ebook img

Security and Privacy in Communication Networks: SecureComm 2017 International Workshops, ATCS and SePrIoT, Niagara Falls, ON, Canada, October 22–25, 2017, Proceedings PDF

348 Pages·2018·22.683 MB·English
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview Security and Privacy in Communication Networks: SecureComm 2017 International Workshops, ATCS and SePrIoT, Niagara Falls, ON, Canada, October 22–25, 2017, Proceedings

Xiaodong Lin Ali Ghorbani Kui Ren Sencun Zhu Aiqing Zhang (Eds.) 239 Security and Privacy in Communication Networks SecureComm 2017 International Workshops, ATCS and SePrIoT Niagara Falls, ON, Canada, October 22–25, 2017 Proceedings 123 Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 239 Editorial Board Ozgur Akan Middle East Technical University, Ankara, Turkey Paolo Bellavista University of Bologna, Bologna, Italy Jiannong Cao Hong Kong Polytechnic University, Hong Kong, Hong Kong Geoffrey Coulson Lancaster University, Lancaster, UK Falko Dressler University of Erlangen, Erlangen, Germany Domenico Ferrari Università Cattolica Piacenza, Piacenza, Italy Mario Gerla UCLA, Los Angeles, USA Hisashi Kobayashi Princeton University, Princeton, USA Sergio Palazzo University of Catania, Catania, Italy Sartaj Sahni University of Florida, Florida, USA Xuemin Sherman Shen University of Waterloo, Waterloo, Canada Mircea Stan University of Virginia, Charlottesville, USA Jia Xiaohua City University of Hong Kong, Kowloon, Hong Kong Albert Y. Zomaya University of Sydney, Sydney, Australia More information about this series at http://www.springer.com/series/8197 Xiaodong Lin Ali Ghorbani (cid:129) Kui Ren Sencun Zhu (cid:129) Aiqing Zhang (Eds.) Security and Privacy in Communication Networks SecureComm 2017 International Workshops, ATCS and SePrIoT Niagara Falls, ON, Canada, October 22–25, 2017 Proceedings 123 Editors Xiaodong Lin Sencun Zhu Wilfrid LaurierUniversity PennsylvaniaState University Waterloo, ON Philadelphia, PA Canada USA Ali Ghorbani AiqingZhang University of NewBrunswick AnhuiNormal University Fredericton, NB Wuhu Canada China KuiRen University at Buffalo Buffalo, NY USA ISSN 1867-8211 ISSN 1867-822X (electronic) Lecture Notesof the Institute for Computer Sciences, Social Informatics andTelecommunications Engineering ISBN 978-3-319-78815-9 ISBN978-3-319-78816-6 (eBook) https://doi.org/10.1007/978-3-319-78816-6 LibraryofCongressControlNumber:2018940136 ©ICSTInstituteforComputerSciences,SocialInformaticsandTelecommunicationsEngineering2018 Thisworkissubjecttocopyright.AllrightsarereservedbythePublisher,whetherthewholeorpartofthe material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission or information storageandretrieval,electronicadaptation,computersoftware,orbysimilarordissimilarmethodologynow knownorhereafterdeveloped. Theuseofgeneraldescriptivenames,registerednames,trademarks,servicemarks,etc.inthispublication doesnotimply,evenintheabsenceofaspecificstatement,thatsuchnamesareexemptfromtherelevant protectivelawsandregulationsandthereforefreeforgeneraluse. Thepublisher,theauthorsandtheeditorsaresafetoassumethattheadviceandinformationinthisbookare believedtobetrueandaccurateatthedateofpublication.Neitherthepublishernortheauthorsortheeditors give a warranty, express or implied, with respect to the material contained herein or for any errors or omissionsthatmayhavebeenmade.Thepublisherremainsneutralwithregardtojurisdictionalclaimsin publishedmapsandinstitutionalaffiliations. Printedonacid-freepaper ThisSpringerimprintispublishedbytheregisteredcompanySpringerInternationalPublishingAG partofSpringerNature Theregisteredcompanyaddressis:Gewerbestrasse11,6330Cham,Switzerland Preface The 13th EAI International Conference on Security and Privacy in Communication Networks (SecureComm) was held during October 22–25, 2017, in the beautiful Niagara Falls, Canada. SecureComm is one of the premier conferences in cyber security, which provides an opportunity for researchers, technologists, and industry specialists in cyber security to meet and exchange ideas and information. We were honored to have hosted keynote speeches by two world renowned cyber security researchers, Dr. Patrick McDaniel, Pennsylvania State University, and Dr. Ninghui Li, Purdue University. Their topics include security and privacy in machine learning, and differential privacy, which are currently hot research topics in cyber security