


default search action
13th SecureComm 2017: Niagara Falls, ON, Canada
- Xiaodong Lin, Ali A. Ghorbani, Kui Ren, Sencun Zhu, Aiqing Zhang:

Security and Privacy in Communication Networks - 13th International Conference, SecureComm 2017, Niagara Falls, ON, Canada, October 22-25, 2017, Proceedings. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 238, Springer 2018, ISBN 978-3-319-78812-8
SecureComm Regular Papers
- Hong Liu, Eugene Y. Vasserman

:
Gray-Box Software Integrity Checking via Side-Channels. 3-23 - Drew Davidson, Vaibhav Rastogi, Mihai Christodorescu, Somesh Jha:

Enhancing Android Security Through App Splitting. 24-44 - Huasong Shan, Qingyang Wang

, Qiben Yan
:
Very Short Intermittent DDoS Attacks in an Unsaturated System. 45-66 - Hong Rong, Huimei Wang, Jian Liu, Jialu Hao, Ming Xian:

Outsourced k-Means Clustering over Encrypted Data Under Multiple Keys in Spark Framework. 67-87 - Pejman Najafi, Andrey Sapegin

, Feng Cheng, Christoph Meinel:
Guilt-by-Association: Detecting Malicious Entities via Graph Mining. 88-107 - Rémi Géraud

, David Naccache, Razvan Rosie:
Twisting Lattice and Graph Techniques to Compress Transactional Ledgers. 108-127 - Peisong Shen

, Chi Chen
, Xiaojie Zhu:
Privacy-Preserving Relevance Ranking Scheme and Its Application in Multi-keyword Searchable Encryption. 128-146 - Xiujia Guo, Zhao Wang, Zhong Chen:

Exploring the Network of Real-World Passwords: Visualization and Estimation. 147-166 - Sascha Groß

, Abhishek Tiwari
, Christian Hammer
:
ThiefTrap - An Anti-theft Framework for Android. 167-184 - Yue Li, Haining Wang, Kun Sun:

BluePass: A Secure Hand-Free Password Manager. 185-205 - Pengwei Lan, Pei Wang, Shuai Wang

, Dinghao Wu:
Lambda Obfuscation. 206-224 - Yan Wang, Shuai Wang

, Pei Wang, Dinghao Wu:
Turing Obfuscation. 225-244 - Vlad Bulakh

, Andrew J. Kaizer
, Minaxi Gupta:
All Your Accounts Are Belong to Us. 245-269 - Tommy Chin, Kaiqi Xiong, Mohamed Rahouti:

SDN-Based Kernel Modular Countermeasure for Intrusion Detection. 270-290 - Yi He, Qi Li, Kun Sun:

LinkFlow: Efficient Large-Scale Inter-app Privacy Leakage Detection. 291-311 - Muhammad Taqi Raza, Fatima Muhammad Anwar, Songwu Lu:

Exposing LTE Security Weaknesses at Protocol Inter-layer, and Inter-radio Interactions. 312-338 - Fengwei Wang, Hui Zhu, Rongxing Lu, Fen Liu, Cheng Huang, Hui Li:

Achieve Efficient and Privacy-Preserving Proximity Detection Scheme for Social Applications. 339-355 - Jiahao Cao, Mingwei Xu, Qi Li, Kun Sun, Yuan Yang, Jing Zheng:

Disrupting SDN via the Data Plane: A Low-Rate Flow Table Overflow Attack. 356-376 - Pinyao Guo, Hunmin Kim, Le Guan, Minghui Zhu, Peng Liu:

VCIDS: Collaborative Intrusion Detection of Sensor and Actuator Attacks on Connected Vehicles. 377-396 - Wentao Chang, Aziz Mohaisen, An Wang, Songqing Chen:

Understanding Adversarial Strategies from Bot Recruitment to Scheduling. 397-417 - Devashish Gosain, Anshika Agarwal, Sahil Shekhawat, Hrishikesh B. Acharya, Sambuddho Chakravarty:

Mending Wall: On the Implementation of Censorship in India. 418-437 - Jianguo Jiang, Jiuming Chen, Kim-Kwang Raymond Choo

, Chao Liu, Kunying Liu, Min Yu, Yongjian Wang:
A Deep Learning Based Online Malicious URL and DNS Detection Scheme. 438-448 - Yan Zhang, Gui Peng, Lu Yang, Yazhe Wang, Minghui Tian, Jianxing Hu, Liming Wang, Chen Song:

Visual Analysis of Android Malware Behavior Profile Based on PMCG_droid : A Pruned Lightweight APP Call Graph. 449-468 - Quanqi Ye, Guangdong Bai

