Program

There are a number of other sessions (not listed as part of SAM'12 in this schedule) that are of potential interest to SAM'12 participants (sessions belonging to other joint conferences of WORLDCOMP.) Therefore, you are encouraged to also check the schedules of other joint conferences. In particular, sessions in BIOCOMP'12, FECS'12, ICAI'12, ICOMP'12, ICWN'12, and IKE'12, discuss topics that are within the scope of SAM; these have been scheduled so that selected SAM'12 attendees can also participate in them.

Note that each conference is divided into a number of topical sessions. These sessions are not necessarily scheduled in the same room/location. Therefore, conference attendees are to check the location of the session(s) they wish to attend; The conference room numbers (Locations) appear in this document.

July 15
03:00 - 09:00pm REGISTRATION (Second Floor, Conference Lobby; 1-5)
July 16
6:30am - 5:00pm REGISTRATION (Second Floor, Conference Lobby: 1-5)
08:30 - 08:45am Congress Opening Remarks - July 16, Monday
Professor Hamid R. Arabnia (Chair, Steering Committee & Coordinator)
University of Georgia, Georgia, USA
(LOCATION: Monte Carlo Pavilion)
08:50 - 09:45am Keynote Lecture 1 - July 16, Monday
Teaching Software Engineering for Software as a Service using Massive Open Online Courses
Professor David A. Patterson
University of California at Berkeley, California, USA
Member, National Academy of Engineering
Member, National of Academy of Sciences
Fellow of IEEE, ACM, and AAAS
Shared (with John Hennessy) the IEEE John von Neumann Medal
(LOCATION: Monte Carlo Pavilion)
09:55 - 10:50am Keynote Lecture 2 - July 16, Monday
Crowdsourcing, Human Computation, and Collective Intelligence
Professor Haym Hirsh
Rutgers University, New Jersey, USA
Former Director (2006-2010) of Division of Information and Intelligent Systems, National Science Foundation, USA
Visiting Scholar (2010-2011) at MIT's Center for Collective Intelligence, USA
Prof. Hirsh received his PhD in 1989 from Stanford University.
(LOCATION: Monte Carlo Pavilion)
11:00 - 11:55am Keynote Lecture 3 - July 16, Monday
ECL and Distributed Machine Learning with the HPCC Systems Platform
Dr. Flavio Villanustre
Vice-President of Technology Architecture and Product, HPCC Systems
(Past positions and professions: Director of Infrastructure at LexisNexis; and also a neurosurgeon.)
(LOCATION: Monte Carlo Pavilion)
12:00 - 01:00pm LUNCH (On Your Own)
SESSION 1-SAM
NETWORK SECURITY
Chair: Dr. Gregory Vert, Texas A&M University, USA
July 16, 2012 (Monday)
01:00pm - 02:20pm
(LOCATION: Ballroom 6)
01:00 - 01:20pm Environment Feature Map for Wireless Device Localization
T. Kaiser, P. Card, K. Ferens
University of Manitoba, Winnipeg, Manitoba, Canada
Seccuris Inc., Winnipeg, MB, Canada
01:20 - 01:40pm Peer-to-Peer Attacks and Defenses
Yu Yang and Lan Yang
California State Polytechnic University, Pomona, California, USA
01:40 - 02:00pm The Systems for Detecting Port Scanner in 3G WCDMA Mobile Networks
Sekwon Kim, Joohyung Oh, and Chaetae Im
Advanced Operation Technology Team, Korea Internet & Security Agency IT Venture Tower, Seoul, South Korea
02:00 - 02:20pm Peer to Peer File Sharing: Security Concerns, Unwanted Traffic Detection and Filtering
Leonardo Carvajal and Lei Chen
Sam Houston State University, Huntsville, Texas, USA
SESSION 2-SAM
COMPUTER AND INFORMATION SECURITY + ASSURANCE, SECURITY, & MANAGEMENT
Chair: Dr. Kathy Liszka, University of Akron, USA
July 16, 2012 (Monday)
02:20pm - 06:00pm
(LOCATION: Ballroom 6)
02:20 - 02:40pm A Theoretical Model for Probabilistically Based Detection and Mitigation of Malware Using Self Organizing Taxonomies
Greg Vert, Anitha Chennamaneni, and SS Iyengar
Texas A&M Central Texas, Killeen, Texas, USA
Florida International University, Miami, Florida, USA
02:40 - 03:00pm Identifying Rootkit Infections Using a New Windows Hidden-driver-based Rootkit
Woei-Jiunn Tsaur and Lo-Yao Yeh
Da-Yeh University, Changhua, Taiwan, R.O.C.
