Tanveer Zia Albert Zomaya Vijay Varadharajan Morley Mao (Eds.) 127 Security and Privacy in Communication Networks 9th International ICST Conference, SecureComm 2013 Sydney, NSW Australia, September 2013 Revised Selected Papers 123 Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 127 EditorialBoard OzgurAkan MiddleEastTechnicalUniversity,Ankara,Turkey PaoloBellavista UniversityofBologna,Italy JiannongCao HongKongPolytechnicUniversity,HongKong FalkoDressler UniversityofErlangen,Germany DomenicoFerrari UniversitàCattolicaPiacenza,Italy MarioGerla UCLA,USA HisashiKobayashi PrincetonUniversity,USA SergioPalazzo UniversityofCatania,Italy SartajSahni UniversityofFlorida,USA Xuemin(Sherman)Shen UniversityofWaterloo,Canada MirceaStan UniversityofVirginia,USA JiaXiaohua CityUniversityofHongKong,HongKong AlbertZomaya UniversityofSydney,Australia GeoffreyCoulson LancasterUniversity,UK Tanveer Zia Albert Zomaya Vijay Varadharajan Morley Mao (Eds.) Security and Privacy in Communication Networks 9thInternationalICSTConference,SecureComm2013 Sydney, NSWAustralia, September 25-28, 2013 Revised Selected Papers 1 3 VolumeEditors TanveerZia CharlesSturtUniversity SchoolofComputingandMathematics WaggaWagga,NSW,Australia E-mail:[email protected] AlbertZomaya TheUniversityofSydney SchoolofInformationTechnologies Darlington,NSW,Australia E-mail:[email protected] VijayVaradharajan MacquarieUniversity,DepartmentofComputing NorthRyde,NSW,Australia E-mail:[email protected] MorleyMao UniversityofMichigan,DepartmentofEECS AnnArbor,MI,USA E-mail:[email protected] ISSN1867-8211 e-ISSN1867-822X ISBN978-3-319-04282-4 e-ISBN978-3-319-04283-1 DOI10.1007/978-3-319-04283-1 SpringerChamHeidelbergNewYorkDordrechtLondon LibraryofCongressControlNumber:2013956812 CRSubjectClassification(1998):K.6.5,C.2,E.3,K.4.4,H.4,H.3 ©ICSTInstituteforComputerSciences,SocialInformaticsandTelecommunicationsEngineering2013 Thisworkissubjecttocopyright.AllrightsarereservedbythePublisher,whetherthewholeorpartof thematerialisconcerned,specificallytherightsoftranslation,reprinting,reuseofillustrations,recitation, broadcasting,reproductiononmicrofilmsorinanyotherphysicalway,andtransmissionorinformation storageandretrieval,electronicadaptation,computersoftware,orbysimilarordissimilarmethodology nowknownorhereafterdeveloped.Exemptedfromthislegalreservationarebriefexcerptsinconnection withreviewsorscholarlyanalysisormaterialsuppliedspecificallyforthepurposeofbeingenteredand executedonacomputersystem,forexclusiveusebythepurchaserofthework.Duplicationofthispublication orpartsthereofispermittedonlyundertheprovisionsoftheCopyrightLawofthePublisher’slocation, inistcurrentversion,andpermissionforusemustalwaysbeobtainedfromSpringer.Permissionsforuse maybeobtainedthroughRightsLinkattheCopyrightClearanceCenter.Violationsareliabletoprosecution undertherespectiveCopyrightLaw. Theuseofgeneraldescriptivenames,registerednames,trademarks,servicemarks,etc.inthispublication doesnotimply,evenintheabsenceofaspecificstatement,thatsuchnamesareexemptfromtherelevant protectivelawsandregulationsandthereforefreeforgeneraluse. Whiletheadviceandinformationinthisbookarebelievedtobetrueandaccurateatthedateofpublication, neithertheauthorsnortheeditorsnorthepublishercanacceptanylegalresponsibilityforanyerrorsor omissionsthatmaybemade.Thepublishermakesnowarranty,expressorimplied,withrespecttothe materialcontainedherein. Typesetting:Camera-readybyauthor,dataconversionbyScientificPublishingServices,Chennai,India Printedonacid-freepaper SpringerispartofSpringerScience+BusinessMedia(www.springer.com) Preface Owing to the increase in the scale and sophistication of cyber crimes conducted through the communication networks, it is imperative for the research com- munity to ensure the protection of data disseminated through these networks. Onlineinformationassetsarefurtherthreatenedbecauseofthe increasingtrend towardadoptionofcloudcomputingandvirtualization.Stakeholdersneedtobe