Main Page

ASIACCS 2017

ASIACCS 2017 Workshops

CCS 2016

CCS 2016
Workshops

CODASPY 2017

CODASPY 2017 Workshops

SACMAT 2017

WiSec 2016

Compilation Author Index

ACM SIGSAC Membership Application

 

ASIA CCS '17 Table of Contents

Foreword
Ahmad-Reza Sadeghi (TU Darmstadt)

Xun Yi (RMIT University)

William Enck (North Carolina State University)

Long Lu (Stony Brook University)

ASIA CCS'17 Organizing Committee

ASIA CCS'17 Sponsor & Supporters

Keynote & Invited Talks

Malware & Machine Learning 1

SGX

Privacy

Mobile Apps & Markets

Malware & Machine Learning 2

Embedded Systems Security 1

Mobile Security 1

Memory Corruption Att. & Def.

Mobile Security 2

Encryption

Side Channel Attacks

Cloud Security

Embedded Systems Security 2

Password & Auth 1

Applied Crypto

Vulnerability Analysis

Web & Network Security

Password & Auth 2

Demonstrations

Storage Security

Posters

(Return to Top)

Keynote & Invited Talks

Hardware Trojans and Other Threats against Embedded Systems (Page 1)
Christof Paar (Ruhr Universitat Bochum & University of Massachusetts - Amherst)

Advanced Security Research in the Era of the Internet of Things (Page 2)
Gregory Akers (Cisco Systems)

CoverUp: Privacy Through "Forced" Participation in Anonymous Communication Networks (Page 3)
David Sommer (ETH Zurich)

Aritra Dhar (ETH Zurich)

Luka Malisa (ETH Zurich)

Esfandiar Mohammadi (ETH Zurich)

Daniel Ronzani (Ronzani Schlauri Attorneys)

Srdjan Capkun (ETH Zurich)

Control-Flow Hijacking: Are We Making Progress? (Page 4)
Mathias Payer (Purdue University)

Security in Personal Genomics: Lest We Forget (Page 5)
Gene Tsudik (University of California, Irvine)

The Case for System Command Encryption (Page 6)
Marc Beunardeau (Ecole normale supérieure)

Aisling Connolly (Ecole normale supérieure)

Rémi Géraud (Ecole normale supérieure)

David Naccache (Ecole normale supérieure)

(Return to Top)

Session: SGX
Session Chair: Mathias Payer (Purdue University)

Detecting Privileged Side-Channel Attacks in Shielded Execution with Déjà Vu (Page 7)
Sanchuan Chen (The Ohio State University)

Xiaokuan Zhang (The Ohio State University)

Michael K. Reiter (University of North Carolina)

Yinqian Zhang (The Ohio State University)

SGX-Log: Securing System Logs With SGX (Page 19)
Vishal Karande (University of Texas at Dallas)

Erick Bauman (University of Texas at Dallas)

Zhiqiang Lin (University of Texas at Dallas)

Latifur Khan (University of Texas at Dallas)

The Circle Game: Scalable Private Membership Test Using Trusted Hardware (Page 31)
Sandeep Tamrakar (Aalto University)

Jian Liu (Aalto University)

Andrew Paverd (Aalto University)

Jan-Erik Ekberg (Darkmatter)

Benny Pinkas (Bar-Ilan University)

N. Asokan (Aalto University & University of Helsinki)

(Return to Top)

Session: Mobile Apps & Markets
Session Chair: William Enck (North Carolina State University)

To Update or Not to Update: Insights from a Two-Year Study of Android App Evolution (Page 45)
Vincent F. Taylor (University of Oxford)

Ivan Martinovic (University of Oxford)

Toward Detecting Collusive Ranking Manipulation Attackers in Mobile App Markets (Page 58)
Hao Chen (East China Normal University)

Daojing He (East China Normal University)

Sencun Zhu (The Pennsylvania State University)

Jingshun Yang (East China Normal University)

Collusive Data Leak and More: Large-scale Threat Analysis of Inter-app Communications (Page 71)
Amiangshu Bosu (Southern Illinois University Carbondale)

