Accepted Posters/Demos

A Proactive Cloud-Based Cross-Reference Forensic Framework
Zhenbang Liu (Shanghai Jiao Tong University, China); Hengming Zou(Shanghai Jiao Tong University, China)

Seven Years in MWS: Experiences of Sharing Datasets with Anti-malware Research Community in Japan
Mitsuhiro Hatada (Waseda University & NTT Communications Corporation, Japan); Masato Terada (Hitachi Incident Response Team, Japan); Tatsuya Mori (Waseda University, Japan)

Efficient Ciphertext Policy Attribute Based Encryption Under Decisional Linear Assumption
Tran Viet Xuan Phuong (University of Wollongong, Australia); Guomin Yang (University of Wollongong, Australia); Willy Susilo (University of Wollongong, Australia)

Scanning-free Personalized Malware Warning System by Learning Implicit Feedback from Detection Logs
Jyun-Yu Jiang (National Taiwan University, Taiwan Roc); Chun-Liang Li (National Taiwan University, Taiwan Roc); Chun-Pai Yang (National Taiwan University, Taiwan Roc); Chung-Tsai Su (Trend Micro, Inc., Taiwan Roc)

A Measurement Framework to Quantify Software Protections
Paolo Tonella (Fondazione Bruno Kessler, Italy); Mariano Ceccato (Fondazione Bruno Kessler, Italy); Bjorn De Sutter (Ghent University, Belgium); Bart Coppens (Ghent University, Belgium)

Efficient Method for Disjunctive and Conjunctive Keyword Search over Encrypted Data
Yu Zhang (Huazhong University of Science and Technology, China); Songfeng Lu (Huazhong University of Science and Technology, China)

Proactive Blacklist Update for Anti-Phishing
Lung-Hao Lee (National Taiwan University, Taiwan Roc); Kuei-Ching Lee (National Taiwan University, Taiwan Roc); Hsin-Hsi Chen (National Taiwan University, Taiwan Roc); Yuen-Hsien Tseng (National Taiwan University, Taiwan Roc)

On the Capability of DNS Cache Poisoning Attacks
Zheng Wang (Qingdao University China)

Analysis and Comparison of Secure Localization Schemes for Intelligent Transportation Systems
Bhaswati Deka (Utah State University, USA); Ryan M Gerdes (Utah State University, USA); Ming Li (Utah State University, USA); Kevin Heaslip (Virginia Tech, USA)

Blind Separation of Benign and Malicious Events to Enable Accurate Malware Family Classification
Hesham Mekky (University of Minnesota, USA); Aziz Mohaisen (VeriSign Labs, USA); Zhi-Li Zhang (University of Minnesota, USA)

Analyzing Access Control Policies with SMT
Fatih Turkmen (Eindhoven University of Technology, Netherlands); Jerry den (Eindhoven University of Technology, Netherlands); Nicola (Eindhoven University of Technology, Netherlands)

LocMask: A Location Privacy Protection Framework in Android System
Qiuyu Xiao (Shanghai Jiao Tong University, China); Jiayi Chen (Shanghai Jiao Tong University, China); Le Yu (Shanghai Jiao Tong University, China); Huaxin Li (Shanghai Jiao Tong University, China); Haojin Zhu (Shanghai Jiao Tong University, China); Muyuan Li (University at Buffalo, USA); Kui Ren (University at Buffalo, USA)

Arranging the Layout of Alphanumeric Buttons--the Role of Passwords
Xiangxue Li (East China Normal University, China); Yu Yu (Shanghai Jiaotong University, China); Qiang Li (Shanghai Jiaotong University, China); Haifeng Qian (East China Normal University, China); Yuan Zhou (Network Emergency Response Technical Team/Coordination Center, China); Jian Weng (Jinan University, China)

A Hybrid Botnet Ecological Environment
Yumei Dai (Beijing University of Posts and Telecommunications, China); Yu Liang (Beijing University of Posts and Telecommunications, China); Ke Li (Beijing University of Posts and Telecommunications, China)

Recommendation-based Third-Party Tracking Monitor to Balance Privacy with Personalization
Qixu Liu (University of Chinese Academy of Sciences, China); Qianru Wu (University of Chinese Academy of Sciences, China); Yuqing Zhang (University of Chinese Academy of Sciences, China); Xiali Wang (University of Chinese Academy of Sciences, China)

T-IP: A Self-Trustworthy and Secure Internet Protocol with Full Compliance to TCP/IP
Xiaofeng Wang (National University of Defense Technology, China); Huan Zhou (National University of Defense Technology, China); Jinshu Su (National University of Defense Technology, China); Bofeng Zhang (National University of Defense Technology, China); Fan Yang (University of Chicago, USA);

Euclidean Distance Based Encryption: How to Embed Fuzziness in Biometric Based Encryption
Fuchun Guo (University of Wollongong, Australia); Willy (University of Wollongong, Australia); Yi (University of Wollongong, Australia)

When and How to Implicitly Authenticate Smartphone Users
Aaron Atwater (University of Waterloo, Canada); Hassan Khan (University of Waterloo, Canada); Urs Hengartner (University of Waterloo, Canada)

Enhancing Security and Privacy with Google Glass
Johannes Krupp (Saarland University, Germany); Dominique Schröder (Saarland University, Germany); Mark Simkin (Saarland University, Germany)

A Lightweight Unknown HTTP Botnets Detecting and Characterizing System
Ke Li (Beijing University of Posts and Telecommunications, China); Chaoge Liu (Institute of Computing Technology, Chinese Academy of Sciences, China); Xiang Cui (Institute of Computing Technology, Chinese Academy of Sciences, China)

