ACCEPTED PAPERS |
Regular Papers A Software-Based Root-of-Trust Primitive on Multicore Platforms Qiang Yan, Jin Han, Yingjiu Li, Robert H. Deng and Tieyan Li Tracer: Enforcing Mandatory Access Control in Commodity OS with the Support of Light-Weight Intrusion Detection and Tracing Zhiyong Shan, Xin Wang and Tzi-cker Chiueh An Ontology- and Bayesian-based Approach for Determining Threat Probabilities Stefan Fenz Enhancing the Trust of Internet Routing with Lightweight Route Attestation Qi Li, Mingwei Xu, Jianping Wu, Xinwen Zhang, Patrick P.C. Lee and Ke Xu Non-uniform Distributions in Quantitative Information-flow Michael Backes, Matthias Berg and Boris Köpf Automatic Construction of Jump-Oriented Programming Shellcode (on the x86) Ping Chen, Xiao Xing, Bing Mao, Li Xie, Xiaobin Shen and Xinchun Yin Strongly Secure Certificateless Key Exchange without Pairing Guomin Yang and Chik-How Tan Identity-Based Online/Offline Key Encapsulation and Encryption Sherman S. M. Chow, Joseph Liu and Jianying Zhou Compact Identity-Based Encryption without Strong Symmetric Cipher Joonsang Baek and Jianying Zhou Secure Mobile Subscription of Sensor-Encrypted Data Cheng-Kang Chu, Wen Tao Zhu, Sherman Chow, Jianying Zhou and Robert H. Deng WebPatrol: Automated Collection and Replay of Web-based Malware Scenarios Kevin Zhijie Chen, Guofei Gu, Jose Nazario, Xinhui Han and Jianwei Zhuge Efficient Audit-based Compliance for Relational Data Retention Ragib Hasan and Marianne Winslett Threshold Ring Signature without Random Oracles Tsz Hon Yuen, Joseph K. Liu, Man Ho Au, Willy Susilo and Jianying Zhou Mind How You Answer Me! (Transparently Authenticating the User of a Smartphone when Answering or Placing a Call) Mauro Conti, Irina Zachia-Zlatea and Bruno Crispo On the Invisibility of Designated Confirmer Signatures Fubiao Xia, Guilin Wang and Rui Xue ROPdefender: A Practical Protection Tool to Protect Against Return-Oriented Programming Attacks Lucas Davi, Ahmad-Reza Sadeghi and Marcel Winandy Lightweight Quick and Stateful Network Scanning Detector Mansour Alsaleh and Paul Van Oorschot PUF ROKs : A Hardware Approach to Read-Once Keys Michael Kirkpatrick, Sam Kerr and Elisa Bertino Attacks Against Process Control Systems: Risk Assessment, Detection, and Response Alvaro Cardenas, Saurabh Amin, Zong-Syun Lin, Yu-Lun Huang, Chi-Yen Huang and Shankar Sastry Detecting Stealth Malware with Inter-Structure and Imported Signatures Bin Liang, Wei You, Wenchang Shi and Zhaohui Liang An Integrated Approach to Cryptographic Mitigation of Denial-of-Service Attacks Jothi Rangasamy, Douglas Stebila, Colin Boyd and Juan Gonzalez Nieto Confidentiality-preserving Proof Theories for Distributed Proof Systems Kazuhiro Minami, Nikita Borisov, Marianne Winslett and Adam Lee Extended Cubes: Enhancing the Cube Attack by Extracting Low-Degree Non-Linear Equations Shekh Faisal Abdul-Latip, Mohammad Reza Reyhanitabar, Willy Susilo and Jennifer Seberry Attack on the GridCode One-Time Password Ian Molloy and Ninghui Li Malware Propagation in Online Social Networks: Nature, Dynamics, and Defense Implications Guanhua Yan, Guanling Chen, Stephan Eidenbenz and Nan Li Efficient Symbolic Automated Analysis of Administrative Role Based Access Control Policies Francesco Alberti, Alessandro Armando and Silvio Ranise Jump-Oriented Programming: A New Class of Code-Reuse Attack Tyler Bletsch, Xuxian Jiang, Vince Freeh and Zhenkai Liang Characterizing