2017 IEEE Conference on
Dependable and Secure Computing

Taipei • Taiwan | August 7—10, 2017

Overview


August 7 August 8 August 9 August 10
08:50—09:00 A5
(SW)
08:50—10:10
B5
(WSDS)
08:50—10:10
09:00—10:00 Opening 9:00—9:20 Keynote #2
9:00—10:00
Keynote #1
09:20—10:20
10:00—11:00 Coffee Break 10:00—10:20
Coffee Break 10:10—10:30
Coffee Break 10:20—10:50 A4
(SW)
10:20—12:20
B4
(HW)
10:20—12:20
Poster 10:30—10:50
A1
(SW)
10:50—12:10
B1
(HW)
10:50—12:10
A6
(SW)
10:50—12:10
B6
(WSDS)
10:50—12:10
11:00—12:00
12:00—13:00
Lunch 12:10—13:10 Lunch 12:10—13:10
Lunch 12:20—13:20
13:00—15:00 Registration
A2
(SW)
13:10—15:10
B2
(HW)
13:10—15:10
A7
(SW)
13:10—14:50
B7
(EP)
13:10—14:50
Excursion
~ 19:30
14:00—15:00
Coffee Break 14:50—15:10
15:00—16:00
Coffee Break 15:10—15:30 A8
(SW)
15:10—17:20
B8
(EP)
15:10—17:20
A3
(SW)
15:30—17:30
B3
(HW)
15:30—17:30
16:00—17:00
17:00—17:30
18:00—21:00 Banquet

Keynote Talks

Attribute-Based Access Control: Insights and Challenges
Prof. Ravi Sandhu
Executive Director and Chief Scientist
Institute for Cyber Security (ICS)
University of Texas at San Antonio

Abstract: Since about 2010 there has been considerable growth of interest among cyber security researchers and practitioners in attribute-based access control (ABAC). The Institute of Cyber Security at the University of Texas at San Antonio has pursued this area intensively. This talk will present a personal perspective on the insights obtained by the Institute's research, as well as research from other groups working on this topic. The talk will identify some challenges in research as well as in practical deployments of ABAC.

Bio: Ravi Sandhu is Executive Director of the Institute for Cyber Security at the University of Texas at San Antonio, where he holds the Lutcher Brown Endowed Chair in Cyber Security. Previously he served on the faculty at George Mason University (1989-2007) and Ohio State University (1982-1989). He holds BTech and MTech degrees from IIT Bombay and Delhi, and MS and PhD degrees from Rutgers University. He is a Fellow of IEEE, ACM and AAAS, and has received awards from IEEE, ACM, NSA and NIST. A prolific and highly cited author, his research has been funded by NSF, NSA, NIST, DARPA, AFOSR, ONR, AFRL and private industry. His seminal papers on role-based access control established it as the dominant form of access control in practical systems. His numerous other models and mechanisms have also had considerable real-world impact. He served as Editor-in-Chief of the IEEE Transactions on Dependable and Secure Computing, and previously as founding Editor-in-Chief of ACM Transactions on Information and System Security. He was Chairman of ACM SIGSAC, and founded the ACM Conference on Computer and Communications Security, the ACM Symposium on Access Control Models and Technologies and the ACM Conference on Data and Application Security and Privacy. He has served as General Chair, Steering Committee Chair, Program Chair and Committee Member for numerous security conferences. He has consulted for leading industry and government organizations, and has lectured all over the world. He is an inventor on 30 security technology patents and has accumulated over 32,000 Google Scholar citations for his papers. At the Institute for Cyber Security his research projects include attribute-based access control, secure cloud computing, secure cloud-enabled Internet of Things, social computing security, and secure data provenance. His web site is at www.profsandhu.com.


Title: Increase Your Security Effectiveness by Automating and Machine Learning
Michael Montoya
Chief Cybersecurity Advisor, Asia
Microsoft Enterprise & Partner Group

Abstract: With the increasing velocity and volume of cyberattacks, coupled with the lack of sufficiently trained staff, it is essential that detection and response activities are automated as much as possible. Based on lessons learned in Microsoft’s SOC, we will show in this talk how to automate tasks, increase machine learning and build a modern security posture.

Bio: As the Asia Chief Cybersecurity Officer for the Microsoft Enterprise Cybersecurity Group, Michael is a leader of Microsoft’s initiatives and operations to provide thought leadership, strategic direction on the development of Microsoft security products and services, and deep customer and partner engagement across Asia.

Michael re-joined Microsoft in 2016 as an experienced information security executive bringing more than 20 years of enterprise IT support and leadership. Michael was Vice President of Cloud and Engineering with Fireeye, where he was responsible for developing and operating the cloud services for Fireeye’s threat intelligence backbone (DTI) and cloud services of Threat Analytics Platform (TAP), Email Threat Prevention (ETP), Mobile Threat Platform (MTP), Cloud Endpoint Security (Helix) and CloudMVX. Prior to his role at Fireeye, Michael was the Deputy Chief Information Officer at EMC where he was responsible for their Cloud First platform, and Infrastructure and Security Operations bringing cloud adoption best practices to a $20 Billion USD enterprise for virtualization, cloud adoption and security resulting in CIO100 industry recognitions.

