2015 ieee trustcom/bigdatase/ispa - proceedingstoc.proceedings.com/28225webtoc.pdf2015 ieee...
TRANSCRIPT
IEEE Catalog Number: ISBN:
CFP15TRU-POD 978-1-4673-7953-3
2015 IEEE Trustcom/BigDataSE/ISPA
Helsinki, Finland 20 – 22 August 2015
Volume 1 Pages 1-709
1/4
2015 IEEE Trustcom/BigDataSE/ISPA
Trustcom-BigDataSE-ISPA 2015
Table of Contents
Volume - 1
Message from the IEEE TrustCom-ISPA-BigDataSE 2015 General Chairs..............................................................................xx
Message from the IEEE TrustCom 2015 Program Chairs..........................................................................................................xxi
TrustCom 2015 Organizing Committee.......................................................................................................................................xxii
TrustCom 2015 and RATSP 2015 Program Committee...........................................................................................................xxiii
TrustCom 2015 External Reviewers..........................................................................................................................................xxviii
Message from the RATSP 2015 Symposium Chairs..................................................................................................................xxix
Message from the Workshop Chairs of IEEE TSCloud 2015....................................................................................................xxx
TSCloud 2015 Organizing and Program Committees...............................................................................................................xxxi
Message from the TrustSoft 2015 Workshop Chairs................................................................................................................xxxii
TrustSoft 2015 Organizing and Program Committees............................................................................................................xxxiii
Message from the IW5GS 2015 Workshop Chairs..................................................................................................................xxxiv
IW5GS Organizing and Program Committees..........................................................................................................................xxxv
Message from the SpaIoT 2015 Workshop Chairs ..................................................................................................................xxxvi
SpaIoT 2015 Organizing and Program Committees...............................................................................................................xxxvii
Message from the TrustWSN 2015 Workshop Chairs..........................................................................................................xxxviii
Message from the UbiSafe 2015 Workshop Chairs................................................................................................................... N/A
UbiSafe 2015 Organizing and Program Committees.....................................................................................................................xl
Keynote Abstracts............................................................................................................................................................................xli
Organizers, Patrons, and Partners.............................................................................................................................................xlviii
14th IEEE International Conference on Trust, Security and Privacy in Computingand Communications
TrustCom Trust Track 1: Trust Evaluation, Reputation and Recommender Systems
DynFluid: Predicting Time-Evolving Rating in Recommendation Systems via Fluid Dynamics ......................................................1
Huanyang Zheng and Jie Wu
CloudRec: A Mobile Cloud Service Recommender System Based on Adaptive QoS
Management ........................................................................................................................................................................................9
Wei Tang and Zheng Yan
v
Improved Lightweight Pseudo-Random Number Generators for the Low-Cost RFID Tags ...........................................................17
Jiageng Chen, Atsuko Miyaj, Hiroyuki Sato, and Chunhua Su
Trust Evaluation in Mobile Devices: An Empirical Study ................................................................................................................25
Richard Weiss, Leon Reznik, Yanyan Zhuang, Andrew Hoffman, Darrell Pollard,
Albert Rafetseder, Tao Li, and Justin Cappos
Dynamic Trust Evaluation of Wireless Sensor Networks Based on Multi-factor .............................................................................33
Jiaojiao Song, Xiaohong Li, Jing Hu, Guangquan Xu, and Zhiyong Feng
TrustCom Trust Track 2: Trusted Environments
TrustTokenF: A Generic Security Framework for Mobile Two-Factor Authentication Using
TrustZone ..........................................................................................................................................................................................41
Yingjun Zhang, Shijun Zhao, Yu Qin, Bo Yang, and Dengguo Feng
On Rehoming the Electronic ID to TEEs ..........................................................................................................................................49
Sandeep Tamrakar, Jan-Erik Ekberg, and Pekka Laitinen
Trusted Execution Environment: What It is, and What It is Not ......................................................................................................57
Mohamed Sabt, Mohammed Achemlal, and Abdelmadjid Bouabdallah
JoKER: Trusted Detection of Kernel Rootkits in Android Devices via JTAG Interface ..................................................................65
Mordechai Guri, Yuri Poliak, Bracha Shapira, and Yuval Elovici
Performance of Cooperative Firewalls in Real-World Deployments ................................................................................................74
Nishant Patanaik and Ana Goulart
TrustCom Trust Track 3: Trust in Wireless and Sensor Networks
Memory Attestation of Wireless Sensor Nodes by Trusted Local Agents ........................................................................................82
Po-Hung Yang and Sung-Ming Yen
Mobility Increases the Risk of Malware Propagations in Wireless Networks ..................................................................................90
Bo Liu, Wanlei Zhou, Longxiang Gao, Sheng Wen, and Tom H. Luan
Simmelian Ties and Structural Holes: Exploring Their Topological Roles in Forming Trust
for Securing Wireless Sensor Networks ............................................................................................................................................96
Ming Xiang, William Liu, Quan Bai, and Adnan Al-Anbuky
Cooperative Transmission Against Impersonation Attack Using Inter-Session Interference
in Two-Hop Wireless Networks ......................................................................................................................................................104
Weidong Yang, Le Xiao, Limin Sun, and Qing Li
Reputation Propagation and Updating in Mobile Ad Hoc Networks with Byzantine Failures .......................................................111
Chuanyou Li, Michel Hurfin, and Yun Wang
TrustCom Trust Track 4: Trust in Social and Cloud Computing
Contextual Sub-network Extraction in Contextual Social Networks ..............................................................................................119
Xiaoming Zheng, Yan Wang, and Mehmet A. Orgun
Trust-Based Formal Delegation Framework for Enterprise Social Networks ................................................................................127
Ahmed Bouchami, Olivier Perrin, and Ehtesham Zahoor
vi
Trust-Aware Elastic Social Compute Units ....................................................................................................................................135
Mirela Riveni, Hong-Linh Truong, and Schahram Dustdar
Regenerating-Codes-Based Efficient Remote Data Checking and Repairing in Cloud Storage ....................................................143
Jing Chen, Yuling Peng, Ruiying Du, Quan Yuan, and Minghui Zheng
TrustCom Security Track 1: Key Management
Research on Key Management for Multi-privileged Group Communications ...............................................................................151
Wei Zhou, Yang Xu, and Guojun Wang
Attainable Unconditional Security for Shared-Key Cryptosystems ................................................................................................159
Fabrizio Biondi, Thomas Given-Wilson, and Axel Legay
Keyword Revocable Searchable Encryption with Trapdoor Exposure Resistance
and Re-generateability .....................................................................................................................................................................167
Keita Emura, Le Trieu Phong, and Yohei Watanabe
RFID Secure Application Revocation for IoT in 5G .......................................................................................................................175
Kai Fan, Yuanyuan Gong, Zhao Du, Hui Li, and Yintang Yang
TrustCom Security Track 2: Software and OS Security
Identifying Unknown Android Malware with Feature Extractions and Classification Techniques ...............................................182
Ludovic Apvrille and Axelle Apvrille
