Scope

    This workshop will discuss various aspects of system level security of smartphones, and stitch together the aspects into holistic and deep understandings. Some specific aspects include system metadata abuse, .so level rootkits in Android, finer-grained protection domains, cross-layer vulnerability analysis, and context-aware access control.

     Through the workshop, some new vulnerabilities and attack on Android/IOS systems could be revealed, and some security design principles of next generation smartphone Operating Systems could be identified.

     The workshop will be more discussion oriented than regular workshops, it will include a few selected presentations, each with a 15 minutes speech and 45 minutes discussion.

Topics

    Research contributions are solicited in all aspects related to system level security of smartphones, including but not limited to:

  • System level vulnerabilities of Android/ IOS system, for example cross-layer vulnerability analysis, service vulnerabilities, etc.
  • New attacks on Android/IOS systems, for example metadata-based attack, .so level rootkits, etc.
  • Design of next generation secure smartphone systems, for example finer-grained protection domains, context-aware access control, etc.
  • ...

Program

7:30-9:00 Breakfast
9:00-10:50 Session 1
9:00-9:05 Introduce the attendees
9:05-9:40 Invited Talk:The Exploration of ART Based on Android 4.4.4
Xin Sun, Xuerui Pan, Tong Shen, Leon Lee, Dan Ping and Bing Mao (Nanjing University, China)
9:40-10:15 Uncovering the Dilemmas on Antivirus Software Design in Modern Mobile Platforms
Heqing Huang, Kai Chen, Peng Liu, Sencun Zhu and Dinghao Wu (Pennsylvania State University, USA)
10:15-10:50 Transplantation Attack: Analysis and Prediction
Zhongwen Zhang and Ji Xiang(IIE, China)
10:50-11:10 Coffe Break
11:10-12:20 Session 2
11:10-11:45 How We Found These Vulnerabilities in Android Applications
Bin Ma(IIE, China)
11:45-12:20 Timing-based Clone Detection on Android Markets
Yingjun Zhang, Kezhen Huang, Yuling Liu, Kai Chen, Liang Huang and Yifeng Lian(ISCAS, China)
12:20-14:00 Lunch Break
14:00-15:10 Session 3
14:00-14:35 A New Trust Chain Security Evaluation Model and Tool
Hu Wei, Ji Dongyao, Wang Ting and Gang Yao(IIE,China)
14:35-15:10 A System for Privacy Information Analysis and Safety Assessment of IOS Applications
Bin Li and Zhijie Feng(IIE,China)
15:10-15:30 Coffe Break
15:30-16:20 Session 4
15:30-16:05 Android System Vulnerbilities Analysis
Xiaorui Gong (IIE, China)
16:05-16:20 Adjourn

Submission

     Papers should be submitted using EasyChair system. Authors are invited to submit original papers not previously published nor submitted in parallel for publication to any other conference, workshop or journal. Papers should be in English.

    --Regular papers: up to 16 pages (include everything).
    --Short papers: up to 7 pages (include everything); forward-looking position papers are very welcome.

    Papers must be formatted using Springer LNICST Authors' Kit. Instructions and templates are available:

    Accepted papers will be published in Springer's LNICST series and will appear in the SpringerLink, one of the largest digital libraries online that covers a variety of scientific disciplines, as well as in the ICST's own EU Digital Library (EUDL). LNICST volumes are submitted for inclusion to leading indexing services, including DBLP, Google Scholar, ACM Digital Library, ISI Proceedings, EI Engineering Index, CrossRef, Scopus.

Important Date

    Paper submission: June 6, 2014   June 20, 2014

    Notification to authors: July 7, 2014

    Camera ready deadline: July 15, 2014

Program Committee Co-Chairs

    Peng Liu, Professor, Cyber Security Lab, Pennsylvania State University, University Park

    Ji Xiang, Associate Professor, Institute of Information Engineering, Chinese Academy of Sciences, China

    Kai Chen, Associate Professor, Institute of Information Engineering, Chinese Academy of Sciences, China

Program Committee Members

  • Damien Octeau, Pennsylvania State University
  • Xiaofeng Wang, Indiana University
  • Marco Carvalho, Florida Institute of Technology
  • Zhiqiang Lin, University of Texas, Dallas
  • Fan Wu, Shanghai Jiao Tong University
  • Lei Xie, Nanjing University
  • Xiaoyin Wang, University of Texas at San Antonio
  • Xinhui Han, Peking University
  • Yuewu Wang, Institute of Information Engineering, Chinese Academy of Sciences

Registration and Local Arrangement

    Cunqing Ma, Institute of Information Engineering, Chinese Academy of Sciences, China

    E-mail: macunqing@iie.ac.cn

    Tel: +86 10 82546543 ext 666