IEEE Conference on Communications and Network Security
29 June - 1 July 2020 // Virtual Conference

Full Program

All times listed are in Central European Summer Time (CEST).

Monday, 29 June 2020

13:45 - 14:00 – Opening: Opening (Room A)

14:00 - 15:00 – Keynote 1: COVID-19, Cybersecurity, and Epidemiology (Room A)

Speaker: Ninghui Li – Professor of Computer Science at Purdue University

15:10 - 16:10 – S1-A: Cloud and Network Security (Room A)

A Large-scale Analysis of Cloud Service Abuse – Naoki Fukushi, Daiki Chiba and Mitsuaki Akiyama (NTT, Japan); Masato Uchida (Waseda University, Japan)

A Rule Reordering Method via Pairing Dependent Rules – Takashi Harada (Kochi University of Technology, Japan); Ken Tanaka (Kanagawa University, Japan); Ryohei Ogasawara (Information Creative Co., Ltd, Japan); Kenji Mikawa (Niigata University, Japan)

Towards a Believable Decoy System: Replaying Network Activities from Real System – Jianhua Sun (College of William and Mary, USA); Kun Sun (George Mason University, USA); Qi Li (Tsinghua University, China)

15:10 - 16:10 – S1-B: Authentication (Room B)

Eathentication: A Chewing-based Authentication Method – Mattia Carlucci, Stefano Cecconello, Mauro Conti and Piero Romare (University of Padua, Italy)

RUMBA-Mouse: Rapid User Mouse-Behavior Authentication Using a CNN-RNN Approach – Shen Fu, Dong Qin and Daji Qiao (Iowa State University, USA); George T Amariucai (Kansas State University, USA)

OTDA: a Unsupervised Optimal Transport framework with Discriminant Analysis for Keystroke Inference – Kun Jin and Chaoyue Liu (The Ohio State University, USA); Cathy Xia (Ohio-State University, USA)

16:20 - 17:40 – S2-A: Security Vulnerability Detection and Remediation (Room A)

A Machine Learning Approach to Classify Security Patches into Vulnerability Types – Xinda Wang, Shu Wang and Kun Sun (George Mason University, USA); Archer Batcheller (Northrop Grumman, USA); Sushil Jajodia (George Mason University, USA)

A Machine Learning-based Approach for Automated Vulnerability Remediation Analysis – Fengli Zhang (University of Arkansas, Fayetteville, USA); Philip Huff (University of Arkansas at Little Rock, USA); Kylie McClanahan (University of Arkansas at Fayetteville, USA); Qinghua Li (University of Arkansas, USA)

Dynamic Risk-Aware Patch Scheduling – Fengli Zhang (University of Arkansas, Fayetteville, USA); Qinghua Li (University of Arkansas, USA)

Exploring Abstraction Functions in Fuzzing – Christopher Salls and Aravind Machiry (University of California, Santa Barbara); Adam Doupe and Yan Shoshitaishvili (Arizona State University, USA); Christopher Kruegel (University of California, Santa Barbara, USA); Giovanni Vigna (University of California Santa Barbara, USA)

16:20 - 17:40 – S2-B: Attack Detection (Room B)

Towards Data-Driven Characterization of Brute-Force Attackers – Florian Wilkens and Mathias Fischer (Universität Hamburg, Germany)

Learning the Associations of MITRE ATT&CK Adversarial Techniques – Rawan Al-Shaer and Jonathan Spring (Carnegie Mellon University, USA); Eliana Christou (University of North Carolina Charlotte, USA)

Exploring Adversarial Properties of Insider Threat Detection – Duc Le and Nur Zincir-Heywood (Dalhousie University, Canada)

Evolving Advanced Persistent Threat Detection using Provenance Graph and Metric Learning – Gbadebo Ayoade, Khandakar Ashrafi Akbar, Pracheta Sahoo and Yang Gao (The University of Texas at Dallas, USA); Anoop Singhal (NIST, USA); Kangkook Jee (The University of Texas at Dallas, USA); Latifur Khan (University of Texas, USA)

17:50 - 19:10 – S3-A: Cyber-physical Systems Security (Room A)

DeepBLOC: A Framework for Securing CPS through Deep Reinforcement Learning on Stochastic Games – Alireza Tahsini, Noah Dunstatter and Mina Guirguis (Texas State University, USA); Chuadhry Mujeeb Ahmed (Singapore University of Technology and Design, Singapore)

HEKA: A Novel Intrusion Detection System for Attacks to Personal Medical Devices – AKM iqtidar Newaz, Amit Kumar Sikder and Leonardo Babun (Florida International University, USA); Selcuk Uluagac (Florida International University & Electrical and Computer Engineering, USA)

Off is Not Off: On the Security of Parked Vehicles – Kyong-Tak Cho (University of Michigan, Ann Arbor, USA); Kang Shin (University of Michigan, USA); Yu Seung Kim and Byung-Ho Cha (Ford Motor Co., USA)

