Regular Papers

A Software-Based Root-of-Trust Primitive on Multicore Platforms
Qiang Yan, Jin Han, Yingjiu Li, Robert H. Deng and Tieyan Li

Tracer: Enforcing Mandatory Access Control in Commodity OS with the Support of Light-Weight Intrusion Detection and Tracing
Zhiyong Shan, Xin Wang and Tzi-cker Chiueh

An Ontology- and Bayesian-based Approach for Determining Threat Probabilities
Stefan Fenz

Enhancing the Trust of Internet Routing with Lightweight Route Attestation
Qi Li, Mingwei Xu, Jianping Wu, Xinwen Zhang, Patrick P.C. Lee and Ke Xu

Non-uniform Distributions in Quantitative Information-flow
Michael Backes, Matthias Berg and Boris Köpf

Automatic Construction of Jump-Oriented Programming Shellcode (on the x86)
Ping Chen, Xiao Xing, Bing Mao, Li Xie, Xiaobin Shen and Xinchun Yin

Strongly Secure Certificateless Key Exchange without Pairing
Guomin Yang and Chik-How Tan

Identity-Based Online/Offline Key Encapsulation and Encryption
Sherman S. M. Chow, Joseph Liu and Jianying Zhou

Compact Identity-Based Encryption without Strong Symmetric Cipher
Joonsang Baek and Jianying Zhou

Secure Mobile Subscription of Sensor-Encrypted Data
Cheng-Kang Chu, Wen Tao Zhu, Sherman Chow, Jianying Zhou and Robert H. Deng

WebPatrol: Automated Collection and Replay of Web-based Malware Scenarios
Kevin Zhijie Chen, Guofei Gu, Jose Nazario, Xinhui Han and Jianwei Zhuge

Efficient Audit-based Compliance for Relational Data Retention
Ragib Hasan and Marianne Winslett

Threshold Ring Signature without Random Oracles
Tsz Hon Yuen, Joseph K. Liu, Man Ho Au, Willy Susilo and Jianying Zhou

Mind How You Answer Me! (Transparently Authenticating the User of a Smartphone when Answering or Placing a Call)
Mauro Conti, Irina Zachia-Zlatea and Bruno Crispo

On the Invisibility of Designated Confirmer Signatures
Fubiao Xia, Guilin Wang and Rui Xue

ROPdefender: A Practical Protection Tool to Protect Against Return-Oriented Programming
Lucas Davi, Ahmad-Reza Sadeghi and Marcel Winandy

Lightweight Quick and Stateful Network Scanning Detector
Mansour Alsaleh and Paul Van Oorschot

PUF ROKs : A Hardware Approach to Read-Once Keys
Michael Kirkpatrick, Sam Kerr and Elisa Bertino

Attacks Against Process Control Systems: Risk Assessment, Detection, and Response
Alvaro Cardenas, Saurabh Amin, Zong-Syun Lin, Yu-Lun Huang, Chi-Yen Huang and Shankar

Detecting Stealth Malware with Inter-Structure and Imported Signatures
Bin Liang, Wei You, Wenchang Shi and Zhaohui Liang

An Integrated Approach to Cryptographic Mitigation of Denial-of-Service Attacks
Jothi Rangasamy, Douglas Stebila, Colin Boyd and Juan Gonzalez Nieto

Confidentiality-preserving Proof Theories for Distributed Proof Systems
Kazuhiro Minami, Nikita Borisov, Marianne Winslett and Adam Lee

Extended Cubes: Enhancing the Cube Attack by Extracting Low-Degree Non-Linear Equations
Shekh Faisal Abdul-Latip, Mohammad Reza Reyhanitabar, Willy Susilo and Jennifer Seberry

Attack on the GridCode One-Time Password
Ian Molloy and Ninghui Li

Malware Propagation in Online Social Networks: Nature, Dynamics, and Defense Implications
Guanhua Yan, Guanling Chen, Stephan Eidenbenz and Nan Li

Efficient Symbolic Automated Analysis of Administrative Role Based Access Control Policies
Francesco Alberti, Alessandro Armando and Silvio Ranise

Jump-Oriented Programming: A New Class of Code-Reuse Attack
Tyler Bletsch, Xuxian Jiang, Vince Freeh and Zhenkai Liang

