Posters

A Fuzzing Test for Dynamic Vulnerability Detection on Android Binder Mechanism
Wang Kai, Zhang Yuqing, Liu Qixu and Dan Fan (University of Chinese Academy of Sciences, P.R. China)

A Novel Covert Timing Channel Detection Approach for Online Network Traffic
Fahimeh Rezaei (University of Nebraska Lincoln, USA); Michael Hempel, Pradhumna L Shrestha, Sushanta Mohan Rakshit and Hamid Sharif (University of Nebraska-Lincoln, USA)

A Predictive Zero-day Network Defense using Long-term Port-scan Recording
Chia-Nan Kao, Yung-Cheng Chang, Nen-Fu Huang, Salim SI and I-Ju Liao (National Tsing Hua University, Taiwan); Rong-Tai Liu and Hsien-Wei Hung (Trend Micro Incorporated, Taiwan)

A privacy-preserving recommender system for mobile commerce
Felix J. Garcia Clemente (University of Murcia, Spain)

An Industrial Control Systems Incident Response Decision Framework
Ying He, Leandros A. Maglaras and Helge Janicke (De Montfort University, United Kingdom); Kevin Jones (Airbus Group Innovations, United Kingdom)

An SELinux-based Intent manager for Android
Simone Mutti, Enrico Bacis and Stefano Paraboschi (University of Bergamo, Italy)

Android malware detection from Google Play meta-data: Selection of important features
Alfonso Muñoz (Eleven Paths, Telefonica, Spain); Ignacio Martín (Universidad Carlos III de Madrid, Spain); Antonio Guzmán (Eleven Paths, Telefonica, Spain); José Alberto Hernández (Universidad Carlos III de Madrid, Spain)

Compiling NATO Authorization Policies for Enforcement in the Cloud and SDNs
Alessandro Armando (University of Genoa, Italy); Riccardo Traverso and Silvio Ranise (Fondazione Bruno Kessler, Italy); Konrad Wrona (NATO Communications and Information Agency, The Netherlands)

CryptID - Distributed Identity Management Infrastructure
Jan-Ole Malchow and Volker Roth (Freie Universität Berlin, Germany)

CryptoCloak Protocol and the Prototype Application
Dijana Vukovic (Faculty of Electrical Engineering, University of Banja Luka, Bosnia and Herzegovina); Danilo Gligoroski (Norwegian University of Science and Technology, Norway); Zoran Djuric (Faculty of Electrical Engineering, University of Banja Luka, Bosnia and Herzegovina)

curlX: a MiddleWare to Enforce Access Control Policies within a Cloud Environment
Meryeme Ayache (University Mohammed 5 & ENSIAS, Morocco); Mohammed Erradi (ENSIAS: Ecole Nationale Supérieure d'Informatique et d'Analyse des Systèmes, Morocco); Bernd Freisleben (Philipps-Universität Marburg, Germany)

Did you really hack a nuclear power plant? An industrial control mobile honeypot
Emmanouil Vasilomanolakis (Technische Universität Darmstadt, Germany); Shreyas Srinivasa (Technische Universitat Darmstadt, Germany); Max Muehlhaeuser (Technical University Darmstadt, Germany)

DockerPolicyModules: Mandatory Access Control for Docker Containers
Enrico Bacis, Simone Mutti, Steven Capelli and Stefano Paraboschi (University of Bergamo, Italy)

DroidChain: A Novel Malware Detection Method for Android based on Behavior Chain
Wang Zhaoguo (Student of Harbin Institute of Technology; Tsinghua National Lab for Information Science and Technology, P.R. China); Li Chenglong (National Computer Network Emergency Response Technical Team Center of China, P.R. China); Guan Yi (Harbin Institute of Technology, P.R. China); Yibo Xue (Tsinghua university, P.R. China)

End-2-End Privacy Architecture for IoT
Sebastian Funke (AGT International, Germany); Jörg Daubert (Technische Universitaet Darmstadt, Germany); Alexander Wiesmaier and Panayotis Kikiras (AGT International, Germany); Max Muehlhaeuser (Technical University Darmstadt, Germany)

Energy Efficiency Performance of Cooperative Schemes in Cognitive Radio Networks with Secrecy
Frederic Gabry (Huawei Technologies, France Research Center, Sweden); Pin-Hsun Lin and Eduard Jorswieck (TU Dresden, Germany)

Enhancing Traffic Analysis Resistance for Tor Hidden Services with Multipath Routing
Lei Yang and Fengjun Li (The University of Kansas, USA)

Feature Extraction and Classification Phishing Websites Based on URL
Mustafa Aydin (Middle East Technical University & Banking Regulation and Supervision Agency of Turkey, Turkey); Nazife Baykal (Middle East Technical University, Turkey)

Filtering IP Source Spoofing using Feasible Path Reverse Path Forwarding with SDN
Kevin T Benton, Linda Camp, Timothy Kelley and Martin Swany (Indiana University, USA)