TRUST.IO: Protecting Physical Interfaces on Cyber-physical Systems – Chad Spensky (University of California, Santa Barbara & Allthenticate, USA); Aravind Machiry (University of California, Santa Barbara, USA); Marcel Busch (University of Erlangen-N\"urnberg, Germany); Kevin Leach (University of Michigan, USA); Rick Housley (United Technologies, USA); Christopher Kruegel (University of California, Santa Barbara, USA); Giovanni Vigna (University of California Santa Barbara, USA)

17:50 - 19:10 – S3-B: Traffic Analysis (Room B)

Attacks on Dynamic Protocol Detection of Open Source Network Security Monitoring Tools – Jan Grashöfer and Christian Titze (Karlsruhe Institute of Technology (KIT), Germany); Hannes Hartenstein (Karlsruhe Institute of Technology, Germany)

Order-Optimal Scaling of Covert Communication over MIMO AWGN Channels – Ahmed Bendary (The Ohio State University, USA & The Military Technical College, Egypt); Can Emre Koksal (The Ohio State University, USA)

NExtSteP: An Extensible Testbed for Network Covert Channels – Olga Chen, Aaron D. Jaggard, Catherine Meadows and Michael C. Shlanta (US Naval Research Laboratory, USA)

Query-Crafting DoS Threats Against Internet DNS – Sang-Yoon Chang (University of Colorado Colorado Springs, USA); Younghee Park and Nikhil Vijayakumar Kengalahalli (San Jose State University, USA); Xiaobo Zhou (University of Colorado, Colorado Springs, USA)

19:20 - 20:00 – Poster Session 1 (Room A)

Fingerprinting Voice Applications on Smart Speakers over Encrypted Traffic – Shriti Naraparaju (USA)

Identifying P2P Communities in Network Traffic Using Measures of Community Connections – Harshvardhan P Joshi and Rudra Dutta (North Carolina State University, USA)

Cyber Security Decision Making Informed by Cyber Threat Intelligence (CYDETI) – Aliyu Aliyu, Ying He and Iryna Yevseyeva (De Montfort University, United Kingdom (Great Britain))

Membership Inference Attacks against MemGuard – Ben Niu (Institute of Information Engineering, Chinese Academy of Sciences, China); Yahong Chen (Institute of Information Engineering, CAS & School of Cyber Security, UCAS, China); Likun Zhang (Central University of Finance and Economics, China); Fenghua Li (Institute of Information Engineerin, CAS & School of Cyber Security, UCAS, P.R. China)


Tuesday, 30 June  2020

14:00 - 15:00 – Keynote 2: Quality of Security: the mandatory service attributes? – Evaluation, exposure, composition, monitoring of QoSec for SecSLA in 5G & beyond developments (Room A)​​​​​​​

Speaker: Emmanuel Dotaro – Head of ICT and Security Labs at Thales Secure Communications and Information Systems – France

15:10 - 16:30 – S4-A: Key Agreement and Blockchain (Room A)

SecureAIS - Securing Pairwise Vessels Communications – Ahmed Aziz, Pietro Tedeschi, Savio Sciancalepore and Roberto Di Pietro (Hamad Bin Khalifa University, Qatar)

Augmented Randomness for Secure Key Agreement using Physiological Signals – Beste Seymen and Duygu Karaoğlan Altop (Sabancı University, Turkey); Albert Levi (Sabanci University, Turkey)

Game Theoretic Approach for Secure and Efficient Heavy-Duty Smart Contracts – Pinglan Liu and Wensheng Zhang (Iowa State University, USA)

Efficient Physical Layer Group Key Generation in 5G Wireless Networks – Long Jiao (George Mason University, USA); Pu Wang (Xidian University, China); Ning Wang (George Mason University, USA); Songlin Chen (George Washington University, USA); Amir Alipour-Fanid, Junqing Le and Kai Zeng (George Mason University, USA)

15:10 - 16:30 – S4-B: Data Security (Room B)

PhishZip: A New Compression-based Algorithm for Detecting Phishing Websites – Rizka Widyarini Purwanto (University of New South Wales, Australia); Arindam Pal (CSIRO & Data61, Australia); Alan Blair (University of New South Wales, Australia); Sanjay Jha (University of NSW, Australia)

Mailto: Me Your Secrets. On Bugs and Features in Email End-to-End Encryption – Jens Müller and Marcus Brinkmann (Ruhr University Bochum, Germany); Damian Poddebniak and Sebastian Schinzel (Münster University of Applied Sciences, Germany); Joerg Schwenk (Ruhr University Bochum, Germany)

Fast and Secure kNN Query Processing in Cloud Computing – Xinyu Lei (Michigan State University, USA); Guan-Hua Tu (Michigan State Unversity, USA); Alex X. Liu (Ant Financial Services Group, China); Tian Xie (Michigan State University, USA)

EARS: Enabling Private Feedback Updates in Anonymous Reputation Systems – Vishnu Teja Kilari (Arizona State University, USA); Ruozhou Yu (North Carolina State University, USA); Satyajayant Misra (New Mexico State University, USA); Guoliang Xue (Arizona State University, USA)

