IEEE Conference on Communications and Network Security
3–5 October 2022 // Austin, TX, USA // Hybrid: In-Person and Virtual Conference


Enhancing Load Balancing by Intrusion Detection System Chain on SDN Data Plane
Nadia Niknami (Temple University), Jie Wu (Temple University)

HoneyCam: Towards Scalable High-Interaction IoT Camera Honeypot Based on 360 degree Videos
Chongqi Guan (Penn State University), Xianda Chen (The Pennsylvania State University), Guohong Cao (The Pennsylvania State University), Sencun Zhu (The Pennsylvania State University), Thomas La Porta (The Pennsylvania State University)

Network-Level Adversaries in Federated Learning
Giorgio Severi (Northeastern University), Matthew Jagielski (Google Research), Gokberk Yar (Northeastern University), Yuxuan Wang (LinkedIn Corporation), Alina Oprea (Northeastern University), Cristina Nita-Rotaru (Northeastern University)

Efficient Public Verification of Confidential Supply-Chain Transactions
Kilian Becher (Technische Universität Dresden), Mirko Schaefer (Technische Universität Dresden), Axel Schroepfer (SAP AG), Thorsten Strufe (Karlsruhe Institute of Technology)

SysCap: Profiling and Crosschecking Syscall and Capability Configurations for Docker Images
Yunlong Xing (George Mason University), Jiahao Cao (Tsinghua University), Xinda Wang (George Mason University), Sadegh Torabi (George Mason University), Kun Sun (George Mason University), Fei Yan (Wuhan University), Qi Li (Tsinghua University)

Securing Communication Against Leaky Switches
Leila Rashidi (University of Calgary), Sogand Sadrhaghighi (University of Calgary), Majid Ghaderi (University of Calgary), Cristina Nita-Rotaru (Northeastern University), Reihaneh Safavi-Naini (University of Calgary)

AutoDefense: Reinforcement Learning Based Autoreactive Defense Against Network Attacks
Yu Mi (Case Western Reserve University), David Mohaisen (University of Central Florida), An Wang (Case Western Reserve University)

Returning to Port: Efficient Detection of Home Router Devices
Thomas Papastergiou (Georgia Institute of Technology), Roberto Perdisci (University of Georgia), Manos Antonakakis (Georgia Tech)

Transferability of Adversarial Examples in Machine Learning-based Malware Detection
Yang Hu (Virginia Tech), Ning Wang (Virginia Tech), Yimin Chen (University of Massachusetts Lowell), Wenjing Lou (Virginia Tech), Thomas Hou (Virginia Tech)

On Security of Proof-of-Policy (PoP) in the Execute-Order-Validate Blockchain Paradigm
Best Paper Runner-Up
Shan Wang (Southeast University), Ming Yang (Southeast University), Bryan Pearson (University of Central Florida), Tingjian Ge (University of Massachusetts, Lowell), Xinwen Fu (University of Massachusetts Lowell), Wei Zhao (Shenzhen Institute of Advanced Technology)

GateKeeper: Operator-centric Trusted App Management Framework on ARM TrustZone
Balachandar Gowrisankar (National University of Singapore), Daisuke Mashima (Advanced Digital Sciences Center), Wen Shei Ong (Illinois at Singapore Pte Ltd), Quanqi Ye (Advanced Digital Sciences Center), Ertem Esiner (Advanced Digital Sciences Center), Binbin Chen (Singapore University of Technology and Design), Zbigniew Kalbarczyk (University of Illinois at Urbana Champaign)

Refining Network Message Segmentation with Principal Component Analysis
Stephan Kleber (Ulm University), Frank Kargl (Ulm University)

Alexa Skills: Security Vulnerabilities and Countermeasures
Dan Su (Beijing Jiaotong University), Jiqiang Liu (Beijing Jiao Tong University), Sencun Zhu (The Pennsylvania State University), Wei Wang (Beijing Jiaotong University), Xiaoyang Wang (Beijing Jiaotong University)

