lecture notes in computer science 8233978-3-319-02726-5/1.pdf · the use of general descriptive...
TRANSCRIPT
Lecture Notes in Computer Science 8233Commenced Publication in 1973Founding and Former Series Editors:Gerhard Goos, Juris Hartmanis, and Jan van Leeuwen
Editorial Board
David HutchisonLancaster University, UK
Takeo KanadeCarnegie Mellon University, Pittsburgh, PA, USA
Josef KittlerUniversity of Surrey, Guildford, UK
Jon M. KleinbergCornell University, Ithaca, NY, USA
Alfred KobsaUniversity of California, Irvine, CA, USA
Friedemann MatternETH Zurich, Switzerland
John C. MitchellStanford University, CA, USA
Moni NaorWeizmann Institute of Science, Rehovot, Israel
Oscar NierstraszUniversity of Bern, Switzerland
C. Pandu RanganIndian Institute of Technology, Madras, India
Bernhard SteffenTU Dortmund University, Germany
Madhu SudanMicrosoft Research, Cambridge, MA, USA
Demetri TerzopoulosUniversity of California, Los Angeles, CA, USA
Doug TygarUniversity of California, Berkeley, CA, USA
Gerhard WeikumMax Planck Institute for Informatics, Saarbruecken, Germany
Sihan Qing Jianying ZhouDongmei Liu (Eds.)
Information andCommunicationsSecurity15th International Conference, ICICS 2013Beijing, China, November 20-22, 2013Proceedings
13
Volume Editors
Sihan QingDongmei LiuChinese Academy of Sciences, Institute of Software, Beijing 100190, ChinaE-mail: [email protected]; [email protected]
Jianying ZhouInstitute for Infocomm Research, Infocomm Security Department1 Fusionopolis Way, #21-01 Connexis, South Tower, Singapore 138632, SingaporeE-mail: [email protected]
ISSN 0302-9743 e-ISSN 1611-3349ISBN 978-3-319-02725-8 e-ISBN 978-3-319-02726-5DOI 10.1007/978-3-319-02726-5Springer Cham Heidelberg New York Dordrecht London
Library of Congress Control Number: 2013950171
CR Subject Classification (1998): E.3, D.4.6, K.6.5, K.4.4, F.2, C.2
LNCS Sublibrary: SL 4 – Security and Cryptology
© Springer International Publishing Switzerland 2013
This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part ofthe material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation,broadcasting, reproduction on microfilms or in any other physical way, and transmission or informationstorage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodologynow known or hereafter developed. Exempted from this legal reservation are brief excerpts in connectionwith reviews or scholarly analysis or material supplied specifically for the purpose of being entered andexecuted on a computer system, for exclusive use by the purchaser of the work. Duplication of this publicationor parts thereof is permitted only under the provisions of the Copyright Law of the Publisher’s location,in its current version, and permission for use must always be obtained from Springer. Permissions for usemay be obtained through RightsLink at the Copyright Clearance Center. Violations are liable to prosecutionunder the respective Copyright Law.The use of general descriptive names, registered names, trademarks, service marks, etc. in this publicationdoes not imply, even in the absence of a specific statement, that such names are exempt from the relevantprotective laws and regulations and therefore free for general use.While the advice and information in this book are believed to be true and accurate at the date of publication,neither the authors nor the editors nor the publisher can accept any legal responsibility for any errors oromissions that may be made. The publisher makes no warranty, express or implied, with respect to thematerial contained herein.
Typesetting: Camera-ready by author, data conversion by Scientific Publishing Services, Chennai, India
Printed on acid-free paper
Springer is part of Springer Science+Business Media (www.springer.com)
Preface
The 15th International Conference on Information and Communications Security(ICICS 2013) was held in Beijing, China, during November 20–22, 2013. TheICICS conference series is an established forum that brings together people fromuniversities, research institutes, industry, and government institutions, who workin a range of fields within information and communications security. The ICICSconferences give attendees the opportunity to exchange new ideas and investigatedevelopments in the state of the art. In previous years, ICICS has taken placein Australia (1999), China (2011, 2009, 2007, 2005, 2003, 2001 and 1997), HongKong (2012), Singapore (2002), Spain (2010, 2004), the UK (2008), and USA(2006). On each occasion, as on this one, the proceedings have been publishedin the Springer’s LNCS series.
