Table of Contents
Malware and Email Security
SAS: Semantics Aware Signature Generation for Polymorphic Worm Detection Deguang Kong Yoon-Chan Jhi Tao Gong Sencun Zhu Peng Liu Hongsheng Xi 1
Analyzing and Exploiting Network Behaviors of Malware Jose Andre Morales Areej Al-Bataineh Shouhuai Xu Ravi Sandhu 20
Inexpensive Email Addresses An Email Spam-Combating System Aram Yegenian Tassos Dimitriou 35
Anonymity and Privacy
Privacy Administration in Distributed Service Infrastructure Nabil Ajam Nora Cuppens-Boulahia Frederic Cuppens 53
On the Formation of Historically k-Anonymous Anonymity Sets in a Continuous LBS Rinku Dewri Indrakshi Ray Indrajit Ray Darrell Whitley 71
Securing Personal Health Records in Cloud Computing: Patient-Centric and Fine-Grained Data Access Control in Multi-owner Settings Ming Li Shucheng Yu Kui Ren Wenjing Lou 89
Wireless Security
A Study on False Channel Condition Reporting Attacks in Wireless Networks Dongho Kim Yih-Chun Hu 107
Characterizing the Security Implications of Third-Party Emergency Alert Systems over Cellular Text Messaging Services Patrick Traynor 125
Saving Energy on WiFi with Required IPsec Youngsang Shin Steven Myers Minaxi Gupta 144
Systems Security - I
Transparent Protection of Commodity OS Kernels Using Hardware Virtualization Michael Grace Zhi Wang Deepa Srinivasan Jinku Li Xuxian Jiang Zhenkai Liang Siarhei Liakh 162
A Generic Construction of Dynamic Single Sign-on with Strong Security Jinguang Han Yi Mu Willy Susilo Jun Yan 181
DeCore: Detecting Content Repurposing Attacks on Client' Systems Smitha Sundareswaran Anna C. Squicciarini 199
Network Security - I
Realizing a Source Authentic Internet Toby Ehrenkranz Jun Li Patrick McDaniel 217
Partial Deafness: A Novel Denial-of-Service Attack in 802.11 Networks Jihyuk Choi Jerry T. Chiang Dongho Kim Yih-Chun Hu 235
Attacking Beacon-Enabled 802.15.4 Networks Sang Shin Jung Marco Valero Anu Bourgeois Raheem Beyah 253
Supporting Publication and Subscription Confidentiality in Pub/Sub Networks Mihaela Ion Giovanni Russello Bruno Crispo 272
Security Protocols - I
CED2: Communication Efficient Disjointness Decision Luciana Marconi Mauro Conti Roberto Di Pietro 290
Impossibility of Finding Any Third Family of Server Protocols Integrating Byzantine Quorum Systems with Threshold Signature Schemes Jingqiang Lin Peng Liu Jiwu Jing Qiongxiao Wang 307
Context-Aware Usage Control for Android Guangdong Bai Liang Gu Tao Feng Yao Guo Xiangqun Chen 326
System Security - II
Efficient Isolation of Trusted Subsystems in Embedded Systems Raoul Strackx Frank Piessens Bart Preneel 344
Enhancing Host Security Using External Environment Sensors Ee-Chien Chang Liming Lu Yongzheng Wu Roland H.C. Yap Jie Yu 362
FADE: Secure Overlay Cloud Storage with File Assured Deletion Yang Tang Patrick P.C. Lee John C.S. Lui Radia Perlman 380
Security Protocols - II
A New Information Leakage Measure for Anonymity Protocols Sami Zhioua 398
Hidden Markov Models for Automated Protocol Learning Sean Whalen Matt Bishop James P. Crutchfield 415
Epistemic Model Checking for Knowledge-Based Program Implementation: An Application to Anonymous Broadcast Omar I. Al-Bataineh Ronr van der Meyden 429
Network Security - II
Surveying DNS Wildcard Usage among the Good, the Bad, and the Ugly Andrew Kalafut Minaxi Gupta Pairoj Rattadilok Pragneshkumar Patel 448
The Hitchhiker's Guide to DNS Cache Poisoning Sooel Son Vitaly Shmatikou 466
A Formal Definition of Online Abuse-Freeness Ralf Küsters Henning Schnoor Tomasz Truderung 484
Author Index 499