On the Resilience of DNS Infrastructure
Haya Shulman (Technische Universität Darmstadt, Germany); Shiran Ezra (Bar Ilan University, Israel);

TraceVirt: A Framework for Detecting the Non-tampering Attacks in the Virtual Machine
Jie Lin (Beijing University of Posts and Telecommunications, China); Chuanyi Liu (Beijing University of Posts and Telecommunications, China); Binxing Fang (Beijing University of Posts and Telecommunications, China);

Quasi-ID: In fact, I am a human
Milivoj Simeonovski (CISPA, Saarland University, Germany);

Using Chinese Characters for Authentication--Algorithmic Framework and Empirical Results
Xiangxue Li (East China Normal University, China); Yu Yu (Shanghai Jiaotong University, China); Qiang Li (Shanghai Jiaotong University, China); Haifeng Qian (East China Normal University, China); Yuan Zhou (Network Emergency Response Technical Team/Coordination Center, China); Jian Weng (Jinan University, China)

Privacy-Enhancing Features of IdentiDroid
Daniele Midi (Purdue University, USA); Oyindamola Oluwatimi (Purdue University, USA); Bilal Shebaro (Purdue University, USA); Elisa Bertino (Purdue University, USA)

Study of Software Plugin-based Malware
Yu Liang (Beijing University of Posts and Telecommunications, China); Zhiqiao Li (Beijing University of Posts and Telecommunications, China); Xiang Cui (Institute of Computing Technology, Chinese Academy of Sciences, China)

How Distributed Are Today’s DDoS Attacks?
An Wang (George Mason University, USA); Wentao Chang (George Mason University, USA); Aziz Mohaisen (VeriSign Labs, USA); Songqing Chen (George Mason University, USA)

An E2E Trusted Cloud Infrastructure
Juan Wang (Wuhan university, China); Bo Zhao (Wuhan university, China); Huanguo Zhang (Wuhan university, China); Hongxin Hu (Clemson University, USA); Fei Yan (Wuhan university, China); Liqiang Zhang (Wuhan university, China); Fajiang Yu (Wuhan university, China);

Protecting Against Data Exfiltration Insider Attacks Through Application Programs
Asmaa Sallam (Purdue University, USA); Elisa Bertino (Purdue University, USA)

Misuseablity Analysis for IT Infrastructure
Asaf Shabtai (Ben-Gurion University of the Negev, Israel); Yuval Elovici (Ben-Gurion University of the Negev, Israel)

Compromising Cloaking-based Location Privacy Preserving Mechanisms with Location Injection Attacks
Lei Jin (University of Pittsburgh. USA); Balaji Palanisamy (University of Pittsburgh. USA); James B.D. Joshi (University of Pittsburgh. USA)

Password Entering and Transmission Security
Gamze Canova (Technische Universität Darmstadt, Germany); Melanie Volkamer (Technische Universität Darmstadt, Germany); Simon Weiler (Technische Universität Darmstadt, Germany)

Android System Broadcast Actions Broadcasts Your Privacy
Fadi Mohsen (University of North Carolina at Charlotte, USA); Mohamed Shehab (University of North Carolina at Charlotte, USA); Emmanuel Bello-Ogunu ebelloog (University of North Carolina at Charlotte, USA); Abeer Al Jarrah (University of North Carolina at Charlotte, USA)

Positioning Attack on Proximity-Based People Discovery
Huan Feng (University of Michigan, USA); Kang G. Shin (University of Michigan, USA)

Abusing URL Shortening Services for Stealthy and Resilient Message Transmitting
Dong Li (Beijing University of Posts and Telecommunications, China); Fangjiao Zhang (Institute of Computing Technology, Chinese Academy of Sciences, China); Chaoge Liu liuchaoge@ict.ac.cn (Institute of Computing Technology, Chinese Academy of Sciences, China)

Mining Elephant Applications in Unknown Traffic by Service Clustering
Hongliang Yu (Beijing University of Posts and Telecommunications, China); Yong Zhao (Institute of Information Engineering, Chinese Academy of Sciences, China); Gang Xiong (Institute of Information Engineering, Chinese Academy of Sciences, China); Li Guo (Institute of Information Engineering, Chinese Academy of Sciences, China); Zhen Li (Institute of Information Engineering, Chinese Academy of Sciences, China); Yong Wang (The National Computer Network Emergency Response Technical Team/Coordination Center of China, China)

Security Control System Enabling to Keep an Intra-LAN in a Secure State Using Security-and-Performance Ratio Control Policies
Yutaka Juba (Ritsumeikan University, Japan); Hung-Hsuan Huang (Ritsumeikan University, Japan); Kyoji Kawagoe (Ritsumeikan University, Japan)

TLS Proxies: Friend or Foe?
Mark O'Neill (Brigham Young University, USA); Scott Ruoti (Brigham Young University, USA); Kent Seamons (Brigham Young University, USA); Daniel Zappala (Brigham Young University, USA)

UAFChecker: Scalable Static Detection of Use-After-Free Vulnerabilities
Jiayi Ye (Peking University, China); Chao Zhang (UC Berkeley, USA); Xinhui Han (Peking University, China)

AdHoneyDroid – Capture Malicious Android Advertisements
Dongqi Wang (Peking University, China); Shuaifu Dai (Peking University and CNCERT, China); Yu Ding (Peking University, China); Tongxin Li (Peking University, China); Xinhui Han (Peking University, China)

Fingerprinting the Publicly Available Sandboxes
Ke Liu (Institute of Computing Technology, Chinese Academy of Sciences, China); Shuai Lu (Harbin University of Science and Technology, China); Chaoge Liu (Institute of Computing Technology, Chinese Academy of Sciences, China)