In Michael’s previous role with Microsoft, he held a number of IT leadership roles including Asia Regional Chief Information Officer and leader of Microsoft’s Global Hosting organization responsible for managing all Internet Datacenter architecture and operations. Michael helped lead Microsoft to expand into the Asia region during a time of incredible growth helping establish global delivery in China and India, as well as, expand IT infrastructure across all the regions in Asia. Michael also was a founder of Microsoft’s Global Hosting Strategy which is now Azure. Under his leadership, Michael helped design and operate Microsoft’s initial 7 datacenters to support the growth in MSN properties, Microsoft.com, WindowsUpdate, Hotmail and the secure extranet to support a business partner network. Michael led the team to industry leading support models, service level agreements and security and operation innovations to support a globally secure and distributed service-oriented architecture.

Michael has established himself as a recognized innovative IT leader and serves as an advisor to several security and IT startups and venture capital firms. Michael earned a dual degree from the University of New Mexico.


Full Program

Session A1: Cryptography Applications #1 (10:50—12:10, Aug 8) [top]
Session Chair: Prof. Kouichi Sakurai (Kyushu University, Japan)
  1. Fair Deposits against Double-Spending for Bitcoin Transactions
    Xingjie Yu, Michael Thang Shiwen, Yingjiu Li, and Robert Deng Huijie
  2. Design and Analysis of High Performance Crypt-NoSQL
    Ming-Hung Shih and Morris Chang
  3. Secure Minimum Weighted Bipartite Matching
    Balamurugan Anandan and Chris Clifton
  4. Detecting Invalid Digital Signatures in Batches
    D. J. Guan, E. S. Zhuang, Yu-Shen Lin, and I. C. Chung
Session B1: Digital System (10:50—12:10, Aug 8) [top]
Session Chair: Prof. Arun Somani (Iowa State University, USA)
  1. Design of Applying FlexRay-bus to Federated Architecture for Triple Redundancy Reliable UAV Flight Control System
    Chang-Han Wu, Ti-Jui Chen, Terng-Yin Hsu and Shang-Ho Tsai Tsai
  2. A Configurable H.265-Compatible Motion Estimation Accelerator Architecture for Realtime 4K Video Encoding in 65nm CMOS
    Michael Braly, Aaron Stillmaker and Bevan Baas
  3. SVM Point-based Real-time Emotion Detection
    Wout Swinkels, Luc Claesen, Feng Xiao and Haibin Shen
  4. NIR-based Gaze Tracking with Fast Pupil Ellipse Fitting for Real-Time Wearable Eye Trackers
    Jia-Hao Wu, Wei-Liang Ou and Chih-Peng Fan
Session A2: Malware and Intrusion Detection (13:10—15:10, Aug 8) [top]
Session Chair: Prof. Avishai Wool (Tel Aviv University, Isarel)
  1. MIRAGE: Randomizing Large Chunk Allocation Via Dynamic Binary Instrumentation
    Zhenghao Hu, Hui Wang, Juanru Li, Wenbo Yang, Yuanyuan Zhang, and Dawu Gu
  2. K-binID: Kernel Binary Code Identification for Virtual Machine Introspection
    Yacine Hebbal, Sylvie Laniepce, and Jean-Marc Menaud
  3. VMCloak: Toward a Stealthy in-VM Agent Execution
    Chiawei Wang and Shiuhpyng Shieh
  4. The Dose Makes the Poison - Leveraging Uncertainty for Effective Malware Detection
    Ruimin Sun, Xiaoyong Yuan, Andrew Lee, Matt Bishop, Donald E. Porter, Xiaolin Li, Andre Gregio, and Daniela Oliveira
  5. Wireless Intrusion Prevention System Using Dynamic Random Forest Against Wireless MAC Spoofing Attack
    Seokhwan Choi, Doohee Hwang, and Yoonho Choi
  6. Hidden Process Detection using Kernel Functions Instrumentation
    Yacine Hebbal, Sylvie Laniepce, and Jean-Marc Menaud
Session B2: Secure Circuits (13:10—15:10, Aug 8) [top]
Session Chair: Prof. Jiann-Shiun Yuan (University of Central Florida, USA)
  1. Computing with Obfuscated Data in Arbitrary Logic Circuits via Noise Insertion and Cancellation
    Yu-Wei Lee and Nur Touba
  2. Single clock-cycle, Multilayer Encryption Algorithm for Single-channel IoT Communications
    Shahzad Muzaffar, Owais Talaat Waheed, Zeyar Aung and Ibrahim Elfadel
  3. Workload-Aware Lifetime Trojan based on Statistical Aging Manipulation
    Tien-Hung Tseng, Shu-Sheng Wang, Jian-You Chen and Kai-Chiang Wu
  4. Security Analysis of Computing Systems from Circuit-Architectural Perspective
    Shayan Taheri and Jiann-Shiun Yuan
  5. An Experimental Study of the State-of-the-Art PUFs Implemented on FPGAs
    Mohammed Saeed Alkatheiri, Yu Zhuang, Mikhail Korobkov and Abdur Rashid Sangi
  6. Towards Fast and Accurate Machine Learning Attacks of Feed-Forward Arbiter PUFs
    Mohammed Saeed Alkatheiri and Yu Zhuang