research. Theconferenceprogramincludedtechnicalpapersselectedthroughpeerreviewsby the Program Committee members, invited talks, and special sessions. Out of a total number of 105 submissions, 31 were selected as full papers and 15 as short papers. Besidesthemainconference,thereweretwoworkshopsonemergingresearchtopicsin the field of security and privacy. This volume comprises the proceedings of these two workshops.Thefirstone,theInternationalWorkshoponApplicationsandTechniques in Cyber Security (ATCS), has been affiliated with SecureComm for many years, focusingonallaspectsontechniquesandapplicationsincybersecurityresearch.Inall, 17papers wereacceptedandareincluded intheproceedings. Thesecond onewasthe FirstWorkshoponSecurityandPrivacyintheInternetofThings(SePrIoT).SePrIoTis intendedto reflect theimportance of addressing security andprivacy intheInternetof Things(IoT).Fivepaperswereacceptedandincludedintheproceedings.Thetechnical program thus comprised a total of 68 papers. Wewouldlike tothank allof ourauthorsaswellasour dedicated organizing team and volunteers for their hard work. SecureComm would not be successful without the dedication and passion of its contributors. Many people worked hard to make Secur- eComm 2017 a success. We would like to express our gratitude to them. It is also impossibletolisthereallthoseindividualswhomwearegratefulto.Butwewouldlike tothankparticularlytheEAI,especiallyProf.ImrichChlamtacofEAI,fortheirstrong supportof this conference. Also,we thank the members ofthe conference committees and the reviewers for their dedicated and passionate work. In particular, we thank the Program Committee co-chairs, Dr. Kui Ren and Dr. Sencun Zhu, for their great leadership in creating such a wonderful program. We also thank Ms. Dominika Beli- sová of EAI for her hard work and dedication in taking great care of the conference organization. Without the extremely generous support of EAI, this conference could not have happened. Last but not least, we thank the Steering Committee of Secur- eComm for having invited us to serve as the general chairs of SecureComm 2017. We hope you enjoy the proceedings of SECURECOMM 2017 as much as we enjoyed the conference. March 2018 Xiaodong Lin Ali Ghorbani Organization 5th International Workshop on Applications and Techniques in Cyber Security, ATCS 2017 General Chairs Jemal H. Abawajy Deakin University, Australia Rafiqul Islam Charles Sturt University, Australia Kim-Kwang Raymond University of Texas at San Antonio, USA Choo Program Committee Junbin Gao The University of Sydney, Australia M. Alamgir Hossain Northumbria University, UK Md Enamul Karim Louisiana Tech University, USA V. Vijayakumar VIT University, Chennai, India Faisal Hasan University of Illinois, USA Tanveer Zia Charles Sturt University, Australia Maumita Bhattacharya Charles Sturt University, Australia Mizanur Rahman King Saud University, KSA Morshed Chowdhury Deakin University, Australia Mohd Farhan Fudzee Universiti Tun Hussein Onn Malaysia, Malaysia Zahid Islam Charles Sturt University, Australia Syed S. Islam University of Western Australia, Australia Andrei Kelarev Federation University, Australia Mohammad Kausar Ittehad University, KSA Hasannuzzaman University of Dhaka, Bangladesh Quazi Mamun Charles Sturt University, Australia Ben Martini University of South Australia, Australia Sumon Sahriar CSIRO, Australia Steve Versteeg CA Labs, Australia Matthew Warren Deakin University, Australia John Yearwood Federation University, Australia Samsul Huda Deakin University, Australia Xun Yi RMIT University, Australia Arif Khan Charles Sturt University, Australia Nasimul Noman University of Newcastle, Australia Chowdhury Farhan Ahmed University of Strasbourg, France Organization First Workshop on Security and Privacy in the Internet of Things, SePrIoT 2017 General Chair José María de Fuentes ComputerSecurityLab(COSEC),CarlosIIIUniversity of Madrid, Spain General Co-chairs Lorena González-Manzano ComputerSecurityLab(COSEC),CarlosIIIUniversity of Madrid, Spain Pedro Peris-López ComputerSecurityLab(COSEC),CarlosIIIUniversity of Madrid, Spain Technical Program Committee Jemal Abawajy Deakin University, Australia Mu’awya Al Dalaien HCT-Khalifa City Women’s College, United Arab Emirates Nasour Bagheri Shahid Rajaee Teachers Training University, Iran Rahmat Budiarto Surya University, Indonesia Carmen Cámara Universidad Carlos III de Madrid, Spain Kim-Kwang Raymond University of Texas at