SecureComm 2019 论文录用列表
2019-10-14 23:01:36 Author: mp.weixin.qq.com(查看原文) 阅读量:68 收藏

通信网络安全与隐私国际会议(SecureComm, EAI International Conference on Security and Privacy in Communication Networks)属于CCF C类会议,侧重关注通信与网络安全、数据安全、软件安全等方面,也是国际权威学术团体欧洲创新联盟(European Alliance of Innovation, EAI)在境外组织召开、水平较高、组织成熟、每年定期召开的国际学术会议。SecureComm 2019年共收到?(2018:108)篇论文,录取38(2018:33)篇论文,录用率为?%(2018:30.5%)。小编将录用论文标题列举如下:

•Towards Forward Secure Internet Traffic

Eman Alashwali (University of Oxford) Pawel Szalachowski (Singapore University of Technology and Design (SUTD)) Andrew Martin (University of Oxford)

Account Lockouts: Characterizing and Preventing Account Denial-of-Service Attacks

Yu Liu (Worcester Polytechnic Institute) Matthew Squires (Worcester Polytechnic Institute) Curtis Taylor (Worcester Polytechnic Institute) Robert Walls (Worcester Polytechnic Institute) Craig Shue (Worcester Polytechnic Institute)

FuncNet: A Euclidean Embedding Approach for Lightweight Binary Association Analysis

Mengxia Luo (University of Chinese Academy of Sciences) Can Yang (University of Chinese Academy of Sciences) Lei Yu (University of Chinese Academy of Sciences)

Covert Channels in SDN: Leaking Out Information from Controllers to End Hosts

Jiahao Cao (Tsinghua University) Kun Sun (George Mason University) Qi Li (Tsinghua University) Mingwei Xu (Tsinghua University) Zijie Yang (Tsinghua University) Kyung Joon Kwak (Intelligent Automation Inc) Jason Li (Intelligent Automation Inc)

TL;DR Hazard: A Comprehensive Study of Levelsquatting Scams

Kun Du (Tsinghua University) Hao Yang (Tsinghua University) Zhou Li (University of California, Irvine) Haixin Duan (Tsinghua University) Shuang Hao (The University of Texas at Dallas) Baojun Liu (Tsinghua University) Yuxiao Ye (The University of Edinburgh) Mingxuan Liu (Tsinghua University) Xiaodong Su (Baidu) Guang Liu (Baidu) Zhifeng Geng (Baidu) Zaifeng Zhang (Qihoo 360) Jinjin Liang (Baidu)

Random Allocation Seed-DSSS Broadcast Communication against Jamming Attacks

Ahmad Alagil (University of South Florida) Yao Liu (University of South Florida)

Towards a Multi-Chain Future of Proof-of-Space

Yao Deng (Shanghai Jiao Tong University) Shuyang Tang (Shanghai Jiao Tong University) Jilai Zheng (Shanghai Jiao Tong University) Zhiqiang Liu (Shanghai Jiao Tong University) Zhen Liu (Shanghai Jiao Tong University) Yu Long (Shanghai Jiao Tong University) Dawu Gu (Shanghai Jiao Tong University)

Stochastic ADMM Based Distributed Machine Learning with Differential Privacy

Jiahao Ding (University of Houston) Sai Mounika Errapotu (University of Houston) Haijun Zhang (University of Science and Technology Beijing) Yanmin Gong (Oklahoma State University) Miao Pan (University of Houston) Zhu Han (University of Houston)

Ticket Transparency: Accountable Single Sign-On with Privacy-Preserving Public Logs

Dawei Chu (Chinese Academy of Sciences) Jingqiang Lin (Chinese Academy of Sciences) Fengjun Li (The University of Kansas) Xiaokun Zhang (Chinese Academy of Sciences) Qiongxiao Wang (Chinese Academy of Sciences) Guangqi Liu (Chinese Academy of Sciences)

An Enhanced Verifiable Inter-domain Routing Protocol based on Blockchain

Yaping Liu (Guangzhou University) Shuo Zhang (Guangzhou University) Haojin Zhu (Shanghai Jiao Tong University) Peng-Jun Wan (Illinois Institute of Technology) Lixin Gao (University of Massachusetts at Amherst) Yaoxue Zhang (Tsinghua University)