awareofthepotentialthreatstotheinformationassetsandcriticalinfrastructure and how to mitigate and eliminate these threats. Inpastnineyears,SecureCommhasemergedasaleadinginternationalforum that covers all aspects of information and communications security with partic- ular emphasis on security in communication and networking. SecureComm also servesasa venue forlearning aboutthe emerging trends insecurity andprivacy research,givingparticipantstheopportunitytonetworkwithexpertsinthefield. The strategic objectives of SecureComm are to provide a common platform for security and privacy experts in academia, industry, and government as well as practitioners, standards developers, and policy makers to engage in discussions on the common goals in order to explore important research directions in the field. This year SecureComm was held in Australia for the first time. This co- incided with one of the 15 recently announced Australian government Strategic Research Priorities in Cyber Security, securing Australia’s place in a changing world. For SecureComm 2013, 70 high-quality papers were submitted from over 15 countries.Unfortunately,theacceptanceratesetforthisconferencedidnotallow ustoacceptallpaperswithrelevantmerits.Inthisrespect,specialthankstothe TechnicalProgramCommitteemembersforhandlingofthechallengingtaskand selecting 21outstanding papers with a significantcontributionto the field to be included in the proceedings. The 21 accepted papers can be broadly classified under the following themes: – Security and privacy in mobile, sensor, and ad hoc networks – Malware, botnets, and distributed denial of service – Securityforemergingtechnologies:VoIP,peer-to-peer,andcloudcomputing – Encryption and key management – Security in software and machine learning – Network and system security model – Security and privacy in pervasive and ubiquitous computing Inadditiontothepaperspresentedatthe conference,wealsohadfollowingfour exciting keynote speakers: – Mike Holm, Operations Manager, AusCERT (Computer Emergency Re- sponse Team in Australia) VI Preface – James Turner, Chair, AISA (Australian Information Security Association) Advocacy Group – Mark Goudie, Regional Manager – Investigations, Dell SecureWorks – JiankunHu,ProfessorandResearchDirectorCyberSecurityLab,Australian Defence Force Academy Finally, we are very grateful to the NSW government for their sponsorship, as well as the European Alliance for Innovation (EAI) and the Institute for Com- puter Sciences, Social Informatics and Telecommunications Engineering (ICST) for allowing SecureComm 2013 to be held in Australia. We also thank the local OrganizingCommitteeanditsmanymembersandvolunteersfortheirsupport.A specialthankgoestoEricaPolini,EAIConferenceManager,andElisaMendini, EAI Venue Manager and Conference Coordinator, for their utmost profession- alism in managing the administrative aspects of the conference. Last but not least, our gratitude goes to the Steering Committee members, in particular to PengLiu, for his continuous supervisionto make SecureComma verysuccessful event. September 2013 Tanveer Zia Albert Zomaya Vijay Varadharajan Morley Mao Organization General Chair Tanveer A. Zia Charles Sturt University, Australia Albert Y. Zomaya University of Sydney, Australia Technical Program Committee Chairs Vijay Varadharajan Macquarie University, Australia Morley Mao University of Michigan, USA Local Chairs Junbin Gao Charles Sturt University, Australia Adel Al-Jumaily University of Technology Sydney, Australia Maumita Bhattacharya Charles Sturt University, Australia Publicity Chairs Salil Kanhere University of New South Wales, Australia Jianming Yong University of Southern Queensland, Australia Weili Han Fudan University, China Publication Chairs Aldar Chan Chun Fai Institute for Infocomm Research (I2R), Singapore Quazi Mamun Charles Sturt University, Australia Workshop Chairs Javed Taheri University of Sydney, Australia Md Rafiqul Islam Charles Sturt University, Australia Sponsorship Chair Sabih-ur Rehman Charles Sturt University, Australia VIII Organization Web Chair Saman Shafigh Charles Sturt University, Australia Conference Manager Erica Polini EAI, Italy Steering Committee Peng Liu Pennsylvania State University, USA Imrich Chlamtac CREATE-NET, Italy Table of Contents Session I: Security & Privacy in Mobile, Sensor, and Ad Hoc Networks Anomaly Detection in Beacon-Enabled IEEE 802.15.4 Wireless Sensor Networks ....................................................... 