Session A3: Software Defined Network (15:30—17:30, Aug 8) [top]
Session Chair: Prof. Chi-Yu Li (National Chiao Tung University, Taiwan)
  1. Implementing NFV System with OpenStack
    Jinlin Chen, Yiren Chen, Shi-Chun Tsai, and Yi-Bing Lin
  2. Detecting Amplification Attacks with Software Defined Networking
    Chih-Chieh Chen, Yi-Ren Chen, Wei-Chih Lu, Shi-Chun Tsai, and Ming-Chuan Yang
  3. SDN On-The-Go (OTG) Physical Testbed
    Joshua Alcorn, Scott Melton, and C. Edward Chow
  4. SDN Data Path Confidence Analysis
    Joshua Alcorn, Scott Melton, and C. Edward Chow
  5. Detection and Prevention of DoS attacks in Software-Defined Cloud Networks
    Perumalraja Rengaraju, Raja Ramanan V, and Chung-Horng Lung
  6. FUSION: A Unified Application Model for Virtual Mobile Infrastructure
    Chieh-Min Wang, Yu-Sung Wu, and Hsing-Hsuan Chung
Session B3: Neural Networks / Automotive Electronics (15:30—17:30, Aug 8) [top]
Session Chair: Prof. Chih-Peng Fan (National Chung Hsing University, Taiwan)
  1. Landslide Prediction with Model Switching
    Shi-Feng Chen and Pao-Ann Hsiung
  2. Combining Low-Cost Inertial Measurement Unit (IMU) and Deep Learning Algorithm for Predicting Vehicle Attitude
    JunYing Huang, ZhengYu Huang, and KuanHung Chen
  3. High Performance CAN/FlexRay Gateway for In-Vehicle Network
    Trong-Yen Lee, Chia-Wei Kuo and I-An Lin
Session A4: Mobile and Data (10:20—12:20, Aug 9) [top]
Session Chair: Prof. Chris Clifton (Purdue University, USA)
  1. Location Privacy-Protection based on p-destination in Mobile Social Networks: a Game Theory Analysis
    Bi Di Ying and Amiya Nayak
  2. PACS: Permission Abuse Checking System for Android Applications based on Review Mining
    Jingzheng Wu, Mutian Yang, and Tianyue Luo
  3. SCANNER: Sequence Clustering of Android Resource Accesses
    Neil Wong Hon Chan and Shanchieh Jay Yang
  4. Secure Location Tracking of Femtocells in Heterogeneous Cellular Networks
    Shin-Ming Cheng, Yu-Jyun Wang, and Ying-Cheng Chen
  5. R2D2: Right Place, Right Path Data Delivery
    Ehab Ashary, C. Edward Chow, Ashish Korpe, and Donovan Thorpe
  6. Privacy-Preserving PCA on Horizontally-Partitioned Data
    Mohammad Al-Rubaie, Pei-Yuan Wu, J. Morris Chang, and Sun-Yuan Kung
Session B4: Digital Design / Soft Error Analysis (10:20—12:20, Aug 9) [top]
Session Chair: Dr. Shao-Ying Yeh
  1. LowLEAC: Low Leakage Energy Architecture for Caches
    Rashmi Girmal and Arun Somani
  2. Design and Implementation of a Low-cost Guided Image Filter for Underwater Image Enhancement
    Cheng-Hao Chang, I-Chang Huang, Mu-Fan Lin and Shiann-Rong Kuang
  3. Radix-4 Adder Design with Refined Carry
    Chun-Hsiang Lai, Yu-Cheng Cheng, Tung-Chi Wu and Yen-Jen Chang
  4. Source Code Transformation for Software-Based On-Line Error Detection
    Tsung-Yen Tsai and Jiun-Lang Huang
  5. Physically Secure Mutual Authentication for IoT
    Muhammad Naveed Aman, Kee Chaing Chua, and Biplab Sikdar
Session A5: Cloud and Distributed Systems (08:50—10:10, Aug 10) [top]
Session Chair: Prof. Dieter Kranzlmueller (LMU & LRZ Munich, Germany)
  1. Probabilistic Treatment of Service Assurance in Distributed Information Systems
    Kaliappa Ravindran and Chin-Tser Huang
  2. Federated Identity Hybrid Cloud Security Considerations Supporting First Responders
    Randy Garcia
  3. A Write-Operation-Adaptable Replication System for Multiplayer Cloud Gaming
    Wan Chi Chang and Pi-Chung Wang
  4. An Analytical Model for Reliability Evaluation of Cloud Service Provisioning Systems
    Fatimah Alturkistani, Saad Alaboodi, and Sarfraz Brohi
Session B5: WSDS Session #1 (08:50—10:10, Aug 10) [top]
Session Chair: Prof. Vitaly Klyuev (University of Aizu, Japan)
  1. The Calibration of Gain error for Time Amplifier Embedded in Time-to-Digital Converter
    Jung-Chin Lai and Frank Hsiao
  2. Hosting Distributed Databases on Internet-of-Things Scaled Devices
    Daniel Richardson, Alan Lin, and John Pecarina
  3. Cyber Anonymity Based on Software-Defined Networking and Onion Routing (SOR)
    Abdelhamid Elgzil, C. Edward Chow, Amer Aljaedi, and Naif Alamri
  4. AES S-Box Construction Using Different Irreducible Polynomial and Constant 8-bit Vector
    Alamsyah, Bharata Adji Teguh, and Bejo Agus
  5. Deterministic Microcode Machine Generation
    Abir M'zah, Bruno Monsuez, and Hycham Aboutaleb
Session A6: Cryptography Applications #2 (10:50—12:10, Aug 10) [top]
Session Chair: Prof. J. Morris Chang (University of South Florida, USA)
  1. Generating and Exploring S-Box Multivariate Quadratic Equation Systems with SageMath