, Naipeng Dong
, Jin Song Dong:
Inferring Implicit Assumptions and Correct Usage of Mobile Payment Protocols. 469-488 - Xurong Li, Chunming Wu, Shouling Ji, Qinchen Gu, Raheem A. Beyah

:
HSTS Measurement and an Enhanced Stripping Attack Against HTTPS. 489-509 - Yunfeng Hong, Yongjian Hu, Chun-Ming Lai

, Shyhtsun Felix Wu, Iulian Neamtiu, Patrick D. McDaniel, Paul L. Yu, Hasan Cam, Gail-Joon Ahn
:
Defining and Detecting Environment Discrimination in Android Apps. 510-529 - Guofeng Wang, Chuanyi Liu, Yingfei Dong, Hezhong Pan, Peiyi Han, Binxing Fang:

Query Recovery Attacks on Searchable Encryption Based on Partial Knowledge. 530-549 - Xiang Ling, Chunming Wu, Shouling Ji, Meng Han:

H _2 DoS: An Application-Layer DoS Attack Towards HTTP/2 Protocol. 550-570 - Yao Liu, Qingkai Zeng, Pinghai Yuan:

Optimizing TLB for Access Pattern Privacy Protection in Data Outsourcing. 571-584 - Yingjun Zhang, Yu Qin, Dengguo Feng, Bo Yang, Weijin Wang:

An Efficient Trustzone-Based In-application Isolation Schema for Mobile Authenticators. 585-605 - Ting Chen

, Yang Xu, Xiaosong Zhang:
A Program Manipulation Middleware and Its Applications on System Security. 606-626
SecureComm Short Papers
- Rui Zhao, Chuan Yue, Qi Han:

Cross-site Input Inference Attacks on Mobile Web Users. 629-643 - Zhiguo Wan, Zhangshuang Guan, Feng Zhuo, Hequn Xian:

BKI: Towards Accountable and Decentralized Public-Key Infrastructure with Blockchain. 644-658 - Jianming Fu, Rui Jin, Yan Lin:

FRProtector: Defeating Control Flow Hijacking Through Function-Level Randomization and Transfer Protection. 659-672 - Le Guan

, Sadegh Farhang, Yu Pu, Pinyao Guo, Jens Grossklags, Peng Liu:
VaultIME: Regaining User Control for Password Managers Through Auto-Correction. 673-686 - Subramaniyam Kannan, Paul Wood, Larry Deatrick, Patricia Beane, Somali Chaterji

, Saurabh Bagchi:
TopHat : Topology-Based Host-Level Attribution for Multi-stage Attacks in Enterprise Systems Using Software Defined Networks. 687-703 - Xunchao Hu, Yao Cheng, Yue Duan

, Andrew Henderson, Heng Yin
:
JSForce: A Forced Execution Engine for Malicious JavaScript Detection. 704-720 - Dongliang Mu, Jia Guo, Wenbiao Ding, Zhilong Wang, Bing Mao, Lei Shi

:
ROPOB: Obfuscating Binary Code via Return Oriented Programming. 721-737 - Jun Zhu, Weiping Zhou, Zhilong Wang, Dongliang Mu, Bing Mao:

DiffGuard: Obscuring Sensitive Information in Canary Based Protections. 738-751 - Zhongliang Yang

, Xueshun Peng, Yongfeng Huang:
A Sudoku Matrix-Based Method of Pitch Period Steganography in Low-Rate Speech Coding. 752-762 - Kailong Wang

, Guangdong Bai
, Naipeng Dong
, Jin Song Dong:
A Framework for Formal Analysis of Privacy on SSO Protocols. 763-777 - Chonghua Wang, Shiqing Ma, Xiangyu Zhang, Junghwan Rhee, Xiaochun Yun, Zhiyu Hao:

A Hypervisor Level Provenance System to Reconstruct Attack Story Caused by Kernel Malware. 778-792 - Zheng Wang

, Shui Yu
, Scott Rose:
An On-Demand Defense Scheme Against DNS Cache Poisoning Attacks. 793-807 - Jinwen Liang

, Zheng Qin
, Sheng Xiao, Jixin Zhang, Hui Yin, Keqin Li:
MPOPE: Multi-provider Order-Preserving Encryption for Cloud Data Privacy. 808-822 - Jian Kang, Yousef Elmehdwi, Dan Lin:

SLIM: Secure and Lightweight Identity Management in VANETs with Minimum Infrastructure Reliance. 823-837 - Quanwei Cai, Jonathan Lutes, Jingqiang Lin, Bo Luo

:
A-Tor: Accountable Anonymity in Tor. 838-851

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