Generation and Assessment of correlation rules to Detect Complex Attack Scenarios
Erwan Godefroy (Supélec, France); Eric Totel (Suplec, France); Michel Hurfin (Inria, France); Frederic Majorczyk (DGA-MI, France)

GFlux: A Google-Based System for Fast Flux Detection
Basheer N. Al-Duwairi and Ahmad T. Al-Hammouri (Jordan University of Science and Technology, Jordan); Monther Aldwairi (Zayed University & Jordan University of Science and Technology, UAE); Vern Paxson (ICSI, USA)

Hide And Seek: Detecting Sensors in P2P Botnets
Leon Böck (Technische Universitaet Darmstadt, Germany); Shankar Karuppayah (Technische Universität Darmstadt & Center for Advanced Security Research Darmstadt & NAv6, Universiti Sains Malaysia, Germany); Tim Grube (Technische Universitaet Darmstadt, Germany); Max Muehlhaeuser (Technical University Darmstadt, Germany); Mathias Fischer (International Computer Science Institute, USA)

ID2T: a DIY dataset creation toolkit for Intrusion Detection Systems
Carlos Garcia Cordero and Emmanouil Vasilomanolakis (Technische Universität Darmstadt, Germany); Nikolay Milanov (Technische Universitat Darmstadt, Germany); Christian Koch and David Hausheer (TU Darmstadt, Germany); Max Muehlhaeuser (Technical University Darmstadt, Germany)

Improved SDN Responsiveness to UDP Flood Attacks
Laura Mutu, Rania Saleh and Ashraf Matrawy (Carleton University, Canada)

Licensed Processing of Encrypted Information
Stefan Rass (Alpen-Adria Universitaet Klagenfurt, Austria); Peter Schartner (Klagenfurt University, Austria)

Lightweight Context-Aware Security System for Wireless Internet Access
Gökcan Çantalı (Bogazici University, Turkey); Orhan Ermiş (Boğaziçi University, Turkey); Gurkan Gur, Fatih Alagoz and M. Ufuk Caglayan (Bogazici University, Turkey)

New Direction For Open NFC Trusted Mobile Applications: The MOBISIM Project
Pascal Urien (Télécom ParisTech, France)

On the Effects of Large-Scale DNS Poisoning
Antonio Barili and Dario Lanterna (University of Pavia, Italy)

On the Use of Fuzzy Logic in Dependable Cloud Management
Sara Foresti, Vincenzo Piuri and Gerson A. Soares (Università degli Studi di Milano, Italy)

Option pricing in a privacy-aware market
Maurizio Naldi and Giuseppe D'Acquisto (University of Rome "Tor Vergata", Italy)

Probe-response attacks on collaborative intrusion detection systems: effectiveness and countermeasures
Emmanouil Vasilomanolakis (Technische Universität Darmstadt, Germany); Michael Stahn (Technische Universitat Darmstadt, Germany); Carlos Garcia Cordero (Technische Universität Darmstadt, Germany); Max Muehlhaeuser (Technical University Darmstadt, Germany)

Secret-Key Agreement over Spatially Correlated Multiple-Antenna Channels in the Low-SNR Regime
Marwen Zorgui (King Abdullah University of Science and Technology, Saudi Arabia); Zouheir Rezki (King Abdullah University of Science and Technologie (KAUST), Saudi Arabia); Basel Alomair (King Abdulaziz City for Science and Technology & University of Washington, Saudi Arabia); Eduard Jorswieck (TU Dresden, Germany); Mohamed-Slim Alouini (King Abdullah University of Science and Technology (KAUST), Saudi Arabia)

Security-Enhanced Network Coding Through Public-Key Cryptography
Vahid Forutan and Robert F.H. Fischer (Ulm University, Germany)

SmartArgos: Improving Mobile Surveillance Systems with Software Defined Networks
Waqas A Latif and Chiu C. Tan (Temple University, USA)

Space-Time Tradeoff in the Aho-Corasick String Matching Algorithm
Yisi Xu and Derek Pao (City University of Hong Kong, Hong Kong)

Timely Login Status Control Using Mobile App
SeokHwan Choi (Pusan National University, Korea); Da-Hyeon Kim (Kyonggi University, Korea); Yoon-Ho Choi (Pusan National University, Korea)

Towards a Scalable, Private, and Searchable Key-value Store
Xingliang Yuan, Xinyu Wang, Yilei Chu and Cong Wang (City University of Hong Kong, Hong Kong); Chen Qian (University of Kentucky, USA)

Towards an SDN-Enabled IDS Environment
Sebastian Seeber, Lars Stiemert and Gabi Dreo Rodosek (Universität der Bundeswehr München, Germany)

URFDS: Systematic Discovery of Unvalidated Redirects and Forwards in Web Applications
Jing Wang (Nanyang Technological University, Singapore); Hongjun Wu (NTU, Singapore)

Web Bots that Mimic Human Browsing Behavior on Previously Unvisited Web-Sites
Natalija Vlajic (York University, Canada)