    A.-M. Leventi-Peetz and Jörg-Volker Peetz
  2. Secure Group Key Distribution in Constrained Environments with IKEv2
    Nils Genschten Felde, Tobias Guggemos, Tobias Heider, and Dieter Kranzlmüller
  3. A Practical and Effective Approach to Implementing High Availability Seamless Ring (HSR)
    James Yu
  4. Multiparty Computations in Varying Contexts
    Paul Laird, Pierpaolo Dondio, and Sarah Jane Delaney
Session B6: WSDS Session #2 (10:50—12:10, Aug 10) [top]
Session Chair: Prof. Chun-Ying Huang (National Chiao Tung University, Taiwan)
  1. CraxTriage: A Coverage Based Triage System
    Chao-Chun Yeh, Han-Lin Lu, Yi-Hsuan Lee, Wei-Sheng Chou, and Shih-Kun Huang
  2. Development of a Network Intrusion Detection System Using Apache Hadoop and Spark
    Keisuke Kato and Vitaly Klyuev
  3. A Novel Public Key Encryption Model Based on Transformed Biometrics
    Bin Yan and Lin You
  4. Adaptive Image Encryption for High Capacity Reversible Data Hiding
    Ka-Cheng Choi and Chi Man Pun
  5. Novel Designated Ownership Transfer with Grouping Proof
    Wei Tim Liew, Kuo-Yu Tsai, Jia Ning Luo, and Ming Hour Yang
Session A7: IoT and Multimedia (13:10—14:50, Aug 10) [top]
Session Chair: Prof. Chi-Man Pun (University of Macau, Macau)
  1. FRiPAL: Face Recognition in Privacy Abstraction Layer
    Di Zhuang, Sen Wang, and J. Morris Chang
  2. A Study on Multiple Wearable Sensors for Activity Recognition
    Yu-Chuan Huang, Hsing-Chen Lin, Ching-Yu Huang, and Chih-Wei Yi
  3. Visual Analysis of Corrupted Video Data in a Video Event DataRecorder
    Youngbin Pyo, Choongin Lee, and Heejo Lee
  4. IoT-Equipped UAV Communications with Seamless Vertical Handover
    Amit Gaur, Jyoti Budakoti, Chung-Horng Lung, and Alan Redmond
Session B7: Experience and Practice - VLSI and CAD (13:10—14:50, Aug 10) [top]
Session Chair: Prof. Juinn-Horng Deng (Yuan Ze University, Taiwan)
  1. FPGA Implementation of OFDM baseband processor
    Kuohua Sung and Terng-Yin Hsu
  2. Lower Power Data Transport Protection for Internet of Things (IoT)
    Chih-Ta Lin
  3. A Novel UL Power Control Scheme for A Digital Cellular Repeater
    Yung-Ting Lee, Chunn-Yenn Lin, and Ming-Jhou Wang
  4. On Exploiting SDN to Facilitate IPv4/IPv6 Coexistence and Transition
    Jia Jhun Lin, Kai Ching Wang, Shin Ming Cheng, and Yen Chun Liu
  5. Implementation of Digital Self-Interference Cancellation in LTE-based CCFD Transmission
    Jian-Ya Chu, Yuan-Te Liao, Chun-Yi Hung, and Terng-Yin Hsu
  6. SDR Measurement Platform Design for FMCW RADAR Performance Verification
    Juinn-Horng Deng
Session A8: Spam and Botnet (15:10—17:20, Aug 10) [top]
Session Chair: Prof. Chin-Tser Huang (University of South Carolina, USA)
  1. An Online Subject-Based Spam Filter Using Natural Language Features
    Chih-Ning Lee, Yi-Ruei Chen, and Wen-Guey Tzeng
  2. The Forward-Backward String: a New Robust Feature for Botnet Detection
    Yuan Hsiang Su, Amir Rezapour, and Wen-Guey Tzeng
  3. PeerHunter: Detecting Peer-to-Peer Botnets through Community Behavior Analysis
    Di Zhuang and J. Morris Chang
  4. Assessment of QoS Adaptation and Cyber-Defense Mechanisms in Networked Systems
    Kaliappa Ravindran, Adjet Kodia, Yassine Wardei, and Steven Drager
  5. Ziffersystem: A Novel Malware Distribution Detection System
    Tzu-Hsien Chuang, Shin-Ying Huang, Ching-Hao Mao, Albert B. Jeng, and Hahn-Ming Lee
Session B8: Experience and Practice - Security (15:10—17:20, Aug 10) [top]
Session Chair: Prof. Chung-Horng Lung (Carleton University, Canada)
  1. Enabling Practical Experimentation in Cyber-Security Training
    Zhenkai Liang, Jian Mao, and Zheng Leong Chua
  2. Memory Forensics using Virtual Machine Introspection for Malware Analysis
    Chin-Wei Tien, Jian-Wei Liao, Shun-Chieh Chang, and Sy-Yen Kuo
  3. Comment on 'Improving the security of protocols of quantum key agreement solely using Bell states and Bell measurement'
    Jun Gu and Tzonelih Hwang
  4. Resisting Attacks from Rogue HeNB
    Cheng Yu Tsai, Chuan Kai Kao, Chuan Yuan Huang, and Jhih Wei Lin
  5. Cyber Attack and Defense on Industry Control Systems
    Chih-Ta Lin, Sung-Lin Wu, and Mei-Lin Lee
  6. Shellcode Detector for Malicious Document Hunting
    Chong-Kuan Chen, Shen-Chieh Lan, and Shiuhpyng Shieh
  7. An SDN-based Defensive Solution against DHCP Attacks in the Virtualization Environment
    Jhen-Li Wang and Yen-Chung Chen
  8. An Autoblocking Mechanism for Firewall Service
    Shan-Jung Fu, Huai-Wen Hsu, Yichih Kao, Shi-Chun Tsai, and Chien-Chao Tseng

