Mobile Security Technologies (MoST) 2016
Thursday, May 26, 2016
The Fairmont Hotel, San Jose, CA
Mobile Security Technologies (MoST) brings together researchers, practitioners, policy makers, and hardware and software developers of mobile systems to explore the latest understanding and advances in the security and privacy for mobile devices, applications, and systems. (For full submission details, see the call for papers.)
Previous MoST Workshops: 2015 2014 2013 2012
Preliminary Program
7:30-8:30 | Breakfast |
---|---|
8:45-9:00 | Opening Remarks by Long Lu |
9:00-10:00 | Keynote by Patrick McDaniel |
Learning from Ourselves: Where are we and where can we go in mobile systems security? [Abstract] [Slides] Speaker: Patrick McDaniel is a Distinguished Professor in the School of Electrical Engineering and Computer Science at The Pennsylvania State University, co-director of the Systems and Internet Infrastructure Security Laboratory, and Fellow of IEEE and ACM. Dr. McDaniel is also the program manager and lead scientist for the Army Research Laboratory's Cyber-Security Collaborative Research Alliance. Patrick’s research centrally focuses on a wide range of topics in security and technical public policy. Prior to pursuing his Ph.D. at the University of Michigan, Patrick was a software architect and project manager in the telecommunications industry. |
|
10:15-10:45 | Coffee break |
10:45-12:30 | Session 1: Studies (Session Chair: Hao Chen) |
Target Fragmentation in Android Apps
[Slides]
Perceptions of Risk in Mobile Transactions
[Slides]
A Study of Grayware on Google Play
[Slides]
|
|
12:30-13:30 | Lunch |
13:30-15:15 | Session 2: Attacks (Session Chair: Lorenzo Cavallaro) |
Browser History Stealing with Captive Wi-Fi Portals
[Slides]
Sensor-based Mobile Web Fingerprinting and Cross-site Input Inference Attacks (Short Paper)
[Slides]
Is Anybody Home? Inferring Activity From Smart Home Network Traffic
[Slides]
|
|
15:15-15:30 | Coffee break |
15:30-17:45 | Session 3: Defenses (Session Chair: Rich Cannings) |
DROIDSCRIBE: Classifying Android Malware based on Runtime Behavior
[Slides]
Analysis of Internal Code Heterogeneity for High-Precision Classification of Repackaged Malware
[Slides]
At Your Fingertips: Considering Finger Distinctness in Continuous Touch-Based Authentication for Mobile Devices (Short Paper)
[Slides]
Hold & Sign: A Novel Behavioral Biometrics for Smartphone User Authentication
[Slides]
|
|
17:45-17:50 | Closing Remarks |
Workshop Co-Chairs
- Hao Chen (University of California, Davis)
- Larry Koved (IBM Research)
Program Chair
- Long Lu (Stony Brook University)
Program Committee
- David Barrera (ETH Zürich)
- Rich Cannings (Google)
- Lorenzo Cavallaro (Royal Holloway, University of London)
- Hao Chen (UC Davis)
- Mihai Christodorescu (Qualcomm Research Silicon Valley)
- Jonathan Crussell (Sandia National Laboratories)
- Drew Davidson (University of Wisconsin-Madison)
- Manuel Egele (Boston University)
- Markus Jakobsson (ZapFraud Inc)
- Suman Jana (Columbia University)
- Larry Koved (IBM TJ Watson Research Center)
- David Lie (University of Toronto)
- Long Lu (Stony Brook University)
- Collin Mulliner (Square, Inc.)
- Adwait Nadkarni (NC State University)
- Kapil Singh (IBM T.J. Watson Research Center)
- Hayawardh Vijayakumar (Samsung Research America)
- Tao Wei (Baidu USA)
- Yajin Zhou (Qihoo 360)