Loop-Oriented Programming: A New Code Reuse Attack to Bypass Modern Defenses ...............................................................190
Bingchen Lan, Yan Li, Hao Sun, Chao Su, Yao Liu, and Qingkai Zeng
Efficient Detection of Zero-day Android Malware Using Normalized Bernoulli Naive Bayes .....................................................198
Luiza Sayfullina, Emil Eirola, Dmitry Komashinsky, Paolo Palumbo, Yoan Miche,
Amaury Lendasse, and Juha Karhunen
A First Look at Android Malware Traffic in First Few Minutes ....................................................................................................206
Zhenxiang Chen, Hongbo Han, Qiben Yan, Bo Yang, Lizhi Peng, Lei Zhang, and Jin Li
Fast Identification of Obfuscation and Mobile Advertising in Mobile Malware ............................................................................214
Marian Kühnel, Manfred Smieschek, and Ulrike Meyer
TrustCom Security Track 3: Data and Application Security
Secure Block Device—Secure, Flexible, and Efficient Data Storage for ARM TrustZone
Systems ............................................................................................................................................................................................222
Daniel Hein, Johannes Winter, and Andreas Fitzek
A Fault-Tolerant Watermarking Algorithm for FPGA IP Protection .............................................................................................230
Jing Long, Dafang Zhang, Wei Liang, and Wenwei Li
Big Data Analytics for Detecting Host Misbehavior in Large Logs ...............................................................................................238
Daniel Gonçalves, João Bota, and Miguel Correia
DPBSV—An Efficient and Secure Scheme for Big Sensing Data Stream .....................................................................................246
Deepak Puthal, Surya Nepal, Rajiv Ranjan, and Jinjun Chen
vii
Interplay of Security&Dependability and Resource Using Model-Driven and Pattern-Based
Development ...................................................................................................................................................................................254
Brahim Hamid
TrustCom Security Track 4: Network Security
RPAH: Random Port and Address Hopping for Thwarting Internal and External Adversaries .....................................................263
Yue-Bin Luo, Bao-Sheng Wang, Xiao-Feng Wang, Xiao-Feng Hu, Gui-Lin Cai, and Hao Sun
MimicHunter: A General Passive Network Protocol Mimicry Detection Framework ...................................................................271
Zigang Cao, Gang Xiong, and Li Guo
An Analysis of TLS Handshake Proxying ......................................................................................................................................279
Douglas Stebila and Nick Sullivan
How to Misuse SMTP over TLS: A Study of the (In) Security of Email Server Communication .................................................287
Lars Baumgäertner, Jonas Höchst, Matthias Leinweber, and Bernd Freisleben
TrustCom Security Track 5: Network Security
Unsupervised Feature Selection Method for Intrusion Detection System ......................................................................................295
Mohammed A. Ambusaidi, Xiangjian He, and Priyadarsi Nanda
Identifying Diffusion Sources in Large Networks: A Community Structure Based Approach ......................................................302
Jiaojiao Jiang, Andi Zhou, Kasra Majbouri Yazdi, Sheng Wen, Shui Yu, and Yang Xiang
An Entropy-Based Distributed DDoS Detection Mechanism in Software-Defined Networking ...................................................310
Rui Wang, Zhiping Jia, and Lei Ju
A Sybil Attack Detection Scheme for a Centralized Clustering-Based Hierarchical Network .......................................................318
Mian Ahmad Jan, Priyadarsi Nanda, Xiangjian He, and Ren Ping Liu
TrustCom Security Track 6: Information Security
Surveys of Daily Information Security of Citizens in Finland ........................................................................................................326
Jukka A. Koskinen
Drive-by Disclosure: A Large-Scale Detector of Drive-by Downloads Based on Latent Behavior
Prediction .........................................................................................................................................................................................334
Ismail Adel AL-Taharwa, Hahn-Ming Lee, Albert B. Jeng, Cheng-Seen Ho, Kuo-Ping Wu,
and Shyi-Ming Chen
Diversifying SQL to Prevent Injection Attacks ...............................................................................................................................344
Sampsa Rauti, Jukka Teuhola, and Ville Leppänen
Information Security Awareness in Educational Institution: An Analysis of Students’ Individual
Factors .............................................................................................................................................................................................352
Ali Farooq, Johanna Isoaho, Seppo Virtanen, and Jouni Isoaho
TrustCom Security Track 7: Authentication and Crypto
A Hybrid Mobile Authentication Model for Ubiquitous Networking .............................................................................................360
Abdullah Almuhaideb, Bala Srinivasan, Phu Dung Le, Mohammed Alhabeeb, and Waleed Alfehaid
viii
Integrity Protection of NDEF Message with Flexible and Enhanced NFC Signature Records ......................................................368
Sufian Hameed, Usman Murad Jamali, and Adnan Samad
An Instruction-Set Randomization Using Length-Preserving Permutation ....................................................................................376
Jianming Fu, Xu Zhang, and Yan Lin
Cut-and-Choose Bilateral Oblivious Transfer and Its Application .................................................................................................384
Chuan Zhao, Han Jiang, Xiaochao Wei, Qiuliang Xu, and Minghao Zhao
A Family of Scalable Polynomial Multiplier Architectures for Lattice-Based Cryptography ........................................................392
Chaohui Du and Guoqiang Bai
TrustCom Security Track 8: Secure Environments
Open-TEE—An Open Virtual Trusted Execution Environment .....................................................................................................400
Brian McGillion, Tanel Dettenborn, Thomas Nyman, and N. Asokan
Transparent Page-Based Kernel and User Space Execution Tracing from a Custom Minimal
ARM Hypervisor .............................................................................................................................................................................408
Julian Horsch and Sascha Wessel
NIST CyberSecurity Framework Compliance: A Generic Model for Dynamic Assessment
and Predictive Requirements ...........................................................................................................................................................418
Nuno Teodoro, Luís Gonçalves, and Carlos Serrão
A Joint Optimization Approach to Security-as-a-Service Allocation and Cyber Insurance
Management ....................................................................................................................................................................................426
Sivadon Chaisiri, Ryan K. L. Ko, and Dusit Niyato
TrustCom Security Track 9: Cloud Security
Efficient Integrity Auditing for Shared Data in the Cloud with Secure User Revocation ..............................................................434
Yuchuan Luo, Ming Xu, Shaojing Fu, Dongsheng Wang, and Junquan Deng
Secure Out-of-Band Remote Management Using Encrypted Virtual Serial Consoles in IaaS
Clouds ..............................................................................................................................................................................................443
Kenichi Kourai and Tatuya Kajiwara
Efficient Searchable Symmetric Encryption for Storing Multiple Source Data on Cloud ..............................................................451
Chang Liu, Liehuang Zhu, and Jinjun Chen
Achieving Lightweight and Secure Access Control in Multi-authority Cloud ...............................................................................459
Yanchao Wang, Fenghua Li, Jinbo Xiong, Ben Niu, and Fangfang Shan
TrustCom Security Track 10: IoT and Wireless Security, Heterogeneous
Lightweight Certificateless and Provably-Secure Signcryptosystem for the Internet of Things ....................................................467
Kim Thuat Nguyen, Nouha Oualha, and Maryline Laurent
Performance Evaluation in WSNs Based on Max-Plus and Time-Domain Stochastic Network
Calculus ...........................................................................................................................................................................................475
Guowei Wu, Jie Wang, and Lin Yao
ix
Feature Interaction Problems in Smart Cards with Dynamic Application Lifecycle and Their
Countermeasures .............................................................................................................................................................................483
Raja Naeem Akram, Konstantinos Markantonakis, Damien Sauveron, and Keith Mayes