Fang Liu (Virginia Tech)

Danfeng (Daphne) Yao (Virginia Tech)

Gang Wang (Virginia Tech)

(Return to Top)

Session: Embedded Systems Security 1
Session Chair: Daphne Yao (Virginia Polytechnic Institute & State University)

Lightweight Swarm Attestation: A Tale of Two LISA-s (Page 86)
Xavier Carpent (University of California, Irvine)

Karim ElDefrawy (SRI International)

Norrathep Rattanavipanon (University of California, Irvine)

Gene Tsudik (University of California, Irvine)

Model-based Attack Detection Scheme for Smart Water Distribution Networks (Page 101)
Chuadhry Mujeeb Ahmed (Singapore University of Technology and Design)

Carlos Murguia (Singapore University of Technology and Design)

Justin Ruths (University of Texas Dallas)

Towards Formal Security Analysis of Industrial Control Systems (Page 114)
Marco Rocchetto (University of Luxembourg)

Nils Ole Tippenhauer (Singapore University of Technology and Design)

Memory Safety for Embedded Devices with nesCheck (Page 127)
Daniele Midi (Purdue University)

Mathias Payer (Purdue University)

Elisa Bertino (Purdue University)

(Return to Top)

Session: Memory Corruption Att. & Def.
Session Chair: Heng Yin (University of California, Riverside)

Strict Virtual Call Integrity Checking for C++ Binaries (Page 140)
Mohamed Elsabagh (George Mason University)

Dan Fleck (George Mason University)

Angelos Stavrou (George Mason University)

BinSequence: Fast, Accurate and Scalable Binary Code Reuse Detection (Page 155)
He Huang (Concordia University)

Amr M. Youssef (Concordia University)

Mourad Debbabi (Concordia University)

PrivWatcher: Non-bypassable Monitoring and Protection of Process Credentials from Memory Corruption Attacks (Page 167)
Quan Chen (North Carolina State University)

Ahmed M. Azab (Samsung Research America)

Guruprasad Ganesh (Samsung Research America)

Peng Ning (Samsung Research America)

Breaking Ad-hoc Runtime Integrity Protection Mechanisms in Android Financial Apps (Page 179)
Taehun Kim (Seoul National University)

Hyeonmin Ha (Seoul National University)

Seoyoon Choi (SAP Labs, Korea)

Jaeyeon Jung (Samsung Electronics)

Byung-Gon Chun (Seoul National University)

DataShield: Configurable Data Confidentiality and Integrity (Page 193)
Scott A. Carr (Purdue University)

Mathias Payer (Purdue University)

(Return to Top)

Session: Encryption
Session Chair: Di Ma (University of Michigan)

Functional Encryption with Oblivious Helper (Page 205)
Pierre-Alain Dupont (DGA, CNRS, INRIA, & ENS/PSL Research University)

David Pointcheval (CNRS, INRIA, & ENS/PSL Research University)

Mis-operation Resistant Searchable Homomorphic Encryption (Page 215)
Keita Emura (National Institute of Information and Communications Technology)

Takuya Hayashi (National Institute of Information and Communications Technology)

Noboru Kunihiro (The University of Tokyo & JST CREST)

Jun Sakuma (University of Tsukuba, JST CREST, & RIKEN Center for AIP)

A Ciphertext-Policy Attribute-based Encryption Scheme With Optimized Ciphertext Size and Fast Decryption (Page 230)
Qutaibah M. Malluhi (Qatar University)

Abdullatif Shikfa (Qatar University)

Viet Cuong Trinh (Qatar University and Hong Duc University)

On the Robustness of RSA-OAEP Encryption and RSA-PSS Signatures Against (Malicious) Randomness Failures (Page 241)
Jacob C. N. Schuldt (AIST)

Kazumasa Shinagawa (AIST & University of Tsukuba)

(Return to Top)

Session: Cloud Security
Session Chair: Dieter Gollmann (Hamburg University of Technology)

