June 3

8:30-17:30

Workshops

18:30-20:30

Welcome party

June 4

8:30-8:45

Welcome speech

8:45-9:45

Keynote

Poster and Coffee break

10:10-12:15

Session 1: Network

Lunch

13:30-15:10

Session 2: Reputation and Location

Poster and Coffee break

15:30-17:35

Session 3: Processing encrypted data

June 5

8:30-9:45

Session 4: Applications 1

Poster and Coffee break

10:10-12:15

Session 5: Crypto

Lunch

13:30-15:10

Session 6: Access control and Flow analysis

Poster and Coffee break

15:30-17:10

Session 7: Software and Systems security

18:30-21:00

Banquet

June 6

8:30-9:45

Session 8: Applications 2

Coffee break

10:10-12:15

Session 9: Authentication

Lunch

13:30-15:10

Session 10: Android

Coffee break

15:30-16:30

Session 11: Short 1 Network

16:30-17:30

Session 12: Short 2 Software

17:30-17:35

Closing



June 4

8:30-8:45

Welcome speech

Shiho Moriai (GC)
Trent Jaeger (PC Co-Chair)

8:45-9:45

Keynote
Chair: Trent Jaeger (Penn State University)

Prof. Christopher Kruegel (University of California, Santa Barbara)
Title: Fighting Malicious Code - An Eternal Struggle
Biography: http://www.cs.ucsb.edu/~chris/

10:10-12:15

Session 1: Network
Chair: Ninghui Li (Purdue University)


1. Fabian Lanze, Andriy Panchenko, Benjamin Braatz, Thomas Engel.
Letting the Puss in Boots Sweat: Detecting Fake Access Points using Dependency of Clock Skews on Temperature

2. Moreno Ambrosin, Mauro Conti, Paolo Gasti, Gene Tsudik.
Covert Ephemeral Communication in Named Data Networking

3. Guowu Xie, Huy Hang, Michalis Faloutsos.
Scanner Hunter:Understanding HTTP Scanning Traffic

4. Hao Zhang, Danfeng Yao, Naren Ramakrishnan.
Detection of Stealthy Malware Activities with Traffic Causality and Scalable Triggering Relation Discovery

5. Georges Bossert, Frédéric Guihéry, Guillaume Hiet.
Towards Automated Protocol Reverse Engineering Using Semantic Information

13:30-15:10

Session 2: Reputation and Location
Chair: Chen-Mou Cheng (Kyushu University)


1. Anupam Das, Nikita Borisov, Prateek Mittal, Matthew Caesar.
Re^3: Relay Reliability Reputation for Anonymity Systems

2. Mahdi Nasrullah Al-Ameen, Matthew Wright.
Persea: A Sybil-Resistant Social DHT

3. Rasib Khan, Shams Zawoad, Md Haque, Ragib Hasan.
OTIT: Towards Secure Provenance Modeling for Location Proofs

4. Jaroslav
Šedĕnka, Paolo Gasti.
Privacy-Preserving Distance Computation and Proximity Testing on Earth, Done Right

15:30-17:35

Session 3: Processing encrypted data
Chair: Sherman S.M. Chow (Chinese University of Hong Kong)


1. Boyang Wang, Yantian Hou, Ming Li, Haitao Wang, Hui Li.
Maple: Scalable Multi-Dimensional Range Search over Encrypted Cloud Data with Tree-based Index

2. Dongxi Liu, Elisa Bertino, Xun Yi.
Privacy of Outsourced k-Means Clustering

3. Muhammad Rizwan Asghar, Ashish Gehani, Bruno Crispo, Giovanni Russello.
PIDGIN: Privacy Preserving Interest and Content Sharing in Opportunistic Networks

4. Jinsheng Zhang, Wensheng Zhang, Daji Qiao.
S-ORAM: A Segmentation-based Oblivious RAM

5. Chengfang Fang, Ee-Chien Chang.
Differential Privacy with delta-Neighbourhood for Spatial and Dynamic Datasets


June 5

8:30-9:45

Session 4: Applications 1
Chair: Yingjiu Li (Singapore Management University)


1. Davide Canali, Davide Balzarotti, Leyla Bilge.
On The Effectiveness of Risk Prediction Based on Users Browsing Behavior

2. Ben Stock, Martin Johns.
Protecting Users Against XSS-based Password Manager Abuse

3. Manar Mohamed, Niharika Sachdeva, Michael Georgescu, Song Gao, Nitesh Saxena, Chengcui Zhang, Ponnurangam Kumaraguru, Paul C. Van Oorschot, Wei-Bang Chen.
A Three-Way Investigation of a Game-CAPTCHA: Automated Attacks, Relay Attacks and Usability

10:10-12:15

Session 5: Crypto
Chair: Robert Deng (Singapore Management University)


1. Janaka Alawatugoda, Douglas Stebila, Colin Boyd.
Modelling After-the-fact Leakage for Key Exchange

2. Rong Jin, Xianru Du, Zi Deng, Kai Zeng, Jing Xu.
Practical Secret Key Agreement for Full-Duplex Near Field Communications

