Security and Privacy in Communication Networks

9th International ICST Conference, SecureComm 2013, Sydney, NSW, Australia, September 25-28, 2013, Revised Selected Papers

  • Tanveer Zia
  • Albert Zomaya
  • Vijay Varadharajan
  • Morley Mao
Conference proceedings SecureComm 2013

DOI: 10.1007/978-3-319-04283-1

Part of the Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering book series (LNICST, volume 127)

Table of contents (26 papers)

  1. Front Matter
  2. Session I: Security & Privacy in Mobile, Sensor, and Ad Hoc Networks

    1. Anomaly Detection in Beacon-Enabled IEEE 802.15.4 Wireless Sensor Networks
      Eirini Karapistoli, Anastasios A. Economides
      Pages 1-18
    2. Secure and Verifiable Top-k Query in Two-Tiered Sensor Networks
      Ting Zhou, Yaping Lin, Wei Zhang, Sheng Xiao, Jinguo Li
      Pages 19-34
    3. CamTalk: A Bidirectional Light Communications Framework for Secure Communications on Smartphones
      Mengjun Xie, Liang Hao, Kenji Yoshigoe, Jiang Bian
      Pages 35-52
  3. Session II: Malware, Botnets, and Distributed Denial of Service

    1. Contrasting Permission Patterns between Clean and Malicious Android Applications
      Veelasha Moonsamy, Jia Rong, Shaowu Liu, Gang Li, Lynn Batten
      Pages 69-85
  4. Session III: Security for Emerging Technologies: VoIP, Peer-to-peer, and Cloud Computing

    1. VCCBox: Practical Confinement of Untrusted Software in Virtual Cloud Computing
      Jun Jiang, Meining Nie, Purui Su, Dengguo Feng
      Pages 122-139
    2. Integrated Security Architecture for Virtual Machines
      Vijay Varadharajan, Udaya Tupakula
      Pages 140-153
  5. Session IV: Encryption and Key Management

    1. Generic Mediated Encryption
      Ibrahim Elashry, Yi Mu, Willy Susilo
      Pages 154-168
    2. An Efficient Reconfigurable II-ONB Modular Multiplier
      Li Miao, He Liangsheng, Yang Tongjie, Gao Neng, Liu Zongbin, Zhang Qinglong
      Pages 169-181
    3. Public-Key Encryption Resilient to Linear Related-Key Attacks
      Hui Cui, Yi Mu, Man Ho Au
      Pages 182-196
  6. Session V: Security in Software and Machine Learning

    1. Clonewise – Detecting Package-Level Clones Using Machine Learning
      Silvio Cesare, Yang Xiang, Jun Zhang
      Pages 197-215
    2. Automatic Polymorphic Exploit Generation for Software Vulnerabilities
      Minghua Wang, Purui Su, Qi Li, Lingyun Ying, Yi Yang, Dengguo Feng
      Pages 216-233
  7. Session VI: Network and System Security Model

    1. A Novel Web Tunnel Detection Method Based on Protocol Behaviors
      Fei Wang, Liusheng Huang, Zhili Chen, Haibo Miao, Wei Yang
      Pages 234-251
    2. Salus: Non-hierarchical Memory Access Rights to Enforce the Principle of Least Privilege
      Niels Avonds, Raoul Strackx, Pieter Agten, Frank Piessens
      Pages 252-269
  8. Session VII: Security and Privacy in Pervasive and Ubiquitous Computing

    1. The B-Side of Side Channel Leakage: Control Flow Security in Embedded Systems
      Mehari Msgna, Konstantinos Markantonakis, Keith Mayes
      Pages 288-304
    2. An e-payment Architecture Ensuring a High Level of Privacy Protection
      Aude Plateaux, Patrick Lacharme, Vincent Coquet, Sylvain Vernois, Kumar Murty, Christophe Rosenberger
      Pages 305-322

About these proceedings

Introduction

This book constitutes the thoroughly refereed post-conference proceedings of the 9th International ICST Conference on Security and Privacy in Communication Networks, held in Sydney, Australia, in September 2013. The 26 revised full papers presented were carefully reviewed and selected from 70 submissions. The papers are grouped in topical sections on: security and privacy in mobile, sensor, and ad hoc networks; malware, botnets, and distributed denial of service; security for emerging technologies: VoIP, peer-to-peer, and cloud computing; encryption and key management; security in software and machine learning; network and system security model; security and privacy in pervasive and ubiquitous computing.

Keywords

Android API attacks intrusion detection mobile devices privacy

Editors and affiliations

  • Tanveer Zia
    • 1
  • Albert Zomaya
    • 2
  • Vijay Varadharajan
    • 3
  • Morley Mao
    • 4
  1. 1.School of Computing and MathematicsCharles Sturt UniversityWagga WaggaAustralia
  2. 2.School of Information TechnologiesUniversity of SydneyDarlingtonAustralia
  3. 3.Department of ComputingMacquarie University, AustraliaAustralia
  4. 4.Department of EECSUniversity of MichiganAnn ArborUSA

Bibliographic information

  • Copyright Information Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2013
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science
  • Print ISBN 978-3-319-04282-4
  • Online ISBN 978-3-319-04283-1
  • Series Print ISSN 1867-8211
  • Series Online ISSN 1867-822X