DoS Attacks on Your Memory in Cloud (Page 253)
Tianwei Zhang (Princeton University)

Yinqian Zhang (The Ohio State University)

Ruby B. Lee (Princeton University)

Side Channels in Deduplication: Trade-offs between Leakage and Efficiency (Page 266)
Frederik Armknecht (University of Mannheim)

Colin Boyd (Norwegian University of Science and Technology)

Gareth T. Davies (Norwegian University of Science and Technology)

Kristian Gjøsteen (Norwegian University of Science and Technology)

Mohsen Toorani (University of Bergen)

Sharing Proofs of Retrievability across Tenants (Page 275)
Frederik Armknecht (University of Mannheim)

Jens-Matthias Bohli (NEC Laboratories Europe & Hochschule Mannheim)

David Froelicher (NEC Laboratories Europe)

Ghassan O. Karame (NEC Laboratories Europe)

Cache-Based Application Detection in the Cloud Using Machine Learning (Page 288)
Berk Gulmezoglu (Worcester Polytechnic Institute)

Thomas Eisenbarth (Worcester Polytechnic Institute)

Berk Sunar (Worcester Polytechnic Institute)

(Return to Top)

Session: Password & Auth 1
Session Chair: Jianying Zhou (Institute for Infocomm Research)

VTBPEKE: Verifier-based Two-Basis Password Exponential Key Exchange (Page 301)
David Pointcheval (CNRS, INRIA, ENS/PSL Research University)

Guilin Wang (Huawei)

Boosting the Guessing Attack Performance on Android Lock Patterns with Smudge Attacks (Page 313)
Seunghun Cha (Sungkyunkwan University)

Sungsu Kwag (Sungkyunkwan University)

Hyoungshick Kim (Sungkyunkwan University)

Jun Ho Huh (Honeywell ACS Labs)

Short Paper - What You See is Not What You Get: Leakage-Resilient Password Entry Schemes for Smart Glasses (Page 327)
Yan Li (Singapore Management University)

Yao Cheng (Singapore Management University)

Yingjiu Li (Singapore Management University)

Robert H. Deng (Singapore Management University)

(Return to Top)

Session: Vulnerability Analysis
Session Chair: Manuel Egele (Boston University)

Pinpointing Vulnerabilities (Page 334)
Yue Chen (Florida State University)

Mustakimur Khandaker (Florida State University)

Zhi Wang (Florida State University)

Extracting Conditional Formulas for Cross-Platform Bug Search (Page 346)
Qian Feng (Syracuse University)

Minghua Wang (BaiDu X-Lab)

Mu Zhang (NEC Laboratories America)

Rundong Zhou (Syracuse University)

Andrew Henderson (Syracuse University)

Heng Yin (University of California, Riverside)

Discovering Logical Vulnerabilities in the Wi-Fi Handshake Using Model-Based Testing (Page 360)
Mathy Vanhoef (KU Leuven)

Domien Schepers (KU Leuven)

Frank Piessens (KU Leuven)

(Return to Top)

Session: Password & Auth 2
Session Chair: Gene Tsudik (University of California, Irvine)

Understanding Human-Chosen PINs: Characteristics, Distribution and Security (Page 372)
Ding Wang (Peking University)

Qianchen Gu (Peking University)

Xinyi Huang (Fujian Normal University)

Ping Wang (Peking University)

Evaluating Behavioral Biometrics for Continuous Authentication: Challenges and Metrics (Page 386)
Simon Eberz (University of Oxford)

Kasper B. Rasmussen (University of Oxford)

Vincent Lenders (armasuisse)

Ivan Martinovic (University of Oxford)

Short Paper - Pass-O: A Proposal to Improve the Security of Pattern Unlock Scheme (Page 400)
Harshal Tupsamudre (TCS Research)

Vijayanand Banahatti (TCS Research)

Sachin Lodha (TCS Research)

Ketan Vyas (TCS Research)

(Return to Top)

Session: Storage Security
Session Chair: Long Lu (Stony Brook University)