Accepted Papers
Computer Systems, Networks, and Software Track

  1. Generating and Exploring S-Box Multivariate Quadratic Equation Systems with SageMath
    A.-M. Leventi-Peetz and Jörg-Volker Peetz
  2. Location Privacy-Protection based on p-destination in Mobile Social Networks: a Game Theory Analysis
    Bi Di Ying and Amiya Nayak
  3. PACS: Permission Abuse Checking System for Android Applications based on Review Mining
    Jingzheng Wu, Mutian Yang, and Tianyue Luo
  4. SCANNER: Sequence Clustering of Android Resource Accesses
    Neil Wong Hon Chan and Shanchieh Jay Yang
  5. An Online Subject-Based Spam Filter Using Natural Language Features
    Chih-Ning Lee, Yi-Ruei Chen, and Wen-Guey Tzeng
  6. The Forward-Backward String: a New Robust Feature for Botnet Detection
    Yuan Hsiang Su, Amir Rezapour, and Wen-Guey Tzeng
  7. MIRAGE: Randomizing Large Chunk Allocation Via Dynamic Binary Instrumentation
    Zhenghao Hu, Hui Wang, Juanru Li, Wenbo Yang, Yuanyuan Zhang, and Dawu Gu
  8. K-binID: Kernel Binary Code Identification for Virtual Machine Introspection
    Yacine Hebbal, Sylvie Laniepce, and Jean-Marc Menaud
  9. Design and Analysis of High Performance Crypt-NoSQL
    Ming-Hung Shih and Morris Chang
  10. PeerHunter: Detecting Peer-to-Peer Botnets through Community Behavior Analysis
    Di Zhuang and J. Morris Chang
  11. FRiPAL: Face Recognition in Privacy Abstraction Layer
    Di Zhuang, Sen Wang, and J. Morris Chang
  12. VMCloak: Toward a Stealthy in-VM Agent Execution
    Chiawei Wang and Shiuhpyng Shieh
  13. Fair Deposits against Double-Spending for Bitcoin Transactions
    Xingjie Yu, Michael Thang Shiwen, Yingjiu Li, and Robert Deng Huijie
  14. Secure Minimum Weighted Bipartite Matching
    Balamurugan Anandan and Chris Clifton
  15. Probabilistic Treatment of Service Assurance in Distributed Information Systems
    Kaliappa Ravindran and Chin-Tser Huang
  16. Assessment of QoS Adaptation and Cyber-Defense Mechanisms in Networked Systems
    Kaliappa Ravindran, Adjet Kodia, Yassine Wardei, and Steven Drager
  17. Implementing NFV System with OpenStack
    Jinlin Chen, Yiren Chen, Shi-Chun Tsai, and Yi-Bing Lin
  18. Secure Location Tracking of Femtocells in Heterogeneous Cellular Networks
    Shin-Ming Cheng, Yu-Jyun Wang, and Ying-Cheng Chen
  19. Physically Secure Mutual Authentication for IoT
    Muhammad Naveed Aman, Kee Chaing Chua, and Biplab Sikdar
  20. FUSION: A Unified Application Model for Virtual Mobile Infrastructure
    Chieh-Min Wang, Yu-Sung Wu, and Hsing-Hsuan Chung
  21. The Dose Makes the Poison - Leveraging Uncertainty for Effective Malware Detection
    Ruimin Sun, Xiaoyong Yuan, Andrew Lee, Matt Bishop, Donald E. Porter, Xiaolin Li, Andre Gregio, and Daniela Oliveira
  22. Wireless Intrusion Prevention System Using Dynamic Random Forest Against Wireless MAC Spoofing Attack
    Seokhwan Choi, Doohee Hwang, and Yoonho Choi
  23. A Study on Multiple Wearable Sensors for Activity Recognition
    Yu-Chuan Huang, Hsing-Chen Lin, Ching-Yu Huang, and Chih-Wei Yi
  24. Detecting Invalid Digital Signatures in Batches
    D. J. Guan, E. S. Zhuang, Yu-Shen Lin, and I. C. Chung
  25. Detecting Amplification Attacks with Software Defined Networking
    Chih-Chieh Chen, Yi-Ren Chen, Wei-Chih Lu, Shi-Chun Tsai, and Ming-Chuan Yang
  26. Visual Analysis of Corrupted Video Data in a Video Event DataRecorder
    Youngbin Pyo, Choongin Lee, and Heejo Lee
  27. Hidden Process Detection using Kernel Functions Instrumentation
    Yacine Hebbal, Sylvie Laniepce, and Jean-Marc Menaud
  28. Federated Identity Hybrid Cloud Security Considerations Supporting First Responders
    Randy Garcia
  29. A Write-Operation-Adaptable Replication System for Multiplayer Cloud Gaming
    Wan Chi Chang and Pi-Chung Wang
  30. Secure Group Key Distribution in Constrained Environments with IKEv2
    Nils Genschten Felde, Tobias Guggemos, Tobias Heider, and Dieter Kranzlmüller
  31. Ziffersystem: A Novel Malware Distribution Detection System
    Tzu-Hsien Chuang, Shin-Ying Huang, Ching-Hao Mao, Albert B. Jeng, and Hahn-Ming Lee
  32. A Practical and Effective Approach to Implementing High Availability Seamless Ring (HSR)
    James Yu
  33. SDN On-The-Go (OTG) Physical Testbed
    Joshua Alcorn, Scott Melton, and C. Edward Chow
  34. SDN Data Path Confidence Analysis
    Joshua Alcorn, Scott Melton, and C. Edward Chow
  35. R2D2: Right Place, Right Path Data Delivery
    Ehab Ashary, C. Edward Chow, Ashish Korpe, and Donovan Thorpe
  36. Multiparty Computations in Varying Contexts
    Paul Laird, Pierpaolo Dondio, and Sarah Jane Delaney
  37. Privacy-Preserving PCA on Horizontally-Partitioned Data
    Mohammad Al-Rubaie, Pei-Yuan Wu, J. Morris Chang, and Sun-Yuan Kung
  38. An Analytical Model for Reliability Evaluation of Cloud Service Provisioning Systems
    Fatimah Alturkistani, Saad Alaboodi, and Sarfraz Brohi
  39. Detection and Prevention of DoS attacks in Software-Defined Cloud Networks
    Perumalraja Rengaraju, Raja Ramanan V, and Chung-Horng Lung
  40. IoT-Equipped UAV Communications with Seamless Vertical Handover
    Amit Gaur, Jyoti Budakoti, Chung-Horng Lung, and Alan Redmond

