This event is endorsed
and organized by

9th International Conference on Security and Privacy in Communication Networks

September 25–27, 2013 | Sydney, Australia

25 September 2013 – Wednesday

**08:30-09:15 Registration**

09:15-09:30 Opening Remarks

**09:30-10:30 Keynote “Challenges in cyber Security” by Mike Holm – AusCERT**

*10:30-11:00 Tea/Coffee break*

**Session I: Security & Privacy in Mobile, Sensor, and Ad Hoc Networks**

11:00-11:30 Eirini Karapistoli and Anastasios Economides. Anomaly Detection in Beacon-Enabled IEEE 802.15.4 Wireless Sensor Networks

11:30-12:00 Ting Zhou, Yaping Lin, Wei Zhang, Sheng Xiao and Jinguo Li. Secure and Verifiable Top-k Query in Two-tiered Sensor Networks

12:00-12:30 Mengjun Xie, Liang Hao, Kenji Yoshigoe and Jiang Bian. CamTalk: A Bidirectional Light Communications Framework for Secure Communications On Smartphones

*12:30-13:30 Lunch*

**13:30-14:30 Keynote “Data breach disclosure and other dinner party games” by James Turner – AISA**

**Session II: Malware, botnets, and Distributed Denial of Service**

14:30-15:00 Cui Xiang, Fang Binxing, Shi Jinqiao and Liu Chaoge. Botnet Triple-Channel Model: Towards Resilient and Efficient Bidirectional Communication Botnets

15:00-15:30 Veelasha Moonsamy, Jia Rong, Shaowu Liu, Gang Li and Lynn Batten. Contrasting Permission Patterns between Clean and Malicious Android Application

*15:30-16:00 Tea/Coffee break*

16:00-16:30 Yousra Aafer, Wenliang Du and Heng Yin. DroidAPIMiner: Mining API-Level Features for Robust Malware Detection in Android

26 September 2013 – Thursday

**09:00-09:30 Registration**

**09:30-10:30 Keynote “Know the enemy” by Mark Goudie – Dell SecureWorks**

*10:30-11:00 Tea/Coffee break*

**Session III: Security for emerging technologies: VoIP, peer-to-peer, and Cloud Computing**

11:00-11:30 Ryan Farley and Xinyuan Wang. Disabling a Computer by Exploiting Softphone Vulnerabilities: Threat and Mitigation

11:30-12:00 Jun Jiang, Meining Nie, Purui Su and Dengguo Feng. VCCBox: Practical Confinement of Untrusted Applications in Virtual Cloud Computing

12:00-12:30 Vijay Varadharajan and Udaya Tupakula. Integrated Security Architecture for Virtual Machines

*12:30-13:30 Lunch*

**Session IV: Encryption and Key Management**

13:30-14:00 Ibrahim Elashry, Yi Mu and Willy Susilo. Generic Mediated Encryption

14:00-14:30 Li Miao, He Liangsheng, Gao Neng, Yang Tongjie and Liu Zongbin. An Efficient Reconfigurable II-ONB Modular Multiplier

14:30-15:00 Hui Cui, Yi Mu and Man Ho Au. Public-Key Encryption Resilient to Linear Related-Key Attacks

*15:00-15:30 Tea/Coffee break*

**Session V: Security in Software and Machine Learning**

15:30-16:00 Silvio Cesare, Yang Xiang and Jun Zhang. Clonewise – Detecting Package-level Clones Using Machine Learning

16:00-16:30 Minghua Wang, Purui Su, Qi Li, Lingyun Ying, Yi Yang and Dengguo Feng. Automatic Polymorphic Exploit Generation for Software Vulnerabilities

*18:30-22:00 Conference dinner* Eat Love Pizza – Darling Harbour Ground Floor, IMAX Theatre Complex 

27 September 2013 – Friday

**09:00-09:30 Registration**

**09:30-10:30 Keynote “Cyber security: from bio-cryptography to intrusion detection” by Jiankun Hu – ADFA:UNSW**

*10:30-11:00 Tea/Coffee break*

**Session VI: Network and System Security Model**

11:00-11:30 Fei Wang, Liusheng Huang, Zhili Chen, Haibo Miao and Wei Yang. A Novel Web Tunnel Detection Method Based on Protocol Behaviors

11:30-12:00 Niels Avonds, Raoul Strackx, Pieter Agten and Frank Piessens. Salus: Non-Hierarchical Memory Access Rights to Enforce the Principle of Least Privilege

12:00-12:30 Jin B. Hong and Dong Seong Kim. Scalable Security Model Generation and Analysis using k-importance Measures

*12:30-14:00 Lunch*

**Session VII: Security and Privacy in Pervasive and Ubiquitous Computing**

14:00-14:30 Mehari Msgna, Konstantinos Markantonakis and Keith Mayes. The B-Side of Side Channel Leakage: Control Flow Security In Embedded Systems

14:30-15:00 Aude Plateaux, Patrick Lacharme, Vincent Coquet, Sylvain Vernois, Kumar Murty and Christophe Rosenberger. An e-payment architecture ensuring a high level of privacy protection

15:00-15:30 Xin Ruan, Chuan Yue and Haining Wang. Unveiling Privacy Setting Breaches in Online Social Networks

*15:30-16:00 Tea/Coffee break*

**16:00-16:30 Best paper award and concluding remarks**