19-21 Oct. 2009
Filter Results
-
[Front cover]
Publication Year: 2009, Page(s): C1|
PDF (349 KB)
-
[Title page i]
Publication Year: 2009, Page(s): i|
PDF (64 KB)
-
[Title page iii]
Publication Year: 2009, Page(s): iii|
PDF (111 KB)
-
[Copyright notice]
Publication Year: 2009, Page(s): iv|
PDF (109 KB)
-
Table of contents
Publication Year: 2009, Page(s):v - xi|
PDF (178 KB)
-
Message from General Chair
Publication Year: 2009, Page(s): xii -
Message from Program Chairs
Publication Year: 2009, Page(s): xiii -
Organizing Committee
Publication Year: 2009, Page(s): xiv|
PDF (128 KB)
-
Program Committee
Publication Year: 2009, Page(s):xv - xvii|
PDF (119 KB)
-
list-reviewer
Publication Year: 2009, Page(s): xviii|
PDF (98 KB)
-
Keynote speakers
Publication Year: 2009, Page(s):xix - xxiFlooding of harmful information on the Internet seriously endangers the physiological and mental health of teenagers. Due to the user-friendliness of the Internet as well as the difficulty in the authentication for the access of specific categories of information, curbing the transmission of harmful information, i.e., to assure the information content security (ICS), has become a reasonable yet ch... View full abstract»
-
Hardware Trojan Horse Device Based on Unintended USB Channels
Publication Year: 2009, Page(s):1 - 8
Cited by: Papers (4)This paper discusses research activities that investigated the risk associated with USB devices. The research focused on identifying, characterizing and modelling unintended USB channels in contemporary computer systems. Such unintended channels can be used by a USB hardware Trojan horse device to create two way communications with a targeted network endpoint, thus violating the integrity and conf... View full abstract»
-
Distinguishing DDoS Attacks from Flash Crowds Using Probability Metrics
Publication Year: 2009, Page(s):9 - 17
Cited by: Papers (22)Both Flash crowds and DDoS (Distributed Denial-of-Service) attacks have very similar properties in terms of Internet traffic, however Flash crowds are legitimate flows and DDoS attacks are illegitimate flows, and DDoS attacks have been a serious threat to Internet security and stability. In this paper we propose a set of novel methods using probability metrics to distinguish DDoS attacks from Flas... View full abstract»
-
Enhancing RFID Tag Resistance against Cloning Attack
Publication Year: 2009, Page(s):18 - 23
Cited by: Papers (9)In its current form, RFID system are susceptible to a range of malevolent attacks. With the rich business intelligence that RFID infrastructure could possibly carry, security is of paramount importance. In this paper, we formalise various threat models due tag cloning on the RFID system. We also present a simple but efficient and cost effect technique that strengthens the resistance of RFID tags t... View full abstract»
-
A Data Mining Approach for Detection of Self-Propagating Worms
Publication Year: 2009, Page(s):24 - 29In this paper we demonstrate our signature based detector for self-propagating worms. We use a set of worm and benign traffic traces of several endpoints to build benign and worm profiles. These profiles were arranged into separate n-ary trees. We also demonstrate our anomaly detector that was used to deal with tied matches between worm and benign trees. We analyzed the performance of each detecto... View full abstract»
-
An Information Filtering Approach
Publication Year: 2009, Page(s):30 - 35
Cited by: Papers (2)Web mining is used to automatically discover and extract information from Web-related data source such as documents, services and user profiles. Although standard data mining methods are applied for mining on the Web, specific algorithms need to be developed and applied for Web based information processing in Web resources. In our paper, we develop a method to filter the relevant information to us... View full abstract»
-
Architecture Design of High Efficient and Non-memory AES Crypto Core for WPAN
Publication Year: 2009, Page(s):36 - 43
Cited by: Papers (2)This paper presents the architecture design of a high efficient and non-memory Advanced Encryption Standard (AES) crypto core to fit WPAN security requirement. The proposed basis transformation approach from Galois Field (2<sup>8</sup>) to Galois Field GF(((2<sup>2</sup>)<sup>2</sup>)<sup>2</sup>) can significantly reduce the hardware complexity of t... View full abstract»