3. Alexandre Pinto, Bertram Poettering, Jacob Schuldt.
Multi-recipient Encryption, Revisited

4. Junzuo Lai, Robert Deng, Yingjiu Li, Jian Weng.
Fully Secure Key-Policy Attribute-Based Encryption with Constant-Size Ciphertexts and Fast Decryption

5. Qingji Zheng, Wei Zhu, Jiafeng Zhu, Xinwen Zhang.
Improved Anonymous Proxy Re-encryption with CCA Security

13:30-15:10

Session 6: Access Control and Flow Analysis
Chair: Rui Wang (Microsoft Research)


1. Mu Zhang, Heng Yin.
Efficient; Context-Aware Privacy Leakage Confinement for Android Applications without Firmware Modding

2. Tobias Wuchner, Martin Ochoa, Alexander Pretschner.
Malware Detection with Quantitative Data Flow Graphs

3. Quoc-Sang Phan, Pasquale Malacaria.
Abstract Model Counting: A Novel Approach for Quantification of Information Leaks

4. Markus Miettinen, Stephan Heuser, Wiebke Kronz, Ahmad-Reza Sadeghi,  N.Asokan.
ConXsense - Automated Context Classification for Context-Aware Access Control

15:30-17:10

Session 7: Software and Systems security
Chair: Yoshiaki Hori (Saga University)


1. Gábor Pék, Andrea Lanzi, Abhinav Srivastava, Davide Balzarotti, Aurélien Francillon, Christoph Neumann.
On the Feasibility of Software Attacks on Commodity Virtual Machine Monitors via Direct Device Assignment

2. Su Zhang, Xinwen Zhang, Xinming Ou.
After We Knew It: Empirical Study and Modeling of Cost-effectiveness of Exploiting Prevalent Known Vulnerabilities Across IaaS Cloud

3. Markus Kammerstetter, Christian Platzer, Wolfgang Kastner.
PROSPECT - Peripheral Proxying Supported Embedded Code Testing

4. Adonis P.H. Fung, Tielei Wang, K.W. Cheung, T.Y. Wong.
Scanning of Real-world Web Applications for Parameter Tampering Vulnerabilities


June 6

8:30-9:45

Session 8: Applications 2
Chair: Daphne Yao (Virginia Tech)


1. Gianluca Stringhini, Oliver Hohlfeld, Christopher Kruegel, Giovanni Vigna.
The Harvester, the Botmaster, and the Spammer: On the Relations Between the Different Actors in the Spam Landscape

2. Bisheng Liu, Urs Hengartner.
pTwitterRec: A Privacy-Preserving Personalized Tweet Recommendation Framework

3. Jelena Isacenkova, Davide Balzarotti.
Shades of Grey: A Closer Look at Emails in the Gray Area

10:10-12:15

Session 9: Authentication
Chair: Kui Ren (State University of New York)


1. Hongbo Liu, Yan Wang, Jian Liu, Jie Yang, Yingying Chen.
Practical User Authentication Leveraging Channel State Information (CSI)

2. Chun Hu, Yousef Elmehdwi, Feng Li, Prabir Bhattacharya, Wei Jiang.
Outsourceable Two-Party Privacy-Preserving Biometric Authentication

3. Yan Li, Ke Xu, Qiang Yan, Yingjiu Li, Robert H. Deng.
Understanding OSN-Based Facial Disclosure against Face Authentication Systems

4. Hua Deng, Qianhong Wu, Bo Qin, Sherman S. M. Chow, Josep Domingo-Ferrer, Wenchang Shi.
Tracing and Revoking Leaked Credentials: Accountability in Leaking Sensitive Outsourced Data

5. Sebastian A. Mödersheim, Luca Viganò.
Sufficient Conditions for Vertical Composition of Security Protocols

13:30-15:10

Session 10: Android
Chair: Toshihiro Yamauchi (Okayama University)


1. Timothy Vidas, Nicolas Christin.
Evading Android Runtime Analysis via Sandbox Detection

2. Collin Mulliner, William Robertson, Engin Kirda.
VirtualSwindle: An Automated Attack Against In-App Billing on Android

3. Min Zheng, Mingshen Sun, John C.S. Lui.
DroidRay: A Security Evaluation System for Customized Android Firmwares

4. Wenbo Yang, Juanru Li, Yuanyuan Zhang, Yong Li, Junliang Shu, Dawu Gu.
APKLancet: Tumor Payload Diagnosis and Purification for Android Applications

15:30-16:30

Session 11: Short 1 Network
Chair: Yuji Suga (Internet Initiative Japan Inc.)