Proofs of Data Residency: Checking whether Your Cloud Files Have Been Relocated (Page 408)
Hung Dang (National University of Singapore)

Erick Purwanto (National University of Singapore)

Ee-Chien Chang (National University of Singapore)

EncKV: An Encrypted Key-value Store with Rich Queries (Page 423)
Xingliang Yuan (City University of Hong Kong)

Yu Guo (City University of Hong Kong)

Xinyu Wang (City University of Hong Kong)

Cong Wang (City University of Hong Kong)

Baochun Li (University of Toronto)

Xiaohua Jia (City University of Hong Kong)

MoPS: A Modular Protection Scheme for Long-Term Storage (Page 436)
Christian Weinert (TU Darmstadt)

Denise Demirel (TU Darmstadt)

Martín Vigil (UFSC)

Matthias Geihs (TU Darmstadt)

Johannes Buchmann (TU Darmstadt)

Updatable Block-Level Message-Locked Encryption (Page 449)
Yongjun Zhao (The Chinese University of Hong Kong)

Sherman S. M. Chow (The Chinese University of Hong Kong)

SHORT PAPER: LINCOS - A Storage System Providing Long-Term Integrity, Authenticity, and Confidentiality (Page 461)
Johannes Braun (TU Darmstadt)

Johannes Buchmann (TU Darmstadt)

Denise Demirel (TU Darmstadt)

Matthias Geihs (TU Darmstadt)

Mikio Fujiwara (NICT)

Shiho Moriai (NICT)

Masahide Sasaki (NICT)

Atsushi Waseda (NICT)

(Return to Top)

Session: Malware & Machine Learning 1
Session Chair: Ivan Martinovic (University of Oxford)

Scaling and Effectiveness of Email Masquerade Attacks: Exploiting Natural Language Generation (Page 469)
Shahryar Baki (University of Houston)

Rakesh Verma (University of Houston)

Arjun Mukherjee (University of Houston)

Omprakash Gnawali (University of Houston)

On the Detection of Kernel-Level Rootkits Using Hardware Performance Counters (Page 483)
Baljit Singh (Qatar University)

Dmitry Evtyushkin (State University of New York at Binghamton)

Jesse Elwell (Vencore Labs)

Ryan Riley (Qatar University)

Iliano Cervesato (Carnegie Mellon University)

Gossip: Automatically Identifying Malicious Domains from Mailing List Discussions (Page 494)
Cheng Huang (Sichuan University)

Shuang Hao (University of California, Santa Barbara)

Luca Invernizzi (University of California, Santa Barbara)

Jiayong Liu (Sichuan University)

Yong Fang (Sichuan University)

Christopher Kruegel (University of California, Santa Barbara & Lastline, Inc.)

Giovanni Vigna (University of California, Santa Barbara & Lastline, Inc.)

Practical Black-Box Attacks against Machine Learning (Page 506)
Nicolas Papernot (Pennsylvania State University)

Patrick McDaniel (Pennsylvania State University)

Ian Goodfellow (OpenAI)

Somesh Jha (University of Wisconsin)

Z. Berkay Celik (Pennsylvania State University)

Ananthram Swami (US Army Research Laboratory)

(Return to Top)

Session: Privacy
Session Chair: Cong Wang (City University of Hong Kong, Hong Kong)

Secure Wallet-Assisted Offline Bitcoin Payments with Double-Spender Revocation (Page 520)
Alexandra Dmitrienko (ETH Zurich)

David Noack (Technische Universität Darmstadt)

Moti Yung (Snapchat, Inc. & Columbia University)

Privacy-preserving and Optimal Interval Release for Disease Susceptibility (Page 532)
Kosuke Kusano (University of Tsukuba)

Ichiro Takeuchi (Nagoya Institute of Technology & RIKEN Center for AIP)

Jun Sakuma (University of Tsukuba, JST CREST, & RIKEN Center for AIP)

Towards Extending Noiseless Privacy - Dependent Data and More Practical Approach (Page 546)
Krzysztof Grining (Wroclaw University of Science and Technology)