On Using a Von Neumann Extractor in Heart-Beat-Based Security ..............................................................................................491
Robert Mark Seepers, Christos Strydis, Ioannis Sourdis, and Chris Innocentius De Zeeuw
TrustCom Privacy Track 2: User Privacy
WiGen: Breaking the Privacy and Security Barriers for Group Management in RFID Systems ...................................................499
Li Lu, Muhammad Jawad Hussain, and Hongzi Zhu
Effects of Contextual Properties on Users’ Privacy Preferences in Mobile Computing
Environments ...................................................................................................................................................................................507
Seung-Hyun Kim, Han-Gyu Ko, In-Young Ko, and Daeseon Choi
Private Membership Test for Bloom Filters ....................................................................................................................................515
Tommi Meskanen, Jian Liu, Sara Ramezanian, and Valtteri Niemi
You are AIRing too Much: Assessing the Privacy of Users in Crowdsourcing Environmental
Data .................................................................................................................................................................................................523
Julien Mineraud, Federico Lancerin, Sasitharan Balasubramaniam, Mauro Conti,
and Sasu Tarkoma
TrustCom Privacy Track 3: Location Privacy and others
A Dynamic Fake Source Algorithm for Source Location Privacy in Wireless Sensor Networks ..................................................531
Matthew Bradbury, Matthew Leeke, and Arshad Jhumka
Time Distortion Anonymization for the Publication of Mobility Data with High Utility ..............................................................539
Vincent Primault, Sonia Ben Mokhtar, Cédric Lauradoux, and Lionel Brunie
Aligning the Conflicting Needs of Privacy, Malware Detection and Network Protection .............................................................547
Ian Oliver and Silke Holtmanns
Enable Privacy Preservation and Result Verification for Top-k Query in Two-Tiered Sensor
Networks .........................................................................................................................................................................................555
Hui Peng, Xiaoying Zhang, Hong Chen, Yuncheng Wu, Yao Wu, and Juru Zeng
TrustCom Privacy Track 4: Data Privacy
Bin Encoding: A User-Centric Secure Full-Text Searching Scheme for the Cloud .......................................................................563
Mark A. Will, Ryan K. L. Ko, and Ian H. Witten
PEAS: Private, Efficient and Accurate Web Search .......................................................................................................................571
Albin Petit, Thomas Cerqueus, Sonia Ben Mokhtar, Lionel Brunie, and Harald Kosch
Privacy-Preserving Mining of Frequent Routes in Cellular Network Data ....................................................................................581
Olof Görnerup, Nima Dokoohaki, and Andrea Hess
uCentive: An Efficient, Anonymous and Unlinkable Incentives Scheme ......................................................................................588
Milica Milutinovic, Italo Dacosta, Andreas Put, and Bart De Decker
x
TrustCom Privacy Track 5: Identity Privacy
(l1, ..., lq)-diversity for Anonymizing Sensitive Quasi-Identifiers .................................................................................................596
Yuichi Sei, Takao Takenouchi, and Akihiko Ohsuga
Lightweight Privacy-Preserving Authentication Scheme for V2G Networks in the Smart Grid ....................................................604
Neetesh Saxena, Bong Jun Choi, and Shinyoung Cho
A Set of Efficient Privacy Protection Enforcing Lightweight Authentication Protocols
for Low-Cost RFID Tags ................................................................................................................................................................612
Pierre-François Bonnefoi, Pierre Dusart, Damien Sauveron, Raja Naeem Akram,
and Konstantinos Markantonakis
Group Sparsity Tensor Factorization for De-anonymization of Mobility Traces ...........................................................................621
Takao Murakami, Atsunori Kanemura, and Hideitsu Hino
The 2015 IEEE International Symposium on Recent Advances of Trust, Security and Privacyin Computing and Communications (RATSP)
RATSP Trust Track 1
Provenance-Based Attestation for Trustworthy Computing ...........................................................................................................630
Jiun Yi Yap and Allan Tomlinson
A Framework for Evaluating the End-to-End Trustworthiness ......................................................................................................638
Nazila Gol Mohammadi, Torsten Bandyszak, Costas Kalogiros, Michalis Kanakakis,
and Thorsten Weyer
Trusted Tamper-Evident Data Provenance .....................................................................................................................................646
Mohammad M. Bany Taha, Sivadon Chaisiri, and Ryan K. L. Ko
Countermeasure Security Risks Management in the Internet of Things Based on Fuzzy Logic
Inference ..........................................................................................................................................................................................654
Igor Kotenko, Igor Saenko, and Sergey Ageev
RATSP Trust Track 2
Trust Metrics Based on a Trusted Network Element ......................................................................................................................660
Jouni Hiltunen and Jarkko Kuusijärvi
Trustworthiness Measurement of E-commerce Systems Using Fuzzy Hybrid Multi-criteria
Analysis ...........................................................................................................................................................................................668
Zhengping Wu and Lifeng Wang
Formal Modeling and Verification of Opportunity-enabled Risk Management .............................................................................676
Alessandro Aldini, Jean-Marc Seigneur, Carlos Ballester Lafuente, Xavier Titi,
and Jonathan Guislain
xi
RATSP Trust Track 3
Single and Multi-metric Trust Management Frameworks for Use in Underwater Autonomous
Networks .........................................................................................................................................................................................685
Andrew Bolster and Alan Marshall
RLTE: A Reinforcement Learning Based Trust Establishment Model ...........................................................................................694
Abdullah Aref and Thomas Tran
In Certificates We Trust—Revisited ...............................................................................................................................................702
Florian Reimair, Peter Teufl, and Bernd Prünster
Interest Flow Control Method Based on User Reputation and Content Name Prefixes in Named
Data Networking .............................................................................................................................................................................710
Sayaka Umeda, Takashi Kamimoto, Yuri Ohata, and Hiroshi Shigeno
RATSP Trust Track 4
Adaptive Trust Threshold Strategy for Misbehaving Node Detection and Isolation ......................................................................718
Muhammad Saleem Khan, Daniele Midi, Majid Iqbal Khan, and Elisa Bertino
Trust-Aware Review Spam Detection .............................................................................................................................................726
Hao Xue, Fengjun Li, Hyunjin Seo, and Roseann Pluretti
KDet: Coordinated Detection of Forwarding Faults in Wireless Community Networks ...............................................................734
Ester López and Leandro Navarro
Inferring User Actions from Provenance Logs ...............................................................................................................................742
Xin Li, Chaitanya Joshi, Alan Yu Shyang Tan, and Ryan Kok Leong Ko
RATSP Security Track 1
Data Mobility Management Model for Active Data Cubes ............................................................................................................750
Thanh Dat Dang, Doan Hoang, and Priyadarsi Nanda
BotProfiler: Profiling Variability of Substrings in HTTP Requests to Detect Malware-Infected
Hosts ................................................................................................................................................................................................758
Daiki Chiba, Takeshi Yagi, Mitsuaki Akiyama, Kazufumi Aoki, Takeo Hariu, and Shigeki Goto
Analysis of Mobility Algorithms for Forensic Virtual Machine Based Malware Detection ..........................................................766
Nada Alruhaily, Behzad Bordbar, and Tom Chothia
A Novel Architecture for Predictive CyberSecurity Using Non-homogenous Markov Models .....................................................774
Subil Abraham and Suku Nair
eSKAMI: Efficient and Scalable Multi-group Key Management for Advanced Metering
Infrastructure in Smart Grid ............................................................................................................................................................782