National Center for High-Performance Computing, Tainan Taiwan, R.O.C.
03:00 - 03:20pm Incorporating Soft Computing Techniques into Anomaly Intrusion Detection Systems
Yingbing Yu
Austin Peay State University, USA
03:20 - 03:40pm BLAST Your Way Through Malware: Malware Analysis Assisted by Bioinformatics Tools
Jay Pedersen, Dhundy Bastola, Ken Dick, Robin Gandhi, William Mahoney
University of Nebraska at Omaha, Omaha, Nebraska, USA
03:40 - 04:00pm Evaluating Intrusion Detection and Prevention Systems Using Tomahawk and Wireshark
David Mudzingwa and Rajeev Agrawal
North Carolina A&T State University, Greensboro, North Carolina, USA
04:00 - 04:20pm Towards Effective Integrated Access Control Lists in Internet Networks
Kamal A. Ahmat and Ammar Elnour
City University of New York, New York, USA
University of Sydney, NSW, Australia
04:20 - 04:40pm Polymorphic Worms Detection Using A Supervised Machine Learning Technique
Mohssen M. Z. E. Mohammed, H. Anthony Chan, Neco Ventura, Mohsin Hashim, Eihab Bashier
University of Cape Town, Rondebosch, South Africa
University of Khartoum, Khartoum, Sudan
04:40 - 05:00pm Firewall Access Control: Static and Dynamic Aspects
Vladimir Zaborovsky and Vladimir Muliukha
Telematics Department, State Polytechnical University, Saint-Petersburg, Russia
05:00 - 05:20pm Application of Criterion-Based Multilayer Access Control to XML Documents
Leon Pan
University of the Fraser Valley, Abbotsford, BC, Canada
05:20 - 05:40pm Weaknesses of EU Countries Cyber Strategies
Kimberly Lukin
University of Turku, Turku, Finland
05:40 - 06:00pm Security Best Practices and Risk Assessment of SCADA and Industrial Control Systems
Guillermo A Francia III, David Thornton, Joshua Dawson
Jacksonville State University, N Jacksonville, Alabama, USA
06:00 - 09:00pm TUTORIALS + INVITED PRESENTATIONS
(Partial overlap with session 2-SAM)
(Please see the lists at the beginning of this booklet)
09:10 - 11:30pm CONFERENCE RECEPTION DINNER / SOCIAL
July 16 - Monday; 09:10 - 11:30pm
(LOCATION: Ballrooms 1-5)
July 17
6:45am - 5:00pm REGISTRATION (Second Floor, Conference Lobby: 1-5)
SESSION 3-SAM
CYBERSECURITY + SECURITY EDUCATION
Co-Chairs: Prof. George Markowsky and Dr. Linda Markowsky
University of Maine, Orono, Maine, USA
July 17, 2012 (Tuesday)
08:00am - 03:00pm
(LOCATION: Ballroom 6)
08:00 - 08:20am Implementation Progress, Student Perceptions, and Refinement of a Virtual Information Security Laboratory
Cory Cavanagh and Raymond Albert
University of Maine at Fort Kent, Maine, USA
08:20 - 08:40am On Conducting Cyber Security Labs from the Cloud
Nick Flower and Kevin Amorin
Northeastern University, Boston, MA, USA
08:40 - 09:00am Effectiveness of Cybersecurity Competitions
Ronald S. Cheung, Joseph P. Cohen, Henry Z. Lo, Fabio Elia, and
Veronica Carrillo-Marquez
University of Massachusetts Boston, MA, USA
09:00 - 09:20am Who's That Knocking At Your Cybercastle's Gate?
