lecture notes in computer science 8233978-3-319-02726-5/1.pdf · the use of general descriptive...

11
Lecture Notes in Computer Science 8233 Commenced Publication in 1973 Founding and Former Series Editors: Gerhard Goos, Juris Hartmanis, and Jan van Leeuwen Editorial Board David Hutchison Lancaster University, UK Takeo Kanade Carnegie Mellon University, Pittsburgh, PA, USA Josef Kittler University of Surrey, Guildford, UK Jon M. Kleinberg Cornell University, Ithaca, NY, USA Alfred Kobsa University of California, Irvine, CA, USA Friedemann Mattern ETH Zurich, Switzerland John C. Mitchell Stanford University, CA, USA Moni Naor Weizmann Institute of Science, Rehovot, Israel Oscar Nierstrasz University of Bern, Switzerland C. Pandu Rangan Indian Institute of Technology, Madras, India Bernhard Steffen TU Dortmund University, Germany Madhu Sudan Microsoft Research, Cambridge, MA, USA Demetri Terzopoulos University of California, Los Angeles, CA, USA Doug Tygar University of California, Berkeley, CA, USA Gerhard Weikum Max Planck Institute for Informatics, Saarbruecken, Germany

Upload: others

Post on 12-Aug-2020

0 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Lecture Notes in Computer Science 8233978-3-319-02726-5/1.pdf · The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication does not

Lecture Notes in Computer Science 8233Commenced Publication in 1973Founding and Former Series Editors:Gerhard Goos, Juris Hartmanis, and Jan van Leeuwen

Editorial Board

David HutchisonLancaster University, UK

Takeo KanadeCarnegie Mellon University, Pittsburgh, PA, USA

Josef KittlerUniversity of Surrey, Guildford, UK

Jon M. KleinbergCornell University, Ithaca, NY, USA

Alfred KobsaUniversity of California, Irvine, CA, USA

Friedemann MatternETH Zurich, Switzerland

John C. MitchellStanford University, CA, USA

Moni NaorWeizmann Institute of Science, Rehovot, Israel

Oscar NierstraszUniversity of Bern, Switzerland

C. Pandu RanganIndian Institute of Technology, Madras, India

Bernhard SteffenTU Dortmund University, Germany

Madhu SudanMicrosoft Research, Cambridge, MA, USA

Demetri TerzopoulosUniversity of California, Los Angeles, CA, USA

Doug TygarUniversity of California, Berkeley, CA, USA

Gerhard WeikumMax Planck Institute for Informatics, Saarbruecken, Germany

Page 2: Lecture Notes in Computer Science 8233978-3-319-02726-5/1.pdf · The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication does not

Sihan Qing Jianying ZhouDongmei Liu (Eds.)

Information andCommunicationsSecurity15th International Conference, ICICS 2013Beijing, China, November 20-22, 2013Proceedings

13

Page 3: Lecture Notes in Computer Science 8233978-3-319-02726-5/1.pdf · The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication does not

Volume Editors

Sihan QingDongmei LiuChinese Academy of Sciences, Institute of Software, Beijing 100190, ChinaE-mail: [email protected]; [email protected]

Jianying ZhouInstitute for Infocomm Research, Infocomm Security Department1 Fusionopolis Way, #21-01 Connexis, South Tower, Singapore 138632, SingaporeE-mail: [email protected]

ISSN 0302-9743 e-ISSN 1611-3349ISBN 978-3-319-02725-8 e-ISBN 978-3-319-02726-5DOI 10.1007/978-3-319-02726-5Springer Cham Heidelberg New York Dordrecht London

Library of Congress Control Number: 2013950171

CR Subject Classification (1998): E.3, D.4.6, K.6.5, K.4.4, F.2, C.2

LNCS Sublibrary: SL 4 – Security and Cryptology

© Springer International Publishing Switzerland 2013

This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part ofthe material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation,broadcasting, reproduction on microfilms or in any other physical way, and transmission or informationstorage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodologynow known or hereafter developed. Exempted from this legal reservation are brief excerpts in connectionwith reviews or scholarly analysis or material supplied specifically for the purpose of being entered andexecuted on a computer system, for exclusive use by the purchaser of the work. Duplication of this publicationor parts thereof is permitted only under the provisions of the Copyright Law of the Publisher’s location,in its current version, and permission for use must always be obtained from Springer. Permissions for usemay be obtained through RightsLink at the Copyright Clearance Center. Violations are liable to prosecutionunder the respective Copyright Law.The use of general descriptive names, registered names, trademarks, service marks, etc. in this publicationdoes not imply, even in the absence of a specific statement, that such names are exempt from the relevantprotective laws and regulations and therefore free for general use.While the advice and information in this book are believed to be true and accurate at the date of publication,neither the authors nor the editors nor the publisher can accept any legal responsibility for any errors oromissions that may be made. The publisher makes no warranty, express or implied, with respect to thematerial contained herein.