Mourad Benmalek and Yacine Challal
RATSP Security Track 2
Implementing Authentication Systems Based on Physical Unclonable Functions .........................................................................790
John Ross Wallrabenstein
xii
Save Our Passwords ........................................................................................................................................................................797
Martin Boonk, Ronald Petrlic, and Christoph Sorge
Partial Data Protection via Structure-Preserving Document Partitioning .......................................................................................801
Luigi Lo Iacono
Enhancing EMV Online PIN Verification ......................................................................................................................................808
Danushka Jayasinghe, Raja Naeem Akram, Konstantinos Markantonakis, Konstantinos Rantos,
and Keith Mayes
A Formalization of Fingerprinting Techniques ...............................................................................................................................818
Fabian Lanze, Andriy Panchenko, and Thomas Engel
RATSP Security Track 3
Securing Network-Assisted Direct Communication: The Case of Unreliable Cellular
Connectivity ....................................................................................................................................................................................826
Aleksandr Ometov, Konstantin Zhidanov, Sergey Bezzateev, Roman Florea, Sergey Andreev,
and Yevgeni Koucheryavy
A Secure Northbound Interface for SDN Applications ...................................................................................................................834
Christian Banse and Sathyanarayanan Rangarajan
Secure Routing Protocol Considering Load Distribution in Mobile Ad Hoc Networks .................................................................840
Yuri Ohata, Sayaka Umeda, Takashi Kamimoto, and Hiroshi Shigeno
A Study of IEEE 802.15.6 Association Protocols ...........................................................................................................................848
Jing Feng, Xin Huang, Yulin Lu, Ruiyang Xu, and Zheng Yan
RATSP Security Track 4
Access Control for the Cloud Based on Multi-device Authentication ............................................................................................856
L. Gonzalez-Manzano, J.M. de Fuentes, and A. Orfila
Enhancing Access-Control with Risk-Metrics for Collaboration on Social Cloud-Platforms ........................................................864
Ahmed Bouchami, Elio Goettelmann, Olivier Perrin, and Claude Godart
RESCUE: Resilient Secret Sharing Cloud-Based Architecture ......................................................................................................872
Elochukwu Ukwandu, William J. Buchanan, Lu Fan, Gordon Russell, and Owen Lo
On the Resource Consumption of Secure Data Sharing ..................................................................................................................880
Holger Kuehner and Hannes Hartenstein
Secure Location Validation with Wi-Fi Geo-fencing and NFC ......................................................................................................890
Maksim Avdyushkin and Musfiq Rahman
RATSP Security Track 5
Proofs of Encrypted Data Retrievability with Probabilistic and Homomorphic Message
Authenticators .................................................................................................................................................................................897
Dongxi Liu and John Zic
A Scalable Data Hiding Scheme Using Hilbert Space Curve and Chaos .......................................................................................905
Gyan Singh Yadav and Aparajita Ojha
xiii
Detecting Data Semantic: A Data Leakage Prevention Approach ..................................................................................................910
Sultan Alneyadi, Elankayer Sithirasenan, and Vallipuram Muthukkumarasamy
A New Solution Based on Multi-rate LDPC for Flash Memory to Reduce ECC Redundancy ......................................................918
Shigui Qi, Dan Feng, Nan Su, Wenguo Liu, and Jingning Liu
CaptureMe: Attacking the User Credential in Mobile Banking Applications ................................................................................924
Mohamed El-Serngawy and Chamseddine Talhi
RATSP Privacy Track 1
Watch Your Mobile Payment: An Empirical Study of Privacy Disclosure ....................................................................................934
Zakaria Sahnoune, Esma Aïmeur, Ghada El Haddad, and Rodrigue Sokoudjou
Disequilibrium: Tor’s Exit Node Selection under the Stereoscope .................................................................................................942
Robert Koch, Mario Golling, and Gabi Dreo Rodosek
Extended Model of Side-Information in Garbling ..........................................................................................................................950
Tommi Meskanen, Valtteri Niemi, and Noora Nieminen
A Cloud-Based Model to Facilitate Mobility of Privacy-Preserving Attribute-Based Credential
Users ................................................................................................................................................................................................958
Ahmad Sabouri
Can On-line Social Network Users Trust That What They Designated as Confidential Data
Remains So? ....................................................................................................................................................................................966
Vladimir Estivill-Castro and David F. Nettleton
RATSP Privacy Track 2
Stylometric Anonymity: Is Imitation the Best Strategy? ................................................................................................................974
Mahmoud Khonji and Youssesf Iraqi
k-anonymity: Risks and the Reality ................................................................................................................................................983
Anirban Basu, Toru Nakamura, Seira Hidano, and Shinsaku Kiyomoto
A Dynamic Credible Factory Reset Mechanism of Personal Data in Android Device ...................................................................990
Dali Zhu, Zheming Fan, and Na Pang
The Pseudonym Broker Privacy Pattern in Medical Data Collection .............................................................................................999
Christiaan Hillen
Game-Theoretic Model of Incentivizing Privacy-Aware Users to Consent to Location Tracking ...............................................1006
Emmanouil Panaousis, Aron Laszka, Johannes Pohl, Andreas Noack, and Tansu Alpcan
RATSP Privacy Track 3
DroidCIA: A Novel Detection Method of Code Injection Attacks on HTML5-Based Mobile
Apps ...............................................................................................................................................................................................1014
Yen-Lin Chen, Hahn-Ming Lee, Albert B. Jeng, and Te-En Wei
Secure Two-Party Rank Correlation Computations for Recommender Systems ..........................................................................1022
Kok-Seng Wong, Minjie Seo, and Myung Ho Kim
The Role of Risk Perceptions in Privacy Concerns Evaluation ....................................................................................................1029
Anna Rohunen and Jouni Markkula
xiv
A Language for the Composition of Privacy-Enforcement Techniques .......................................................................................1037
Ronan-Alexandre Cherrueau, Rémi Douence, and Mario Südholt
Potential Mass Surveillance and Privacy Violations in Proximity-Based Social Applications ....................................................1045
Silvia Puglisi, David Rebollo-Monedero, and Jordi Forné
The Fifth IEEE International Symposium on Trust and Security in Cloud Computing (TSCloud)
TSCloud Session I
A Review of Free Cloud-Based Anti-Malware Apps for Android ................................................................................................1053
Jason Walls and Kim-Kwang Raymond Choo
Forensic Collection and Analysis of Thumbnails in Android .......................................................................................................1059
Ming Di Leom, Christian Javier D’Orazio, Gaye Deegan, and Kim-Kwang Raymond Choo
EyeCloud: A BotCloud Detection System ....................................................................................................................................1067
Mohammad Reza Memarian, Mauro Conti, and Ville Leppänen
TSCloud Session II
A Taxonomy of Cloud Attack Consequences and Mitigation Strategies: The Role of Access
Control and Privileged Access Management ................................................................................................................................1073
Kin Suntana Tep, Ben Martini, Ray Hunt, and Kim-Kwang Raymond Choo
Cloud Security Audit for Migration and Continuous Monitoring .................................................................................................1081
Umar Mukhtar Ismail, Shareeful Islam, and Haralambos Mouratidis
Enhancing Cloud Security and Privacy: Broadening the Service Level Agreement ....................................................................1088