San Antonio, USA Choo Juan Estévez-Tapiador Universidad Carlos III de Madrid, Spain Flavio García University of Birmingham, UK Ana Isabel González-Tablas Universidad Carlos III de Madrid, Spain Flavio Lombardi Università Roma Tre, Italy Javier López University of Malaga, Spain Samuel Marchal Aalto University, Finland Katerina Mitrokotsa Chalmers University of Technology, Sweden Ana Nieto Universidad de Málaga, Spain Panos Papadimitratos KTH, Sweden Julian Schütte Fraunhofer AISEC, Germany Jetzabel Serna-Olvera Goethe Universität, Frankfurt, Germany Agusti Solanas Rovira I Virgili University, Spain Contents International Workshop on Applications and Techniques in Cyber Security (ATCS) Privacy in Social Media. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 Erdal Ozkaya and Rafiqul Islam SecControl: Bridging the Gap Between Security Tools and SDN Controllers. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11 Li Wang and Dinghao Wu An Effective Approach for Dealing with the Pressure to Compromise Security During Systems Development . . . . . . . . . . . . . . . . . . . . . . . . . . . 32 Yeslam Al-Saggaf Securing Websites Against Homograph Attacks . . . . . . . . . . . . . . . . . . . . . 47 Jemal Abawajy, A. Richard, and Zaher Al Aghbari Privacy Threat Analysis of Mobile Social Network Data Publishing . . . . . . . 60 Jemal H. Abawajy, Mohd Izuan Hafez Ninggal, Zaher Al Aghbari, Abdul Basit Darem, and Asma Alhashmi Exploring Secure Communication in VANET Broadcasting . . . . . . . . . . . . . 69 Muhammad Jafer, M. Arif Khan, Sabih ur Rehman, and Tanveer A. Zia Identification of Forensic Artifacts in VMWare Virtualized Computing . . . . . 85 Cory Smith, Glenn Dietrich, and Kim-Kwang Raymond Choo Possible Keyloggers Without Implementing a Keyboard in Android . . . . . . . 104 Itzael Jiménez Aranda, Eleazar Aguirre Anaya, Raúl Acosta Bermejo, and Ponciano Jorge Escamilla Ambrosio A New Cyber Security Framework Towards Secure Data Communication for Unmanned Aerial Vehicle (UAV) . . . . . . . . . . . . . . . . . . . . . . . . . . . . 113 Md Samsul Haque and Morshed U. Chowdhury Securing Healthcare Data Using Biometric Authentication . . . . . . . . . . . . . . 123 Sharmin Jahan, Mozammel Chowdhury, Rafiqul Islam, and Junaid Chaudhry Fast and Robust Biometric Authentication Scheme Using Human Ear . . . . . . 133 Mozammel Chowdhury, Rafiqul Islam, and Junbin Gao X Contents WebAD2: A Cascading Model Based on Machine Learning for Web Attacks Detection. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 145 Ying Lin and Bo Li Human Factors, Self-awareness and Intervention Approaches in Cyber Security When Using Mobile Devices and Social Networks. . . . . . . . . . . . . 166 Ken Eustace, Rafiqul Islam, Philip Tsang, and Geoff Fellows Hiding Fast Flux Botnet in Plain Email Sight. . . . . . . . . . . . . . . . . . . . . . . 182 Zhi Wang, Meilin Qin, Mengqi Chen, and Chunfu Jia Cyber Security Decision Support for Remediation in Automated Computer Network Defence. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 198 Maxwell Dondo Situational Crime Prevention and the Mitigation of Cloud Computing Threats . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 218 Chaz Vidal and Kim-Kwang Raymond Choo SoNeUCON Pro: An Access Control Model for Social Networks ABC with Translucent User Provenance. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 234 Lorena González-Manzano, Mark Slaymaker, Jose M. de Fuentes, and Dimitris Vayenas 1st Workshop on Security and Privacy in the Internet of Things (SePrIoT) SAFEDroid: Using Structural Features for Detecting Android Malwares . . . . 255 Sevil Sen, Ahmet I. Aysan, and John A. Clark Manipulating the Five V’s in the Next Generation Air Transportation System. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 271 Dustin Mink, William Bradley Glisson, Ryan Benton, and Kim-Kwang Raymond Choo A Framework for Acquiring and Analyzing Traces from Cryptographic Devices. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 283 Alfonso Blanco Blanco, Jose María de Fuentes, Lorena González-Manzano, Luis Hernández Encinas, Agustín Martín Muñoz, José Luis Rodrigo Oliva, and J. Ignacio Sánchez García Sensitive Data in Smartphone Applications: Where Does It Go? Can It Be Intercepted?. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 301 Eirini Anthi and George Theodorakopoulos

See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.