Visible to the public 15th International Conference on Information & Communications Security (ICICS 2013) - Beijing, China

SoS Newsletter- Advanced Book Block

15th International Conference on Information & Communications Security (ICICS 2013) - Beijing, China


15th International Conference on Information & Communications Security (ICICS 2013)
20-22 November 2013, Beijing, China

Defending against heap overflow by using randomization in nested virtual clusters
Chee Meng Tey and Debin Gao
School of Information Systems, Singapore Management University VTOS: Research on Methodology of "Light-weight" Formal Design and Verification for Microkernel OS
Zhenjiang Qian, Hao Huang and Fangmin Song
Department of Computer Science and Technology, Nanjing University

XLRF: A Cross-Layer Intrusion Recovery Framework for Damage Assessment and Recovery Plan Generation
Eunjung Yoon and Peng Liu
Pennsylvania State University

PRIDE: Practical Intrusion Detection in Resource Constrained Wireless Mesh Networks
Amin Hassanzadeh, Zhaoyan Xu, Radu Stoleru, Guofei Gu and Michalis Polychronakis
Texas A&M University; Columbia University

Fingerprint Embedding: A Proactive Strategy of Detecting Timing Channels
Jing Wang, Peng Liu, Limin Liu, Le Guan and Jiwu Jing
State Key Laboratory of Information Security, Institute of Information Engineering, CAS; University of Chinese Academy of Sciences; Pennsylvania State University

Type-Based Analysis of Protected Storage in the TPM
Jianxiong Shao, Dengguo Feng and Yu Qin
Institute of Software, Chinese Academy of Sciences

Remote Attestation Mechanism for User Centric Smart Cards using Pseudorandom Number Generators
Raja Naeem Akram, Konstantinos Markantonakis and Keith Mayes
Cyber Security Lab, Department of Computer Science, University of Waikato; ISG Smart card Centre, Royal Holloway, University of London

Direct Construction of Signcryption Tag-KEM from Standard Assumptions in the Standard Model
Xiangxue Li, Haifeng Qian, Yu Yu, Jian Weng and Yuan Zhou
Department of Computer Science and Technology, East China Normal University;
National Engineering Laboratory for Wireless Security, Xi'an University of Posts and Telecommunications;
Institute for Interdisciplinary Information Sciences, Tsinghua University;
Department of Computer Science, Jinan University;
Network Emergency Response Technical Team/Coordination Center, China

Efficient eCK-secure Authenticated Key Exchange Protocols in the Standard Model
Zheng Yang
Horst Goertz Institute for IT Security

Time-Stealer: A Stealthy Threat for Virtualization Scheduler and Its Countermeasures
Hong Rong, Ming Xian, Huimei Wang and Jiangyong Shi
State Key Laboratory of Complex Electromagnetic Environment Effects on Electronics and Information System,National University of DefenseTechnology

Detecting Malicious Co-resident Virtual Machines Indulging in Load-Variation Attacks
Smitha Sundareswaran and Anna Squicciarini
College of Information Sciences and Technology, Pennsylvania State University

A Covert Channel Using Event Channel State on Xen Hypervisor
Qingni Shen, Mian Wan, Zhuangzhuang Zhang, Zhi Zhang, Sihan Qing and Zhonghai Wu
Peking University;

Comprehensive Evaluation of AES Dual Ciphers as a Side-Channel Countermeasure
Amir Moradi and Oliver Mischke
Horst Gortz Institute for IT-Security, Ruhr University Bochum

EMD-Based Denoising for Side-Channel Attacks and Relationships between the Noises Extracted with Different Denoising Methods
Mingliang Feng, Yongbin Zhou and Zhenmei Yu
State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences; School of Information Technology, Shandong Women's University

Defeat Information Leakage from Browser Extensions Via Data Obfuscation
Wentao Chang and Songqing Chen
Department of Computer Science, George Mason University

Rating Web Pages Using Page-Transition Evidence
Jian Mao, Xinshu Dong, Pei Li, Tao Wei and Zhenkai Liang
School of Electronic and Information Engineering, BeiHang University; School of Computing, National University of Singapore; Institute of Computer Science and Technology, Peking University

OSNGuard: Detecting Worms with User Interaction Traces in Online Social Networks
Liang He, Dengguo Feng, Purui Su, Ling-Yun Ying, Yi Yang, Huafeng, Huang and Huipeng Fang
Institute of Software, Chinese Academy of Sciences

Attacking and Fixing the CS Mode Han Sui, Wenling Wu, Liting Zhang and Peng Wang
Trusted Computing and Information Assurance Laboratory, Institute of Software, Chinese Academy of Sciences; Data Assurance and Communication Security, Institute of Information Engineering, Chinese Academy of Sciences

Integral Attacks on Reduced-Round PRESENT
Shengbao Wu and Mingsheng Wang
Trusted Computing and Information Assurance Laboratory, Institute of Software, Chinese Academy of Sciences; State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences

Computationally Efficient Expressive Key-Policy Attribute Based Encryption Schemes with Constant-Size Ciphertext
Y. Sreenivasa Rao and Ratna Dutta
Indian Institute of Technology Kharagpur

Privacy-Preserving Decentralized Ciphertext-Policy Attribute-Based Encryption with Fully Hidden Access Structure
Huiling Qian, Jiguo Li and Yichen Zhang
College of Computer and Information Engineering, Hohai University

Accelerating AES in JavaScript with WebGL
Yang Yang, Jiawei Zhu, Qiuxiang Dong, Guan Zhi and Zhong Chen
Peking University

Analysis of Multiple Checkpoints in Non-perfect and Perfect Rainbow Tradeoff Revisited
Wenhao Wang and Dongdai Lin
State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences

Efficient Implementation of NIST-Compliant Elliptic Curve Cryptography for Sensor Nodes
Zhe Liu, Hwajeong Seo, Johann Groszschaedl and Howon Kim
University of Luxembourg; Pusan National University

A Secure and Efficient Scheme for Cloud Storage Against Eavesdropper
Jian Liu, Huimei Wang, Ming Xian and Kun Huang
State Key Laboratory of Complex Electromagnetic Environment Effects on Electronics and Information System, National University of Defense Technology

Secure and Private Outsourcing of Shape-Based Feature Extraction
Shumiao Wang, Mohamed Nassar, Mikhail Atallah and Qutaibah Malluhi Purdue University; Qatar University

Toward Generic Method for Server-Aided Cryptography
Sebastien Canard, Iwen Coisel, Julien Devigne, Cecilia Gallais, Thomas Peters and Olivier Sanders
Orange Labs; JRC; Universite de Rennes; Universite catholique de Louvain

Generation and Tate Pairing Computation of Ordinary Elliptic Curves with Embedding Degree One
Zhi Hu, Lin Wang, Maozhi Xu and Guoliang Zhang
Beijing International Center for Mathematical Research, Peking University; Science and Technology on Communication Security Laboratory; LMAM, School of Mathematical Sciences, Peking University

Threshold Secret Image Sharing
Teng Guo, Feng Liu, Chuankun Wu, Chingnung Yang and Wen Wang
State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences; National Dong Hwa University

(ID#:14-2902)


Note:

Articles listed on these pages have been found on publicly available internet pages and are cited with links to those pages. Some of the information included herein has been reprinted with permission from the authors or data repositories. Direct any requests via Email to SoS.Project (at) SecureDataBank.net for removal of the links or modifications to specific citations. Please include the ID# of the specific citation in your correspondence.