George Markowsky and Linda Markowsky
University of Maine, Orono, Maine, USA
09:20 - 09:40am Developing Small Team-based Cyber Security Exercises
Brandon Mauer, William Stackpole, Daryl Johnson
Rochester Institute of Technology, Rochester, New York, USA
09:40 - 10:00am Employing Entropy in the Detection and Monitoring of Network Covert Channels
Chaim Sanders, Jacob Valletta, Bo Yuan, Daryl Johnson, Peter Lutz
Networking, Security & Systems Administration, Rochester Institute of Technology, New York, USA
10:00 - 10:20am NAT Denial of Service: An Analysis of Translation Table Behavior on Multiple Platforms
Nathan Winemiller, Bruce Hartpence, Daryl Johnson, and Sumita Mishra
Rochester Institute of Technology, Rochester, New York, USA
10:20 - 10:40am BREAK
10:40 - 11:00am Toward a More Perfect Scoring System for the Northeast Collegiate Cyber Defense Competions (NECCDC)
George Markowsky and Linda Markowsky
University of Maine, Orono, Maine, USA
11:00 - 11:20am UPnP Port Manipulation as a Covert Channel
Steve Monette, Daryl Johnson, Bo Yuan, Peter Lutz
Rochester Institute of Technology, New York, USA
11:20 - 11:40am A Multi-Disciplined Security Engineering Education Approach
William D. Casper and Stephen M. Papa
Lockheed Martin, Southern Methodist University, Texas, USA
11:40 - 12:00pm Forensic Acquisition and Analysis of VMware Virtual Hard Disks
Manish Hirwani, Yin Pan, Bill Stackpole, Daryl Johnson
Rochester Institute of Technology, New York, USA
12:00 - 12:20pm A Covert Channel in the TTL Field of DNS Packets
Christopher Hoffman, Daryl Johnson, Bo Yuan, Peter Lutz
Rochester Institute of Technology, New York, USA
12:20 - 01:20pm A Statistical Approach to Reduce Malware Inside an Information System in Banking Sector
Gustavo A Valencia Zapata, Juan C Salazar Uribe
Universidad Nacional de Colombia, Escuela de Ciencias Estadisticas, Medellin, Colombia
12:40 - 01:20pm LUNCH (On Your Own)
01:20 - 01:40pm Audio Steganography Using High Frequency Noise Introduction
David Wheeler, Daryl Johnson, Bo Yuan, Peter Lutz
Rochester Institute of Technology, New York, USA
01:40 - 02:00pm Webpage Source Based Covert Channel
Tarun Madiraju, Daryl Johnson, Bo Yuan, Peter Lutz
Rochester Institute of Technology, New York, USA
02:00 - 02:20pm A Covert Channel Over Transport Layer Source Ports
James R. F. Gimbe, Daryl Johnson, Peter Lutz, Bo Yuan
Rochester Institute of Technology, New York, USA
02:20 - 02:40pm Covert Channel in the BitTorrent Tracker Protocol
Joseph Desimone, Daryl Johnson, Bo Yuan, Peter Lutz
Rochester Institute of Technology, New York, USA
02:40 - 03:00pm A Physical Channel in a Digital World
Michael D. Deffenbaugh, Daryl Johnson, Bo Yuan, Peter Lutz
Rochester Institute of Technology, New York, USA
03:00 - 03:20pm BREAK
SESSION 4-SAM
SECURITY APPLICATIONS + ABUSE PREVENTION METHODS + SOFTWARE AND TOOLS
Chair: Dr. Nizar Al Holou, University of Detroit Mercy, USA
July 17, 2012 (Tuesday)
03:20pm - 06:00pm
(LOCATION: Ballroom 6)
03:20 - 03:40pm Infrared Technology Pinpoints Energy Loss in Buildings
Timmy Nguyen and Leonidas Deligiannidis
Wentworth Institute of Technology, Boston, MA, USA
03:40 - 04:00pm Software Similarity and Metamorphic Detection
Mausami Mungale and Mark Stamp
San Jose State University, San Jose, California, USA
04:00 - 04:20pm Cyber Semantic Account Management - User Behavior Modeling, Visualization and Monitoring
Keith Shapiro and Tony Stirtzinge
Securboration, Inc., Melbourne, Florida, USA
04:20 - 04:40pm Vulnerability Assessment in Cloud Computing
Srujan Kotikela, Krishna Kavi, Mahadevan Gomathisankaran