On the Security of TRNGs based on Multiple Ring Oscillators

Xinying Wu (University of Chinese Academy of Sciences) Yuan Ma (University of Chinese Academy of Sciences) Jing Yang (University of Chinese Academy of Sciences) Tianyu Chen (University of Chinese Academy of Sciences) Jingqiang Lin (University of Chinese Academy of Sciences)

SEVGuard: Protecting User Mode Applications using Secure Encrypted Virtualization

Ralph Palutke (Friedrich-Alexander-Universitaet Erlangen-Nuernberg) Andreas Neubaum (Friedrich-Alexander-Universitaet Erlangen-Nuernberg) Johannes Götzfried (Friedrich-Alexander-Universitaet Erlangen-Nuernberg)

•Target Information Trading – An Economic Perspective of Security

Jing Hou (Auburn University) Li Sun (Auburn University) Tao Shu (Auburn University) Husheng Li (University of Tennessee Knoxville)

Location Privacy Issues in the Opensky-Network Crowdsourcing Platform

Savio Sciancalepore (Hamad Bin Khalifa University) Saeif Alhazbi (Hamad Bin Khalifa University) Roberto Di Pietro (Hamad Bin Khalifa University)

A Loss-tolerant Mechanism of Message Segmentation and Reconstruction in Multi-path Communication of Anti-tracking Network

Changbo Tian (University of Chinese Academy of Sciences) Yongzheng Zhang (University of Chinese Academy of Sciences) Tao Yin (University of Chinese Academy of Sciences) Yupeng Tuo (University of Chinese Academy of Sciences) Ruihai Ge (University of Chinese Academy of Sciences)

Decentralized Privacy-Preserving Reputation Management for Mobile Crowdsensing

Lichuan Ma (Xidian University) Qingqi Pei (Xidian University) Youyang Qu (Deakin University) Kefeng Fan (China Electronics Standardization Institute) Xin Lai (Xunlei Network Technologies)

Secure Consistency Verification for Untrusted Cloud Storage by Public Blockchains

Kai Li (Syracuse University) Yuzhe Tang (Syracuse University) Beom Heyn Kim (University of Toronto) Jianliang Xu (Hong Kong Baptist University)

•Traffic-based Automatic Detection of Browser Fingerprinting

Rui Zhao (University of Nebraska Omaha) Edward Chow (University of Colorado Colorado Springs) Chunchun Li (University of Colorado Colorado Springs)

CustomPro: Network Protocol Customization through Cross-host Feature Analysis

Yurong Chen (George Washington University) Tian Lan (George Washington University) Guru Venkataramani (George Washington University)

Victim-Aware Adaptive Covert Channels

Riccardo Bortolameotti (University of Twente) Thijs van Ede (University of Twente) Andrea Continella (University of California, Santa Barbara) Maarten H. Everts (University of Twente) Willem Jonker (University of Twente) Pieter Hartel (Delft University of Technology) Andreas Peter (University of Twente)

•DeepCG: Classifying Metamorphic Malware through Deep Learning of Call Graphs

Shuang Zhao (Chinese Academy of Sciences) Xiaobo Ma (Xi’an Jiaotong University) Wei Zou (Chinese Academy of Sciences) Bo Bai (Chinese Academy of Sciences)

•Automated IoT Device Fingerprinting Through Encrypted Stream Classification

Jianhua Sun (College of William and Mary) Kun Sun (George Mason University) Chris Shenefiel (Cisco Systems, Inc.)

