Security and Privacy in Communication Networks: 6th International ICST Conference, SecureComm 2010, Singapore, September 7-9, 2010, Proceedings / Edition 1

Security and Privacy in Communication Networks: 6th International ICST Conference, SecureComm 2010, Singapore, September 7-9, 2010, Proceedings / Edition 1

by Sushil Jajodia
     
 

ISBN-10: 364216160X

ISBN-13: 9783642161605

Pub. Date: 11/04/2010

Publisher: Springer Berlin Heidelberg

This book constitutes the thoroughly refereed proceedings of the 6th International ICST Conference, SecureComm 2010, held in Singapore in September 2010. The 28 revised full papers were carefully reviewed and selected from 112 submissions. They are organized in topical sections on malware and email security, anonymity and privacy, wireless security, systems

Overview

This book constitutes the thoroughly refereed proceedings of the 6th International ICST Conference, SecureComm 2010, held in Singapore in September 2010. The 28 revised full papers were carefully reviewed and selected from 112 submissions. They are organized in topical sections on malware and email security, anonymity and privacy, wireless security, systems security, network security, and security prools.

Product Details

ISBN-13:
9783642161605
Publisher:
Springer Berlin Heidelberg
Publication date:
11/04/2010
Series:
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering Series, #50
Edition description:
2010
Pages:
500
Product dimensions:
6.10(w) x 9.20(h) x 1.20(d)

Table of Contents

Malware and Email Security

SAS: Semantics Aware Signature Generation for Polymorphic Worm Detection Deguang Kong Yoon-Chan Jhi Tao Gong Sencun Zhu Peng Liu Hongsheng Xi 1

Analyzing and Exploiting Network Behaviors of Malware Jose Andre Morales Areej Al-Bataineh Shouhuai Xu Ravi Sandhu 20

Inexpensive Email Addresses An Email Spam-Combating System Aram Yegenian Tassos Dimitriou 35

Anonymity and Privacy

Privacy Administration in Distributed Service Infrastructure Nabil Ajam Nora Cuppens-Boulahia Frederic Cuppens 53

On the Formation of Historically k-Anonymous Anonymity Sets in a Continuous LBS Rinku Dewri Indrakshi Ray Indrajit Ray Darrell Whitley 71

Securing Personal Health Records in Cloud Computing: Patient-Centric and Fine-Grained Data Access Control in Multi-owner Settings Ming Li Shucheng Yu Kui Ren Wenjing Lou 89

Wireless Security

A Study on False Channel Condition Reporting Attacks in Wireless Networks Dongho Kim Yih-Chun Hu 107

Characterizing the Security Implications of Third-Party Emergency Alert Systems over Cellular Text Messaging Services Patrick Traynor 125

Saving Energy on WiFi with Required IPsec Youngsang Shin Steven Myers Minaxi Gupta 144

Systems Security - I

Transparent Protection of Commodity OS Kernels Using Hardware Virtualization Michael Grace Zhi Wang Deepa Srinivasan Jinku Li Xuxian Jiang Zhenkai Liang Siarhei Liakh 162

A Generic Construction of Dynamic Single Sign-on with Strong Security Jinguang Han Yi Mu Willy Susilo Jun Yan 181

DeCore: Detecting Content Repurposing Attacks on Client' Systems Smitha Sundareswaran Anna C. Squicciarini 199

Network Security - I

Realizing a Source Authentic Internet Toby Ehrenkranz Jun Li Patrick McDaniel 217

Partial Deafness: A Novel Denial-of-Service Attack in 802.11 Networks Jihyuk Choi Jerry T. Chiang Dongho Kim Yih-Chun Hu 235

Attacking Beacon-Enabled 802.15.4 Networks Sang Shin Jung Marco Valero Anu Bourgeois Raheem Beyah 253

Supporting Publication and Subscription Confidentiality in Pub/Sub Networks Mihaela Ion Giovanni Russello Bruno Crispo 272

Security Protocols - I

CED2: Communication Efficient Disjointness Decision Luciana Marconi Mauro Conti Roberto Di Pietro 290

Impossibility of Finding Any Third Family of Server Protocols Integrating Byzantine Quorum Systems with Threshold Signature Schemes Jingqiang Lin Peng Liu Jiwu Jing Qiongxiao Wang 307

Context-Aware Usage Control for Android Guangdong Bai Liang Gu Tao Feng Yao Guo Xiangqun Chen 326

System Security - II

Efficient Isolation of Trusted Subsystems in Embedded Systems Raoul Strackx Frank Piessens Bart Preneel 344

Enhancing Host Security Using External Environment Sensors Ee-Chien Chang Liming Lu Yongzheng Wu Roland H.C. Yap Jie Yu 362

FADE: Secure Overlay Cloud Storage with File Assured Deletion Yang Tang Patrick P.C. Lee John C.S. Lui Radia Perlman 380

Security Protocols - II

A New Information Leakage Measure for Anonymity Protocols Sami Zhioua 398

Hidden Markov Models for Automated Protocol Learning Sean Whalen Matt Bishop James P. Crutchfield 415

Epistemic Model Checking for Knowledge-Based Program Implementation: An Application to Anonymous Broadcast Omar I. Al-Bataineh Ronr van der Meyden 429

Network Security - II

Surveying DNS Wildcard Usage among the Good, the Bad, and the Ugly Andrew Kalafut Minaxi Gupta Pairoj Rattadilok Pragneshkumar Patel 448

The Hitchhiker's Guide to DNS Cache Poisoning Sooel Son Vitaly Shmatikou 466

A Formal Definition of Online Abuse-Freeness Ralf Küsters Henning Schnoor Tomasz Truderung 484

Author Index 499

Customer Reviews

Average Review:

Write a Review

and post it to your social network

     

Most Helpful Customer Reviews

See all customer reviews >