University of North Texas, Denton, Texas, USA
04:40 - 05:00pm A Deception Framework for Survivability Against Next Generation Cyber Attacks
Ruchika Mehresh and Shambhu Upadhyaya
University at Buffalo, Buffalo, New York, USA
05:00 - 05:20pm Methods for Restricting Access in a Web Application
Grant Miller and Nader Nassar
International Business Machines (IBM), Boulder, Colorado, USA
International Business Machines (IBM), Somers, New York, USA
05:20 - 05:40pm A Bayesian Network Analysis of System Failure in the Presence of Low-Probability External Correlating Events
Jack K. Horner
Independent Researcher, USA
05:40 - 06:00pm Tackling Internet Abuse in Great Britain: Towards a Framework for Classifying Severities of Flame Trolling
Jonathan Bishop
Electronic Law for Internet Empowerment Group Centre for Research into
Online Communities and E-Learning Systems, Brussels, Belgium
POSTER/DISCUSSION SESSION A-SAM
July 17, 2012 (Tuesday)
06:00 - 06:30pm
(LOCATION: Hallways of Ballrooms 1-5)
  • Portsentry for Special Occasions
    Linda Markowsky
    University of Maine, Maine, USA
  • Stroke Based Graphical Password Scheme: Passtroke
    Taehyoung Ko, Sukin Kang, Jonguk Kim, Manpyo Hong
    Division of Computer Engineering, Graduate School, Ajou University, Korea
  • Impact of Security Measures and Algorithms on Operations at Transportation Facilities
    Marguerite Zarrillo and Elijah El Lazkani
    University of Massachusetts, Dartmouth, MA, USA
  • A Study on Secure User Authentication Protocols
    Yu-jong Jang and Jin Kwak
    Korea Information Security Department, Soonchunhyang University, Korea
  • A Facial Recognition System Based on User Authentication for Mobile Office Environments
    Yun-Sang Byun, Sung Yong Ryu and Jin Kwak
    Korea Information Security Department, Soonchunhyang University, Korea
  • Robust ECC-based Three Factor User Authentication Preserving Biometric Privacy
    Tien-Ho Chen, Hsiu-Lien Yeh, Kuei-Jung Hu, and Wei-Kuan Shih
    Institute of Information System and Applications, National TsingHua University, Taiwan
  • Preliminary Study in Zoo Stability in Fingerprint Recognition
    Kevin O'Connor and Stephen Elliott
    Purdue University, USA
06:00 - 09:00pm TUTORIALS + INVITED PRESENTATIONS
(Please see the lists at the beginning of this booklet)
July 18
6:45am - 5:00pm REGISTRATION (Second Floor, Conference Lobby: 1-5)
SESSION 5-SAM
SECURITY APPLICATIONS + HARDWARE SECURITY
Chair: Dr. Kathy Liszka, University of Akron, USA
July 18, 2012 (Wednesday)
08:00am - 10:40am
(LOCATION: Ballroom 6)
08:00 - 08:20am Security in the Cloud: A Stake Holder's Perspective
Vivek Shandilya and Sajjan Shiva
University of Memphis, Memphis, TN, USA
08:20 - 08:40am Design and Analysis of Message Categorization Method - Towards Security Support System Preventing Human Errors
Shinsaku Kiyomoto, Kazuhide Fukushima, Yutaka Miyake
Information Security Laboratory, KDDI R&D Laboratories Inc., Fujimino, Saitama, Japan
08:40 - 09:00am Identifying Illegal Digital Images: An Image Watermark Approach to Preventing the Spread of Pornography
Mark Wilson, Qingzhong Liu, and Lei Chen
Sam Houston State University, Huntsville, Texas, USA
09:00 - 09:20am Cloud Computing Security Using DOSBAD: Denial of Service Bandwidth Allowance
Biswajit Panja, Dayton Paul, Priyanka Meharia, Alex Henke
University of Michigan-Flint, Flint, Michigan, USA
Eastern Michigan University, Ypsilanti, Michigan, USA
09:20 - 09:40am Electronic Identity Management Infrastructure For Trustworthy Services in E-Government and E-Commerce
Polzonetti A., Marcantoni F., Falcioni D.
