Security and Privacy in Communication Networks

11th EAI International Conference, SecureComm 2015, Dallas, TX, USA, October 26-29, 2015, Proceedings

  • Bhavani Thuraisingham
  • XiaoFeng Wang
  • Vinod Yegneswaran
Conference proceedings

DOI: 10.1007/978-3-319-28865-9

Part of the Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering book series (LNICST, volume 164)

Table of contents (48 papers)

  1. Front Matter
    Pages I-XIII
  2. Mobile, System and Software Security

    1. Front Matter
      Pages 1-1
    2. FineDroid: Enforcing Permissions with System-Wide Application Execution Context
      Yuan Zhang, Min Yang, Guofei Gu, Hao Chen
      Pages 3-22
    3. Detection, Classification and Characterization of Android Malware Using API Data Dependency
      Yongfeng Li, Tong Shen, Xin Sun, Xuerui Pan, Bing Mao
      Pages 23-40
    4. Using Provenance Patterns to Vet Sensitive Behaviors in Android Apps
      Chao Yang, Guangliang Yang, Ashish Gehani, Vinod Yegneswaran, Dawood Tariq, Guofei Gu
      Pages 58-77
    5. Intrinsic Code Attestation by Instruction Chaining for Embedded Devices
      Oliver Stecklina, Peter Langendörfer, Frank Vater, Thorsten Kranz, Gregor Leander
      Pages 97-115
    6. Defeating Kernel Driver Purifier
      Jidong Xiao, Hai Huang, Haining Wang
      Pages 116-134
    7. Kernel Data Attack Is a Realistic Security Threat
      Jidong Xiao, Hai Huang, Haining Wang
      Pages 135-154
  3. Cloud Security

    1. Front Matter
      Pages 155-155
    2. RScam: Cloud-Based Anti-Malware via Reversible Sketch
      Hao Sun, Xiaofeng Wang, Jinshu Su, Peixin Chen
      Pages 157-174
    3. TADOOP: Mining Network Traffic Anomalies with Hadoop
      Geng Tian, Zhiliang Wang, Xia Yin, Zimu Li, Xingang Shi, Ziyi Lu et al.
      Pages 175-192
    4. SuperCall: A Secure Interface for Isolated Execution Environment to Dynamically Use External Services
      Yueqiang Cheng, Qing Li, Miao Yu, Xuhua Ding, Qingni Shen
      Pages 193-211
    5. Authenticating Top-k Results of Secure Multi-keyword Search in Cloud Computing
      Xiaojun Xiao, Yaping Lin, Wei Zhang, Xin Yao, Qi Gu
      Pages 212-229
  4. Privacy and Side Channels

    1. Front Matter
      Pages 231-231
    2. Resource Efficient Privacy Preservation of Online Social Media Conversations
      Indrajeet Singh, Masoud Akhoondi, Mustafa Y. Arslan, Harsha V. Madhyastha, Srikanth V. Krishnamurthy
      Pages 233-255
    3. Uranine: Real-time Privacy Leakage Monitoring without System Modification for Android
      Vaibhav Rastogi, Zhengyang Qu, Jedidiah McClurg, Yinzhi Cao, Yan Chen
      Pages 256-276
    4. Remote Activation of Hardware Trojans via a Covert Temperature Channel
      Priyabrat Dash, Chris Perkins, Ryan M. Gerdes
      Pages 294-310

About these proceedings


This volume constitutes the thoroughly refereed post-conference proceedings of the 11th International Conference on Security and Privacy in Communication Networks, SecureComm 2015, held in Dallas, TX, USA, in October 2015.

The 29 regular and 10 poster papers presented were carefully reviewed and selected from 107 submissions. It also presents 9 papers accepted of the workshop on Applications and Techniques in Cyber Security, ATCS 2015.

The papers are grouped in the following topics: mobile, system, and software security; cloud security; privacy and side channels; Web and network security; crypto, protocol, and model.


Android anomaly detection attacks authentication cloud computing cryptography cyber security encryption identity management intrusion detection mobile devices mobile security network security privacy security security of data side channels smartphones software security

Editors and affiliations

  • Bhavani Thuraisingham
    • 1
  • XiaoFeng Wang
    • 2
  • Vinod Yegneswaran
    • 3
  1. 1.The University of Texas at DallasRichardsonUSA
  2. 2.Indiana University at BloomingtonBloomingtonUSA
  3. 3.SRI InternationalMenlo ParkUSA

Bibliographic information

  • Copyright Information Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2015
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science
  • Print ISBN 978-3-319-28864-2
  • Online ISBN 978-3-319-28865-9
  • Series Print ISSN 1867-8211
  • Series Online ISSN 1867-822X