Kernel Malware Behavior with Kernel Data Access Patterns Junghwan Rhee, Zhiqiang Lin and Dongyan Xu Formal Modelling and Automatic Detection of Resource Exhaustion Attacks Bogdan Groza and Marius Minea Examining Indistinguishability-Based Security Models for Key Exchange Protocols: The case of CK, CK-HMQV, and eCK Cas Cremers Boosting the scalability of Botnet Detection Using Adaptive Traffic Sampling Junjie Zhang, Xiapu Luo, Roberto Perdisci, Guofei Gu, Wenke Lee and Nick Feamster Bounded Vector Signatures and their Applications Lei Wei, Scott E. Coull and Michael K. Reiter Rethinking about Guessing Attacks Zhiwei Li and Weichao Wang An efficient mobile PACE implementation Alex Wiesmaier, Moritz Horsch, Johannes Braun, Franziskus Kiefer, Detlef Hühnlein, Falko Strenzke and Johannes Braun Practical Affiliation-Hiding Authentication from Improved Polynomial Interpolation Mark Manulis and Bertram Poettering Short Papers Stronger Security Model of Group Key Agreement Jianjie Zhao, Dawu Gu and M. Choudary Gorantla How to Search Linear Approximations for Large Non-Surjective S-boxes Yue Sun, Meiqin Wang and Qiumei Sun Separation of Duties as a Service David Basin, Samuel Burri and Guenter Karjoth On the Security of the Identity-based Encryption based on DHIES from ASIACCS 2010 Willy Susilo and Joonsang Baek Leakage Resilient eCK-Secure Key Exchange Protocol Without Random Oracles Daisuke Moriyama and Tatsuaki Okamoto Efficient Computational Oblivious Transfer Using Interactive Hashing Kirill Morozov and George Savvides 1-out-of-2 Signature Miroslaw Kutylowski and Jun Shao Self Destructive Tamper Response for Software Protection Kazuomi Oishi and Tsutomu Matsumoto MLAS: Multiple Level Authentication Scheme for VANETs Tat Wing Chim, S.M. Yiu, Lucas C.K. Hui and Victor O.K. Li How to Design Space Efficient Revocable IBE from Non-monotonic ABE Huang Lin, Zhenfu Cao, Yuguang Fang, Muxin Zhou and Haojin Zhu Diesel: Applying Privilege Separation to Database Access Adrienne Felt, Matthew Finifter, Joel Weinberger and David Wagner On the effectiveness of using Anonymizing Networks for Web Search Privacy Sai Teja Peddinti and Nitesh Saxena Self-Certified Ring Signatures Nan Li, Yi Mu, Willy Susilo and Fuchun Guo On Mouse Dynamics as a Behavioral Biometric for Authentication Zach Jorgensen and Ting Yu Server-Aided Signatures Verification Secure against Collusion Attack Sherman S. M. Chow, Man Ho Au and Willy Susilo Multi-Authority Ciphertext-Policy Attribute-Based Encryption with Accountability Jin Li, Qiong Huang, Xiaofeng Chen, Sherman S. Chow, Duncan S. Wong and Dongqing Xie A New and Extended Fault Analysis on RSA Chen Caisen and Wang Tao Common Malicious Behavior through Graph Clustering Younghee Park and Douglas Reeves Receipt-Mode Trust Negotiation: Efficient Authorization Through Outsourced Interactions Andrew K Adams, Adam J. Lee and Daniel Mossé Quantified Risk-Adaptive Access Control for Patient Privacy Protection in Health Information Systems Qihua Wang and Hongxia Jin EASiER: Encryption-based Access Control in Social Networks with Efficient Revocation Sonia Jahid, Prateek Mittal and Nikita Borisov Optimal Message Transmission Protocols with Flexible Parameters Reihaneh Safavi-Naini, Mohammed Tuhin and Hongsong Shi Towards a Binary Integrity System for Windows Yongzheng Wu and Roland Yap A Statistical Approach to Botnet Virulence Estimation Julian Rrushi, Ehsan Mokhtari and Ali Ghorbani |