In total, 113 manuscripts from 19 countries were submitted to ICICS 2013,among which 23 regular and six short papers from 12 countries were accepted.The accepted papers cover a wide range of disciplines within information secu-rity and applied cryptography. Each submission to ICICS 2013 was anonymouslyreviewed by three reviewers. We are very grateful to members of the ProgramCommittee, which was composed of 66 members from 16 countries; we wouldlike to thank them, as well as all the external reviewers, for their valuable con-tributions to the tough and time-consuming reviewing process.
ICICS 2013 was organized and hosted by the Institute of Software, Chi-nese Academy of Sciences (CAS), the Institute of Software and Microelectronics,Peking University and the State Key Laboratory of Information Security of theInstitute of Information Engineering, Chinese Academy of Sciences (CAS). Theconference was sponsored by the National Natural Science Foundation of Chinaunder Grant No. 60970135 and No. 61170282.
We would like to thank the authors who submitted their papers to ICICS2013, and the attendees from all around the world. Finally, we would also like tothank Ying Qiu for managing the conference website and the EasyChair system,Publicity Chair Xinyi Huang for making the wide distribution of the call forpapers, and other local Organizing Committee members for providing logisticalsupport.
August 2013 Sihan QingJianying Zhou
ICICS 2013
15th International Conferenceon Information and Communications Security
Beijing, ChinaNovember 20–22, 2013
Organized by
Institute of Software, Chinese Academy of Sciences (CAS)Institute of Software and Microelectronics, Peking University, China
SKLOIS, Institute of Information Engineering, CAS
Sponsored by
National Natural Science Foundation of China (NNSFC)
General Chair
Dongdai Lin Institute of Information Engineering, CAS,China
Program Chairs
Sihan Qing Chinese Academy of Sciences and PekingUniversity, China
Jianying Zhou Institute for Infocomm Research, Singapore
Program Committee
Michel Abdalla ENS and CNRS, FranceEndre Bangerter Bern University of Applied Sciences, GermanyZinaida Benenson University of Erlangen-Nuremberg, GermanyMarina Blanton University of Notre Dame, USAIoana Boureanu EPFL, SwitzerlandBogdan Carbunar Florida International University, USAAldar Chan Institute for Infocomm Research, SingaporeEe-Chien Chang National University of Singapore, SingaporeLiqun Chen Hewlett-Packard Laboratories, UKSongqing Chen George Mason University, USA
VIII ICICS 2013
Xiaofeng Chen Xidian University, ChinaSherman S.M. Chow Chinese University of Hong Kong, SAR ChinaAndreas Dewald University of Erlangen-Nuremberg, GermanyThomas Eisenbarth Worcester Polytechnic Institute, USAJosep Ferrer-Gomila Universitat de les Illes Balears, SpainSara Foresti Universita degli Studi di Milano, ItalyDebin Gao Singapore Management University, SingaporeDieter Gollmann Hamburg University of Technology, GermanyStefanos Gritzalis University of the Aegean, GreeceDawu Gu Shanghai Jiao Tong University, ChinaJin Han Institute for Infocomm Research, SingaporeMatt Henricksen Institute for Infocomm Research, SingaporeXinyi Huang Fujian Normal University, ChinaLucas Hui The University of Hong Kong, ChinaXuxian Jiang North Carolina State University, USASokratis Katsikas University of Piraeus, GreeceSteve Kremer Inria Nancy - Grand Est, FranceXuejia Lai Shanghai Jiao Tong University, ChinaJiguo Li Hohai University, ChinaTieyan Li Huawei, SingaporeYingjiu Li Singapore Management University, SingaporeJavier Lopez University of Malaga, SpainWenjing Luo Virginia Tech, USAMark Manulis University of Surrey, UKKeith Martin Royal Holloway, University of London, UKSjouke Mauw University of Luxembourg, LuxembourgChris Mitchell Royal Holloway, University of London, UKAtsuko Miyaji JAIST, JapanPayman