16:40 - 17:40 – S5-A: Security in the IoT (Room A)

SCIBORG: Secure Configurations for the IOT Based on Optimization and Reasoning on Graphs – Hamed Soroush (PARC, USA); Massimiliano Albanese (George Mason University, USA); Milad Asgari Mehrabadi (University of California, Irvine, USA); Ibifubara Iganibo (George Mason University, USA); Marc Mosko (Palo Alto Research Center, USA); Jason Gao and David Fritz (Sandia National Laboratories, USA); Shantanu Rane and Eric Bier (Palo Alto Research Center, USA)

Rapid: Robust and Adaptive Detection of Distributed Denial-of-Service Traffic from the Internet of Things – Samuel Mergendahl and Jun Li (University of Oregon, USA)

Cumulative Message Authentication Codes for Resource-Constrained Networks – He Li (Virginia Polytechnic Institute and State University, USA); Vireshwar Kumar (Purdue University, USA); Jung-Min (Jerry) Park and Yaling Yang (Virginia Tech, USA)

16:40 - 17:40 – S5-B: Wireless and Network Security (Room B)

Privacy Protection and Efficient Incumbent Detection in Spectrum Sharing Based on Federated Learning Ning Wang and Junqing Le (George Mason University, USA); Weiwei Li (Hebei University of Engineering, China & George Mason University, USA); Long Jiao, Zhihao Li and Kai Zeng (George Mason University, USA)

Sweet: Secure Wireless Energy Transfer with Electric Vehicles in Vehicular Energy Networks Yuntao Wang (Xi'an Jiaotong University, China); Zhou Su (Shanghai University, China); Ning Zhang (Texas A&M University-Corpus Christi, USA); Abderrahim Benslimane (University of Avignon & LIA/CERI, France)

When the Network of a Smart City Is Not So Smart Ali Tabaja and Reuven Cohen (Technion, Israel)

17:50 - 18:50 – S6-A: Digital Forensics (Room A)

Compact and Resilient Cryptographic Tools for Digital Forensics Efe Ulas Akay Seyitoglu and Attila Altay Yavuz (University of South Florida, USA); Muslum Ozgur Ozmen (Purdue University, USA)

Forensic Investigation of Industrial Control Systems Using Deterministic Replay Gregory W Walkup (Sandia National Laboratories, USA); Sriharsha Etigowni and Dongyan Xu (Purdue University, USA); Vincent Urias and Han Lin (Sandia National Laboratories, USA)

Catching Falling Dominoes: Cloud Management-Level Provenance Analysis with Application to OpenStack Azadeh Tabiban (Concordia University, Canada); Yosr Jarraya and Mengyuan Zhang (Ericsson Canada, Canada); Makan Pourzandi (Ericsson, Canada); Lingyu Wang (Concordia University, Canada); Mourad Debbabi (Concordia University, Montreal, Canada)

17:50 - 19:10 – S6-B: Malware (Room B)

DodgeTron: Towards Autonomous Cyber Deception Using Dynamic Hybrid Analysis of Malware Md Sajidul Islam Sajid, Jinpeng Wei, Md Rabbi Alam and Ehsan Aghaei (University of North Carolina at Charlotte, USA); Ehab Al-Shaer (University of North Carolina Charlotte, USA)

A Quantitative Framework to Model Reconnaissance by Stealthy Attackers and Support Deception-Based Defenses Luan Huy Pham and Massimiliano Albanese (George Mason University, USA); Ritu Chadha, Cho-Yu Chiang and Sridhar Venkatesan (Perspecta Labs, USA); Charles A Kamhoua (US Army Research Laboratory & Network Science Division, USA); Nandi Leslie (CCDC Army Research Laboratory & Raytheon, USA)

Hybrid Analysis of Android Apps for Security Vetting using Deep Learning Dewan Chaulagain, Prabesh Poudel, Prabesh Pathak and Sankardas Roy (Bowling Green State University, USA); Doina Caragea (Kansas State University, USA); Guojun Liu and Xinming Ou (University of South Florida, USA)

SYMBION: Interleaving Symbolic with Concrete Execution Fabio Gritti, Lorenzo Fontana, Eric Gustafson, Fabio Pagani, Andrea Continella and Christopher Kruegel (University of California, Santa Barbara, USA); Giovanni Vigna (University of California Santa Barbara, USA)

17:50 - 19:10 – Poster Session 2 (Room A)

Platoon Handover Authentication in 5G-V2X Guanjie Li and Chengzhe Lai (Xi’an University of Posts and Telecommunications, China)

Automated Post-Breach Penetration Testing through Reinforcement Learning Sujita Chaudhary, Austin O'Brien and Shengjie Xu (Dakota State University, USA)

Website Cryptojacking Detection Using Machine Learning Venkata Sai Krishna Avinash Nukala (University of Cincinnati, USA)