School of Science and Technology University of Camerino, Italy
09:40 - 10:00am An Overview of Laws And Standards For Health Information Security and Privacy
Francis Akowuah, Xiaohong Yuan, Jinsheng Xu, Hong Wang
North Carolina A&T State University, Greensboro, North Carolina, USA
10:00 - 10:20am Design and Low Power VLSI Implementation of Triple-DES Algorithm
Alexandra Camacho, Isaac Sanchez, Eugene John and Ram Krishnan
University of Texas at San Antonio, San Antonio, Texas, USA
10:20 - 10:40am Designing and Deploying a Secured VO for a Wine Geo-traceability Application
Francois Barrere, Romain Laborde, Abdelmalek Benzekri
Laborde, Benzekri, IRIT Laboratory, Paul Sabatier University, Toulouse cedex, France
10:40 - 11:00am BREAK
SESSION 6-SAM
SPECIAL TRACK ON MISSION ASSURANCE AND CRITICAL INFRASTRUCTURE PROTECTION
Chair: Dr. Michael Grimaila, Air Force Institute of Technology, USA
July 18, 2012 (Wednesday)
11:00am - 12:20pm
(LOCATION: Ballroom 6)
11:00 - 11:20am Secure Management of Certificates for Industrial Control Systems
Sebastian Obermeier, Ragnar Schierholz, Hadeli Hadeli, Robert R. Enderlein, Ana Hristova, Thomas Locher
ABB Corporate Research, Industrial Software Systems, Baden, Switzerland
11:20 - 11:40am Information Security Analysis Using Game Theory and Simulation
Bob G. Schlicher and Robert K. Abercrombie
Oak Ridge National Laboratory, Oak Ridge, TN, USA
11:40 - 12:00pm The New Old Discipline of Cyber Security Engineering
Thomas Fuhrman
Herndon, Virginia, USA
12:00 - 12:20pm A Survey of Cyberspace Mission Assurance Within United States Air Force Communications Squadrons
Mickey Evans, Michael R. Grimaila, and Robert F. Mills
Air Force Institute of Technology, AFIT/ENV, WPAFB, Ohio, USA
12:20 - 01:20pm LUNCH (On Your Own)
SESSION 7-SAM
BIOMETRICS AND FORENSICS
Co-Chairs: Prof. Hyung-Woo Lee, Hanshin University, Republic of Korea and Dr. Lamine M. Aouad, Centre of Cybercrime Investigation, University College Dublin, Ireland
July 18, 2012 (Wednesday)
01:20pm - 04:00pm
(LOCATION: Ballroom 6)
01:20 - 01:40pm FREE SLOT
01:40 - 02:00pm Android Forensics: a Physical Approach
Lamine M. Aouad and Tahar M. Kechadi
Centre of Cybercrime Investigation, University College, Dublin, Ireland
02:00 - 02:20pm Facial Image and Voice Data Based One-Time Password (FV-OTP) Mechanism for e-Financial Authentication System on a Smart Phone
You Joung Ham, Won-Bin Choi, Hyung-Woo Lee
Hanshin University, Yangsan-dong, Osan, Gyyunggi Province, South Korea
02:20 - 02:40pm A Study of the Graphical User Interfaces for Biometric Authentication System
Hiroshi Dozono, Takayuki Inoue, and Masanori Nakakuni
Saga University, Japan; Fukuoka University, Japan
02:40 - 03:00pm Securing Sensitive Data Stored on Smartphones: Using Face Recognition to Unlock Mobile Devices
Mark Wilson and Lei Chen
Sam Houston State University, Huntsville, Texas, USA
03:00 - 03:20pm BREAK
03:20 - 03:40pm An Efficient Acceleration of Digital Fonensics Search Using GPGPU
Chung-han Chen and Fan Wu
Tuskegee University, Tuskegee, Alabama, USA
03:40 - 04:00pm Utilization of Fingerprint System in The Mobile E-Government
KyoungYul Bae, Jongwon Kim, Hyun Byun
Sangmyung University, Republic of Korea
SESSION 8-SAM
CRYPTOGRAPHIC TECHNOLOGIES + INFORMATION ASSURANCE & SECURITY
Chair: Dr. Levent Ertaul, California State University East Bay, USA
July 18, 2012 (Wednesday)
04:00pm - 06:00pm
(LOCATION: Ballroom 6)
04:00 - 04:20pm Enabling Searchable Dynamic Data Management for Group Collaboration in Cloud Storages
