Skip to main content
  • Conference proceedings
  • © 2013

Security and Privacy in Communication Networks

9th International ICST Conference, SecureComm 2013, Revised Selected Papers

Conference proceedings info: SecureComm 2013.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (26 papers)

  1. Front Matter

  2. Session I: Security & Privacy in Mobile, Sensor, and Ad Hoc Networks

    1. Anomaly Detection in Beacon-Enabled IEEE 802.15.4 Wireless Sensor Networks

      • Eirini Karapistoli, Anastasios A. Economides
      Pages 1-18
    2. Secure and Verifiable Top-k Query in Two-Tiered Sensor Networks

      • Ting Zhou, Yaping Lin, Wei Zhang, Sheng Xiao, Jinguo Li
      Pages 19-34
    3. CamTalk: A Bidirectional Light Communications Framework for Secure Communications on Smartphones

      • Mengjun Xie, Liang Hao, Kenji Yoshigoe, Jiang Bian
      Pages 35-52
  3. Session II: Malware, Botnets, and Distributed Denial of Service

    1. Contrasting Permission Patterns between Clean and Malicious Android Applications

      • Veelasha Moonsamy, Jia Rong, Shaowu Liu, Gang Li, Lynn Batten
      Pages 69-85
  4. Session III: Security for Emerging Technologies: VoIP, Peer-to-peer, and Cloud Computing

    1. VCCBox: Practical Confinement of Untrusted Software in Virtual Cloud Computing

      • Jun Jiang, Meining Nie, Purui Su, Dengguo Feng
      Pages 122-139
    2. Integrated Security Architecture for Virtual Machines

      • Vijay Varadharajan, Udaya Tupakula
      Pages 140-153
  5. Session IV: Encryption and Key Management

    1. Generic Mediated Encryption

      • Ibrahim Elashry, Yi Mu, Willy Susilo
      Pages 154-168
    2. An Efficient Reconfigurable II-ONB Modular Multiplier

      • Li Miao, He Liangsheng, Yang Tongjie, Gao Neng, Liu Zongbin, Zhang Qinglong
      Pages 169-181
    3. Public-Key Encryption Resilient to Linear Related-Key Attacks

      • Hui Cui, Yi Mu, Man Ho Au
      Pages 182-196
  6. Session V: Security in Software and Machine Learning

    1. Clonewise – Detecting Package-Level Clones Using Machine Learning

      • Silvio Cesare, Yang Xiang, Jun Zhang
      Pages 197-215
    2. Automatic Polymorphic Exploit Generation for Software Vulnerabilities

      • Minghua Wang, Purui Su, Qi Li, Lingyun Ying, Yi Yang, Dengguo Feng
      Pages 216-233
  7. Session VI: Network and System Security Model

    1. A Novel Web Tunnel Detection Method Based on Protocol Behaviors

      • Fei Wang, Liusheng Huang, Zhili Chen, Haibo Miao, Wei Yang
      Pages 234-251
    2. Salus: Non-hierarchical Memory Access Rights to Enforce the Principle of Least Privilege

      • Niels Avonds, Raoul Strackx, Pieter Agten, Frank Piessens
      Pages 252-269
  8. Session VII: Security and Privacy in Pervasive and Ubiquitous Computing

    1. The B-Side of Side Channel Leakage: Control Flow Security in Embedded Systems

      • Mehari Msgna, Konstantinos Markantonakis, Keith Mayes
      Pages 288-304
    2. An e-payment Architecture Ensuring a High Level of Privacy Protection

      • Aude Plateaux, Patrick Lacharme, Vincent Coquet, Sylvain Vernois, Kumar Murty, Christophe Rosenberger
      Pages 305-322

Other Volumes

  1. Security and Privacy in Communication Networks

About this book

This book constitutes the thoroughly refereed post-conference proceedings of the 9th International ICST Conference on Security and Privacy in Communication Networks, held in Sydney, Australia, in September 2013. The 26 revised full papers presented were carefully reviewed and selected from 70 submissions. The papers are grouped in topical sections on: security and privacy in mobile, sensor and ad hoc networks; malware, botnets and distributed denial of service; security for emerging technologies: VoIP, peer-to-peer and cloud computing; encryption and key management; security in software and machine learning; network and system security model; security and privacy in pervasive and ubiquitous computing.

Editors and Affiliations

  • School of Computing and Mathematics, Charles Sturt University, Wagga Wagga, Australia

    Tanveer Zia

  • School of Information Technologies, University of Sydney, Darlington, Australia

    Albert Zomaya

  • Department of Computing, Macquarie University, Australia, Australia

    Vijay Varadharajan

  • Department of EECS, University of Michigan, Ann Arbor, USA

    Morley Mao

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access