Marek Klonowski (Wroclaw University of Science and Technology)

BlindIDS: Market-Compliant and Privacy-Friendly Intrusion Detection System over Encrypted Traffic (Page 561)
Sébastien Canard (Orange Labs)

Aïda Diop (Orange Labs)

Nizar Kheir (Thales Group)

Marie Paindavoine (Orange Labs)

Mohamed Sabt (DejaMobile)

(Return to Top)

Session: Malware & Machine Learning 2
Session Chair: Robert H. Deng (Singapore Management University, Singapore)

The Role of Hosting Providers in Fighting Command and Control Infrastructure of Financial Malware (Page 575)
Samaneh Tajalizadehkhoob (Delft University of Technology)

Carlos Gañán (Delft University of Technology)

Arman Noroozian (Delft University of Technology)

Michel van Eeten (Delft University of Technology)

Automatically Inferring Malware Signatures for Anti-Virus Assisted Attacks (Page 587)
Christian Wressnegger (TU Braunschweig)

Kevin Freeman (University of Göttingen)

Fabian Yamaguchi (TU Braunschweig)

Konrad Rieck (TU Braunschweig)

PAYBREAK: Defense Against Cryptographic Ransomware (Page 599)
Eugene Kolodenker (Boston University & MITRE)

William Koch (Boston University)

Gianluca Stringhini (University College London)

Manuel Egele (Boston University)

(Return to Top)

Session: Mobile Security 1
Session Chair: N. Asokan (Aalto University)

SPOKE: Scalable Knowledge Collection and Attack Surface Analysis of Access Control Policy for Security Enhanced Android (Page 612)
Ruowen Wang (Samsung Research America)

Ahmed M. Azab (Samsung Research America)

William Enck (North Carolina State University)

Ninghui Li (Purdue University)

Peng Ning (Samsung Research America)

Xun Chen (Samsung Research America)

Wenbo Shen (Samsung Research America)

Yueqiang Cheng (Samsung Research America)

Android Database Attacks Revisited (Page 625)
Behnaz Hassanshahi (National University of Singapore)

Roland H. C. Yap (National University of Singapore)

TriFlow: Triaging Android Applications using Speculative Information Flows (Page 640)
Omid Mirzaei (Universidad Carlos III de Madrid)

Guillermo Suarez-Tangil (University College London)

Juan Tapiador (Universidad Carlos III de Madrid)

Jose M. de Fuentes (Universidad Carlos III de Madrid)

(Return to Top)

Session: Mobile Security 2
Session Chair: Andrew Paverd (Aalto University)

Secure Integration of Web Content and Applications on Commodity Mobile Operating Systems (Page 652)
Drew Davidson (University of Wisconsin-Madison)

Yaohui Chen (Stony Brook University)

Franklin George (Stony Brook University)

Long Lu (Stony Brook University)

Somesh Jha (University of Wisconsin-Madison)

DroidForensics: Accurate Reconstruction of Android Attacks via Multi-layer Forensic Logging (Page 666)
Xingzi Yuan (University of Georgia)

Omid Setayeshfar (University of Georgia)

Hongfei Yan (University of Georgia)

Pranav Panage (University of Georgia)

Xuetao Wei (University of Cincinnati)

Kyu Hyung Lee (University of Georgia)

DroidPill: Pwn Your Daily-Use Apps (Page 678)
Chaoting Xuan (VMWare)

Gong Chen (Georgia Institute of Technology)

Erich Stuntebeck (VMWare)

(Return to Top)

Session: Side Channel Attacks
Session Chair: Hoda A. Khezaimy (Emirates Advanced Investment Group)

Securing Memory Encryption and Authentication Against Side-Channel Attacks Using Unprotected Primitives (Page 690)
Thomas Unterluggauer (Graz University of Technology)

Mario Werner (Graz University of Technology)

Stefan Mangard (Graz University of Technology)

Don't Skype & Type! Acoustic Eavesdropping in Voice-Over-IP (Page 703)
Alberto Compagno (Sapienza University of Rome)

