Program

There are a number of other sessions (not listed as part of SAM'13 in this schedule) that are of potential interest to SAM'13 participants (sessions belonging to other joint conferences.) Therefore, you are encouraged to also check the schedules of other joint conferences. In particular, sessions in ICWN'13, FECS'13, ICOMP'13, and IKE'13 discuss topics that are within the scope of SAM'13; these have been scheduled so that selected SAM'13 attendees can also participate in them.

Note that each conference is divided into a number of topical sessions. These sessions are not necessarily scheduled in the same room/location. Therefore, conference attendees are to check the location of the session(s) they wish to attend; The conference room numbers (Locations) appear in this document.

July 21
03:00 - 09:00pm REGISTRATION (LOCATION: Cohiba 5)
July 22
6:30am - 5:00pm REGISTRATION (LOCATION: Cohiba 5)
08:30 - 08:45am Congress Opening Remarks - July 22, Monday
Professor Hamid R. Arabnia (Chair, Steering Committee & Coordinator)
University of Georgia, Georgia, USA
(LOCATION: Tropicana Theater)
08:50 - 09:45am Keynote Lecture 1 - July 22, Monday
Accessing and Computing Meaning
Professor Victor Raskin
Distinguished Professor of English and Linguistics
Professor of Computer Science
Purdue University, Indiana, USA
(LOCATION: Tropicana Theater)
09:55 - 10:50am Keynote Lecture 2 - July 22, Monday
Visualization and Data Mining for High Dimensional Datasets
Professor Alfred Inselberg
Professor, School of Mathematical Sciences, Tel Aviv University, Israel
Senior Fellow, San Diego Supercomputing Center
Inventor of the multidimensional system of Parallel Coordinates
Author of textbook "Parallel Coordinates: VISUAL Multidimensional Geometry", (praised by Stephen Hawking among others.)
(LOCATION: Tropicana Theater)
11:00 - 11:40am Keynote Lecture 3 - July 22, Monday
How Intellectual Property is Changing the Global Economic Landscape, and What Universities and Companies Must Do to Prepare
Dr. Sandeep Chatterjee
Chief Executive Officer (CEO), Shuv Gray LLC, USA
Named Young Global Leader for 2011 by the World Economic Forum for his "professional accomplishments, commitment to society and potential to contribute to shaping the future of the world."
(LOCATION: Tropicana Theater)
11:45 - 11:55am Information talk - July 22, Monday
Directory of Published Papers - a database
Laurance Baschkin
InterDok Media Services, USA
(LOCATION: Tropicana Theater)
12:00 - 01:00pm LUNCH (On Your Own)
SESSION 1-SAM
SECURITY MANAGEMENT + SECURITY EDUCATION + COMPUTER SECURITY + HARDWARE SECURITY
Chair: Dr. Dusan Stevanovic, York University, Toronto, Canada
July 22, 2013 (Monday)
01:00pm - 02:20pm
(LOCATION: Cohiba 11)
01:00 - 01:20pm Using Client-Side JavaScript to Mitigate Drive-by-Downloads
Abner Mendoza and Narasimha Shashidhar
Sam Houston State University, Huntsville, Texas, USA
01:20 - 01:40pm Secure NAND Flash Architecture Resilient to Strong Fault-Injection Attacks Using Algebraic Manipulation Detection Code
Pei Luo, Zhen Wang, Mark Karpovsky
Reliable Computing Lab, Electrical and Computer Engineering, Boston University, Boston, MA, USA
Mediatek Wireless, Inc., USA
01:40 - 02:00pm An Integrated Approach to Defense Against Degrading Application-Layer DDoS Attacks
Dusan Stevanovic and Natalija Vlajic
Department of Computer Science and Engineering, York University, Toronto, Canada
02:00 - 02:20pm Multi-disciplinary Approach to Cyber Security Education
Wendy A. Lawrence-Fowler
The University of Texas-Pan American, Texas, USA
SESSION 2-SAM
BIOMETRIC AND FORENSICS
Co-Chairs:
Dr. Cristina Soviany, IDES Technologies, Belgium
Dr. Gregory Vert, Texas A&M University, USA
July 22, 2013 (Monday)
02:20pm - 04:20pm
(LOCATION: Cohiba 11)
02:20 - 02:40pm Fingerprinting Malware Using Bioinformatics Tools Building a Classifier for the Zeus Virus
Jay Pedersen, Dhundy Bastola, Ken Dick, Robin Gandhi, William Mahoney
University of Nebraska at Omaha, Omaha, Nebraska, USA
02:40 - 03:00pm Combination of Fingerprint and Password System
KyoungYul Bae and Hyun Byun
Sangmyung University, Republic of Korea
03:00 - 03:20pm BREAK