1 Eirini Karapistoli and Anastasios A. Economides Secure and Verifiable Top-k Query in Two-Tiered Sensor Networks..... 19 Ting Zhou, Yaping Lin, Wei Zhang, Sheng Xiao, and Jinguo Li CamTalk:ABidirectionalLightCommunicationsFrameworkforSecure Communications on Smartphones .................................. 35 Mengjun Xie, Liang Hao, Kenji Yoshigoe, and Jiang Bian Session II: Malware, Botnets, and Distributed Denial of Service Botnet Triple-Channel Model: Towards Resilient and Efficient Bidirectional Communication Botnets .............................. 53 Cui Xiang, Fang Binxing, Shi Jinqiao, and Liu Chaoge Contrasting PermissionPatterns between Clean and Malicious Android Applications..................................................... 69 Veelasha Moonsamy, Jia Rong, Shaowu Liu, Gang Li, and Lynn Batten DroidAPIMiner: Mining API-Level Features for Robust Malware Detection in Android ............................................. 86 Yousra Aafer, Wenliang Du, and Heng Yin Session III: Security for Emerging Technologies: VoIP, Peer-to-peer, and Cloud Computing Disabling a Computer by Exploiting Softphone Vulnerabilities: Threat and Mitigation .................................................. 104 Ryan Farley and Xinyuan Wang VCCBox: Practical Confinement of Untrusted Software in Virtual Cloud Computing................................................ 122 Jun Jiang, Meining Nie, Purui Su, and Dengguo Feng Integrated Security Architecture for Virtual Machines ................ 140 Vijay Varadharajan and Udaya Tupakula X Table of Contents Session IV: Encryption and Key Management Generic Mediated Encryption...................................... 154 Ibrahim Elashry, Yi Mu, and Willy Susilo An Efficient Reconfigurable II-ONB Modular Multiplier............... 169 Li Miao, He Liangsheng, Yang Tongjie, Gao Neng, Liu Zongbin, and Zhang Qinglong Public-Key Encryption Resilient to Linear Related-Key Attacks........ 182 Hui Cui, Yi Mu, and Man Ho Au Session V: Security in Software and Machine Learning Clonewise – Detecting Package-LevelClones Using Machine Learning... 197 Silvio Cesare, Yang Xiang, and Jun Zhang Automatic Polymorphic Exploit Generation for Software Vulnerabilities ................................................... 216 Minghua Wang, Purui Su, Qi Li, Lingyun Ying, Yi Yang, and Dengguo Feng Session VI: Network and System Security Model A Novel Web Tunnel Detection Method Based on Protocol Behaviors... 234 Fei Wang, Liusheng Huang, Zhili Chen, Haibo Miao, and Wei Yang Salus: Non-hierarchical Memory Access Rights to Enforce the Principle of Least Privilege ................................................ 252 Niels Avonds, Raoul Strackx, Pieter Agten, and Frank Piessens Scalable Security Model Generation and Analysis Using k-importance Measures ....................................................... 270 Jin B. Hong and Dong Seong Kim Session VII: Security and Privacy in Pervasive and Ubiquitous Computing The B-Side of Side Channel Leakage: Control Flow Security in Embedded Systems............................................... 288 Mehari Msgna, Konstantinos Markantonakis, and Keith Mayes An e-payment Architecture Ensuring a High Level of Privacy Protection ...................................................... 305 Aude Plateaux, Patrick Lacharme, Vincent Coquet, Sylvain Vernois, Kumar Murty, and Christophe Rosenberger