Download the Call for Papers PDF

Scope

    The First International Workshop on Data Protection in Mobile and Pervasive Computing (DAPRO) will focus on sensitive data on the mobile and pervasive devices such as phone, laptop, sensor, raspberry pi, pad, RFID, NFC device, VANET node and so on. These devices face more physical threats than other traditional computing devices, and are configured with peripheral interfaces different from traditional computing devices.

     This workshop will provide a forum for researchers, engineers and students to present and discuss innovative ideas, research results, applications and experience related to the threats and protections, especially for the sensitive data on these devices.

Program

DAPRO 2014 & SSS 2014
International Workshop on Data Protection in Mobile and Pervasive Computing (DAPRO)
International Workshop on Secure Smart Systems (SSS)

Location: Beijing Yulong International Hotel, China

Date: September 23, 2014

9:00-9:10Opening RemarkJingqiang Lin / Zhan Wang
9:10-10:00 Keynote Speech
Virtualization-Based Data Protection on x86 Platforms
Xuhua Ding
Session 1Jingqiang Lin (Chair)
10:00-10:25Towards Efficient Update of Access Control Policy for Cryptographic Cloud StorageWeiyu Jiang, Zhan Wang, Limin Liu and Neng Gao
10:25-10:50virtio-ct: A Secure Cryptographic Token Service in HypervisorsLe Guan, Fengjun Li, Jiwu Jing, Jing Wang and Ziqiang Ma
10:50-11:00Break
Session 2Tilo Müller (Chair)
11:00-11:25Blind Format String AttacksFatih Kilic, Thomas Kittel and Claudia Eckert
11:25-11:50An Empirical Evaluation of Software Obfuscation Techniques applied to Android APKsFelix Freiling, Mykola Protsenko and Yan Zhuang
Session 3Zhan Wang (Chair)
11:50-12:15Towards Privacy-Preserving Web Metering Via User-Centric HardwareFahad Alarifi and Maribel Fernandez

Topics

    Research contributions are solicited in all areas related to data protection in mobile and pervasive computing, including but not limited to:

  • Anonymity and tracking
  • Anti-theft
  • Backup and remote retrieve
  • Lightweight cryptographic scheme and white-box cryptography
  • Lightweight intrusion detection and prevention
  • Physical threat
  • Privacy and location
  • Remote trust establishment and trusted computing
  • Sensitive data protection
  • Usable security
  • Vehicular ad-hoc network security

Submission

    Papers should be submitted using EasyChair system. Authors are invited to submit original papers not previously published nor submitted in parallel for publication to any other conference, workshop or journal. Papers should be in English. Regular papers should be up to 12 pages in length. Papers must be formatted using Springer LNICST Authors' Kit. Instructions and templates are available:

    Accepted papers will be published in Springer's LNICST series and will appear in the SpringerLink, one of the largest digital libraries online that covers a variety of scientific disciplines, as well as in the ICST's own EU Digital Library (EUDL). LNICST volumes are submitted for inclusion to leading indexing services, including DBLP, Google Scholar, ACM Digital Library, ISI Proceedings, EI Engineering Index, CrossRef, Scopus.

Accepted Papers

  1. virtio-ct: A Secure Cryptographic Token Service in Hypervisors.
    Le Guan, Fengjun Li, Jiwu Jing, Jing Wang and Ziqiang Ma

  2. Blind format string attacks.
    Fatih Kilic, Thomas Kittel and Claudia Eckert

  3. An Empirical Evaluation of Software Obfuscation Techniques applied to Android APKs.
    Felix Freiling, Mykola Protsenko and Yan Zhuang

  4. Towards Efficient Update of Access Control Policy for Cryptographic Cloud Storage.
    Weiyu Jiang, Zhan Wang, Limin Liu and Neng Gao

Important Date

    Paper submission: June 6, 2014

    Notification to authors: July 7, 2014

    Camera ready deadline: July 15, 2014

Program Committee Co-Chairs

    Jingqiang Lin, Institute of Information Engineering, Chinese Academy of Sciences, China

    Tilo Müller, Friedrich-Alexander University Erlangen-Nuremberg, Germany

Program Committee Members

  • Zinaida Benenson, Friedrich-Alexander University Erlangen-Nuremberg, Germany
  • Xinyi Huang, Fujian Normal University, China
  • Fengjun Li, the University of Kansas, USA
  • Federico Maggi, Politecnico di Milano, Italy
  • Collin Mulliner, Northeastern University, USA
  • Jonas Pfoh, Technical University of Munich, Germany
  • Michael Spreitzenbarth, Siemens AG, Corporate Technology, Germany
  • Bo Zhao, Wuhan University, China

Registration and Local Arrangement

    Yuan Ma, Institute of Information Engineering, Chinese Academy of Sciences, China

    E-mail: mayuan@iie.ac.cn

    Tel: +86 10 82546548 ext 619