HallMonitor: A Framework for Identifying Network Policy Violations in Software
Daniel Olszewski (University of Florida), Patrick Traynor (University of Florida), Kevin Butler (University of Florida), Weidong Zhu (University of Florida), Sandeep Sathyanarayana (University of Florida)

RadioNet: Robust Deep-Learning Based Radio Fingerprinting
Haipeng Li (University of Cincinnati), Kaustubh Gupta (University of Nebraska - Lincoln), Chenggang Wang (University of Cincinnati), Nirnimesh Ghose (University of Nebraska - Lincoln), Boyang Wang (University of Cincinnati)

5G Messaging: System Insecurity and Defenses
Jinghao Zhao (University of California, Los Angeles), Qianru Li (UCLA), Zengwen Yuan (UCLA), Zhehui Zhang (UCLA), Songwu Lu (UCLA)

MultiEvasion: Evasion Attacks Against Multiple Malware Detectors
Hao Liu (University of Cincinnati), Wenhai Sun (Purdue University), Nan Niu (University of Cincinnati), Boyang Wang (University of Cincinnati)

Multi-Protocol IoT Network Reconnaissance
Stefan Gvozdenovic (Boston University), Johannes Becker (Boston University), John Mikulskis (Boston University), David Starobinski (Boston University)

Ransomware Detection in Databases through Dynamic Analysis of Query Sequences
Christoph Sendner (University of Würzburg), Lukas Iffländer (University of Würzburg), Sebastian Schindler (University of Würzburg), Michael Jobst (University of Würzburg), Alexandra Dmitrienko (University of Würzburg), Samuel Kounev (University of Würzburg)

A Study on the Testing of Android Security Patches
Christopher Brant (University of Florida), Tuba Yavuz (University of Florida)

Learning-Based Radio Fingerprinting for RFID Secure Authentication Scheme
Jiaqi Xu (The Ohio State University), Xingya Zhao (The Ohio State University), Arjun Bakshi (The Ohio State University), Kannan Srinivasan (The Ohio State University)

DASK: Driving-Assisted Secret Key Establishment
Edwin Yang (University of Oklahoma), Song Fang (University of Oklahoma), Dakun Shen (Central Michigan University)

Eolo: IoT Proximity-based Authentication via Pressure Correlated Variations
Omar Ibrahim (HBKU - CSE - ICT Division), Gabriele Oligeri (HBKU - CSE - ICT Division), Roberto Di Pietro (Hamad Bin Khalifa University)

An Active Learning Approach to Dynamic Alert Prioritization for Real-time Situational Awareness
Yeongwoo Kim (KTH Royal Institute of Technology), György Dán (KTH Royal Institute of Technology)

TrafficSpy: Disaggregating VPN-encrypted IoT Network Traffic for User Privacy Inference
Qi Li (Colorado School of Mines), Keyang Yu (Colorado School of Mines), Dong Chen (Colorado School of Mines), Mo Sha (Florida International University), Long Cheng (Clemson University)

Agent-Level Differentially Private Federated Learning via Compressed Model Perturbation 
Yuanxiong Guo (University of Texas at San Antonio), Rui Hu (University of Texas at San Antonio), Yanmin Gong (University of Texas at San Antonio)

Securing Wireless Channels: Reliable Shared Secret Extraction through OTFS
Usama Saeed (Virginia Tech), Lingjia Liu (Virginia Tech), Kai Zeng (George Mason University), Robert Calderbank (Duke University)

Systematically Analyzing Vulnerabilities in Connection Establishment Phase of Wi-Fi Systems
Naureen Hoque (Rochester Institute of Technology), Hanif Rahbari (Rochester Institute of Technology), Cullen Rezendes (Rochester Institute of Technology)