Bob Duncan and Mark Whittington
Android Cache Taxonomy and Forensic Process ..........................................................................................................................1094
Felix Immanuel, Ben Martini, and Kim-Kwang Raymond Choo
TSCloud Session III
Secure Sketch Search for Document Similarity ............................................................................................................................1102
Cengiz Orencik, Mahmoud Alewiwi, and Erkay Savas
Architectural Model and Security Mechanisms for Cloud Federations ........................................................................................1108
Luciano Barreto, Joni Fraga, and Frank Siqueira
A Framework for Cryptography Based Accountability and Service Invocation Control
for Service Composition in a Multicloud Architecture .................................................................................................................1116
Gwan-Hwan Hwang, Kuh-Yih Huang, and Yu-Cheng Hsiao
Stationarity Enforcement of Accelerator Based TRNG by Genetic Algorithm ............................................................................1122
Jose Juan Mijares Chan, Parimala Thulasiraman, Gabriel Thomas, and Ruppa Thulasiram
The First IEEE International Workshop on Trustworthy Software Systems (TrustSoft)
xv
TrustSoft Session I
A Global, Empirical Analysis of the Shellshock Vulnerability in Web Applications ..................................................................1129
Baden Delamore and Ryan K. L. Ko
Preventing Library Spoofing on Android ......................................................................................................................................1136
Dennis Titze and Julian Schütte
TrustSoft Session II
Issues in Trustworthy Software Systems .......................................................................................................................................1142
Mazen Ezzeddine and Haitham Akkary
Mission-Aware Vulnerability Assessment for Cyber-Physical Systems ......................................................................................1148
Xiaotian Wang, Matthew Davis, Junjie Zhang, and Vance Saunders
Alias Detection Across Multi-online Applications Based on User’s Behavior Characteristics ....................................................1154
Zhaoli Liu, Tao Qin, Xiaohong Guan, Xiaoqiang Niu, and Tao Yang
A Rejuvenation Model for Software System under Normal Attack ..............................................................................................1160
Haining Meng, Xinhong Hei, Yan Li, Yanning Du, and Guo Xie
The First IEEE International Workshop on 5G Security (IW5GS)
IW5GS Session I
Towards 5G Security .....................................................................................................................................................................1165
Peter Schneider and Günther Horn
Unblocking Stolen Mobile Devices Using SS7-MAP Vulnerabilities: Exploiting
the Relationship between IMEI and IMSI for EIR Access ...........................................................................................................1171
Siddharth Prakash Rao, Silke Holtmanns, Ian Oliver, and Tuomas Aura
Mobile Guard Demo: Network Based Malware Detection ...........................................................................................................1177
Vikramajeet Khatri and Joerg Abendroth
IW5GS Session II
Towards Secure Multi-tenant Virtualized Networks .....................................................................................................................1180
Nicolae Paladi and Christian Gehrmann
CRC-Based Message Authentication for 5G Mobile Technology ................................................................................................1186
Elena Dubrova, Mats Näslund, and Göran Selander
An Air Interface Signaling Protection Function for Mobile Networks: GSM Experiments
and Beyond ....................................................................................................................................................................................1192
Prajwol Kumar Nakarmi, Oscar Ohlsson, and Michael Liljenstam
IW5GS Session III
Security in D2D Communications: A Review ..............................................................................................................................1199
Mingjun Wang and Zheng Yan
xvi
A USIM Compatible 5G AKA Protocol with Perfect Forward Secrecy .......................................................................................1205
Jari Arkko, Karl Norrman, Mats Näslund, and Bengt Sahlin
The Eighth IEEE International Symposium on Security, Privacy and Anonymity in Internetof Things (SpaIoT)
SpaIoT Session I
Revocation Management in Vehicular Ad-hoc Networks .............................................................................................................1210
Francisco Martín-Fernández, Pino Caballero-Gil, and Cándido Caballero-Gil
Enhancing the Trajectory Privacy with Laplace Mechanism ........................................................................................................1218
Daiyong Quan, Lihua Yin, and Yunchuan Guo
A Simple RFID-Based Architecture for Privacy Preservation ......................................................................................................1224
Di Wu, Jingfu Du, Dali Zhu, and Siye Wang
Towards Efficient Implementation of Lattice-Based Public-Key Encryption on Modern CPUs .................................................1230
Chaohui Du, Guoqiang Bai, and Hongyi Chen
Towards Tracing of k-Anonymized Datasets ................................................................................................................................1237
Shinsaku Kiyomoto, Toru Nakamura, and Yutaka Miyake
SpaIoT Session II
WAVE: Secure Wireless Pairing Exploiting Human Body Movements ......................................................................................1243
Wei Wang, Zhan Wang, Wen Tao Zhu, and Lei Wang
Achieving Forward Secrecy and Unlinkability in Cloud-Based Personal Health Record System ...............................................1249
Naveen Kumar, Anish Mathuria, and Manik Lal Das
Security Orchestrator: Introducing a Security Orchestrator in the Context of the ETSI NFV
Reference Architecture ..................................................................................................................................................................1255
Bernd Jaeger
A Trustworthiness Model for Crowdsourced and Crowdsensed Data ..........................................................................................1261
Catia Prandi, Stefano Ferretti, Silvia Mirri, and Paola Salomoni
The First IEEE International Workshop on Trust and Security in Wireless Sensor Networks(TrustWSN)
TrustWSN Session I
Periodicity-and-Linear-Based Data Suppression Mechanism for WSN .......................................................................................1267
Yanchao Song, Juan Luo, Chang Liu, and Wenfeng He
Quantitative Trustworthy Evaluation Scheme for Trust Routing Scheme in Wireless Sensor
Networks .......................................................................................................................................................................................1272
Hongsong Chen, Zhi Han, and Zhongchuan Fu
An Energy Efficient Congestion Control Scheme for Multimedia Data in Wireless Sensor
Networks .......................................................................................................................................................................................1279
Kyoungsoo Bok, Eunkyung Ryu, Junho Park, and Jaesoo Yoo
xvii
TrustWSN Session II
A Security Topology Protocol of Wireless Sensor Networks Based on Community Detection
and Energy Aware .........................................................................................................................................................................1284
Zuo Chen, Mengyuan Jia, Yan Wang, and Xiaolong Yan
A Novel Sensor Deployment Approach Using Fruit Fly Optimization Algorithm in Wireless
Sensor Networks ............................................................................................................................................................................1292
Huan Zhao, Qian Zhang, Liang Zhang, and Yan Wang
A Self-Adaptive Wireless Sensor Network Coverage Method for Intrusion Tolerance Based
on Particle Swarm Optimization and Cuckoo Search ...................................................................................................................1298
Zuo Chen, Xue Li, Bin Lv, and Mengyuan Jia
TrustWSN Session III
Protein-Protein Interaction Network Constructing Based on Text Mining and Reinforcement
Learning with Application to Prostate Cancer ..............................................................................................................................1306
Fei Zhu, Quan Liu, Xiaofang Zhang, and Bairong Shen
Study on the Coverage of Adaptive Wireless Sensor Network Based on Trust ...........................................................................1312
Huan Zhao, Chaoming Hu, Rui Zheng, and Bin Lv
An Efficient Clustering Mining Algorithm for Indoor Moving Target Trajectory Based on
the Improved AGNES ...................................................................................................................................................................1318