Mauro Conti (University of Padua)

Daniele Lain (University of Padua)

Gene Tsudik (University of California, Irvine)

Hit by the Bus: QoS Degradation Attack on Android (Page 716)
Mehmet Sinan Inci (Worcester Polytechnic Institute)

Thomas Eisenbarth (Worcester Polytechnic Institute)

Berk Sunar (Worcester Polytechnic Institute)

(Return to Top)

Session: Embedded Systems Security 2
Session Chair: Michail Maniatakos (New York University Abu Dhabi)

DRIVE: Dynamic Runtime Integrity Verification and Evaluation (Page 728)
Andre Rein (Huawei Technologies)

An Attack Against Message Authentication in the ERTMS Train to Trackside Communication Protocols (Page 743)
Tom Chothia (University of Birmingham)

Mihai Ordean (University of Birmingham)

Joeri de Ruiter (Radboud University)

Richard J. Thomas (University of Birmingham)

Using Program Analysis to Synthesize Sensor Spoofing Attacks (Page 757)
Ivan Pustogarov (Cornell Tech)

Thomas Ristenpart (Cornell Tech)

Vitaly Shmatikov (Cornell Tech)

Short Paper - SCM: Secure Code Memory Architecture (Page 771)
Ruan de Clercq (KU Leuven)

Ronald de Keulenaer (Ghent University)

Pieter Maena (KU Leuven)

Bart Preneel (KU Leuven)

Bjorn De Sutter (Ghent University)

Ingrid Verbauwhede (KU Leuven)

(Return to Top)

Session: Applied Crypto
Session Chair: Frederik Armknecht (University of Mannheim)

Group Signatures with Time-bound Keys Revisited: A New Model and an Efficient Construction (Page 777)
Keita Emura (National Institute of Information and Communications Technology)

Takuya Hayashi (National Institute of Information and Communications Technology)

Ai Ishida (Tokyo Institute of Technology & National Institute of Advanced Industrial Science and Technology)

Almost Universal Forgery Attacks on the COPA and Marble Authenticated Encryption Algorithms (Page 789)
Jiqiang Lu (Institute for Infocomm Research)

A Terrorist-fraud Resistant and Extractor-free Anonymous Distance-bounding Protocol (Page 800)
Gildas Avoine (INSA & IRISA Rennes)

Xavier Bultel (Université Clermont Auvergne)

Sébastien Gambs (Université du Québec à Montréal)

David Gérault (Université Clermont Auvergne)

Pascal Lafourcade (Université Clermont Auvergne)

Cristina Onete (INSA/IRISA Rennes)

Jean-Marc Robert (École de Technologie Supérieure)

Heterogeneous Rainbow Table Widths Provide Faster Cryptanalyses (Page 815)
Gildas Avoine (INSA Rennes & IRISA)

Xavier Carpent (University of California, Irvine)

An Efficient KP-ABE with Short Ciphertexts in Prime OrderGroups under Standard Assumption (Page 823)
Jongkil Kim (CSIRO)

Willy Susilo (University of Wollongong)

Fuchun Guo (University of Wollongong)

Man Ho Au (The Hong Kong Polytechnic University)

Surya Nepal (CSIRO)

(Return to Top)

Session: Web & Network Security
Session Chair: Christina Pöpper (New York University Abu Dhabi)

SECRET: On the Feasibility of a Secure, Efficient, and Collaborative Real-Time Web Editor (Page 835)
Dennis Felsch (Ruhr-University Bochum)

Christian Mainka (Ruhr-University Bochum)

Vladislav Mladenov (Ruhr-University Bochum)

Jörg Schwenk (Ruhr-University Bochum)

WedgeTail: An Intrusion Prevention System for the Data Plane of Software Defined Networks (Page 849)
Arash Shaghaghi (The University of New South Wales & Data61, CSIRO)

Mohamed Ali Kaafar (Data61, CSIRO)

Sanjay Jha (The University of New South Wales)