Performant Binary Fuzzing without Source Code using Static Instrumentation
Eric Pauley (Pennsylvania State University), Gang Tan (Pennsylvania State University), Danfeng Zhang (Pennsylvania State University), Patrick McDaniel (Pennsylvania State University)

Stealthy Off-Target Coupled-Control-Plane Jamming
Shreya Gupta (Rice University), Chia-Yi Yeh (Rice University), Edward Knightly (Rice University)

Membership Inference Attack in Face of Data Transformations
Jiyu Chen (University of California, Davis), Yiwen Guo (none), Hao Chen (UC Davis), Neil Gong (Duke University)

SIGTAM: A Tampering Attack on Wi-Fi Preamble Signaling and Countermeasures
Zhengguang Zhang (University of Arizona), Marwan Krunz (University of Arizona)

A User-Friendly Two-Factor Authentication Method against Real-Time Phishing Attacks
Yuanyi Sun (Pennsylvania State University), Sencun Zhu (The Pennsylvania State University), Yao Zhao (Shape Security), Pengfei Sun (Shape Security)

Supporting Law-Enforcement to Cope with Blacklisted Websites: Framework and Case Study
Mir Mehedi Ahsan Pritom (University of Texas at San Antonio), Shouhuai Xu (University of Colorado Colorado Springs)

NL2GDPR: Automatically Develop GDPR Compliant Android Application Features from Natural Language
Faysal Hossain Shezan (University of Virginia), Yingjie Lao (Clemson University), Minlong Peng (Baidu Research), Xin Wang (Baidu Research), Mingming Sun (Baidu Research), Ping Li (Baidu Research)

Detecting DNS hijacking by using NetFlow data
Martin Fejrskov (Aalborg University), Emmanouil Vasilomanolakis (Technical University of Denmark), Jens Pedersen (Aalborg University)

PRM - Private Interference Discovery for IEEE 802.15.4 Networks
Dominik George (Eindhoven University of Technology), Savio Sciancalepore (Eindhoven University of Technology (TU/e))

ACADIA: Efficient and Robust Adversarial Attacks Against Deep Reinforcement Learning
Haider Ali (Virginia Tech), Mohannad Al Ameedi (Virginia Tech), Ananthram Swami (Army Research Lab.), Rui Ning (Old Dominion University), Jiang Li (Old Dominion University), Hongyi Wu (The University of Arizona), Jin-Hee Cho (Virginia Tech)

Security Analysis of Mixed RF-FSO Blockage Attack Over Generalized RF Fading and Atmospheric Turbulence
Neji Mensi (Howard University), Danda Rawat (Howard University), Chunmei Liu (Howard University)

Tweak: Towards Portable Deep Learning Models for Domain-Agnostic LoRa Device Authentication
Jared Gaskin (Oregon State University), Bechir Hamdaoui (Oregon State University), Weng-Keen Wong (Oregon State University)

Absolute Security in High-Frequency Wireless Links
Alejandro Cohen (Technion), Rafael D'Oliveira (Clemson University), Chia-Yi Yeh (Rice University), Hichem Guerboukha (Brown University), Rabi Shrestha (Brown University), Zhaoji Fang (Brown University), Edward Knightly (Rice University), Muriel Médard (MIT), Daniel Mittleman (Brown University)

When Third-Party JavaScript Meets Cache: Explosively Amplifying Security Risks on the Internet
Tao Hou (University of South Florida), Shengping Bi (New Mexico State University), Mingkui Wei (George Mason University), Tao Wang (New Mexico State University), Zhuo Lu (University of South Florida), Yao Liu (University of South Florida)

Error Prevalence in NIDS datasets: A Case Study on CIC-IDS-2017 and CSE-CIC-IDS-2018
Best Paper Award
Lisa Liu (University of New South Wales), Gints Engelen (University of Leuven), Daryl Essam (University of New South Wales at the Australian Defence Force Academy), Timothy Lynar (University of New South Wales at the Australian Defence Force Academy), Wouter Joosen (University of Leuven)