Accepted Papers
System Electronics, VLSI, and CAD

  1. LowLEAC: Low Leakage Energy Architecture for Caches
    Rashmi Girmal and Arun Somani
  2. An Experimental Study of the State-of-the-Art PUFs Implemented on FPGAs
    Mohammed Saeed Alkatheiri, Yu Zhuang, Mikhail Korobkov, and Abdur Rashid Sangi
  3. Security Analysis of Computing Systems from Circuit-Architectural Perspective
    Shayan Taheri and Jiann-Shiun Yuan
  4. Design of Applying FlexRay-bus to Federated Architecture for Triple Redundancy Reliable UAV Flight Control System
    Chang-Han Wu, Ti-Jui Chen, Terng-Yin Hsu, and Shang-Ho Tsai Tsai
  5. Workload-Aware Lifetime Trojan based on Statistical Aging Manipulation
    Tien-Hung Tseng, Shu-Sheng Wang, Jian-You Chen, and Kai-Chiang Wu
  6. Computing with Obfuscated Data in Arbitrary Logic Circuits via Noise Insertion and Cancellation
    Yu-Wei Lee and Nur Touba
  7. Single clock-cycle, Multilayer Encryption Algorithm for Single-channel IoT Communications
    Shahzad Muzaffar, Owais Talaat Waheed, Zeyar Aung, and Ibrahim Elfadel
  8. A Configurable H.265-Compatible Motion Estimation Accelerator Architecture for Realtime 4K Video Encoding in 65nm CMOS
    Michael Braly, Aaron Stillmaker, and Bevan Baas.
  9. Source Code Transformation for Software-Based On-Line Error Detection
    Tsung-Yen Tsai and Jiun-Lang Huang
  10. Towards Fast and Accurate Machine Learning Attacks of Feed-Forward Arbiter PUFs
    Mohammed Saeed Alkatheiri and Yu Zhuang
  11. SVM Point-based Real-time Emotion Detection
    Wout Swinkels, Luc Claesen, Feng Xiao, and Haibin Shen
  12. NIR-based Gaze Tracking with Fast Pupil Ellipse Fitting for Real-Time Wearable Eye Trackers
    Jia-Hao Wu, Wei-Liang Ou, and Chih-Peng Fan
  13. High Performance CAN/FlexRay Gateway Design for In-Vehicle Network
    Trong-Yen Lee, Chia-Wei Kuo and I-An Lin
  14. Landslide Prediction with Model Switching
    Shi-Feng Chen and Pao-Ann Hsiung
  15. Combining Low-Cost Inertial Measurement Unit (IMU) and Deep Learning Algorithm for Predicting Vehicle Attitude
    JunYing Huang, ZhengYu Huang, and KuanHung Chen
  16. Radix-4 Adder Design with Refined Carry
    Chun-Hsiang Lai, Yu-Cheng Cheng, Tung-Chi Wu and Yen-Jen Chang
  17. Design and Implementation of a Low-cost Guided Image Filter for Underwater Image Enhancement
    Cheng-Hao Chang, I-Chang Huang, Mu-Fan Lin and Shiann-Rong Kuang