Typesetting: Camera-ready by author, data conversion by Scientific Publishing Services, Chennai, India

Printed on acid-free paper

Springer is part of Springer Science+Business Media (www.springer.com)

Page 4: Lecture Notes in Computer Science 8233978-3-319-02726-5/1.pdf · The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication does not

Preface

The 15th International Conference on Information and Communications Security(ICICS 2013) was held in Beijing, China, during November 20–22, 2013. TheICICS conference series is an established forum that brings together people fromuniversities, research institutes, industry, and government institutions, who workin a range of fields within information and communications security. The ICICSconferences give attendees the opportunity to exchange new ideas and investigatedevelopments in the state of the art. In previous years, ICICS has taken placein Australia (1999), China (2011, 2009, 2007, 2005, 2003, 2001 and 1997), HongKong (2012), Singapore (2002), Spain (2010, 2004), the UK (2008), and USA(2006). On each occasion, as on this one, the proceedings have been publishedin the Springer’s LNCS series.

In total, 113 manuscripts from 19 countries were submitted to ICICS 2013,among which 23 regular and six short papers from 12 countries were accepted.The accepted papers cover a wide range of disciplines within information secu-rity and applied cryptography. Each submission to ICICS 2013 was anonymouslyreviewed by three reviewers. We are very grateful to members of the ProgramCommittee, which was composed of 66 members from 16 countries; we wouldlike to thank them, as well as all the external reviewers, for their valuable con-tributions to the tough and time-consuming reviewing process.

ICICS 2013 was organized and hosted by the Institute of Software, Chi-nese Academy of Sciences (CAS), the Institute of Software and Microelectronics,Peking University and the State Key Laboratory of Information Security of theInstitute of Information Engineering, Chinese Academy of Sciences (CAS). Theconference was sponsored by the National Natural Science Foundation of Chinaunder Grant No. 60970135 and No. 61170282.

We would like to thank the authors who submitted their papers to ICICS2013, and the attendees from all around the world. Finally, we would also like tothank Ying Qiu for managing the conference website and the EasyChair system,Publicity Chair Xinyi Huang for making the wide distribution of the call forpapers, and other local Organizing Committee members for providing logisticalsupport.

August 2013 Sihan QingJianying Zhou

Page 5: Lecture Notes in Computer Science 8233978-3-319-02726-5/1.pdf · The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication does not

ICICS 2013

15th International Conferenceon Information and Communications Security

Beijing, ChinaNovember 20–22, 2013

Organized by

Institute of Software, Chinese Academy of Sciences (CAS)Institute of Software and Microelectronics, Peking University, China

SKLOIS, Institute of Information Engineering, CAS

Sponsored by

National Natural Science Foundation of China (NNSFC)

General Chair

Dongdai Lin Institute of Information Engineering, CAS,China

Program Chairs

Sihan Qing Chinese Academy of Sciences and PekingUniversity, China

Jianying Zhou Institute for Infocomm Research, Singapore

Program Committee

Michel Abdalla ENS and CNRS, FranceEndre Bangerter Bern University of Applied Sciences, GermanyZinaida Benenson University of Erlangen-Nuremberg, GermanyMarina Blanton University of Notre Dame, USAIoana Boureanu EPFL, SwitzerlandBogdan Carbunar Florida International University, USAAldar Chan Institute for Infocomm Research, SingaporeEe-Chien Chang National University of Singapore, SingaporeLiqun Chen Hewlett-Packard Laboratories, UKSongqing Chen George Mason University, USA

Page 6: Lecture Notes in Computer Science 8233978-3-319-02726-5/1.pdf · The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication does not

