Pradhumna L Shrestha (University of Nebraska-Lincoln, USA), Michael Hempel (University of Nebraska-Lincoln, USA), Fahimeh Rezaei (University of Nebraska Lincoln, USA), Hamid Sharif (University of Nebraska-Lincoln, USA)
Design and Analysis of a Model-Based Covert Timing Channel for Skype Traffic   
Rennie Archibald (University of California, Davis, USA), Dipak Ghosal (University of California, Davis, USA)
16:00 - 16:30:         Coffee Break
16:30 - 18:00:         Panel: Hacking Things: Security and Privacy Challenges in Internet of Things
18: 30: Reception & Poster Session / Dinner (
Accepted Posters)

Tuesday 29 September 2015
08:30 - 10:30:        Session 3A - Physical Layer Security
Chair: Panagiotis (Panos) Papadimitratos (KTH, Sweden)
PHYVOS: Physical Layer Voting for Secure and Fast Cooperation   
Bocan Hu (University of Arizona, USA), Yan Zhang (University of Arizona, USA), Loukas Lazos (University of Arizona, USA)
Physical Layer Key Agreement under Signal Injection Attack 
Rong Jin (Huazhong University of Science and Technology, P.R. China), Kai Zeng (George Mason University, USA)
PHY-Layer Location Privacy Preserving Access Point Selection Mechanism in Next-Generation Wireless Networks
Sadegh Farhang (New York University, USA), Yezekael Hayel (LIA, University of Avignon, France), Quanyan Zhu (New York University, USA)
Securing Massive MIMO at the Physical Layer
Yuksel Basciftci (The Ohio State University, USA), Can Emre Koksal (The Ohio State University, USA), Alexei Ashikhmin (Bell Labs, Alcatel-Lucent, USA)
Adversarial Wiretap Channel with Public Discussion  
Pengwei Wang (University of Calgary, Canada), Reihaneh Safavi-Naini (University of Calgary, Canada)
08:30 - 10:30:        Session 3B - Attacks & Defenses
Chair: Rui Zhang (University of Hawaii, United States)
Using Linkography to Understand Cyberattacks   
Andrew N Fisher (Sandia National Laboratories, USA), Carson Kent (Sandia National Laboratories, USA), David J Zage (Sandia National Laboratories, USA), John C Jarocki (Sandia National Laboratories, USA)
Multi-objective Software Assignment for Active Cyber Defense   
Chu Huang (The Pennsylvania State University, USA), Sencun Zhu (The Pennsylvania State University, USA), Quanlong Guan (Jinan University, P.R. China)
Characterizing Phishing Threats with Natural Language Processing   
Michael Kotson (MIT Lincoln Laboratory, USA), Alexia Schulz (MIT Lincoln Laboratory, USA)
A Deception Based Approach for Defeating OS and Service Fingerprinting 
Massimiliano Albanese (George Mason University, USA), Ermanno Battista (University of Naples Federico II, Italy), Sushil Jajodia (George Mason University, USA)
PLC Guard: A Practical Defense against Attacks on Cyber-Physical Systems   
Jan-Ole Malchow (Freie Universität Berlin, Germany), Daniel Marzin (Freie Universität Berlin, Germany), Johannes Klick (Freie Universität Berlin, Germany), Robert Kovacs (Hasso-Plattner-Institut für Software system technik GmbH, Germany), Volker Roth (Freie Universität Berlin, Germany)
10:30 - 11:00:          Coffee Break
11:00 - 12:00:          Keynote Talk II, Patrick Drew McDaniel, Pennsylvania State University

12:00 - 13:30:          Lunch
13:30 - 15:30:          Session 4A - Internet Security I
Chair: Chiu C. Tan (Temple University, United States)
OnionDNS: A Seizure-Resistant Top-Level Domain                
Nolen Scaife (University of Florida, USA), Henry Carter (Georgia Institute of Technology, USA), Patrick Traynor (University of Florida, USA)
Crowd-based Detection of Routing Anomalies on the Internet         
Rahul Hiran (Linköping University, Sweden), Niklas Carlsson (Linköping University, Sweden), Nahid Shahmehri (Linköping University, Sweden)
Small Lies, Lots of Damage: a Partition Attack on Link-State Routing Protocols  
Reuven Cohen (Technion, Israel), Raziel Hess-Green (Technion, Israel), Gabi Nakibly (Technion, Israel)
Leveraging Client-Side DNS Failure Patterns to Identify Malicious Behaviors      
Pengkui Luo (University of Minnesota, USA), Ruben Torres (Symantec, USA), Zhi-Li Zhang (University of Minnesota, USA), Sabyasachi Saha (Symantec, USA), Sung-Ju Lee (KAIST, Korea), Antonio Nucci (Cisco Systems, USA), Marco Mellia (Politecnico di Torino, Italy)