Mohassel University of Calgary, CanadaDavid Naccache ENS, FranceRaphael Phan Multimedia University, MalaysiaDavid Pointcheval CNRS/ENS/Inria, FranceVincent Rijmen KU Leuven, BelgiumAhmad-Reza Sadeghi Technische Universitat Darmstadt, GermanyKouichi Sakurai Kyushu University, JapanPierangela Samarati Universita degli Studi di Milano, ItalyMiguel Soriano Universitat Politecnica de Catalunya, SpainWilly Susilo University of Wollongong, AustraliaTsuyoshi Takagi Kyushu University, JapanVrizlynn Thing Institute for Infocomm Research, SingaporeClaire Vishik Intel, UKGuilin Wang University of Wollongong, AustraliaHaining Wang The College of William and Mary, USALina Wang Wuhan University, China
ICICS 2013 IX
Weiping Wen Peking University, ChinaDuncan Wong City University of Hong Kong, ChinaWenling Wu Institute of Software, ChinaYongdong Wu Institute for Infocomm Research, SingaporeLi Xu Fujian Normal University, ChinaShouhuai Xu University of Texas at San Antonio, USAFangguo Zhang Sun Yat-sen University, ChinaFutai Zhang Nanjing Normal University, ChinaJie Zhang Nanyang Technological University, SingaporeWentao Zhang Institute of Information Engineering, CAS,
ChinaYuliang Zheng UNCC, USAYongbin Zhou Institute of Information Engineering, China
Publicity Chair
Xinyi Huang Fujian Normal University, China
Publication Chair
Dongmei Liu Chinese Academy of Sciences, China
External Reviewers
Zeeshan BilalShaoying CaiHua ChenJiageng ChenXihui ChenChen-Mou ChengCheng-Kang ChuSu ChunhuaXingmin CuiSabrina De Capitani DiVimercatiProkopios DrogkarisChanglai DuJunbin FangCarol FungYuichi FutaWei GaoJinguang Han
Takuya HayashiStephan HeuserShuhui HouGeorgios KambourakisDivyan KonidalaBarbara KordyNan LiWei LiZhengqi LiJunrong LiuYang LiuYang LuWeiliang LuoTakashi NishideKazumasa OmoteJun PangPanagiotis RizomiliotisRodrigo Roman
Patrick SchweitzerJie ShiMasaaki ShiraseBen StockBenjamin StritterWenhai SunYing-Kai TangHaibo TianAggeliki TsohouChristian WachsmannBing WangJianfeng WangWei WuHong XuJia XuZhiqian XuWeijia XueQiben Yan
X ICICS 2013
Yanjiang YangRehana YasminXin YeTsz Hon Yuen
Hui ZhangLei ZhangShaojun ZhangTao ZhangYinghui Zhang
Yunlei ZhaoQingji ZhengYao ZhengBo Zhu
Table of Contents
System Security
Defending against Heap Overflow by Using Randomization in NestedVirtual Clusters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
Chee Meng Tey and Debin Gao
VTOS: Research on Methodology of “Light-Weight” Formal Designand Verification for Microkernel OS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
Zhenjiang Qian, Hao Huang, and Fangmin Song
Web Security and Worm Detection
Defeat Information Leakage from Browser Extensions via DataObfuscation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
Wentao Chang and Songqing Chen
Rating Web Pages Using Page-Transition Evidence . . . . . . . . . . . . . . . . . . . 49Jian Mao, Xinshu Dong, Pei Li, Tao Wei, and Zhenkai Liang
OSNGuard: Detecting Worms with User Interaction Traces in OnlineSocial Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59
Liang He, Dengguo Feng, Purui Su, Lingyun Ying, Yi Yang,Huafeng Huang, and Huipeng Fang
Cloud Storage Security
A Secure and Efficient Scheme for Cloud Storage againstEavesdropper . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75
Jian Liu, Huimei Wang, Ming Xian, and Kun Huang
Secure and Private Outsourcing of Shape-Based Feature Extraction . . . . 90Shumiao Wang, Mohamed Nassar, Mikhail Atallah, andQutaibah Malluhi
Virtualization for Cloud Computing
Time-Stealer: A Stealthy Threat for Virtualization Scheduler and ItsCountermeasures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100
Hong Rong, Ming Xian, Huimei Wang, and Jiangyong Shi
Detecting Malicious Co-resident Virtual Machines Indulging inLoad-Based Attacks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 113
Smitha Sundareswaran and Anna C. Squcciarini
