IEEE International Conference on Computer Communications
15-19 April 2018 // Honolulu, HI // USA

Workshop on MobiSec: Security, Privacy, and Digital Forensics of Mobile Systems and Networks - Program

The Second IEEE International Workshop on The Security, Privacy, and Digital Forensics of Mobile Systems and Networks

(MobiSec 2018)

Part of the IEEE INFOCOM 2018


Monday, April 16, 2018 ● 08:00 – 17:30 ● Room: Tapa 1


To many people, smartphones have been an indispensable part of daily life and work. With all personal financial and medical information and job related data being processed on these mobile systems and networks, it is critically important that the development and advancement of secure mobile operating systems, secure mobile applications, secure smartphone devices and cellular networks keep up with the ever-growing smartphone usage. For this reason, this research area has been a very important sector in the network and telecommunication industry and a focus of funded research projects in many research institutes.

The scope of MobiSec 2018 encompasses the security, privacy, and digital forensics of mobile systems and networks, including but not limited to Android, iOS and Windows Mobile operating systems, smartphones and applications for these platforms and devices, as well as cellular networks. The aim of MobiSec 2018 is to bring together the active scholars and researchers from around the world and to provide a great venue and opportunity to share ideas and research findings that may shed light upon the advancement in these areas.


Lei Chen (Georgia Southern University, USA)
Guofei Gu (Texas A&M University, USA)
Wenjia Li (New York Institute of Technology, USA)
Nhien-An Le-Khac (University College Dublin, Ireland)
Vimal Kumar (The University of Waikato, New Zealand)

Publication Chair:
Narasimha Shashidhar (Sam Houston State University, USA)

Publicity Chair:
Weitian Tong (Georgia Southern University, USA)

Web Chair:
Weinan Gao (Georgia Southern University, USA)




Session 1

Towards Best Secure Coding Practice for Implementing SSL/TLS
Mohannad Alhanahnah (University of Nebraska-Lincoln, USA), Qiben Yan (University of Nebraska-Lincoln, USA)
Modeling and Analyzing Privacy-awareness Social Behavior Network
Xu Han (Jilin University, China), Yanheng Liu (Jilin University, China), Jian Wang (Jilin University, China)
Understanding Secure and Usable Gestures for Realtime Motion based Authentication
Yanyan Li (University of Arkansas at Little Rock), Mengjun Xie (University of Arkansas at Little Rock)
A Two layer Model of Malware Propagation in a Search Engine Context
YiJin Chen (University of Electronic Science and Technology of China, China), Yuming Mao (University of Electronic Science and Technology of China, China), Lei Cui (Deakin University, Australia), Supeng Leng (University of Electronic Science and Technology of China, China), Yunkai Wei (University of Electronic Science and Technology of China, China), Xiaosha Chen (University of Electronic Science and Technology of China, China)



Coffee Break



Keynote Session
Security and Privacy in Mobile Networked Systems

Danda Rawat (Howard University)



Session 2

App Traffic Mutation: Toward Defending Against Mobile Statistical Traffic Analysis
Louma Chaddad (American University of Beirut, Lebanon), Ali Chehab (American University of Beirut, Lebanon), Imad H Elhajj (American University of Beirut, Lebanon), Ayman Kayssi (American University of Beirut, Lebanon)
Improving Wireless Devices Identification Using Gray relationship Classifier to Enhance Wireless Network Security
Yun Lin (Harbin Engineering University, China), Wenxin Li (Harbin Engineering University, China), Jianguo Sun (Harbin Engineering University, China), Qidi Wu (Harbin Engineering University, China)
Traffic-Driven Intrusion Detection for Massive MTC towards 5G Networks
Nan Lu (Xi’an Jiaotong University, China), Qinghe Du (Xi’an Jiaotong University, China), Li Sun (Xi’an Jiaotong University, China), Pinyi Ren (Xi’an Jiaotong University, China)






Session 3

Hierarchical Architecture for Securing 5G based Software-Defined Intelligent Transportation System
Sadia Din (Kyungpook National University, Korea), Anand Paul (Kyungpook National University, Korea), Awais Ahmad (Yeungnam University, Korea), Syed Hassan Ahmed (University of Central Florida, USA), Gwanggil Jeon (Incheon National University, Korea), Danda B. Rawat (Howard University, USA)
MotionHacker: Motion Sensor based Eavesdropping on Handwriting via Smartwatch
Qingxin Xia (Ocean University of China, China), Feng Hong (Ocean University of China, China), Feng Yuan (Ocean University of China, China), Zhongwen Guo (Ocean University of China, China)
A Contract-based Resource Allocation Mechanism in Wireless Virtualized Network
Di Zhang (University of Jyväskylä, Finland), Zheng Chang (University of Jyväskylä, Finland), Timo Hämäläinen (University of Jyväskylä, Finland), Weinan Gao (Georgia Southern University)
Secure Mobile Crowdsourcing for WLAN Indoor Localization
Mu Zhou (Chongqing University of Post and Telecommunications, China), Yiyao Liu (Chongqing University of Post and Telecommunications, China), Wei Nie (Chongqing University of Post and Telecommunications, China), Liangbo Xie (University of Electronic Science and Technology of China, China), Zengshan Tian (Chongqing University of Post and Telecommunications, China)



Coffee Break



Session 4

A lightweight multi-factor mobile user authentication scheme
Jianguo Sun (Harbin Engineering University, China), Qi Zhong (Harbin Engineering University, China), Liang Kou (Harbin Engineering University, China), Wenshan Wang (Harbin Engineering University, China), Qingan Da (Harbin Engineering University, China), Yun Lin (Harbin Engineering University, China)
Improving Signal Modulation Recognition Using Principal Component Analysis and Compressive Sensing
Yuyao Li (Harbin Engineering University, China), Zheng Dou (Harbin Engineering University, China), Xiaolei Zhu (Harbin Engineering University, China), Chengzhuo Shi (Wright State University, USA)
Group-Query-as-a-Service for Secure Dynamic Spectrum Access in Geolocation-Enabled Database-Driven Opportunistic Wireless Communications in ROAR Framework
Abdulhamid A. Adebayo (Howard University, USA), Danda B. Rawat (Howard University, USA), Jiang (Leo) Li (Howard University, USA), Moses Garuba (Howard University, USA)
Compromised Secrecy Region with Friendly Jammers in Heterogeneous Cellular Networks
Shiwei Yan (Peking University, China), Yong Shang (Peking University, China), Ming Zhang (Peking University, China)