This event is endorsed
and organized by

9th International Conference on Security and Privacy in Communication Networks

September 25–27, 2013 | Sydney, Australia

33 Eirini Karapistoli and Anastasios Economides. *Anomaly Detection in Beacon-Enabled IEEE 802.15.4 Wireless Sensor Networks*

29 Hui Cui, Yi Mu and Man Ho Au. *Public-Key Encryption Resilient to Linear Related-Key Attacks*

43 Shenglong Ding and Yiming Zhao. *Efficient Undeniable Attribute-Based Signature*

48 Xin Ruan, Chuan Yue and Haining Wang. *Unveiling Privacy Setting Breaches in Online Social Networks*

17 Li Miao, He Liangsheng, Gao Neng, Yang Tongjie and Liu Zongbin. *An Efficient Reconfigurable II-ONB Modular Multiplier*

22 Ibrahim Elashry, Yi Mu and Willy Susilo. *Generic Mediated Encryption*

68 Ryan Farley and Xinyuan Wang. *Disabling a Computer by Exploiting Softphone Vulnerabilities: Threat and Mitigation*

67 Mengjun Xie, Liang Hao, Kenji Yoshigoe and Jiang Bian. *CamTalk: A Bidirectional Light Communications Framework for Secure Communications On Smartphones*

15 Jun Jiang, Meining Nie, Purui Su and Dengguo Feng. *VCCBox: Practical Confinement of Untrusted Applications in Virtual Cloud Computing*

27 Niels Avonds, Raoul Strackx, Pieter Agten and Frank Piessens. *Salus: Non-Hierarchical Memory Access Rights to Enforce the Principle of Least Privilege*

46 Cui Xiang, Fang Binxing, Shi Jinqiao and Liu Chaoge. *Botnet Triple-Channel Model: Towards Resilient and Efficient Bidirectional Communication Botnets*

19 Aude Plateaux, Patrick Lacharme, Vincent Coquet, Sylvain Vernois, Kumar Murty and Christophe Rosenberger. *An e-payment architecture ensuring a high level of privacy protection*

45 Veelasha Moonsamy, Jia Rong, Shaowu Liu, Gang Li and Lynn Batten. *Contrasting Permission Patterns between Clean and Malicious Android Application*

25 Silvio Cesare, Yang Xiang and Jun Zhang. *Clonewise – Detecting Package-level Clones Using Machine Learning*

28 Minghua Wang, Purui Su, Qi Li, Lingyun Ying, Yi Yang and Dengguo Feng. *Automatic Polymorphic Exploit Generation for Software Vulnerabilities*

49 Yousra Aafer, Wenliang Du and Heng Yin. *DroidAPIMiner: Mining API-Level Features for Robust Malware Detection in Android*

59 Ting Zhou, Yaping Lin, Wei Zhang, Sheng Xiao and Jinguo Li. *Secure and Verifiable Top-k Query in Two-tiered Sensor Networks*

61 Fei Wang, Liusheng Huang, Zhili Chen, Haibo Miao and Wei Yang. *A Novel Web Tunnel Detection Method Based on Protocol Behaviors*

64 Jin B. Hong and Dong Seong Kim. *Scalable Security Model Generation and Analysis using k-importance Measures*

23 Mehari Msgna, Konstantinos Markantonakis and Keith Mayes. *The B-Side of Side Channel Leakage: Control Flow Security In Embedded Systems*

69 Udaya Tupakula and Vijay Varadharajan. *Integrated Security Architecture for Virtual Machines*