The Case for In-Network Replay Suppression (Page 862)
Taeho Lee (ETH Zürich)

Christos Pappas (ETH Zürich)

Adrian Perrig (ETH Zürich)

Virgil Gligor (Carnegie Mellon University)

Yih-Chun Hu (University of Illinois at Urbana-Champaign)

Taming Asymmetric Network Delays for Clock Synchronization Using Power Grid Voltage (Page 874)
Dima Rabadi (Singapore University of Technology and Design & Advanced Digital Science Center, Illinois at Singapore)

Rui Tan (Nanyang Technological University)

David K. Y. Yau (Singapore University of Technology and Design & Advanced Digital Science Center, Illinois at Singapore)

Sreejaya Viswanathan (Advanced Digital Science Center, Illinois at Singapore)

Accurate Manipulation of Delay-based Internet Geolocation (Page 887)
AbdelRahman Abdou (Carleton University)

Ashraf Matrawy (Carleton University)

Paul C. van Oorschot (Carleton University)

(Return to Top)

Demonstrations

BRIDEMAID: An Hybrid Tool for Accurate Detection of Android Malware (Page 899)
Fabio Martinelli (IIT-CNR)

Francesco Mercaldo (IIT-CNR)

Andrea Saracino (IIT-CNR)

How Discover a Malware using Model Checking (Page 902)
Fabio Martinelli (IIT-CNR)

Francesco Mercaldo (IIT-CNR)

Vittoria Nardone (University of Sannio)

Antonella Santone (University of Sannio)

(Return to Top)

Posters

POSTER: Enabling End-Users to Protect their Privacy (Page 905)
Mahmoud Barhamgi (The Open University & Claude Bernard University)

Mu Yang (The Open University)

Chia-Mu Yu (National Chung Hsing University)

Yijun Yu (The Open University)

Arosha K. Bandara (The Open University)

Djamal Benslimane (Claude Bernard University)

Bashar Nuseibeh (The Open University The Irish Software Research Centre)

POSTER: Detecting Inter-App Information Leakage Paths (Page 908)
Shweta Bhandari (MNIT Jaipur)

Frederic Herbreteau (University of Bordeaux)

Vijay Laxmi (MNIT Jaipur)

Akka Zemmari (University of Bordeaux)

Partha S. Roop (The University of Auckland)

Manoj Singh Gaur (MNIT Jaipur)

POSTER: Detection of Information Leaks via Reflection in Android Apps (Page 911)
Jyoti Gajrani (MNIT Jaipur)

Li Li (SnT, University of Luxembourg)

Vijay Laxmi (MNIT)

Meenakshi Tripathi (MNIT)

Manoj Singh Gaur (MNIT)

Mauro Conti (University of Padua)

POSTER: Localization of Spoofing Devices using a Large-scale Air Traffic Surveillance System (Page 914)
Kai Jansen (Ruhr-University Bochum)

Matthias Schäfer (University of Kaiserslautern)

Vincent Lenders (armasuisse)

Christina Pöpper (New York University Abu Dhabi)

Jens Schmitt (University of Kaiserslautern)

POSTER: Traffic Analysis Attacks in Anonymity Networks (Page 917)
Katharina Siobhan Kohls (Ruhr-University)

Christina Poepper (New York University)

POSTER: Quantitative Security Assessment Method based on Entropy for Moving Target Defense (Page 920)
Duohe Ma (CAS)

Liming Wang (CAS)

Cheng Lei (China National Digital Switching System Engineering & Technological Research Center)

Zhen Xu (CAS)

Hongqi Zhang (China National Digital Switching System Engineering & Technological Research Center)

Meng Li (Hong Kong Baptist University)

POSTER: A Behavioral Biometric Authentication Framework on Smartphones (Page 923)
Ahmed Mahfouz (Minia University)

Tarek M. Mahmoud (Minia University & Canadian Interntional College)

Ahmed Sharaf Eldin (Helwan University & Sinai University)

POSTER: A Secure, Practical & Safe Packet Spoofing Service (Page 926)
Will Scott (NYUAD)