Mobile Security Technologies (MoST) 2016

Thursday, May 26, 2016

The Fairmont Hotel, San Jose, CA

Mobile Security Technologies (MoST) brings together researchers, practitioners, policy makers, and hardware and software developers of mobile systems to explore the latest understanding and advances in the security and privacy for mobile devices, applications, and systems. (For full submission details, see the call for papers.)

Previous MoST Workshops: 2015 2014 2013 2012

Preliminary Program

7:30-8:30 Breakfast
8:45-9:00 Opening Remarks by Long Lu
9:00-10:00 Keynote by Patrick McDaniel

Learning from Ourselves: Where are we and where can we go in mobile systems security? [Abstract] [Slides]

Speaker: Patrick McDaniel is a Distinguished Professor in the School of Electrical Engineering and Computer Science at The Pennsylvania State University, co-director of the Systems and Internet Infrastructure Security Laboratory, and Fellow of IEEE and ACM. Dr. McDaniel is also the program manager and lead scientist for the Army Research Laboratory's Cyber-Security Collaborative Research Alliance. Patrick’s research centrally focuses on a wide range of topics in security and technical public policy. Prior to pursuing his Ph.D. at the University of Michigan, Patrick was a software architect and project manager in the telecommunications industry.

10:15-10:45 Coffee break
10:45-12:30 Session 1: Studies (Session Chair: Hao Chen)

Target Fragmentation in Android Apps [Slides]
Patrick Mutchler (Stanford University), Yeganeh Safaei, Adam Doupe (Arizona State University) and John Mitchell (Stanford University)

Perceptions of Risk in Mobile Transactions [Slides]
Shari Trewin, Larry Koved, Cal Swart and Kapil Singh (IBM T.J. Watson Research Center)

A Study of Grayware on Google Play [Slides]
Benjamin Andow, Adwait Nadkarni (North Carolina State University), Blake Bassett (University of Illinois at Urbana-Champaign), William Enck (North Carolina State University) and Tao Xie (University of Illinois at Urbana-Champaign)

12:30-13:30 Lunch
13:30-15:15 Session 2: Attacks (Session Chair: Lorenzo Cavallaro)

Browser History Stealing with Captive Wi-Fi Portals [Slides]
Adrian Dabrowski, Georg Merzdovnik (SBA Research), Nikolaus Kommenda (Technische Universität Wien) and Edgar Weippl (SBA Research)

Sensor-based Mobile Web Fingerprinting and Cross-site Input Inference Attacks (Short Paper) [Slides]
Chuan Yue (Colorado School of Mines)

Is Anybody Home? Inferring Activity From Smart Home Network Traffic [Slides]
Bogdan Copos, Karl Levitt, Matt Bishop and Jeff Rowe (University of California, Davis)

15:15-15:30 Coffee break
15:30-17:45 Session 3: Defenses (Session Chair: Rich Cannings)

DROIDSCRIBE: Classifying Android Malware based on Runtime Behavior [Slides]
Santanu Kumar Dash, Guillermo Suarez-Tangil, Salahuddin Khan, Kimberly Tam (Royal Holloway, University of London), Mansour Ahmadi (University of Cagliari), Johannes Kinder and Lorenzo Cavallaro (Royal Holloway, University of London)

Analysis of Internal Code Heterogeneity for High-Precision Classification of Repackaged Malware [Slides]
Ke Tian, Danfeng Yao, Barbara Ryder (Virginia Tech) and Gang Tan (Penn State University)

At Your Fingertips: Considering Finger Distinctness in Continuous Touch-Based Authentication for Mobile Devices (Short Paper) [Slides]
Zaire Ali, Jamie Payton (University of North Carolina at Charlotte) and Vincent Sritapan (Department of Homeland Security)

Hold & Sign: A Novel Behavioral Biometrics for Smartphone User Authentication [Slides]
Attaullah Buriro, Bruno Crispo, Filippo Delfrari (University of Trento) and Konrad Wrona (NATO Communication and Information Agency)

17:45-17:50 Closing Remarks

Workshop Co-Chairs

Program Chair

Program Committee