IEEE International Conference on Computer Communications
29 April - 2 May 2019 // Paris, France

Workshop on the Security, Privacy, and Digital Forensics of Mobile Systems and Networks - Program

The Third IEEE International Workshop on the Security, Privacy, and Digital  
Forensics of Mobile Systems and Networks (MobiSec 2019)

Monday, 29 April, 2019● 08:00 – 18:30 ● Room: Scene E

To many people, smartphones have been an indispensable part of daily life and work. With personal financial and medical information and business data being processed on smartphones and related mobile systems and networks, it is critically important that the development and advancement of secure mobile operating systems, secure mobile applications, secure smartphone devices and cellular networks keep up with the evergrowing smartphone usage. For this reason, this research area has been a very important sector in the network and telecommunication industry and a focus of funded research projects in many research institutes.

The scope of MobiSec 2019 encompasses the security, privacy, and digital forensics of mobile systems and networks, including but not limited to Android, iOS and Windows Mobile operating systems, smartphones and applications for these platforms and devices, as well as cellular networks.

Executive Chairs:  
Lei Chen (Georgia Southern University, USA; point of contact)  
Mauro Conti (The University of Padua, Italy)  
Yun Lin (Harbin Engineering University, China)  
Peter Mueller (IBM Zurich Research Laboratory, Switzerland)  
Wenjia Li (New York Institute of Technology, USA)  
Danda Rawat (Howard University, USA)  
Nhien-An Le-Khac (University College Dublin, Ireland)

Area Chairs:  
Narasimha Shashidhar, Publication Chair (Sam Houston State University, USA)  
Weitian Tong, Publicity Chair (Georgia Southern University, USA)  
Weinan Gao, Web Chair (Georgia Southern University, USA)


 

08:25 – 08:30 
Opening Session 
Chairs: Yun Lin, Laurent Njilla

 

08:30 – 10:00 
Session 1: Identification and Forensics

Feature-Based Model for Automated Identification of Subjects and Bystanders in Photos 
David Darling (University of Arkansas, USA), Ang Li (Duke University, USA), Qinghua Li (University of Arkansas, USA)

Wireless Physical-Layer Identification Assisted 5G Network Security 
Jie Chang (Harbin Engineering University, China), Yihan Xiao (Harbin Engineering University, China), Zhen Zhang (Harbin Engineering University, China)

Forensic Analysis of Third Party Location Applications in Android and iOS 
Jason Bays (Purdue University, USA), Umit Karabiyik (Purdue University, USA)

Research on the Identification of IoT Devices Based on Higher-Order Spectra 
Qidi Wu (Harbin Engineering University, China), Yibing Li (Harbin Engineering University, China), Zhaoyue Zhang (Civil Aviation University of China, China)

 

10:00 – 10:30 
Coffee Break

10:30 – 11:30 
Keynote Session 
Privacy-Preserved Machine Learning as a Service (MLaaS) for Mobile Users 
Hongyi Wu 
(Old Dominion University)

11:30 – 12:30 
Session 2: Trust

Scan-and-Pay on Android is Dangerous 
Enis Ulqinaku (ETH Zürich, Switzerland), Julinda Stefa (Sapienza University of Rome, Italy), Alessandro Mei (Sapienza University of Rome, Italy)

Global Roaming Trust-based Model for V2X Communications 
Aljawharah Alnasser (King Saud University, Saudi Arabia), Hongjian Sun (Durham University, UK)

Blockchain-Based Location Proof Generation and Verification 
Mohammad Reza Nosouhi (University of Technology Sydney & CSIRO's Data61, Australia), Shui Yu (University of Technology Sydney, Australia), Marthie Grobler (CSIRO's Data61, Australia), Qingyi Zhu (Chongqing University of Post and Telecommunication, China), Yong Xiang (Deakin University, Australia)

12:30 – 14:00 
Lunch Break

14:00 – 15:30 
Session 3: Authentication

Survey of Mobile Device Authentication Methods Based on RF Fingerprint 
Xinghao Guo (Harbin Engineering University, China), Zhen Zhang (Harbin Engineering University, China), Yihan Xiao (Harbin Engineering University, China), Jie Chang (Harbin Engineering University, China)

ECC-based Secure and Lightweight Authentication Protocol for Mobile Environment 
Sahil Garg (École de Technologie Supérieure, Canada), Kuljeet Kaur (École de Technologie Supérieure, Canada), Georges Kaddoum (École de Technologie Supérieure, Canada), Syed Hassan Ahmed (Georgia Southern University, USA), Francois Gagnon (Ecole de Technologie Superieure, Canada), Mohsen Guizani (University of Idaho, USA)

Robust Feature Modeling for Face Authentication in Smart Device 
Ao Li (Harbin University of Science and Technology, China), Xin Liu (Harbin University of Science and Technology, China), Hailong Jiang (Kent State University, USA)

Internet of Things Wireless Sensor Entity Authentication Scheme Based on Merkle 
Jianguo Sun (Harbin Engineering University, China), Duo Liu (Harbin Engineering University, China), Libo Yin (China Industrial Control Systems Cyber Emergency Response Team, China), Ge Zhang (China Industrial Control Systems Cyber Emergency Response Team, China), Sizhao Li (Harbin Engineering University, China)

15:30 – 16:00 
Coffee Break

16:00 – 17:20 
Session 4: Privacy

Transition-Entropy: A Novel Metric for Privacy Preservation in Location-Based Services 
Sina Shaham (The University of Sydney, Australia), Ming Ding (Data 61, Australia), Bo Liu (La Trobe University, Australia), Zihuai Lin (UThe niversity of Sydney, Australia), Jun Li (Nanjing University of Science and Technology, China)

Operator and Manufacturer Independent D2D Private Link for Future 5G Networks 
Ayoub Mars (Technical University of Braunschweig, Germany), Ahmad Abadleh (Mutah University, Jordan), Wael Adi (Technical University of Braunschweig, Germany)

Privacy-Preserving and Secure Decentralized Access Control System for Low Emission Zones 
Carles Anglès-Tafalla (Universitat Rovira i Virgili, Spain), Alexandre Viejo (Universitat Rovira i Virgili, Spain), Jordi Castellà-Roca (Universitat Rovira i Virgili, Spain)

Protection Research of Sink Location Privacy in Underwater Sensor Networks 
Xiaoning Feng (Harbin Engineering University, China), Zhuo Wang (Harbin Engineering University, China), Ning Han (Harbin Engineering University, China)

17:20 – 17:30 
Break

17:30 – 18:30 
Session 5: General Topics

Using a Dynamic Model to Predict Popularity of News 
Xiaomeng Wang (Harbin Institute of Technology, China), Binxing Fang (Harbin Institute of Technology, China), Hongli Zhang (Harbin Institute of Technology, China), Xing Wang (Harbin Institute of Technology, China)

Ranking Node Influence According to Dynamic Network Load 
Tiantian Jin (Jiangsu University, China), Changda Wang (Jiangsu University, China)

Research on Flight Fuel Prediction based on Historical Data Mining 
Zhaoyue Zhang (Civil Aviation University of China, China), Na Meng (Civil Aviation University of China, China), Mengqi Wang (Civil Aviation University of China, China), Yudong Sun (Civil Aviation University of China, China)

Patrons

Student Travel Grant Sponsors