Wei-qing Huang, Chang Ding, Si-ye Wang, and Shuang Hu
A Near Field Communication(NFC) Security Model Based on OSI Reference Model ...............................................................1324
Wei Fan, Weiqing Huang, Zhujun Zhang, Ye Wang, and Degang Sun
Secure Routing Protocols for Sensor Networks: Construction with Signature Schemes
for Multiple Signers .......................................................................................................................................................................1329
Kenta Muranaka, Naoto Yanai, Shingo Okamura, and Toru Fujiwara
The Seventh IEEE International Symposium on UbiSafe Computing (UbiSafe)
UbiSafe Session I
A Method for Deriving and Testing Malicious Behavior Detection Rules ...................................................................................1337
Raimo Hilden and Kimmo Hätönen
Towards a Generic Trust Management Framework Using a Machine-Learning-Based Trust
Model .............................................................................................................................................................................................1343
Jorge López and Stephane Maag
A Distributed Reputation System for Certification Authority Trust Management .......................................................................1349
Jiska Classen, Johannes Braun, Florian Volk, Matthias Hollick, Johannes Buchmann,
and Max Mühlhäuser
xviii
UbiSafe Session II
Data Sharing on the Cloud: A Scalable Proxy-Based Protocol for Privacy-Preserving Queries ..................................................1357
Maryam Sepehri, Stelvio Cimato, Ernesto Damiani, and Chan Yeob Yeuny
DDOS Mitigation Cloud-Based Service .......................................................................................................................................1363
Fouad Guenane, Michele Nogueira, and Ahmed Serhrouchni
Dynamic Game Access Control Based on Trust ...........................................................................................................................1369
Shunan Ma
Dynamic Security Policies Enforcement and Adaptation Using Aspects .....................................................................................1374
Muhammad Sabir Idrees, Samiha Ayed, Nora Cuppens-Boulahia, and Frédéric Cuppens
The Second IEEE International Workshop on the Emerging Future Internet and Network Security(EFINS)
EFINS Session I
Cybercrime Profiling: Decision-Tree Induction, Examining Perceptions of Internet Risk
and Cybercrime Victimisation .......................................................................................................................................................1380
Ameer Al-Nemrat and Chafika Benzaid
From ZeuS to Zitmo: Trends in Banking Malware .......................................................................................................................1386
Najla Etaher, George R.S. Weir, and Mamoun Alazab
ARP Cache Poisoning Mitigation and Forensics Investigation ....................................................................................................1392
Heman Awang Mangut, Ameer Al-Nemrat, Chafika Benzaïd, and Abdel-Rahman H. Tawil
EFINS Session II
Virtualization and Cyber Security: Arming Future Security Practitioners ...................................................................................1398
Midhun Babu Tharayanil, Gill Whitney, Mahdi Aiash, and Chafika Benzaid
A Security Analysis of the Emerging P2P-Based Personal Cloud Platform MaidSafe ................................................................1403
Florian Jacob, Jens Mittag, and Hannes Hartenstein
Automated Collection and Analysis of Malware Disseminated via Online Advertising ..............................................................1411
Muhammad N. Sakib and Chin-Tser Huang
Author Index - Volume I
xix
IEEE Catalog Number: ISBN:
CFP15TRU-POD 978-1-4673-7953-3
2015 IEEE Trustcom/BigDataSE/ISPA
Helsinki, Finland 20 – 22 August 2015
Volume 2 Pages 1-246
3/4
2015 IEEE Trustcom/BigDataSE/ISPA
Trustcom-BigDataSE-ISPA 2015
Table of Contents
Volume - 2
Message from the IEEE TrustCom-ISPA-BigDataSE 2015 General Chairs ..............................................................................ix
Message from the IEEE BigDataSE 2015 General Chairs.............................................................................................................x
Message from the DTWSM 2015 Workshop Chairs ....................................................................................................................xii
DTWSM 2015 Organizing and Program Committees.................................................................................................................xiii
Message from the CPBD Chairs....................................................................................................................................................xiv
CPBD 2015 Organizing and Program Committees.......................................................................................................................xv
Message from the RTStreams 2015 Workshop Chairs................................................................................................................xvi
RTStreams 2015 Organizing and Program Committees............................................................................................................xvii
The Ninth IEEE International Conference on Big Data Science and Engineering
BigDataSE: Analytics I
M-PCA Binary Embedding for Approximate Nearest Neighbor Search ............................................................................................1
Ezgi Can Ozan, Serkan Kiranyaz, and Moncef Gabbouj
Large-Scale Classification by an Approximate Least Squares One-Class Support Vector
Machine Ensemble ..............................................................................................................................................................................6
Vasileios Mygdalis, Iosifidis Alexandros, Anastasios Tefas, and Ioannis Pitas
Nearest Class Vector Classification for Large-Scale Learning Problems .........................................................................................11
Alexandros Iosifidis, Anastasios Tefas, and Ioannnis Pitas
Class-Specific Nonlinear Projections Using Class-Specific Kernel Spaces .....................................................................................17
Alexandros Iosifidis, Moncef Gabbouj, and Petri Pekki
BigDataSE: Analytics II
Scalable Learning of k-dependence Bayesian Classifiers under MapReduce ...................................................................................25
Jacinto Arias, José A. Gámez, and José M. Puerta
Distributed Entropy Minimization Discretizer for Big Data Analysis under Apache Spark ............................................................33
Sergio Ramírez-Gallego, Salvador García, Héctor Mouriño-Talín, and David Martínez-Rego
Scalable Massively Parallel Learning of Multiple Linear Regression Algorithm with MapReduce ................................................41
Moufida Adjout Rehab and Faouzi Boufares
v
An Algorithm for Identifying the Learning Patterns in Big Data .....................................................................................................48
Majed Farrash and Wenjia Wang
Goal-Based Analytic Composition for On-and Off-line Execution at Scale ....................................................................................56
Peter Coetzee and Stephen Jarvis
BigDataSE: Text Analytics
Similarity Measure Based on Low-Rank Approximation for Highly Scalable Recommender
Systems ..............................................................................................................................................................................................66
Sepideh Seifzadeh and Ali Miri
Spatial-Temporal Aware Truth Finding in Big Data Social Sensing Applications ...........................................................................72
Chao Huang and Dong Wang
Similarity-Based Query-Focused Multi-document Summarization Using Crowdsourced
and Manually-built Lexical-Semantic Resources ..............................................................................................................................80
Muhidin A. Mohamed and Mourad Oussalah
Semi-Supervised Multiple Disambiguation ......................................................................................................................................88
Kambiz Ghoorchian, Fatemeh Rahimian, and Sarunas Girdzijauskas
BigDataSE: Big Data Technologies
Hadoop Characterization ...................................................................................................................................................................96
Icaro Alzuru, Kevin Long, Bhaskar Gowda, David Zimmerman, and Tao Li
Telemetry for Elastic Data (TED): Middleware for MapReduce Job Metering and Rating ...........................................................104
Soheil Qanbari, Ashkan Farivarmoheb, Parham Fazlali, Samira Mahdizadeh,
and Schahram Dustdar
Cost Models for Distributed Pattern Mining in the Cloud ..............................................................................................................112
Sabeur Aridhi, Laurent d’Orazio, Mondher Maddouri, and Engelbert Mephu Nguifo
Performance Evaluation of Enterprise Big Data Platforms with HiBench .....................................................................................120