VIII ICICS 2013

Xiaofeng Chen Xidian University, ChinaSherman S.M. Chow Chinese University of Hong Kong, SAR ChinaAndreas Dewald University of Erlangen-Nuremberg, GermanyThomas Eisenbarth Worcester Polytechnic Institute, USAJosep Ferrer-Gomila Universitat de les Illes Balears, SpainSara Foresti Universita degli Studi di Milano, ItalyDebin Gao Singapore Management University, SingaporeDieter Gollmann Hamburg University of Technology, GermanyStefanos Gritzalis University of the Aegean, GreeceDawu Gu Shanghai Jiao Tong University, ChinaJin Han Institute for Infocomm Research, SingaporeMatt Henricksen Institute for Infocomm Research, SingaporeXinyi Huang Fujian Normal University, ChinaLucas Hui The University of Hong Kong, ChinaXuxian Jiang North Carolina State University, USASokratis Katsikas University of Piraeus, GreeceSteve Kremer Inria Nancy - Grand Est, FranceXuejia Lai Shanghai Jiao Tong University, ChinaJiguo Li Hohai University, ChinaTieyan Li Huawei, SingaporeYingjiu Li Singapore Management University, SingaporeJavier Lopez University of Malaga, SpainWenjing Luo Virginia Tech, USAMark Manulis University of Surrey, UKKeith Martin Royal Holloway, University of London, UKSjouke Mauw University of Luxembourg, LuxembourgChris Mitchell Royal Holloway, University of London, UKAtsuko Miyaji JAIST, JapanPayman Mohassel University of Calgary, CanadaDavid Naccache ENS, FranceRaphael Phan Multimedia University, MalaysiaDavid Pointcheval CNRS/ENS/Inria, FranceVincent Rijmen KU Leuven, BelgiumAhmad-Reza Sadeghi Technische Universitat Darmstadt, GermanyKouichi Sakurai Kyushu University, JapanPierangela Samarati Universita degli Studi di Milano, ItalyMiguel Soriano Universitat Politecnica de Catalunya, SpainWilly Susilo University of Wollongong, AustraliaTsuyoshi Takagi Kyushu University, JapanVrizlynn Thing Institute for Infocomm Research, SingaporeClaire Vishik Intel, UKGuilin Wang University of Wollongong, AustraliaHaining Wang The College of William and Mary, USALina Wang Wuhan University, China

Page 7: Lecture Notes in Computer Science 8233978-3-319-02726-5/1.pdf · The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication does not

ICICS 2013 IX

Weiping Wen Peking University, ChinaDuncan Wong City University of Hong Kong, ChinaWenling Wu Institute of Software, ChinaYongdong Wu Institute for Infocomm Research, SingaporeLi Xu Fujian Normal University, ChinaShouhuai Xu University of Texas at San Antonio, USAFangguo Zhang Sun Yat-sen University, ChinaFutai Zhang Nanjing Normal University, ChinaJie Zhang Nanyang Technological University, SingaporeWentao Zhang Institute of Information Engineering, CAS,

ChinaYuliang Zheng UNCC, USAYongbin Zhou Institute of Information Engineering, China

Publicity Chair

Xinyi Huang Fujian Normal University, China

Publication Chair

Dongmei Liu Chinese Academy of Sciences, China

External Reviewers

Zeeshan BilalShaoying CaiHua ChenJiageng ChenXihui ChenChen-Mou ChengCheng-Kang ChuSu ChunhuaXingmin CuiSabrina De Capitani DiVimercatiProkopios DrogkarisChanglai DuJunbin FangCarol FungYuichi FutaWei GaoJinguang Han

Takuya HayashiStephan HeuserShuhui HouGeorgios KambourakisDivyan KonidalaBarbara KordyNan LiWei LiZhengqi LiJunrong LiuYang LiuYang LuWeiliang LuoTakashi NishideKazumasa OmoteJun PangPanagiotis RizomiliotisRodrigo Roman

Patrick SchweitzerJie ShiMasaaki ShiraseBen StockBenjamin StritterWenhai SunYing-Kai TangHaibo TianAggeliki TsohouChristian WachsmannBing WangJianfeng WangWei WuHong XuJia XuZhiqian XuWeijia XueQiben Yan

Page 8: Lecture Notes in Computer Science 8233978-3-319-02726-5/1.pdf · The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication does not

X ICICS 2013

Yanjiang YangRehana YasminXin YeTsz Hon Yuen

Hui ZhangLei ZhangShaojun ZhangTao ZhangYinghui Zhang

Yunlei ZhaoQingji ZhengYao ZhengBo Zhu

Page 9: Lecture Notes in Computer Science 8233978-3-319-02726-5/1.pdf · The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication does not

Table of Contents

System Security

Defending against Heap Overflow by Using Randomization in NestedVirtual Clusters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1

Chee Meng Tey and Debin Gao

VTOS: Research on Methodology of “Light-Weight” Formal Designand Verification for Microkernel OS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17

Zhenjiang Qian, Hao Huang, and Fangmin Song

Web Security and Worm Detection

Defeat Information Leakage from Browser Extensions via DataObfuscation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33

Wentao Chang and Songqing Chen

Rating Web Pages Using Page-Transition Evidence . . . . . . . . . . . . . . . . . . . 49Jian Mao, Xinshu Dong, Pei Li, Tao Wei, and Zhenkai Liang

OSNGuard: Detecting Worms with User Interaction Traces in OnlineSocial Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59

Liang He, Dengguo Feng, Purui Su, Lingyun Ying, Yi Yang,Huafeng Huang, and Huipeng Fang

Cloud Storage Security

A Secure and Efficient Scheme for Cloud Storage againstEavesdropper . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75

Jian Liu, Huimei Wang, Ming Xian, and Kun Huang

Secure and Private Outsourcing of Shape-Based Feature Extraction . . . . 90Shumiao Wang, Mohamed Nassar, Mikhail Atallah, andQutaibah Malluhi

