Skip to main content
  • Conference proceedings
  • © 2015

International Conference on Security and Privacy in Communication Networks

10th International ICST Conference, SecureComm 2014, Beijing, China, September 24-26, 2014, Revised Selected Papers, Part II

Conference proceedings info: SecureComm 2014.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (32 papers)

  1. International Workshop on Applications and Technologies in Cyber Security (ATCS)

    1. A Survey on Mining Program-Graph Features for Malware Analysis

      • Md. Saiful Islam, Md. Rafiqul Islam, A. S. M. Kayes, Chengfei Liu, Irfan Altas
      Pages 220-236
    2. Defence Against Code Injection Attacks

      • Hussein Alnabulsi, Quazi Mamun, Rafiqul Islam, Morshed U. Chowdhury
      Pages 237-251
    3. False Data Injection Attack Targeting the LTC Transformers to Disrupt Smart Grid Operation

      • Adnan Anwar, Abdun Naser Mahmood, Mohiuddin Ahmed
      Pages 252-266
    4. A Domain-Based Multi-cluster SIP Solution for Mobile Ad Hoc Network

      • Ala‘ Aburumman, Kim-Kwang Raymond Choo
      Pages 267-281
  2. DAPRO 2014 and SSS 2014 International Workshop on Data Protection in Mobile and Pervasive Computing (DAPRO) International Workshop on Secure Smart Systems (SSS)

    1. Front Matter

      Pages 283-283
    2. virtio-ct: A Secure Cryptographic Token Service in Hypervisors

      • Le Guan, Fengjun Li, Jiwu Jing, Jing Wang, Ziqiang Ma
      Pages 285-300
    3. Blind Format String Attacks

      • Fatih Kilic, Thomas Kittel, Claudia Eckert
      Pages 301-314
    4. An Empirical Evaluation of Software Obfuscation Techniques Applied to Android APKs

      • Felix C. Freiling, Mykola Protsenko, Yan Zhuang
      Pages 315-328
    5. Towards Privacy-Preserving Web Metering via User-Centric Hardware

      • Fahad Alarifi, Maribel Fernández
      Pages 329-340
    6. Towards Efficient Update of Access Control Policy for Cryptographic Cloud Storage

      • Weiyu Jiang, Zhan Wang, Limin Liu, Neng Gao
      Pages 341-356
  3. International Workshop on System Level Security of Smartphones

    1. Front Matter

      Pages 357-357
    2. Uncovering the Dilemmas on Antivirus Software Design in Modern Mobile Platforms

      • Heqing Huang, Kai Chen, Peng Liu, Sencun Zhu, Dinghao Wu
      Pages 359-366
    3. Transplantation Attack: Analysis and Prediction

      • Zhongwen Zhang, Ji Xiang, Lei Wang, Lingguang Lei
      Pages 367-374
    4. Timing-Based Clone Detection on Android Markets

      • Yingjun Zhang, Kezhen Huang, Yuling Liu, Kai Chen, Liang Huang, Yifeng Lian
      Pages 375-381
    5. A New Trust Chain Security Evaluation Model and Tool

      • Wei Hu, Dongyao Ji, Ting Wang, Gang Yao
      Pages 382-391
  4. Back Matter

    Pages 407-409

Other Volumes

  1. International Conference on Security and Privacy in Communication Networks

About this book

This 2-volume set constitutes the thoroughly refereed post-conference proceedings of the 10th International Conference on Security and Privacy in Communication Networks, SecureComm 2014, held in Beijing, China, in September 2014. The 27 regular and 17 short papers presented were carefully reviewed. It also presents 22 papers accepted for four workshops (ATCS, SSS, SLSS, DAPRO) in conjunction with the conference, 6 doctoral symposium papers and 8 poster papers. The papers are grouped in the following topics: security and privacy in wired, wireless, mobile, hybrid, sensor, ad hoc networks; network intrusion detection and prevention, firewalls, packet filters; malware, and distributed denial of service; communication privacy and anonymity; network and internet forensics techniques; public key infrastructures, key management, credential management; secure routing, naming/addressing, network management; security and privacy in pervasive and ubiquitous computing; security & privacy for emerging technologies: VoIP, peer-to-peer and overlay network systems; security & isolation in data center networks; security & isolation in software defined networking.

Editors and Affiliations

  • CAS, Institute of Information Engineering, Beijing, China

    Jin Tian

  • Institute of Information Engineering, Beijing, China

    Jiwu Jing

  • IBM Thomas J. Watson Research Center, New York, USA

    Mudhakar Srivatsa

Bibliographic Information

  • Book Title: International Conference on Security and Privacy in Communication Networks

  • Book Subtitle: 10th International ICST Conference, SecureComm 2014, Beijing, China, September 24-26, 2014, Revised Selected Papers, Part II

  • Editors: Jin Tian, Jiwu Jing, Mudhakar Srivatsa

  • Series Title: Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

  • DOI: https://doi.org/10.1007/978-3-319-23802-9

  • Publisher: Springer Cham

  • eBook Packages: Computer Science, Computer Science (R0)

  • Copyright Information: Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2015

  • Softcover ISBN: 978-3-319-23801-2Published: 02 December 2015

  • eBook ISBN: 978-3-319-23802-9Published: 01 December 2015

  • Series ISSN: 1867-8211

  • Series E-ISSN: 1867-822X

  • Edition Number: 1

  • Number of Pages: XIX, 409

  • Number of Illustrations: 126 b/w illustrations

  • Topics: Systems and Data Security

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access