default search action
13th SecureComm 2017: Niagara Falls, ON, Canada
- Xiaodong Lin, Ali A. Ghorbani, Kui Ren, Sencun Zhu, Aiqing Zhang:
Security and Privacy in Communication Networks - 13th International Conference, SecureComm 2017, Niagara Falls, ON, Canada, October 22-25, 2017, Proceedings. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 238, Springer 2018, ISBN 978-3-319-78812-8
SecureComm Regular Papers
- Hong Liu, Eugene Y. Vasserman:
Gray-Box Software Integrity Checking via Side-Channels. 3-23 - Drew Davidson, Vaibhav Rastogi, Mihai Christodorescu, Somesh Jha:
Enhancing Android Security Through App Splitting. 24-44 - Huasong Shan, Qingyang Wang, Qiben Yan:
Very Short Intermittent DDoS Attacks in an Unsaturated System. 45-66 - Hong Rong, Huimei Wang, Jian Liu, Jialu Hao, Ming Xian:
Outsourced k-Means Clustering over Encrypted Data Under Multiple Keys in Spark Framework. 67-87 - Pejman Najafi, Andrey Sapegin, Feng Cheng, Christoph Meinel:
Guilt-by-Association: Detecting Malicious Entities via Graph Mining. 88-107 - Rémi Géraud, David Naccache, Razvan Rosie:
Twisting Lattice and Graph Techniques to Compress Transactional Ledgers. 108-127 - Peisong Shen, Chi Chen, Xiaojie Zhu:
Privacy-Preserving Relevance Ranking Scheme and Its Application in Multi-keyword Searchable Encryption. 128-146 - Xiujia Guo, Zhao Wang, Zhong Chen:
Exploring the Network of Real-World Passwords: Visualization and Estimation. 147-166 - Sascha Groß, Abhishek Tiwari, Christian Hammer:
ThiefTrap - An Anti-theft Framework for Android. 167-184 - Yue Li, Haining Wang, Kun Sun:
BluePass: A Secure Hand-Free Password Manager. 185-205 - Pengwei Lan, Pei Wang, Shuai Wang, Dinghao Wu:
Lambda Obfuscation. 206-224 - Yan Wang, Shuai Wang, Pei Wang, Dinghao Wu:
Turing Obfuscation. 225-244 - Vlad Bulakh, Andrew J. Kaizer, Minaxi Gupta:
All Your Accounts Are Belong to Us. 245-269 - Tommy Chin, Kaiqi Xiong, Mohamed Rahouti:
SDN-Based Kernel Modular Countermeasure for Intrusion Detection. 270-290 - Yi He, Qi Li, Kun Sun:
LinkFlow: Efficient Large-Scale Inter-app Privacy Leakage Detection. 291-311 - Muhammad Taqi Raza, Fatima Muhammad Anwar, Songwu Lu:
Exposing LTE Security Weaknesses at Protocol Inter-layer, and Inter-radio Interactions. 312-338 - Fengwei Wang, Hui Zhu, Rongxing Lu, Fen Liu, Cheng Huang, Hui Li:
Achieve Efficient and Privacy-Preserving Proximity Detection Scheme for Social Applications. 339-355 - Jiahao Cao, Mingwei Xu, Qi Li, Kun Sun, Yuan Yang, Jing Zheng:
Disrupting SDN via the Data Plane: A Low-Rate Flow Table Overflow Attack. 356-376 - Pinyao Guo, Hunmin Kim, Le Guan, Minghui Zhu, Peng Liu:
VCIDS: Collaborative Intrusion Detection of Sensor and Actuator Attacks on Connected Vehicles. 377-396 - Wentao Chang, Aziz Mohaisen, An Wang, Songqing Chen:
Understanding Adversarial Strategies from Bot Recruitment to Scheduling. 397-417 - Devashish Gosain, Anshika Agarwal, Sahil Shekhawat, Hrishikesh B. Acharya, Sambuddho Chakravarty:
Mending Wall: On the Implementation of Censorship in India. 418-437 - Jianguo Jiang, Jiuming Chen, Kim-Kwang Raymond Choo, Chao Liu, Kunying Liu, Min Yu, Yongjian Wang:
A Deep Learning Based Online Malicious URL and DNS Detection Scheme. 438-448 - Yan Zhang, Gui Peng, Lu Yang, Yazhe Wang, Minghui Tian, Jianxing Hu, Liming Wang, Chen Song:
Visual Analysis of Android Malware Behavior Profile Based on PMCG_droid : A Pruned Lightweight APP Call Graph. 449-468 - Quanqi Ye, Guangdong Bai, Naipeng Dong, Jin Song Dong:
Inferring Implicit Assumptions and Correct Usage of Mobile Payment Protocols. 469-488 - Xurong Li, Chunming Wu, Shouling Ji, Qinchen Gu, Raheem A. Beyah:
HSTS Measurement and an Enhanced Stripping Attack Against HTTPS. 489-509 - Yunfeng Hong, Yongjian Hu, Chun-Ming Lai, Shyhtsun Felix Wu, Iulian Neamtiu, Patrick D. McDaniel, Paul L. Yu, Hasan Cam, Gail-Joon Ahn:
Defining and Detecting Environment Discrimination in Android Apps. 510-529 - Guofeng Wang, Chuanyi Liu, Yingfei Dong, Hezhong Pan, Peiyi Han, Binxing Fang:
Query Recovery Attacks on Searchable Encryption Based on Partial Knowledge. 530-549 - Xiang Ling, Chunming Wu, Shouling Ji, Meng Han:
H _2 DoS: An Application-Layer DoS Attack Towards HTTP/2 Protocol. 550-570 - Yao Liu, Qingkai Zeng, Pinghai Yuan:
Optimizing TLB for Access Pattern Privacy Protection in Data Outsourcing. 571-584 - Yingjun Zhang, Yu Qin, Dengguo Feng, Bo Yang, Weijin Wang:
An Efficient Trustzone-Based In-application Isolation Schema for Mobile Authenticators. 585-605 - Ting Chen, Yang Xu, Xiaosong Zhang:
A Program Manipulation Middleware and Its Applications on System Security. 606-626
SecureComm Short Papers
- Rui Zhao, Chuan Yue, Qi Han:
Cross-site Input Inference Attacks on Mobile Web Users. 629-643 - Zhiguo Wan, Zhangshuang Guan, Feng Zhuo, Hequn Xian:
BKI: Towards Accountable and Decentralized Public-Key Infrastructure with Blockchain. 644-658 - Jianming Fu, Rui Jin, Yan Lin:
FRProtector: Defeating Control Flow Hijacking Through Function-Level Randomization and Transfer Protection. 659-672 - Le Guan, Sadegh Farhang, Yu Pu, Pinyao Guo, Jens Grossklags, Peng Liu:
VaultIME: Regaining User Control for Password Managers Through Auto-Correction. 673-686 - Subramaniyam Kannan, Paul Wood, Larry Deatrick, Patricia Beane, Somali Chaterji, Saurabh Bagchi:
TopHat : Topology-Based Host-Level Attribution for Multi-stage Attacks in Enterprise Systems Using Software Defined Networks. 687-703 - Xunchao Hu, Yao Cheng, Yue Duan, Andrew Henderson, Heng Yin:
JSForce: A Forced Execution Engine for Malicious JavaScript Detection. 704-720 - Dongliang Mu, Jia Guo, Wenbiao Ding, Zhilong Wang, Bing Mao, Lei Shi:
ROPOB: Obfuscating Binary Code via Return Oriented Programming. 721-737 - Jun Zhu, Weiping Zhou, Zhilong Wang, Dongliang Mu, Bing Mao:
DiffGuard: Obscuring Sensitive Information in Canary Based Protections. 738-751 - Zhongliang Yang, Xueshun Peng, Yongfeng Huang:
A Sudoku Matrix-Based Method of Pitch Period Steganography in Low-Rate Speech Coding. 752-762 - Kailong Wang, Guangdong Bai, Naipeng Dong, Jin Song Dong:
A Framework for Formal Analysis of Privacy on SSO Protocols. 763-777 - Chonghua Wang, Shiqing Ma, Xiangyu Zhang, Junghwan Rhee, Xiaochun Yun, Zhiyu Hao:
A Hypervisor Level Provenance System to Reconstruct Attack Story Caused by Kernel Malware. 778-792 - Zheng Wang, Shui Yu, Scott Rose:
An On-Demand Defense Scheme Against DNS Cache Poisoning Attacks. 793-807 - Jinwen Liang, Zheng Qin, Sheng Xiao, Jixin Zhang, Hui Yin, Keqin Li:
MPOPE: Multi-provider Order-Preserving Encryption for Cloud Data Privacy. 808-822 - Jian Kang, Yousef Elmehdwi, Dan Lin:
SLIM: Secure and Lightweight Identity Management in VANETs with Minimum Infrastructure Reliance. 823-837 - Quanwei Cai, Jonathan Lutes, Jingqiang Lin, Bo Luo:
A-Tor: Accountable Anonymity in Tor. 838-851
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.