Characterizing Kernel Malware Behavior with Kernel Data Access Patterns
Junghwan Rhee, Zhiqiang Lin and Dongyan Xu

Formal Modelling and Automatic Detection of Resource Exhaustion Attacks
Bogdan Groza and Marius Minea

Examining Indistinguishability-Based Security Models for Key Exchange Protocols: The case of CK, CK-HMQV, and eCK
Cas Cremers

Boosting the scalability of Botnet Detection Using Adaptive Traffic Sampling
Junjie Zhang, Xiapu Luo, Roberto Perdisci, Guofei Gu, Wenke Lee and Nick Feamster

Bounded Vector Signatures and their Applications
Lei Wei, Scott E. Coull and Michael K. Reiter

Rethinking about Guessing Attacks
Zhiwei Li and Weichao Wang

An efficient mobile PACE implementation
Alex Wiesmaier, Moritz Horsch, Johannes Braun, Franziskus Kiefer, Detlef Hühnlein, Falko Strenzke and Johannes Braun

Practical Affiliation-Hiding Authentication from Improved Polynomial Interpolation
Mark Manulis and Bertram Poettering

Short Papers

Stronger Security Model of Group Key Agreement
Jianjie Zhao, Dawu Gu and M. Choudary Gorantla

How to Search Linear Approximations for Large Non-Surjective S-boxes
Yue Sun, Meiqin Wang and Qiumei Sun

Separation of Duties as a Service
David Basin, Samuel Burri and Guenter Karjoth

On the Security of the Identity-based Encryption based on DHIES from ASIACCS 2010
Willy Susilo and Joonsang Baek

Leakage Resilient eCK-Secure Key Exchange Protocol Without Random Oracles
Daisuke Moriyama and Tatsuaki Okamoto

Efficient Computational Oblivious Transfer Using Interactive Hashing
Kirill Morozov and George Savvides

1-out-of-2 Signature
Miroslaw Kutylowski and Jun Shao

Self Destructive Tamper Response for Software Protection
Kazuomi Oishi and Tsutomu Matsumoto

MLAS: Multiple Level Authentication Scheme for VANETs
Tat Wing Chim, S.M. Yiu, Lucas C.K. Hui and Victor O.K. Li

How to Design Space Efficient Revocable IBE from Non-monotonic ABE
Huang Lin, Zhenfu Cao, Yuguang Fang, Muxin Zhou and Haojin Zhu

Diesel: Applying Privilege Separation to Database Access
Adrienne Felt, Matthew Finifter, Joel Weinberger and David Wagner

On the effectiveness of using Anonymizing Networks for Web Search Privacy
Sai Teja Peddinti and Nitesh Saxena

Self-Certified Ring Signatures
Nan Li, Yi Mu, Willy Susilo and Fuchun Guo

On Mouse Dynamics as a Behavioral Biometric for Authentication
Zach Jorgensen and Ting Yu

Server-Aided Signatures Verification Secure against Collusion Attack
Sherman S. M. Chow, Man Ho Au and Willy Susilo

Multi-Authority Ciphertext-Policy Attribute-Based Encryption with Accountability
Jin Li, Qiong Huang, Xiaofeng Chen, Sherman S. Chow, Duncan S. Wong and Dongqing Xie

A New and Extended Fault Analysis on RSA
Chen Caisen and Wang Tao

Common Malicious Behavior through Graph Clustering
Younghee Park and Douglas Reeves

Receipt-Mode Trust Negotiation: Efficient Authorization Through Outsourced Interactions
Andrew K Adams, Adam J. Lee and Daniel Mossé

Quantified Risk-Adaptive Access Control for Patient Privacy Protection in Health Information Systems
Qihua Wang and Hongxia Jin

EASiER: Encryption-based Access Control in Social Networks with Efficient Revocation
Sonia Jahid, Prateek Mittal and Nikita Borisov

Optimal Message Transmission Protocols with Flexible Parameters
Reihaneh Safavi-Naini, Mohammed Tuhin and Hongsong Shi

Towards a Binary Integrity System for Windows
Yongzheng Wu and Roland Yap

A Statistical Approach to Botnet Virulence Estimation

Julian Rrushi, Ehsan Mokhtari and Ali Ghorbani