XII Table of Contents
A Covert Channel Using Event Channel State on Xen Hypervisor . . . . . . 125Qingni Shen, Mian Wan, Zhuangzhuang Zhang, Zhi Zhang,Sihan Qing, and Zhonghai Wu
Trusted and Trustworthy Computing
Type-Based Analysis of Protected Storage in the TPM . . . . . . . . . . . . . . . 135Jianxiong Shao, Dengguo Feng, and Yu Qin
Remote Attestation Mechanism for User Centric Smart Cards UsingPseudorandom Number Generators . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 151
Raja Naeem Akram, Konstantinos Markantonakis, and Keith Mayes
Authentication and Security Protocols
Direct Construction of Signcryption Tag-KEM from StandardAssumptions in the Standard Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 167
Xiangxue Li, Haifeng Qian, Yu Yu, Jian Weng, and Yuan Zhou
Efficient eCK-Secure Authenticated Key Exchange Protocols in theStandard Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 185
Zheng Yang
Intrusion Detection and Recovery
XLRF: A Cross-Layer Intrusion Recovery Framework for DamageAssessment and Recovery Plan Generation . . . . . . . . . . . . . . . . . . . . . . . . . . 194
Eunjung Yoon and Peng Liu
PRIDE: Practical Intrusion Detection in Resource Constrained WirelessMesh Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 213
Amin Hassanzadeh, Zhaoyan Xu, Radu Stoleru, Guofei Gu, andMichalis Polychronakis
Fingerprint Embedding: A Proactive Strategy of Detecting TimingChannels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 229
Jing Wang, Peng Liu, Limin Liu, Le Guan, and Jiwu Jing
Side Channel Attacks and Defense
Comprehensive Evaluation of AES Dual Ciphers as a Side-ChannelCountermeasure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 245
Amir Moradi and Oliver Mischke
EMD-Based Denoising for Side-Channel Attacks and Relationshipsbetween the Noises Extracted with Different Denoising Methods . . . . . . . 259
Mingliang Feng, Yongbin Zhou, and Zhenmei Yu
Table of Contents XIII
Engineering Issues of Crypto
Accelerating AES in JavaScript with WebGL . . . . . . . . . . . . . . . . . . . . . . . . 275Yang Yang, Zhi Guan, Jiawei Zhu, Qiuxiang Dong, and Zhong Chen
Analysis of Multiple Checkpoints in Non-perfect and Perfect RainbowTradeoff Revisited . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 288
Wenhao Wang and Dongdai Lin
Efficient Implementation of NIST-Compliant Elliptic CurveCryptography for Sensor Nodes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 302
Zhe Liu, Hwajeong Seo, Johann Großschadl, and Howon Kim
Cryptanalysis
Attacking and Fixing the CS Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 318Han Sui, Wenling Wu, Liting Zhang, and Peng Wang
Integral Attacks on Reduced-Round PRESENT . . . . . . . . . . . . . . . . . . . . . . 331Shengbao Wu and Mingsheng Wang
Attribute-Based Encryption
Computationally Efficient Expressive Key-Policy Attribute BasedEncryption Schemes with Constant-Size Ciphertext . . . . . . . . . . . . . . . . . . 346
Y. Sreenivasa Rao and Ratna Dutta
Privacy-Preserving Decentralized Ciphertext-Policy Attribute-BasedEncryption with Fully Hidden Access Structure . . . . . . . . . . . . . . . . . . . . . . 363
Huiling Qian, Jiguo Li, and Yichen Zhang
Cryptographic Primitives and Applications
Toward Generic Method for Server-Aided Cryptography . . . . . . . . . . . . . . 373Sebastien Canard, Iwen Coisel, Julien Devigne, Cecilia Gallais,Thomas Peters, and Olivier Sanders
Generation and Tate Pairing Computation of Ordinary Elliptic Curveswith Embedding Degree One . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 393
Zhi Hu, Lin Wang, Maozhi Xu, and Guoliang Zhang
Threshold Secret Image Sharing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 404Teng Guo, Feng Liu, ChuanKun Wu, ChingNung Yang,Wen Wang, and YaWei Ren
Author Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 413