Accepted Papers
Experience and Practice

  1. FPGA Implementation of OFDM baseband processor
    Kuohua Sung and Terng-Yin Hsu
  2. Comment on ‘Improving the security of protocols of quantum key agreement solely using Bell states and Bell measurement’
    Jun Gu and Tzonelih Hwang
  3. Shellcode Detector for Malicious Document Hunting
    Chong-Kuan Chen, Shen-Chieh Lan, and Shiuhpyng Shieh
  4. An SDN-based Defensive Solution against DHCP Attacks in the Virtualization Environment
    Jhen-Li Wang and Yen-Chung Chen
  5. An Autoblocking Mechanism for Firewall Service
    Shan-Jung Fu, Huai-Wen Hsu, Yichih Kao, Shi-Chun Tsai, and Chien-Chao Tseng
  6. Cyber Attack and Defense on Industry Control Systems
    Chih-Ta Lin, Sung-Lin Wu, and Mei-Lin Lee
  7. Lower Power Data Transport Protection for Internet of Things (IoT)
    Chih-Ta Lin
  8. Resisting Attacks from Rogue HeNB
    Cheng Yu Tsai, Chuan Kai Kao, Chuan Yuan Huang, and Jhih Wei Lin
  9. Memory Forensics using Virtual Machine Introspection for Malware Analysis
    Chin-Wei Tien, Jian-Wei Liao, Shun-Chieh Chang, and Sy-Yen Kuo
  10. A Novel UL Power Control Scheme for A Digital Cellular Repeater
    Yung-Ting Lee, Chunn-Yenn Lin, and Ming-Jhou Wang
  11. On Exploiting SDN to Facilitate IPv4/IPv6 Coexistence and Transition
    Jia Jhun Lin, Kai Ching Wang, Shin Ming Cheng, and Yen Chun Liu
  12. Enabling Practical Experimentation in Cyber-Security Training
    Zhenkai Liang, Jian Mao, and Zheng Leong Chua
  13. Implementation of Digital Self-Interference Cancellation in LTE-based CCFD Transmission
    Jian-Ya Chu, Yuan-Te Liao, Chun-Yi Hung, and Terng-Yin Hsu
  14. SDR Measurement Platform Design for FMCW RADAR Performance Verification
    Juinn-Horng Deng

Accepted Papers
Workshop

  1. AES S-Box Construction Using Different Irreducible Polynomial and Constant 8-bit Vector
    Alamsyah, Bharata Adji Teguh, and Bejo Agus
  2. Hosting Distributed Databases on Internet-of-Things Scaled Devices
    Daniel Richardson, Alan Lin, and John Pecarina
  3. CraxTriage: A Coverage Based Triage System
    Chao-Chun Yeh, Han-Lin Lu, Yi-Hsuan Lee, Wei-Sheng Chou, and Shih-Kun Huang
  4. Development of a Network Intrusion Detection System Using Apache Hadoop and Spark
    Keisuke Kato and Vitaly Klyuev
  5. Novel Designated Ownership Transfer with Grouping Proof
    Wei Tim Liew, Kuo-Yu Tsai, Jia Ning Luo, and Ming Hour Yang
  6. A Novel Public Key Encryption Model Based on Transformed Biometrics
    Bin Yan and Lin You
  7. The Calibration of Gain error for Time Amplifier Embedded in Time-to-Digital Converter
    Jung-Chin Lai and Frank Hsiao
  8. Adaptive Image Encryption for High Capacity Reversible Data Hiding
    Ka-Cheng Choi and Chi Man Pun
  9. Deterministic Microcode Machine Generation
    Abir M'zah, Bruno Monsuez, and Hycham Aboutaleb
  10. Cyber Anonymity Based on Software-Defined Networking and Onion Routing (SOR)
    Abdelhamid Elgzil, C. Edward Chow, Amer Aljaedi, and Naif Alamri

Accepted Posters

  1. Multi-object Splicing Forgery Detection Using Noise Level Difference
    Bo Liu and Chi Man Pun
  2. Droidrevealer: Automatically detecting Mysterious Codes in Android Applications
    Xinyin Zhang, Yuanye Cao, Jingzheng Wu, Mutian Yang, Tianyue Luo, and Yueqin Liu
  3. Interactive Simulation Platform using Processing-based Visualization for Safe Collision-Free Autonomous Driving Development
    Daejin Park and Dongkyu Lee
  4. Development of A High Throughput Image Compression System for Optical Remote Sensing
    Yu-Wei Cheng and Yin-Tsung Hwang
  5. High-performance Reverse Converter Design for the New Four-moduli Set {22n, 2n+1, 2n/2+1, 2n/2−1}
    Siang-Min Siao, Ming-Hwa Sheu, and Shao-Yu Wang