Fu-Kuo Tseng and Rong-Jaye Chen
National Chiao Tung University, Hsinchu, Taiwan
04:20 - 04:40pm Signature as Public Key Structured Cryptosystem and its Application
Kenichi Arai and Hiroyuki Okazaki
Tokyo University of Science, Japan; Shinshu University, Japan
04:40 - 05:00pm End-to-End Encrypting Android Phone Calls
Ian Burns, Kasimir Gabert, Jun Zheng
New Mexico Institute of Mining and Technology, New Mexico, USA
05:00 - 05:20pm Optimization Schemes for Privacy Key Management Protocol at WIMAX Network
Marjan Abdeyazdan, Vahid Arjmand, Morteza Doorandish, Mohsen Mosavi
Islamic Azad Universiy, Mahshahr, Iran
05:20 - 05:40pm Reconfigurable Steganographic System with Hidden Double Layered Authentication
G. Margarov, V. Markarov, A. Khachaturov
State Engineering University of Armenia, Yerevan, Armenia
05:40 - 06:00pm Global QoS Framework for Cloud Security: A Paradigm Shift Toward a New Trust Concept
Nabil El Kadhi and Dana Al Tehmazi
Ahlia University, Bahrain
06:00 - 09:00pm TUTORIALS + INVITED PRESENTATIONS
(Please see the lists at the beginning of this booklet)
July 19
6:45am - 5:00pm REGISTRATION (Second Floor, Conference Lobby: 1-5)
SESSION 9-SAM
SECURITY SYSTEMS AND MANAGEMENT
Co-Chairs: Amir Aryanpour, University of Bedfordshire, UK
July 19, 2012 (Thursday)
08:00am - 11:20am
(LOCATION: Ballroom 6)
08:00 - 08:20am IRS: An Issue Resolution System for Cyber Attack Classification and Management
Chris B. Simmons, Sajjan Shiva, Vinhthuy Phan, Vivek Shandilya, Lakisha Simmons
University of Memphis, Memphis, TN, USA
Indiana State University, Terre Haute, Indiana, USA
08:20 - 08:40am CamInSens - An Intelligent in-situ Security System for Public Spaces
David d'Angelo, Carsten Grenz, Colin Kuntzsch, Manfred Bogen
Fraunhofer IAIS, Schloss Birlinghoven, Sankt Augustin, Germany
Leibniz University Hannover, Hannover, Germany
08:40 - 09:00am Implementation of a Web Application for Evaluation of Web Application Security Scanners
L. Ertaul and Y. Martirosyan
California State University, East Bay, Hayward, California, USA
09:00 - 09:20am Toward Design an Interoperability Framework for Security Policy Languages
Amir Aryanpour, Song Y. Yan, Scott Davies, Andrew Harmel-law
University of Bedfordshire, UK; Technology Services, Capgemini, UK
09:20 - 09:40am Extention of Account Managment Method With Blind Signature Scheme
Ryu Watanabe and Yutaka Miyake
KDDI R&D Laboratories, Inc., Fujimino, Saitama, Japan
09:40 - 10:00am Combating Social Engineering a DoD Perspective
Nathaniel D. Amsden and Lei Chen
Sam Houston State University, Huntsville, Texas, USA
10:00 - 10:20am ISO 27001 Gap Analysis - Case Study
Ibrahim AL-Mayahi and Sa'ad P. Mansoor
Bangor University, Bangor, UK
10:20 - 10:40am BREAK
10:40 - 11:00am Zachman Framework, the Owner's Perspective and Security
Levent Ertaul and V. Rathod
California State University, East Bay, Hayward, California, USA
11:00 - 11:20am Analytical impact of the Security Techniques on Information System for Decision Making
Tejpreet Singh, Parminder Singh Nandha, Kanwaljit Singh
Khalsa College of Engg. & Tech., Punjab, India
CQ University Australia, Australia
Amritsar College of Engg. & Tech., India
SESSION 10-SAM
SECURITY APPLICATIONS + ABUSE PREVENTION METHODS + SOFTWARE & TOOLS
Chair: Dr. Nizar Al Holou, University of Detroit Mercy, USA
July 19, 2012 (Thursday)
11:20am - 12:20pm
(LOCATION: Ballroom 6)
11:20 - 11:40am A Conceptual Framework for Securing Digital I&C Systems in Nuclear Power Plants
Jung-Woon Lee, Jae-Gu Song, Cheol-Kwon Lee, and Dong-Young Lee