Virtualization for Cloud Computing

Time-Stealer: A Stealthy Threat for Virtualization Scheduler and ItsCountermeasures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100

Hong Rong, Ming Xian, Huimei Wang, and Jiangyong Shi

Detecting Malicious Co-resident Virtual Machines Indulging inLoad-Based Attacks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 113

Smitha Sundareswaran and Anna C. Squcciarini

Page 10: Lecture Notes in Computer Science 8233978-3-319-02726-5/1.pdf · The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication does not

XII Table of Contents

A Covert Channel Using Event Channel State on Xen Hypervisor . . . . . . 125Qingni Shen, Mian Wan, Zhuangzhuang Zhang, Zhi Zhang,Sihan Qing, and Zhonghai Wu

Trusted and Trustworthy Computing

Type-Based Analysis of Protected Storage in the TPM . . . . . . . . . . . . . . . 135Jianxiong Shao, Dengguo Feng, and Yu Qin

Remote Attestation Mechanism for User Centric Smart Cards UsingPseudorandom Number Generators . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 151

Raja Naeem Akram, Konstantinos Markantonakis, and Keith Mayes

Authentication and Security Protocols

Direct Construction of Signcryption Tag-KEM from StandardAssumptions in the Standard Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 167

Xiangxue Li, Haifeng Qian, Yu Yu, Jian Weng, and Yuan Zhou

Efficient eCK-Secure Authenticated Key Exchange Protocols in theStandard Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 185

Zheng Yang

Intrusion Detection and Recovery

XLRF: A Cross-Layer Intrusion Recovery Framework for DamageAssessment and Recovery Plan Generation . . . . . . . . . . . . . . . . . . . . . . . . . . 194

Eunjung Yoon and Peng Liu

PRIDE: Practical Intrusion Detection in Resource Constrained WirelessMesh Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 213

Amin Hassanzadeh, Zhaoyan Xu, Radu Stoleru, Guofei Gu, andMichalis Polychronakis

Fingerprint Embedding: A Proactive Strategy of Detecting TimingChannels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 229

Jing Wang, Peng Liu, Limin Liu, Le Guan, and Jiwu Jing

Side Channel Attacks and Defense

Comprehensive Evaluation of AES Dual Ciphers as a Side-ChannelCountermeasure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 245

Amir Moradi and Oliver Mischke

EMD-Based Denoising for Side-Channel Attacks and Relationshipsbetween the Noises Extracted with Different Denoising Methods . . . . . . . 259

Mingliang Feng, Yongbin Zhou, and Zhenmei Yu

Page 11: Lecture Notes in Computer Science 8233978-3-319-02726-5/1.pdf · The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication does not

Table of Contents XIII

Engineering Issues of Crypto

Accelerating AES in JavaScript with WebGL . . . . . . . . . . . . . . . . . . . . . . . . 275Yang Yang, Zhi Guan, Jiawei Zhu, Qiuxiang Dong, and Zhong Chen

Analysis of Multiple Checkpoints in Non-perfect and Perfect RainbowTradeoff Revisited . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 288

Wenhao Wang and Dongdai Lin

Efficient Implementation of NIST-Compliant Elliptic CurveCryptography for Sensor Nodes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 302

Zhe Liu, Hwajeong Seo, Johann Großschadl, and Howon Kim

Cryptanalysis

Attacking and Fixing the CS Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 318Han Sui, Wenling Wu, Liting Zhang, and Peng Wang

Integral Attacks on Reduced-Round PRESENT . . . . . . . . . . . . . . . . . . . . . . 331Shengbao Wu and Mingsheng Wang

Attribute-Based Encryption

Computationally Efficient Expressive Key-Policy Attribute BasedEncryption Schemes with Constant-Size Ciphertext . . . . . . . . . . . . . . . . . . 346

Y. Sreenivasa Rao and Ratna Dutta

Privacy-Preserving Decentralized Ciphertext-Policy Attribute-BasedEncryption with Fully Hidden Access Structure . . . . . . . . . . . . . . . . . . . . . . 363

Huiling Qian, Jiguo Li, and Yichen Zhang

Cryptographic Primitives and Applications

Toward Generic Method for Server-Aided Cryptography . . . . . . . . . . . . . . 373Sebastien Canard, Iwen Coisel, Julien Devigne, Cecilia Gallais,Thomas Peters, and Olivier Sanders

Generation and Tate Pairing Computation of Ordinary Elliptic Curveswith Embedding Degree One . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 393

Zhi Hu, Lin Wang, Maozhi Xu, and Guoliang Zhang

Threshold Secret Image Sharing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 404Teng Guo, Feng Liu, ChuanKun Wu, ChingNung Yang,Wen Wang, and YaWei Ren

Author Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 413