List of Authors

    Aboutaleb, Hycham Agus, Bejo Al-Rubaie, Mohammad Alaboodi, Saad Alamri, Naif Alamsyah, Alcorn, Joshua Aljaedi, Amer Alkatheiri, Mohammed Saeed Alturkistani, Fatimah Aman, Muhammad Naveed Anandan, Balamurugan Ashary, Ehab Aung, Zeyar Baas, Bevan Bishop, Matt Braly, Michael Brohi, Sarfraz Budakoti, Jyoti Chan, Neil Wong Hon Chang, J. Morris Chang, Morris Chang, Shun-Chieh Chang, Wan Chi Chen, Chih-Chieh Chen, Chong-Kuan Chen, Jian-You Chen, Jinlin Chen, Ti-Jui Chen, Yen-Chung Chen, Yi-Ren Chen, Yi-Ruei Chen, Ying-Cheng Chen, Yiren Cheng, Shin Ming Cheng, Shin-Ming Choi, Ka-Cheng Choi, Seokhwan Choi, Yoonho Chou, Wei-Sheng Chow, C. Edward Chu, Jian-Ya Chua, Kee Chaing Chua, Zheng Leong Chuang, Tzu-Hsien Chung, Hsing-Hsuan Chung, I. C. Claesen, Luc Clifton, Chris Delaney, Sarah Jane Deng, Juinn-Horng Dondio, Pierpaolo Drager, Steven Elfadel, Ibrahim Elgzil, Abdelhamid Fan, Chih-Peng Felde, Nils Genschten Fu, Shan-Jung Garcia, Randy Gaur, Amit Girmal, Rashmi Gregio, Andre Gu, Dawu Gu, Jun Guan, D. J. Guggemos, Tobias Hebbal, Yacine Heider, Tobias Hsiao, Frank Hsu, Huai-Wen Hsu, Terng-Yin Hu, Zhenghao Huang, Chin-Tser Huang, Ching-Yu Huang, Chuan Yuan Huang, Jiun-Lang Huang, Shih-Kun Huang, Shin-Ying Huang, Yu-Chuan Huijie, Robert Deng Hung, Chun-Yi Hwang, Doohee Hwang, Tzonelih Jeng, Albert B. Kao, Chuan Kai Kao, Yichih Kato, Keisuke Khero, Kainat Khoso, Abdul Jabbar Klyuev, Vitaly Kodia, Adjet Korobkov, Mikhail Korpe, Ashish Kranzlmüller, Dieter Kung, Sun-Yuan Kuo, Sy-Yen Lai, Jung-Chin Laird, Paul Lan, Shen-Chieh Laniepce, Sylvie Lee, Andrew Lee, Chih-Ning Lee, Choongin Lee, Hahn-Ming Lee, Heejo Lee, Mei-Lin Lee, Yi-Hsuan Lee, Yu-Wei Lee, Yung-Ting Leventi-Peetz, A.-M. Li, Juanru Li, Xiaolin Li, Yingjiu Liang, Zhenkai Liao, Jian-Wei Liao, Yuan-Te Liew, Wei Tim Lin, Alan Lin, Chih-Ta Lin, Chunn-Yenn Lin, Hsing-Chen Lin, Jhih Wei Lin, Jia Jhun Lin, Yi-Bing Lin, Yu-Shen Liu, Yen Chun Lu, Han-Lin Lu, Wei-Chih Lung, Chung-Horng Luo, Jia Ning Luo, Tianyue M'zah, Abir Mao, Ching-Hao Mao, Jian Melton, Scott Menaud, Jean-Marc Monsuez, Bruno Muzaffar, Shahzad Nayak, Amiya Oliveira, Daniela Ou, Wei-Liang Pecarina, John Peetz, Jörg-Volker Porter, Donald E. Pun, Chi Man Pyo, Youngbin Ravindran, Kaliappa Redmond, Alan Rengaraju, Perumalraja Rezapour, Amir Richardson, Daniel Sangi, Abdur Rashid Shen, Haibin Sheu, Ming-Hwa Shieh, Shiuhpyng Shih, Ming-Hung Shiwen, Michael Thang Siao, Siang-Min Sikdar, Biplab Somani, Arun Stillmaker, Aaron Su, Yuan Hsiang Sun, Ruimin Sung, Kuohua Swinkels, Wout Taheri, Shayan Teguh, Bharata Adji Thorpe, Donovan Tien, Chin-Wei Touba, Nur Tsai, Cheng Yu Tsai, Kuo-Yu Tsai, Shang-Ho Tsai Tsai, Shi-Chun Tsai, Tsung-Yen Tseng, Chien-Chao Tseng, Tien-Hung Tzeng, Wen-Guey V, Raja Ramanan Waheed, Owais Talaat Wang, Chiawei Wang, Chieh-Min Wang, Hui Wang, Jhen-Li Wang, Kai Ching Wang, Ming-Jhou Wang, Pi-Chung Wang, Sen Wang, Shao-Yu Wang, Shu-Sheng Wang, Yu-Jyun Wardei, Yassine Wu, Chang-Han Wu, Jia-Hao Wu, Jingzheng Wu, Kai-Chiang Wu, Pei-Yuan Wu, Sung-Lin Wu, Yu-Sung Xiao, Feng Yan, Bin Yang, Ming Hour Yang, Ming-Chuan Yang, Mutian Yang, Shanchieh Jay Yang, Wenbo Yeh, Chao-Chun Yi, Chih-Wei Ying, Bi Di You, Lin Yu, James Yu, Xingjie Yuan, Jiann-Shiun Yuan, Xiaoyong Zhang, Yuanyuan Zhuang, Di Zhuang, E. S. Zhuang, Yu


© 2017 IEEE Conference on Dependable and Secure Computing