1. Benjamin Johnson, Aron Laszka, Jens Grossklags.
How Many Down? Toward Understanding Systematic Risk in Networks

2. Sebastien Gambs, Cristina Onete, Jean-Marc Robert.
Prover Anonymous and Deniable Distance-Bounding Authentication

3. Sascha Fahl, Yasemin Acar, Henning Perl, Matthew Smith.
Why Eve and Mallory (Also) Love Webmasters - A Study on the Root Causes of SSL Misconfigurations

4. Tiffany Hyun-Jin Kim, Colleen Stuart, Hsu-Chun Hsiao, Yue-Hsun Lin, Leon Zheng, Laura Dabbish, Sara Kiesler.
YourPassword: Applying Feedback Loops to Improve Security Behavior of Managing Multiple Passwords

16:30-17:30

Session 12: Short 2 Software
Chair: Yuji Suga (Internet Initiative Japan Inc.)


1. Jakub Szefer, Pramod Jamkhedkar, Diego Perez-Botero, Ruby Lee.
Cyber Defenses for Physical Attacks and Insider Threats in Cloud Computing

2. Steven Van Acker, Nick Nikiforakis, Lieven Desmet, Frank Piessens, Wouter Joosen.
Monkey-in-the-browser: Malware and Vulnerabilities in Augmented Browsing Script Markets

3. Kun Yang, Lujue Zhou, Yongke Wang, Jianwei Zhuge, Haixin Duan.
IntentFuzzer: Detecting Capability Leaks of Android Applications

4. Xingjie Yu, Zhan Wang, Kun Sun, Wen Tao Zhu, Neng Gao, Jiwu Jing.
Remotely Wiping Sensitive Data on Stolen Smartphones

17:30-17:35

Closing

Kouichi Sakurai (PC Co-Chair)


Poster

* Junhan Park, Keisuke Iwai, Hidema Tanaka and Takakazu Kurokawa
Analysis of Slow Read DoS attack

* Enkhbold Chimedtseren, Keisuke Iwai, Hidema Tanaka and Takakazu Kurokawa
A study of IDS using Discrete Fourier Transform

* Yang Li and Kazuo Sakiyama
Toward Practical Solution to Unsuccessful Write Operation on Non-Volatile Memory of Passive RFID Tags

* Dennis Kengo Oka, Camille Vuillaume, and Takahiro Furue
Vehicle ECU Hacking

* Rong Hu, Kirill Morozov, Rui Zhang, and Tsuyoshi Takagi
Confirmer Signatures from McEliece Assumptions

* Atsushi Takayasu and Noboru Kunihiro
Partial Key Exposure Attacks on RSA When Most Significant Bits of d Known

* Kuniyasu Suzaki, Toshiki Yagi, Kazukuni Kobara, Nobuko Inoue, and Tomoyuki Kawade
Virtual Jail Storage System which prevents information leakage from client and server

* Nuttapong Attrapadung, Keita Emura, Goichiro Hanaoka, and Yusuke Sakai
Revocable Group Signature with Constant-size Revocation List

* Kazuma Ohara, Keita Emura, Goichiro Hanaoka, Ai Ishida, Kazuo Ohta, and Yusuke Sakai
A Scalable Group Signature Scheme with Revocation in the Random Oracle Model

* CHAN Sambathratanak and Nakamura Yasuhiro
Exploring Cross-Site Scripting Attacks and Possible Defense Methods

* Yoichi Goto, HeeJeong Lee, and Yasuhiro Nakamura
A Study of stepping stone detection method on observations of darknet

* Yuji Suga
SSL/TLS servers status survey about enabling forward secrecy (+ rapid survey after the Heartbleed Bug)

* Takuya Watanabe and Tatsuya Mori
Understanding consistency between words and actions for Android apps

* Hee jeong Lee, Yoichi Goto, and Yasuhiro Nakamura
NAT client detection using the key features of the packet header

* Masaya Sato and Toshihiro Yamauchi
Mitigating Attacks Based on Process Identification by Disguising Process Information

* Yoshiaki Hori, Yaokai Feng, Akira Nagata, Kohei Kotera, and Katsuichi Nakamura
Traffic Anomaly Detection supporting M2M devices

* Sanami Nakagawa, Keita Emura, Goichiro Hanaoka, Akihisa Kodate, Takashi Nishide, Eiji Okamoto, and Yusuke Sakai
Performance Evaluation of a Privacy-Enhanced Access Log Management Mechanism

# Underlined authors are presenters.



Social Events

June 3

08:30-17:30

Workshops

Lunch Box (Sandwich) will be served. Please have a lunch in the rooms of
the each Workshop. If you have informed us about dietary restrictions and food
allergies in your registration, please pick up a special lunch box at the reception desk in the lobby.

18:30-20:30

Welcome party

Small food snacks; canapes and hors d'oeuvre are served.
Please enjoy it after the registration.
Room: AOI

June 5

18:30-21:00

Banquet

Japanese traditional attraction is scheduled. We hope you will have a nice time.
* A name tag for extra banquet will be handed for an accompanying person at registration.
Room: AOI

June 4- 6

 

Lunch

Lunch box will be served in the room for Lunch, i.e. KURAMA and GION, on each day. It will be separately served for a person who has informed us about his/her dietary restrictions and food allergies in the registration.
Please pick it up at the reception desk in the lobby.

ASIACCS2014 Conference Secretariat 

Copyright(C) ASIACCS 2014 All Right Reserved