I&C and HF Research Division, Korea Atomic Energy Research Institute, Daejeon, Republic of Korea
11:40 - 12:00pm Sterilization of Stego-images Through Histogram Normalization
Goutam Paul and Imon Mukherjee
Jadavpur University, Kolkata, India
St. Thomas College of Engineering Technology, Kolkata, India
12:00 - 01:00pm LUNCH (On Your Own)
SESSION 11-SAM
SECURITY APPLICATIONS AND ALGORITHMS
Chair: Dr. Nizar Al Holou, University of Detroit Mercy, USA
July 19, 2012 (Thursday)
01:00pm - 03:00pm
(LOCATION: Ballroom 6)
01:00 - 01:20pm Security Concerns and Disruption Potentials Posed by a Compromised AMI Network: Risks to the Bulk Power System
Mohammed M. Olama, James Nutaro, Vladimir Protopopescu, Robert Coop
Computational Sciences & Engineering Division, Oak Ridge National Laboratory, Tennessee, USA
University of Tennessee, Knoxville, Tennessee, USA
01:20 - 01:40pm Practical Security in E-Mail Applications
Franziskus Kiefer, Alexander Wiesmaier, Christian Fritz
Technische Universitat Darmstadt, Darmstadt, Germany
AGT Group (R&D) GmbH, Darmstadt, Germany
01:40 - 02:00pm A Method For Engineering Secure Control Systems With Application To Critical Infrastructures
James Nutaro, Ike Patterson, Glenn Allgood, Teja Kuruganti, David Fugate
Oak Ridge National Laboratory, Tennessee, USA
02:00 - 02:20pm Clustering Online Social Network Communities Using Genetic Algorithms
Dipankar Dasgupta, Mustafa H. Hajeer, Alka Singh, Sugata Sanyal
University of Memphis, Memphis, Tennessee, USA
02:20 - 02:40pm Securing Your Containers: An Exercise in Secure High Performance Virtual Containers
Adam Miller and Lei Chen
Sam Houston State University, Huntsville, Texas, USA
02:40 - 03:00pm FREE SLOT
03:00 - 03:20pm BREAK
SESSION 12-SAM
(CONCURRENT SESSION WITH PART OF SESSION 14-SAM)
INFORMATION ASSURANCE, SECURITY, AND MANAGEMENT
Co-Chairs: TBA
July 19, 2012 (Thursday)
03:20pm - 04:40pm
(LOCATION: Ballroom 6)
03:20 - 03:40pm A Multi-Attribute Evaluation of Information Security Controls in Organizations Using Grey Systems Theory
Abdel Ejnioui, Angel R. Otero, Carlos E. Otero, Abrar A. Qureshi
University of South Florida Polytechnic, Lakeland, Florida, USA
Nova Southeastern University, Fort Lauderdale, Florida, USA
The University of Virginia's College at Wise, Virginia, USA
03:40 - 04:00pm Management - An Achilles Heel of Information Assurance Security: A Case Study of Verizon's Data Breach Reports
Pedro A. Diaz-Gomez, Alfonso Valencia Rodriguez and Luis E. Gomez H.
Cameron University, Lawton, Oklahoma, USA
Universidad Piloto de Colombia, Colombia
04:00 - 04:20pm Impact Evaluation and Prediction Model for Clustering Social Groups
Yanping Zhao, BaoShan Bu, Senlin Luo
Beijing Institute of Technology, Beijing, P. R. China
04:20 - 04:40pm EC- RBAC Model: Secured Access Control Model for Exigent Scenarios in Defense Systems
Syed Amanullah Quadri and Abdullah S Al Ghamd
Kingdom of Saudi Arabia, Saudi Arabia
SESSION 13-SAM
SPECIAL TRACK ON MOBILE AND EMBEDDED SYSTEM SECURITY
Co-Chairs: Dr. Christopher Bolan, SECAU - Security Research Group, Edith Cowan University, Western Australia
July 19, 2012 (Thursday)
04:40pm - ...
(LOCATION: Platinum Room)
Note: We anticipate a large number of speaker no-shows for this track (probably over 80%) due to potential delay in obtaining US visa, non registration, late papers, ... In cases of no-shows, the presentations can be moved up to close time gaps in the session. Each talk is 15 to 20 minutes long and there is a BREAK at 3:00pm for 20 minutes.