Towards a Science of Anomaly Detection System Evasion   
Muhammad Qasim Ali (University of North Carolina Charlotte & Symantec Corporation, USA), Ayesha B. Ashfaq (National University of Sciences & Technology, Pakistan), Ehab Al-Shaer (University of North Carolina Charlotte, USA), Qi Duan (UNCC, USA)
13:30 - 15:30:          Session 4B - Cross Layer Security 
Chair: Mukesh Singhal (University of California at Merced, United States)
Eavesdropping with Periscopes: Experimental Security Analysis of Highly Directional Millimeter Waves        
Daniel Steinmetzer (Technische Universität Darmstadt, Germany), Joe Chen (Rice University, USA), Jiska Classen (Technische Universität Darmstadt, Germany), Edward W. Knightly (Rice University, USA), Matthias Hollick (Technische Universität Darmstadt, Germany)
Emerging Attacks on VANET Security based on GPS Time Spoofing   
Sebastian Bittl (Fraunhofer ESK, Germany), Arturo A. Gonzalez (Fraunhofer ESK, Germany), Matthias Myrtus (Fraunhofer ESK, Germany), Hanno Beckmann (FAF University, Germany), Stefan Sailer (FAF University, Germany), Bernd Eissfeller (University FAF Munich, Germany)
Secure Partial Repair in Wireless Caching Networks with Broadcast Channels   
Majid Gerami (KTH (The Royal Institute of Technology), Sweden), Ming Xiao (Royal Institute of Technology, Sweden), Somayeh Salimi (KTH Royal Institute of Technology, Sweden), Mikael Skoglund (KTH Royal Institute of Technology, Sweden)
Hammer and Anvil: The Threat of a Cross-Layer Jamming-aided Data Control Attack in Multihop Wireless Networks           
Liyang Zhang (Northeastern University, USA), Tommaso Melodia (Northeastern University, USA)
Securing Wireless Medium Access Control Against Insider Denial-of-Service Attackers  
Sang-Yoon Chang (Advanced Digital Sciences Center (ADSC), Singapore), Yih-Chun Hu (University of Illinois at Urbana-Champaign, USA), Zhuotao Liu (University of Illinois at Urbana-Champaign, USA)

15:30 - 16:00:         Coffee Break
16:00 - 17:40:         Session 5 A - Internet Security II
Chair: Albert Levi (Sabanci University, Turkey)

Efficient Gossip Protocols for Verifying the Consistency of Certificate Logs           
Laurent Chuat (ETH Zurich, Switzerland), Pawel Szalachowski (ETH Zurich, Switzerland) , Adrian Perrig (ETH Zurich & Carnegie Mellon University, USA), Ben Laurie (Google Inc., United Kingdom), Eran Messeri (Google Inc., United Kingdom)
Inter-Flow Consistency: A Novel SDN Update Abstraction for Supporting Inter-Flow Constraints          
 Weijie Liu (University of Illinois at Urbana-champaign, USA), Rakesh B. Bobba (Oregon State University, USA), Sibin Mohan (University of Illinois at Urbana-Champaign, USA), Roy H Campbell (University of Illinois at Urbana-Champaign, USA)
mTor: A Multipath Tor Routing Beyond Bandwidth Throttling    
Lei Yang (The University of Kansas, USA), Fengjun Li (The University of Kansas, USA)
Uncovering the Mystery of Trust in An Online Social Network
Guangchi Liu (Montana State University, USA), Qing Yang (Montana State University, USA), Honggang Wang (University of Massachusetts, Dartmouth, USA), Shaoen Wu (Ball State University, USA), Mike P Wittie (Montana State University, USA)
16:00 - 17:40:         Session 5 B - Privacy in Mobile and Wireless Systems
Chair: Mauro Conti (University of Padua, Italy)
Your Actions Tell Where You Are: Uncovering Twitter Users in a Metropolitan Area 
Jinxue Zhang (Arizona State University, USA), Jingchao Sun (Arizona State University, USA), Rui Zhang (University of Hawaii, USA), Yanchao Zhang  (Arizona State University, USA)
I Know What You Did On Your Smartphone: Inferring App Usage Over Encrypted Data Traffic
Qinglong Wang (McGill University, Canada), Amir Yahyavi (Carnegie Mellon University, USA), Bettina Kemme (McGill University, Canada), Wenbo He (McGill University, Canada)
How Voice Call Technology Poses Security Threats in 4G LTE Networks
Guan-Hua Tu (University of California, Los Angeles, USA), Chi-Yu Li (UCLA, USA), Chunyi Peng (Ohio State University, USA), Songwu Lu (University of California at Los Angeles, USA)
Group Anonymous D2D Communication with End-to-End Security in LTE-A
Ruei-Hau Hsu (Singapore University of Technology and Design, Singapore), Jemin Lee (Singapore University of Technology and Design (SUTD), Singapore)