SecureComm C

47 papers

YearTitle / Authors
2018Security and Privacy in Communication Networks - 13th International Conference, SecureComm 2017, Niagara Falls, ON, Canada, October 22-25, 2017, Proceedings
Xiaodong Lin, Ali A. Ghorbani, Kui Ren, Sencun Zhu, Aiqing Zhang
2017A Deep Learning Based Online Malicious URL and DNS Detection Scheme.
Jianguo Jiang, Jiuming Chen, Kim-Kwang Raymond Choo, Chao Liu, Kunying Liu, Min Yu, Yongjian Wang
2017A Framework for Formal Analysis of Privacy on SSO Protocols.
Kailong Wang, Guangdong Bai, Naipeng Dong, Jin Song Dong
2017A Hypervisor Level Provenance System to Reconstruct Attack Story Caused by Kernel Malware.
Chonghua Wang, Shiqing Ma, Xiangyu Zhang, Junghwan Rhee, Xiaochun Yun, Zhiyu Hao
2017A Program Manipulation Middleware and Its Applications on System Security.
Ting Chen, Yang Xu, Xiaosong Zhang
2017A Sudoku Matrix-Based Method of Pitch Period Steganography in Low-Rate Speech Coding.
Zhongliang Yang, Xueshun Peng, Yongfeng Huang
2017A-Tor: Accountable Anonymity in Tor.
Quanwei Cai, Jonathan Lutes, Jingqiang Lin, Bo Luo
2017Achieve Efficient and Privacy-Preserving Proximity Detection Scheme for Social Applications.
Fengwei Wang, Hui Zhu, Rongxing Lu, Fen Liu, Cheng Huang, Hui Li
2017All Your Accounts Are Belong to Us.
Vlad Bulakh, Andrew J. Kaizer, Minaxi Gupta
2017An Efficient Trustzone-Based In-application Isolation Schema for Mobile Authenticators.
Yingjun Zhang, Yu Qin, Dengguo Feng, Bo Yang, Weijin Wang
2017An On-Demand Defense Scheme Against DNS Cache Poisoning Attacks.
Zheng Wang, Shui Yu, Scott Rose
2017BKI: Towards Accountable and Decentralized Public-Key Infrastructure with Blockchain.
Zhiguo Wan, Zhangshuang Guan, Feng Zhuo, Hequn Xian
2017BluePass: A Secure Hand-Free Password Manager.
Yue Li, Haining Wang, Kun Sun
2017Cross-site Input Inference Attacks on Mobile Web Users.
Rui Zhao, Chuan Yue, Qi Han
2017Defining and Detecting Environment Discrimination in Android Apps.
Yunfeng Hong, Yongjian Hu, Chun-Ming Lai, Shyhtsun Felix Wu, Iulian Neamtiu, Patrick D. McDaniel, Paul L. Yu, Hasan Cam, Gail-Joon Ahn
2017DiffGuard: Obscuring Sensitive Information in Canary Based Protections.
Jun Zhu, Weiping Zhou, Zhilong Wang, Dongliang Mu, Bing Mao
2017Disrupting SDN via the Data Plane: A Low-Rate Flow Table Overflow Attack.
Jiahao Cao, Mingwei Xu, Qi Li, Kun Sun, Yuan Yang, Jing Zheng
2017Enhancing Android Security Through App Splitting.
Drew Davidson, Vaibhav Rastogi, Mihai Christodorescu, Somesh Jha
2017Exploring the Network of Real-World Passwords: Visualization and Estimation.
Xiujia Guo, Zhao Wang, Zhong Chen
2017Exposing LTE Security Weaknesses at Protocol Inter-layer, and Inter-radio Interactions.
Muhammad Taqi Raza, Fatima Muhammad Anwar, Songwu Lu
2017FRProtector: Defeating Control Flow Hijacking Through Function-Level Randomization and Transfer Protection.
Jianming Fu, Rui Jin, Yan Lin
2017Gray-Box Software Integrity Checking via Side-Channels.
Hong Liu, Eugene Y. Vasserman
2017Guilt-by-Association: Detecting Malicious Entities via Graph Mining.
Pejman Najafi, Andrey Sapegin, Feng Cheng, Christoph Meinel
2017H _2 DoS: An Application-Layer DoS Attack Towards HTTP/2 Protocol.