  • User Reaction Towards End User License Agreements on Android Smartphones
    Hamish Cotton and Christopher Bolan
    SECAU - Security Research Group, Edith Cowan University, Western Australia
  • A Proposed Method for Examining Wireless Device Vulnerability to Brute Force Attacks via WPS External Registrar PIN Authentication Design
    Symon Aked, Christopher Bolan, Murray Brand
    Edith Cowan University, Perth, Western Australia
    SECAU - Security Research Group, Edith Cowan University, Western Australia
  • Science or Experience: What is More Relevant?
    Ken Fowle
    SECAU - Security Research Group, Edith Cowan University, Western Australia
  • The 2011 IDN Homograph Attack Mitigation Survey
    Peter Hannay and Greg Baatard
    SECAU - Security Research Group, Edith Cowan University, Western Australia
  • An Overview of Cloud Computing and Related Security Concerns
    Krishnun Sansurooah
    SECAU - Security Research Group, Edith Cowan University, Western Australia
  • Utilising the RFID LOCK Command Against Multiple Targets
    Christopher Bolan
    SECAU - Security Research Group, Edith Cowan University, Western Australia
SESSION 14-SAM
(CONCURRENT SESSION WITH SESSIONS 12-SAM AND 13-SAM)
TOPICS IN SECURITY AND MANAGEMENT + LATE PAPERS
Co-Chairs: Dr. Sergey Morozov, University of Detroit Mercy, USA
July 19, 2012 (Thursday)
02:20pm - ...
(LOCATION: Ballroom 7)
Note: We anticipate a large number of speaker no-shows for this track (probably over 80%) due to potential delay in obtaining US visa, non registration, late papers, ... In cases of no-shows, the presentations can be moved up to close time gaps in the session. Each talk is 15 to 20 minutes long and there is a BREAK at 3:00pm for 20 minutes.
  • Novel Weight Based Intra Cluster Group Security and Key Management Applying Rivest-Shamir-Adleman Algorithm
    Dr. Meera Gandhi, K. Gomathi
    Sathyabama University, Chennai, India
  • A Steganosis Algorithm With Reversible Wavelets and Conditional Probability
    E. A. Yfantis, R. Gripentog, J. Baker, R. Young
    ICIS Laboratory and National Supercomputer Center, University of Nevada, Las Vegas, USA
  • Security Authentication Using Improved RBAC Model
    Hana Do, Sungjin Kim, Hoon Jeong, Eui-In Choi
    Hannam University, Daejeon, Korea
  • A Security and Privacy Model for Electronic Health Records
    Xuezhen Huang, Jiqiang Liu, Zhen Han
    Beijing Jiaotong University, P. R. China
  • Database Security Requirement on Cloud Computing
    Hana Do, Hoon Jeong, Sungjin Kim, Eui-In Choi
    Hannam University, Daejeon, Korea
  • An Improvement Over Chang and Lee's Electronic Voting Scheme
    Hoda Ghavamipoor, Maryam Shahpasand
    Amir Kabir University of Technology, Tehran, Iran
  • Generating Trust Policies to Enforce Data Privacy in a Research Project
    Marcel Danilescu, Laura Danilescu
    ASWIC Ltd., Romania; Danubius University of Galati, Romania
  • Resource-Efficient Multi-Source Authentication Utilizing Split-Join One-Way Key Chain
    Seonho Choi, Kun Sun, Hyeonsang Eom
    Bowie State University, Maryland, USA; George Mason University, Virginia, USA
    Seoul National University, Korea
  • Automatic Detection and Cleaning of Malware in Decentralized Peer to Peer Network
    S. Shashank, S. Rahul, S. Sathish, Grace Nivitha
    Anna University, Chennai, India
  • An Improved ID-based User Authentication with Key Agreement Scheme Using ECC for Mobile Devices
    Chao-Wen Chan, Yii-Wen Lin
    National Taichung University of Science and Technology, Taiwan
  • ZLA: Towards Zero-Leak Private Information in Online E-commerce Transactions
    Hiroshi Fujinoki, Christopher A. Chelmecki, and David M. Henry
    Southern Illinois University Edwardsville, Illinois, USA