Todor Ivanov, Raik Niemann, Sead Izberovic, Marten Rosselli, Karsten Tolle, and Roberto V. Zicari
Adaptive Data Communication Interface: A User-Centric Visual Data Interpretation Framework ...............................................128
Grazziela P. Figueredo, Christian Wagner, Jonathan M. Garibaldi, and Uwe Aickelin
The Second IEEE International Workshop on Data, Text, Web, and Social Network Mining(DTWSM)
DTWSM Session I
Probabilistic Modeling Towards Understanding the Power Law Distribution of Video Viewing
Behavior in Large-Scale e-Learning ...............................................................................................................................................136
Ni Xue, Huan He, Jun Liu, Qinghua Zheng, Tian Ma, Jianfei Ruan, and Bo Dong
Enhancing the Detection Rate of Inclined Faces .............................................................................................................................143
Jun-Horng Chen, I-Lin Tang, and Chun-Hsuan Chang
PPT Image Segmentation Based on Color Entropy ........................................................................................................................147
Feijuan He, Xuelu Chen, Dawei Xu, and Xianglin Miao
vi
Mining E-commerce Data from E-shop Websites ...........................................................................................................................153
Andrea Horch, Holger Kett, and Anette Weisbecker
Provision of Disk I/O Guarantee for MapReduce Applications ......................................................................................................161
Xuan Thi Tran, Tien Van Do, Nam H. Do, Lóránt Farkas, and Csaba Rotter
The First IEEE International Workshop on Classification Problems Embedded in the Nature of BigData (CPBD)
CPBD Session I
A MapReduce-Based k-Nearest Neighbor Approach for Big Data Classification .........................................................................167
Jesús Maillo, Isaac Triguero, and Francisco Herrera
Semantic HMC: A Predictive Model Using Multi-label Classification for Big Data .....................................................................173
Rafael Peixoto, Thomas Hassan, Christophe Cruz, Aurélie Bertaux, and Nuno Silva
Analysis of Data Preprocessing Increasing the Oversampling Ratio for Extremely Imbalanced
Big Data Classification ....................................................................................................................................................................180
Sara del Río, José Manuel Benítez, and Francisco Herrera
Feature Ranking Based on Information Gain for Large Classification Problems with MapReduce ..............................................186
Eftim Zdravevski, Petre Lameski, Andrea Kulakov, Boro Jakimovski, Sonja Filiposka,
and Dimitar Trajanov
Compounds Activity Prediction in Large Imbalanced Datasets with Substructural Relations
Fingerprint and EEM .......................................................................................................................................................................192
Wojciech Marian Czarnecki and Krzysztof Rataj
The First IEEE International Workshop on Real Time Data Stream Analytics (RTStreams)
CPBD Session II and RTStreams Session I
Incremental One-Class Bagging for Streaming and Evolving Big Data .........................................................................................193
Bartosz Krawczyk and Michał Woźniak
An Increment Decision Tree Algorithm for Streamed Data ...........................................................................................................199
Dariusz Jankowski and Konrad Jackowski
Multi-label Stream Classification Using Extended Binary Relevance Model ................................................................................205
Pawel Trajdos and Marek Kurzynski
Data Stream Classification Using Random Feature Functions and Novel Method Combinations .................................................211
Jesse Read and Albert Bifet
Symbolic Time Series Representation for Stream Data Processing ................................................................................................217
Jakub Sevcech and Maria Bielikova
RTStreams Session II
A Platform for Real-Time Opinion Mining from Social Media and News Streams .......................................................................223
Nikos Tsirakis, Vasilis Poulopoulos, Panagiotis Tsantilas, and Iraklis Varlamis
Predicting Object Trajectories from High-Speed Streaming Data ..................................................................................................229
Nikolaos Zorbas, Dimitrios Zissis, Konstantinos Tserpes, and Dimosthenis Anagnostopoulos
vii
The Technology of Processing Intensive Structured Dataflow on a Supercomputer ......................................................................235
Vladislav A. Shchapov, Grigorii F. Masich, and Aleksei G. Masich
Issues in Complex Event Processing Systems .................................................................................................................................241
Ioannis Flouris, Nikos Giatrakos, Minos Garofalakis, and Antonios Deligiannakis
Author Index - Volume II
viii
IEEE Catalog Number: ISBN:
CFP15TRU-POD 978-1-4673-7953-3
2015 IEEE Trustcom/BigDataSE/ISPA
Helsinki, Finland 20 – 22 August 2015
Volume 3 Pages 1-320
4/4
2015 IEEE Trustcom/BigDataSE/ISPA
Trustcom-BigDataSE-ISPA 2015
Table of Contents
Volume - 3
Message from the IEEE TrustCom-ISPA-BigDataSE 2015 General Chairs ..............................................................................ix
Message from the ISPA 2015 Program Committee Chairs............................................................................................................x
ISPA 2015 Organizing and Technical Program Committee.........................................................................................................xi
Message from the RePara 2015 Workshop Chairs......................................................................................................................xiii
RePara 2015 Organizing and Program Committees....................................................................................................................xiv
Message from the PBio 2015 Workshop Chairs............................................................................................................................xv
PBio 2015 Organizing and Program Committees........................................................................................................................xvi
Message from the DIAS 2015 Workshop Chairs ........................................................................................................................xvii
DIAS 2015 Organizing and Program Committees.....................................................................................................................xviii
The 13th IEEE International Symposium on Parallel and Distributed Processing with Applications
ISPA Session I
Evaluating HTM for Pauseless Garbage Collectors in Java ................................................................................................................1
Maria Carpen-Amarie, Dave Dice, Patrick Marlier, Gael Thomas, and Pascal Felber
Selfish Self-Stabilizing Approach to Maximal Independent Sets .......................................................................................................9
Li-Hsing Yen and Jean-Yao Huang
Parallel SMT Solving and Concurrent Symbolic Execution .............................................................................................................17
Emil Rakadjiev, Taku Shimosawa, Hiroshi Mine, and Satoshi Oshima
Identifying Hierarchical Structures in Sequences on GPU ...............................................................................................................27
Prashant Jalan, Arihant Kumar Jain, and Subhajit Roy
ISPA Session II
A New Fill-in Strategy for IC Factorization Preconditioning Considering SIMD Instructions ........................................................37
Takeshi Iwashita, Naokazu Takemura, Akihiro Ida, and Hiroshi Nakashima
Enhanced GPU Resource Utilization through Fairness-aware Task Scheduling ..............................................................................45
Ayman Tarakji, Alexander Gladis, Tarek Anwar, and Rainer Leupers
v
Exploiting Hyper-Loop Parallelism in Vectorization to Improve Memory Performance
on CUDA GPGPU .............................................................................................................................................................................53
Shixiong Xu and David Gregg
ISPA Session III
Towards Increasing the Error Handling Time Window in Large-Scale Distributed Systems
Using Console and Resource Usage Logs .........................................................................................................................................61
Nentawe Gurumdimma, Arshad Jhumka, Maria Liakata, Edward Chuah, and James Browne
Metaprogramming Dense Linear Algebra Solvers Applications to Multi and Many-Core
Architectures .....................................................................................................................................................................................69
Ian Masliah, Marc Baboulin, and Joel Falcou
Parallel Monte Carlo Tree Search from Multi-core to Many-core Processors ..................................................................................77