Secrecy on a Gaussian Relay-Eavesdropper Channel with a Trusted Relay

Keke Hu (Chinese Academy of Sciences) Xiaohui Zhang (Chinese Academy of Sciences) Yongming Wang (Chinese Academy of Sciences)

•ChaffyScript: Vulnerability-Agnostic Defense of JavaScript Exploits via Memory Perturbation

Xunchao Hu (DeepBits Technology LLC) Brian Testa (Syracuse University) Heng Yin (University of California, Riverside)

Topology-Aware Hashing for Effective Control Flow Graph Similarity Analysis

Yuping Li (Pinterest) Jiyong Jang (IBM) Xinming Ou (University of South Florida)

Online Cyber Deception System using PartiallyObservable Monte-Carlo Planning Framework

Md Ali Reza Al Amin (Old Dominion University) Sachin Shetty (Old Dominion University) Laurent Njilla (Air Force Research Lab) Deepak Tosh (University of Texas at El Paso) Charles Kamhoua (Army Research Lab)

Obfusifier: Obfuscation-resistant Android Malware Detection System

Zhiqiang Li (University of Nebraska-Lincoln) Jun Sun (University of Nebraska-Lincoln) Qiben Yan (University of Nebraska-Lincoln) Witawas Srisa-An (University of Nebraska-Lincoln) Yutaka Tsutano (University of Nebraska-Lincoln)

Measuring Tor Relay Popularity

Tao Chen (Oklahoma State University) Weiqi Cui (Oklahoma State University) Eric Chan-Tin (Loyola University Chicago)

The Disbanding Attack: Exploiting Human-in-the-loop Control in Vehicular Platooning

Ali Al-Hashimi (Utah State University) Pratham Oza (Virginia Tech) Ryan Gerdes (Virginia Tech) Thidapat Chantem (Virginia Tech)

•Closing the Gap with APTs through Semantic Clusters and Automated Cybergames

Steven Gianvecchio (The MITRE Corporation) Christopher Burkhalter (The MITRE Corporation) Hongying Lan (The MITRE Corporation) Andrew Sillers (The MITRE Corporation) Ken Smith (The MITRE Corporation)

Application Transiency: Towards a Fair Trade of Personal Information for Application Services

Raquel Alvarez (The Pennsylvania State University) Jake Levenson (The Pennsylvania State University) Patrick McDaniel (The Pennsylvania State University)

POKs Based Secure and Energy-Efficient Access Control for Implantable Medical Devices

Chenglong Fu (Temple University) Xiaojiang Du (Temple University) Longfei Wu (Fayetteville State University) Qiang Zeng (University of South Carolina) Amr Mohamed (Qatar University) Mohsen Guizani (Qatar University)

•Edge-Assisted CNN Inference over Encrypted Data for Internet of Things

Yifan Tian (Embry-Riddle Aeronautical University) Jiawei Yuan (Embry-Riddle Aeronautical University) Shucheng Yu (Stevens Institute of Technology) Yantian Hou (Boise State University) Houbing Song (Embry-Riddle Aeronautical University)

Secure Attribute-Based Encryption Schemes with Revocability and Dual-Policy

Shengmin Xu (Singapore Management University) Yingjiu Li (Singapore Management University) Ximeng Liu (Singapore Management University) Guomin Yang (University of Wollongong) Yinghui Zhang (Singapore Management University)

USB-Watch: A Dynamic Hardware-Assisted USB Threat Detection Framework

Kyle Denney (Florida International University) Enes Erdin (Florida International University) Leonardo Babun (Florida International University) Michael Vai (Massachusetts Institute of Technology Lincoln Laboratory) A. Selcuk Uluagac (Florida International University)

•SoK: ATT&CK Techniques and Trends in Windows Malware

Kris Oosthoek (Delft University of Technology) Christian Doerr (Delft University of Technology)

Trustless Double Auction Framework on Blockchain

Truc Nguyen (University of Florida) My Thai (University of Florida)

Trojan Attack on Deep Generative Models in Autonomous Driving

Shaohua Ding (Nanjing University) Yulong Tian (Nanjing University) Fengyuan Xu (Nanjing University) Qun Li (College of William and Mary) Sheng Zhong (Nanjing University)

会议主页:

hhttp://securecomm.org/accepted-papers/

安全学术圈招募队友-ing,有兴趣加入学术圈的请联系secdr#qq.com


文章来源: http://mp.weixin.qq.com/s?__biz=MzU5MTM5MTQ2MA==&mid=2247484633&idx=1&sn=cdd04015a492971c51c23dad55c9fc20&chksm=fe2efb52c9597244e1df82a46107705aba844aa79b5dbda77a785f3ca087dd2af0f206fa2b5b#rd
如有侵权请联系:admin#unsafe.sh