Xiang Ling, Chunming Wu, Shouling Ji, Meng Han
2017HSTS Measurement and an Enhanced Stripping Attack Against HTTPS.
Xurong Li, Chunming Wu, Shouling Ji, Qinchen Gu, Raheem A. Beyah
2017Inferring Implicit Assumptions and Correct Usage of Mobile Payment Protocols.
Quanqi Ye, Guangdong Bai, Naipeng Dong, Jin Song Dong
2017JSForce: A Forced Execution Engine for Malicious JavaScript Detection.
Xunchao Hu, Yao Cheng, Yue Duan, Andrew Henderson, Heng Yin
2017Lambda Obfuscation.
Pengwei Lan, Pei Wang, Shuai Wang, Dinghao Wu
2017LinkFlow: Efficient Large-Scale Inter-app Privacy Leakage Detection.
Yi He, Qi Li, Kun Sun
2017MPOPE: Multi-provider Order-Preserving Encryption for Cloud Data Privacy.
Jinwen Liang, Zheng Qin, Sheng Xiao, Jixin Zhang, Hui Yin, Keqin Li
2017Mending Wall: On the Implementation of Censorship in India.
Devashish Gosain, Anshika Agarwal, Sahil Shekhawat, Hrishikesh B. Acharya, Sambuddho Chakravarty
2017Optimizing TLB for Access Pattern Privacy Protection in Data Outsourcing.
Yao Liu, Qingkai Zeng, Pinghai Yuan
2017Outsourced k-Means Clustering over Encrypted Data Under Multiple Keys in Spark Framework.
Hong Rong, Huimei Wang, Jian Liu, Jialu Hao, Ming Xian
2017Privacy-Preserving Relevance Ranking Scheme and Its Application in Multi-keyword Searchable Encryption.
Peisong Shen, Chi Chen, Xiaojie Zhu
2017Query Recovery Attacks on Searchable Encryption Based on Partial Knowledge.
Guofeng Wang, Chuanyi Liu, Yingfei Dong, Hezhong Pan, Peiyi Han, Binxing Fang
2017ROPOB: Obfuscating Binary Code via Return Oriented Programming.
Dongliang Mu, Jia Guo, Wenbiao Ding, Zhilong Wang, Bing Mao, Lei Shi
2017SDN-Based Kernel Modular Countermeasure for Intrusion Detection.
Tommy Chin, Kaiqi Xiong, Mohamed Rahouti
2017SLIM: Secure and Lightweight Identity Management in VANETs with Minimum Infrastructure Reliance.
Jian Kang, Yousef Elmehdwi, Dan Lin
2017ThiefTrap - An Anti-theft Framework for Android.
Sascha Groß, Abhishek Tiwari, Christian Hammer
2017TopHat : Topology-Based Host-Level Attribution for Multi-stage Attacks in Enterprise Systems Using Software Defined Networks.
Subramaniyam Kannan, Paul Wood, Larry Deatrick, Patricia Beane, Somali Chaterji, Saurabh Bagchi
2017Turing Obfuscation.
Yan Wang, Shuai Wang, Pei Wang, Dinghao Wu
2017Twisting Lattice and Graph Techniques to Compress Transactional Ledgers.
Rémi Géraud, David Naccache, Razvan Rosie
2017Understanding Adversarial Strategies from Bot Recruitment to Scheduling.
Wentao Chang, Aziz Mohaisen, An Wang, Songqing Chen
2017VCIDS: Collaborative Intrusion Detection of Sensor and Actuator Attacks on Connected Vehicles.
Pinyao Guo, Hunmin Kim, Le Guan, Minghui Zhu, Peng Liu
2017VaultIME: Regaining User Control for Password Managers Through Auto-Correction.
Le Guan, Sadegh Farhang, Yu Pu, Pinyao Guo, Jens Grossklags, Peng Liu
2017Very Short Intermittent DDoS Attacks in an Unsaturated System.
Huasong Shan, Qingyang Wang, Qiben Yan
2017Visual Analysis of Android Malware Behavior Profile Based on PMCG_droid : A Pruned Lightweight APP Call Graph.
Yan Zhang, Gui Peng, Lu Yang, Yazhe Wang, Minghui Tian, Jianxing Hu, Liming Wang, Chen Song