Workshop Program Security, Privacy, and Digital Forensics of Mobile Systems and Networks

The International Workshop on The Security, Privacy, and Digital Forensics of Mobile Systems and Networks (MobiSec 2017)
 
Monday, 1 May, 2017 ● 08:20 – 17:00 ● Room: Georgia 4
 
To many people, smartphones have been an indispensable part of daily life and work. With all personal financial and medical information and job related data being processed on these mobile systems and networks, it is critically important that the development and advancement of secure mobile operating systems, secure mobile applications, secure smartphone devices and cellular networks keep up with the ever-growing smartphone usage. For this reason, this research area has been a very important sector in the network and telecommunication industry and a focus of funded research projects in many research institutes.
The scope of MobiSec 2017 encompasses the security, privacy, and digital forensics of mobile systems and networks, including but not limited to Android, iOS and Windows Mobile operating systems, smartphones and applications for these platforms and devices, as well as cellular networks. The aim of MobiSec 2017 is to bring together the active scholars and researchers from around the world and to provide a great venue and opportunity to share ideas and research findings that may shed light upon the advancement in these areas.
 
Chairs:
Guofei Gu (Texas A&M University, USA)
Lei Chen (Georgia Southern University, USA)
Wenjia Li (New York Institute of Technology, USA)
 
 
08:20 – 08:30
Opening Session
Chairs: Guofei Gu, Lei Chen and Wenjia Li
 
08:30 – 10:00
Session 1
 
Effective and Scalable Repackaged Application Detection based on User Interface
Meiqi Lin, Dafang Zhang, Xin Su, Tinghao Yu (Hunan University, China)
 
FuzzyDP: Fuzzy-based Big Data Publishing Against Inquiry Attacks
Youyang Qu, Shui Yu, Longxiang Gao (Deakin University, Australia), Sancheng Peng (Guangdong University of Foreign Studies, China), Yong Xiang (Deakin University, Australia), Liang Xiao (Xiamen University, China)
 
Intrusion and Attacks over Mobile Networks and Cloud Health Systems
Lo'ai A. Tawalbeh, Hala Tawalbeh (Jordan University of Science and Technology, Jordan), Houbing Song (West Virginia University & West Virginia Center of Excellence for Cyber-Physical Systems, USA), Yaser Jararweh (Jordan University of Science and Technology, Jordan)
 
TextDroid: Semantics-based Detection of Mobile Malware Using Network Flows
Shanshan Wang (University of Jinan, China), Qiben Yan (University of Nebraska-Lincoln, USA), Zhenxiang Chen, Bo Yang, Chuan Zhao (University of Jinan, China), Mauro Conti (University of Padua, Italy)
 
10:30 – 11:15
Keynote Session
Guiling (Grace) Wang (New Jersey Institute of Technology)
An Overview of Mobile Application Security
 
11:15 – 12:00
Session 2
 
An Image Texture and BP neural network based Malicious Files Detection Technique for Cloud Storage Systems
Guanchao Wen, Yupeng Hu, Chen Jiang, Na Cao, Zheng Qin (Hunan University, China)
 
Statistical Network Behavior Based Threat Detection
Ran He (Bell Labs, USA), Jin Cao, Lawrence Drabeck (Bell Labs-Lucent Technologies, USA)
 
13:30 – 15:00
Session 3
 
The Problem of Privacy in Cooperative Intelligent Transportation Systems (C-ITS)
Djibrilla Amadou Kountché (Institut Mines-Télécom / Télécom Bretagne, France), Jean-Marie Bonnin (Institut Mines Telecom / IMT Atlantique & IRISA - Inria, France), Houda Labiod (TELECOM ParisTech, France)
 
App behavioral analysis using system calls
Prajit K Das, Anupam Joshi, Tim Finin (University of Maryland, Baltimore County, USA)
 
Random projection data perturbation based privacy protection in WSNs
Zhao Ming, Wu Zhengjiang (Central South University, China)
 
Security Analysis of Internet-of-Things: A Case Study of August Smart Lock
Mengmei Ye, Nan Jiang, Hao Yang, Qiben Yan (University of Nebraska-Lincoln, USA)
 
15:30 – 17:30
Session 4
 
A New Lightweight Key Exchange Protocol With Provable Security for Securing Cloud-Assisted Mobile Communications
Jun Liu (University of North Dakota, USA)
 
A Federated Cloud Computing Framework for Adaptive Cyber Defense and Distributed Computing
Olumide. Malomo, Danda B. Rawat, Moses Garuba (Howard University, USA)
 
Adaptive Scheduling Mechanism Based on Self-Similarity for Duty Cycle Opportunistic Mobile Networks
Yueyue Dou, Feng Zeng, Zhigang Chen (Central South University, China)
 
Initial Trust Establishment for Personal Space IoT Systems
Tham T. Nguyen, Doan B Hoang, Diep N. Nguyen (University of Technology Sydney, Australia), Aruna Seneviratne (University of New South Wales, Australia)
 
Ranking Most Informative Apps for Effective Identification of Legitimate Smartphone Owners
Abdulaziz Alzubaidi (University of Colorado at Colorado Springs, USA), Swarup Roy (North Eastern Hill University, India), Jugal Kalita (University of Colorado at Colorado Springs, USA)