-
A Cryptographically t-Private Auction System
Publication Year: 2009, Page(s):44 - 51We present a feasible cryptographically t-private protocol for electronic auctions. Our construction is based on Yao's garbled circuits and pseudorandom number generators (PRNG). Our protocol involves a field of (t+1)<sup>2</sup> parties for the generation of the garbled circuit and permits an arbitrary large number of bidders. The computational requirements are low: Only t+1 parties o... View full abstract»
-
Design of a Secure Router System for Next-Generation Networks
Publication Year: 2009, Page(s):52 - 59
Cited by: Papers (1)Computer networks are vulnerable to attacks, where the network infrastructure itself is targeted. Emerging router designs, which use software-programmable embedded processors, increase the vulnerability to such attacks. We present the design of a secure packet processing platform (SPPP) that can protect these router systems. We use an instruction-level monitoring system to detect deviations in pro... View full abstract»
-
Changing Network Behavior
Publication Year: 2009, Page(s):60 - 66
Cited by: Papers (4)The security of computer networks has been in the focus of research for years. While several sophisticated systems had been developed in the area of intrusion detection, new challenges arised. Pattern matching systems are not able to cope with high bandwidth (10 Gbps +) when analyzing the whole payload. Furthermore, new attack schemes arise by increasingly complex software and systems. New approac... View full abstract»
-
Grid of Security: A New Approach of the Network Security
Publication Year: 2009, Page(s):67 - 72
Cited by: Papers (6)Network security is in a daily evolving domain. Every day, new attacks, virus or intrusion techniques are released. Hence, network devices, enterprise servers or personal computers are potential targets of these attacks. Current security solutions like firewalls, intrusion detection systems (IDS) and virtual private networks (VPN) are centralized solutions which rely mostly on the analyze of inbou... View full abstract»
-
DeWorm: A Simple Protocol to Detect Wormhole Attacks in Wireless Ad Hoc Networks
Publication Year: 2009, Page(s):73 - 80
Cited by: Papers (24)The wormhole attack is considered to be a serious security attack in multihop ad hoc and sensor networks. We propose "DeWorm", a simple protocol to effectively detect wormhole attacks without the need for special hardware and/or strict location or synchronization requirements. DeWorm makes use of discrepancies in routing information between neighbors to detect wormholes. A simulation based analysi... View full abstract»
-
Effective Attacks in the Tor Authentication Protocol
Publication Year: 2009, Page(s):81 - 86
Cited by: Papers (2)As an anonymous Internet communication system Tor is popular and famous, being used by lots of users. The security of Tor is based on the authentication protocol. Although the Tor authentication protocol has been proved secure, this paper discovers its security vulnerability through its concurrency analysis, and shows it cannot be securely executed by multiple concurrent sessions. A new session-ke... View full abstract»
-
Secure Authenticated Key Establishment Protocol for Ad Hoc Networks
Publication Year: 2009, Page(s):87 - 94
Cited by: Patents (1)Multicast communication in dynamic environments like ad hoc networks are potentially of critical concern. As group members move in and out of the group, in order to preserve confidentiality, it becomes imperative to use cryptographic keys with rekeying mechanism each time a user enters or leaves. Therefore, in dynamic environments rekeying introduces a significant computational and communication o... View full abstract»
-
An Evaluation of Secure Real-Time Transport Protocol (SRTP) Performance for VoIP
Publication Year: 2009, Page(s):95 - 101
Cited by: Papers (8)The Secure Real-Time Transport Protocol (SRTP) is an Internet standards-track security profile for RTP used to provide confidentiality, integrity and replay protection for RTP traffic. We study the performance of SRTP when it is used to secure VoIP conversations. Experiments are conducted using snom and Twinkle softphones running on Windows and Linux platforms respectively and a bare PC softphone ... View full abstract»