Accepted Workshop Papers


International Workshop on Security And Privacy Analytics

ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization

ACM Workshop on Attribute Based Access Control


International Workshop on Security And Privacy Analytics

Full papers:

Predicting Exploitation of Disclosed Software Vulnerabilities Using Open-source Data
Benjamin Bullough (MIT); Anna Yanchenko (MIT); Christopher Smith (MIT); Joseph Zipkin (MIT)

Fast Feature Extraction and Malicious URL Detection
Avisha Das (University of Houston); Rakesh Verma (University of Houston)

Non-interactive (t, n)-Incidence Counting from Differentially Private Indicator Vectors
Mohammad Alaggan (INRIA); Mathieu Cunche (INRIA); Marine Minier (INSA Lyon)

EMULATOR vs REAL PHONE: Android Malware Detection Using Machine Learning
Mohammed Alzaylaee (Queen's University Belfast); Suleiman Yerima (Queen's University Belfast); Sakir Sezer (Queen's University Belfast)

Short papers:

Model-based cluster analysis for identifying suspicious activity sequences in software
Hemank Lamba (CMU); Thomas Glazier (CMU); Bradley Schmerl (CMU); Javier Camar Moreno (CMU); David Garlan (CMU); Juergen Pfeffer (TU Munich)

An Internal/Insider Threat Score for Data Loss Prevention And Detection
Kyrre Wahl Kongsg†rd (Norwegian Defense Research Establishment); Nils Agne Nordbotten (Norwegian Defense Research Establishment); Federico Mancini (Norwegian Defense Research Establishment);  Paal E. Engelstad (Norwegian Defense Research Establishment)

Analysis of Causative attacks against SVMs Learning from Data Streams Cody Burkard (University of Washington, Bothell); Brent Lagesse (University of Washington, Bothell)

Identifying Key Cyber-Physical Terrain
Brian Thompson (MITRE Corporation); Richard Harang (Invincea Inc.)

MCDefender: Toward Effective Cyberbullying Defense in Mobile Online Social Networks
Nishant Vishwamitra (Clemson University); Xiang Zhang (Clemson University); Hongxin Hu (Clemson University); Feng Luo (Clemson University)

Keynotes:

Feature Cultivation in Privileged Information-augmented Detection
Patrick McDaniel (Pennsylvania State University)

Continuous Authentication Using Behavioral Biometrics
Shambhu Upadhyaya (SUNY Buffalo)

Invited Papers:

Feature Cultivation in Privileged Information-augmented Detection
Z. Berkay Celik (Pennsylvania State University); Patrick McDaniel (Pennsylvania State University); Rauf Izmailov (Vencore Labs)



ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization

Full papers:

Trusted Click: Overcoming Security issues of NFV in the Cloud
Michael Coughlin (University of Colorado Boulder); Eric Keller (University of Colorado Boulder);  Eric Wustrow (University of Colorado Boulder)

A First Step Towards Security Extension for NFV Orchestrator
Montida Pattaranantakul (Institut Mines-Télécom/TELECOM Lille, TELECOM SudParis); Yuchia Tseng (Paris Descartes University);  Ruan He (Orange Labs);  Zonghua Zhang (Institut Mines-Télécom/TELECOM Lille);  Ahmed Meddahi (Institut Mines-Télécom/TELECOM Lille)

Enabling SDN Experimentation in Network Testbeds
Sivaramakrishnan Ramanathan (University of Southern California); Pravein Govindan Kannan (National University of Singapore); Chan Mun Choon (National University of Singapore);  Jelena Mirkovic (USC Information Sciences Institue); Keith Sklower (UC Berkeley)

CommunityGuard: A Crowdsourced Home Cyber-Security System
Chase Stewart (University of Colorado Boulder); Anne Vasu (University of Colorado Boulder);  Eric Keller (University of Colorado Boulder)

Position papers:

Viable Protection of High-Performance Networks through Hardware/Software Co-Design
Johanna Amann (ICSI / Corelight); Robin Sommer (ICSI / Corelight / LBNL)

Towards Effective Virtualization of Intrusion Detection System
Nuyun Zhang (Clemson University); Hongda Li (Clemson University); Hongxin Hu (Clemson University); Younghee Park (San Jose State University)

Invited full papers:

Using Game-based Moving Target Defense in SDN-enabled Cloud Networking Environments
Ankur Chowdhary (Arizona State University); Dijiang Huang (Arizona State University); Sandeep Pisharody (Arizona State University); Adel Alshamrani (Arizona State University)


A Novel Software Dened Security Framework for Large-scale Data-intensive Science 
Deepak Nadig Ananatha (University of Nebraska-Lincoln);  Byrav Ramamurthy (University of Nebraska-Lincoln)

Dynamic DDoS defense resource allocation using Network Function Virtualization
A H M Jakaria (Tennessee Tech); Wei Yang (Virginia Commonwealth University); Bahman Rashidi (Virginia Commonwealth University); Carol Fung  (Virginia Commonwealth University); Mohammad A. Rahman (Tennessee Tech)

Ultimate Forwarding Resilience in OpenFlow Networks
Christopher Hannon (Illinois Institute of Technology); Dong Jin (Illinois Institute of Technology); Chen Chen (Argonne National Laboratory); Jianhui Wang (Argonne National Laboratory)

Invited position papers:

Dynamic Defense Provision via Network Functions Virtualization 
Pritesh Chandaliya (San Jose State University); Akshaya Muralidharan (San Jose State University); Nikash Kumar (San Jose State University); Younghee Park (San Jose State University); Hongxin Hu (Clemson University)

Harvesting Data Integration for SDN
Anduo Wang (Temple University); Jason Croft (UIUC); Eduard Dragut (Temple University)

CareNet: Building a Secure Software-defined Infrastructure for Home-based Healthcare
Peilong Li (University of Massachusetts Lowell); Chen Xu (University of Massachusetts Lowell); Yan Luo (University of Massachusetts Lowell); Yu Cao (University of Massachusetts Lowell); Jomol Mathew (University of Massachusetts Medical School); Yunsheng Ma(University of Massachusetts Medical School)

ACM Workshop on Attribute Based Access Control

Full papers:

Verification of Resilience Policies that assist Attribute Based Access Control
Antonios Gouglidis (Lancaster University); Vincent Hu (NIST); Jerry Busby (Lancaster University); David Hutchison (Lancaster University)

Imposing Fine-grain Next Generation Access Control over Database Queries
David Ferraiolo (NIST); Serban Gavrila (NIST); Gopi Katwala (NIST); Jashua Roberts (NIST)

A systematic approach to implementing ABAC
David Brossard (Axiomatics); Gerry Gebel (Axiomatics); Mark Berg (Axiomatics)

Attribute Transformation for Attribute-Based Access Control
Prosunjit Biswas (UTSA), Ravi Sandhu (UTSA); Ram Krishnan (UTSA)

ABAC with Group Attributes and Attribute Hierarchy Utilizing the Policy Machine
Smriti Bhatt (UTSA); Farhan Patwa (UTSA); Ravi Sandhu (UTSA)

Proposed Model for Natural Language ABAC Authoring
Ronald Turner (XpressRules)

Leveraging Attribute Based Access Control to Ensure Fine-grained Access to FHIR Resources
Subhojeet Mukherjee (Colorado State University); Indrakshi Ray (Colorado State University); Indrajit Ray (Colorado State University); Toan Ong (University of Colorado Denver); Michael Kahn (University of Colorado Denver)

Keynotes:

Feature Cultivation in Privileged Information-augmented Detection
Patrick McDaniel (Pennsylvania State University)


Comments