S. Ali Mirsoleimani, Aske Plaat, Jaap van den Herik, and Jos Vermaseren
Routing Algorithms for Recursively-Defined Data Centre Networks ..............................................................................................84
Alejandro Erickson, Abbas Kiasari, Javier Navaridas, and Iain A. Stewart
Petri Nets Formalization of Map/Reduce Paradigm to Optimise the Performance-Cost Tradeoff ...................................................92
M. Carmen Ruiz, Javier Calleja, and Diego Cazorla
ISPA Session IV
A Horizontally-Scalable Multiprocessing Platform Based on Node.js ...........................................................................................100
Ahmad Maatouki, Joerg Meyer, Marek Szuba, and Achim Streit
Performance Evaluations of Document-Oriented Databases Using GPU and Cache Structure .....................................................108
Shin Morishima and Hiroki Matsutani
Energy-Efficient Sorting with the Distributed Memory Architecture ePUMA ..............................................................................116
Andréas Karlsson, Joar Sohl, and Dake Liu
Hardware Transactional Memory Optimization Guidelines, Applied to Ordered Maps ................................................................124
Lars Frydendal Bonnichsen, Christian Wilhelm Probst, and Sven Karlsson
Analysis of the Impact of CPU Virtualization on Parallel Applications in Xen .............................................................................132
Kenichi Kourai and Riku Nakata
The First IEEE International Workshop on Reengineering for Parallelism in HeterogeneousParallel Platforms (RePara)
RePara Session I
Parallelizing High-Frequency Trading Applications by Using C++11 Attributes ..........................................................................140
Marco Danelutto, Tiziano De Matteis, Gabriele Mencagli, and Massimo Torquati
AKI: Automatic Kernel Identification and Annotation Tool Based on C++ Attributes .................................................................148
Rafael Sotomayor, Luis Miguel Sanchez, Javier Garcia Blas, Alejandro Calderon,
and Javier Fernandez
MeterPU: A Generic Measurement Abstraction API Enabling Energy-Tuned Skeleton Backend
Selection ..........................................................................................................................................................................................154
Lu Li and Christoph Kessler
vi
RePara Session II
Exploiting Task-Parallelism on GPU Clusters via OmpSs and rCUDA Virtualization ..................................................................160
Adrián Castelló, Rafael Mayo, Judit Planas, and Enrique S. Quintana-Ortí
Parallel Pipeline on Heterogeneous Multi-processing Architectures ..............................................................................................166
Andrés Rodríguez, Angeles Navarro, Rafael Asenjo, Antonio Vilches, Francisco Corbera,
and María Garzarán
The Loop-of-Stencil-Reduce Paradigm ...........................................................................................................................................172
Marco Aldinucci, Marco Danelutto, Maurizio Drocco, Peter Kilpatrick, Guilherme Peretti Pezzi,
and Massimo Torquati
Prediction Models for Performance, Power, and Energy Efficiency of Software Executed
on Heterogeneous Hardware ...........................................................................................................................................................178
Dénes Bán, Rudolf Ferenc, István Siket, and Ákos Kiss
The Third IEEE International Workshop on Parallelism in Bioinformatics (PBio)
PBio: Cluster Computing in Bioinformatics
Parallel Computation of Voxelized Macromolecular Surfaces by Spatial Slicing ..........................................................................184
Sebastian Daberdaku and Carlo Ferrari
Scalable RNA Sequencing on Clusters of Multicore Processors ....................................................................................................190
Héctor Martínez, Sergio Barrachina, Maribel Castillo, Joaquín Tárraga, Ignacio Medina,
Joaquín Dopazo, and Enrique S. Quintana-Ortí
A Parallel Algorithm for Compression of Big Next-Generation Sequencing Datasets ..................................................................196
Sandino Vargas Pérez and Fahad Saeed
Assessment of a Black-Box Approach for a Parallel Finite Elements Solver in Computational
Hemodynamics ................................................................................................................................................................................202
Ferdinando Auricchio, Marco Ferretti, Adrien Lefieux, Mirto Musci, Alessandro Reali,
Santi Trimarchi, and Alessandro Veneziani
PBio: Hardware Accelerators in Bioinformatics
Smith-Waterman Protein Search with OpenCL on an FPGA .........................................................................................................208
Enzo Rucci, Carlos García, Guillermo Botella, Armando De Giusti, Marcelo Naiouf,
and Manuel Prieto-Matias
Accelerating Phylogenetic Inference on Heterogeneous OpenCL Platforms .................................................................................214
Lídia Kuan, Leonel Sousa, and Pedro Tomás
Accelerating DNA Sequence Analysis Using Intel(R) Xeon Phi(TM) ...........................................................................................222
Suejb Memeti and Sabri Pllana
Fast Epistasis Detection in Large-Scale GWAS for Intel Xeon Phi Clusters .................................................................................228
Glenn R. Luecke, Nathan T. Weeks, Brandon M. Groth, Marina Kraeva, Li Ma, Luke M. Kramer,
James E. Koltes, and James M. Reecy
vii
PBio: Many-core, Multi-core, and Distributed Computing in Bioinformatics
On the Performance of BWA on NUMA Architectures .................................................................................................................236
Josefina Lenis and Miquel Angel Senar
Parallel H4MSA for Multiple Sequence Alignment .......................................................................................................................242
Álvaro Rubio-Largo, Miguel A. Vega-Rodríguez, and David L. González-Álvarez
Discovering Candidates for Gene Network Expansion by Distributed Volunteer Computing .......................................................248
Francesco Asnicar, Luca Erculiani, Francesca Galante, Caterina Gallo, Luca Masera,
Paolo Morettin, Nadir Sella, Stanislau Semeniuta, Thomas Tolio, Giulia Malacarne,
Kristof Engelen, Andrea Argentini, Valter Cavecchia, Claudio Moser, and Enrico Blanzieri
The First IEEE International Workshop on Distributed Intelligent Automation Systems (DIAS)
DIAS Session I: Models and Applications for Industrial Cyber-physical Systems
Cyber-physical Design of Data Centers Cooling Systems Automation ..........................................................................................254
Arash Mousavi, Valeriy Vyatkin, Yulia Berezovskaya, and Xiaojing Zhang
Fuzzy Logic Based Prosumer Agent in a Modular Smart Grid Prosumer Architecture .................................................................261
Chen-Wei Yang, Kashif Gulzar, Seppo Sierla, and Valeriy Vyatkin
Adaptation of Material Flows in Mechanical Transportation Systems Based on Observation
Experience .......................................................................................................................................................................................269
Stanislav Belyakov, Marina Savelyeva, Jeffrey Yan, and Valeriy Vyatkin
An OPC UA Based Architecture for Testing Tracking Simulation Methods .................................................................................275
Gerardo Santillán Martínez, Tommi Karhela, Valeriy Vyatkin, Tuomas Miettinen, and Cheng Pang
Model-Driven Runtime Embedded Monitoring for Industrial Controllers .....................................................................................281
Pavel Kustarev, Sergei Bykovskii, Vasiliy Milin, and Alexander Antonov
DIAS Session II: Distributed Design Architectures
Synthesis of Safety Controllers for Distributed Automation Systems on the Basis of Reverse
Safe Net Condition/Event Systems .................................................................................................................................................287
Victor Dubinin, Valeriy Vyatkin, and Hans-Michael Hanisch
A Formal Perspective on IEC 61499 Execution Control Chart Semantics .....................................................................................293
Per Lindgren, Marcus Lindner, David Pereira, and Luís Miguel Pinho
Formal Modeling of Testing Software for Cyber-Physical Automation Systems ..........................................................................301
Igor Buzhinsky, Cheng Pang, and Valeriy Vyatkin
Inferring Automata Logic from Manual Control Scenarios: Implementation in Function Blocks .................................................307
Daniil Chivilikhin, Anatoly Shalyto, and Valeriy Vyatkin
Formal Verification of IEC61499 Function Blocks with Abstract State Machines
and SMV—Modelling .....................................................................................................................................................................313
Sandeep Patil, Victor Dubinin, and Valeriy Vyatkin
Author Index - Volume III
viii