03:20 - 03:40pm A Biometric Authentication System That Automatically Generates Feature Points
Hiroshi Dozono, Youki Inaba, Masanori Nakakun
Saga University, Japan
Fukuoka University, Fukuoka, Japan
03:40 - 04:00pm A Biometric Security Model with Identities Detection and Local Feature-level Fusion
Sorin Soviany and Cristina Soviany
Communications Terminals and Telematics Department, I.N.S.C.C., Bucharest, Romania
IDES Technologies, Bruxelles, Belgium
04:00 - 04:20pm Framework for Next Generation Digital Forensics Models
Mohsen M. Doroodchi and Amjad Ali
Center for Security Studies, University of Maryland, Maryland, USA
SESSION 3-SAM
COMPUTER SECURITY I
Chair: Prof. Kathy Liszka, University of Akron, USA
July 22, 2013 (Monday)
04:20pm - 05:20pm
(LOCATION: Cohiba 11)
04:20 - 04:40pm QR Code Steganography
Donny Jacob Ohana and Narasimha Shashidhar
Sam Houston State University, Huntsville, Texas, USA
04:40 - 05:00pm Dynamic Analysis of Malicious Code and Response System
Ajay Katangur, Vinay Chaitankar, Dulal Kar, Somasheker Akkaladevi
Texas A&M University-Corpus Christi, Corpus Christi, Texas, USA
Virginia State University, Petersburg, Virginia, USA
05:00 - 05:20pm Towards High Reliability of a Multi-Agent System Designed for Intrusion Detection in MANET
Leila Mechtri, Fatiha T. Djemili, Salim Ghanemi
Badji-Mokhtar University, Annaba, Algeria
06:00 - 09:00pm TUTORIALS + PANEL DISCUSSIONS
(Please see the lists at the beginning of this book)
09:10 - 11:30pm CONFERENCE RECEPTION DINNER / SOCIAL
July 22 - Monday
09:00pm - 11:45pm
(LOCATION: Pavilion)
July 23
6:45am - 5:00pm REGISTRATION (LOCATION: Cohiba 5)
SESSION 4-SAM
CRYPTOGRAPHIC TECHNOLOGIES I
Chair: Dr. Levent Ertaul, California State University, East Bay, USA
July 23, 2013 (Tuesday)
08:00am - 10:20pm
(LOCATION: Cohiba 11)
08:00 - 08:20am Towards An Efficient Protocol for Privacy and Authentication in Wireless Networks
Clifton Mulkey, Dulal Kar, Ajay Katangur
Texas A&M University-Corpus Christi, Texas, USA
08:20 - 08:40am A Robust User Authentication Scheme for Multi- Server Environment Using Smart Cards
Tien-Ho Chen, Hsiu-lien Yeh, Tseng-Yi Chen, Wei-Kuan Shih
National Tsing Hua University, Hsinchu, Taiwan
08:40 - 09:00am Secure Wireless Fax Module
Shakeel Durrani, Rida Amee, Imran Jattala, Nassar Ikram
Horizon Tech Services Islamabad, Pakistan
09:00 - 09:20am Elliptic Curve Cryptography Coprocessor for Mobile Ad-Hoc Networks
Micho Radovnikovich and Debatosh Debnath
Department of Electrical and Computer Engineering, Oakland University, Rochetser, Michigan, USA
09:20 - 09:40am Investigation of System Performance of Quantum Cryptography Key Distribution in Network Security
Mehrdad S. Sharbaf
CSUDH, Computer Science Department, Carson, California, USA
09:40 - 10:00am Securing RTP Packets Using Persistent Packet Key Encryption Scheme For Real-Time Multimedia Applications
Younchan Jung and Enrique Festijo
School of Information, Communications & Electronics Engineering, Catholic University of Korea, Gyeonggi-do, Korea
10:00 - 10:20am Using Secure Multi-Party Computation When Processing Distributed Health Data
Anders Andersen
University of Tromso, Tromso, Norway
10:20 - 11:00am POSTER/DISCUSSION SESSION A-SAM
July 23, 2013 (Tuesday)
(LOCATION: Cohiba 8-9)
  • Integrative Security for Java EE Web Applications
    Thorsten Kisner and Helge Hemmer
    Management and Engineering, AHT Group AG, Essen, Germany
  • HPA Lab: An Open-Source Educational Tool to Explore Host Protected Areas Under Linux
    L. Markowsky
    University of Maine, Orono, Maine, USA
  • Design and Implementation of Broker System for Protect Privacy Information
    Sung-Jun Kim and Joon Woo
    KISTI, Korea
SESSION 5-SAM
SYSTEMS ENGINEERING AND SECURITY + COMPUTER SECURITY + NETWORK SECURITY
Chair: Dr. Michael R. Grimaila, Air Force Institute of Technology, USA
July 23, 2013 (Tuesday)
11:00am - 12:20pm
(LOCATION: Cohiba 11)
11:00 - 11:20am New Quasigroup Based Random Number Generator
Matthew Battey, Abhishek Parakh, William Mahoney
University of Nebraska at Omaha, Omaha, Nebraska, USA
11:20 - 11:40am A Systems Engineering Approach for Assured Cyber Systems
Logan Mailloux, Brent Langhals, Michael Grimaila
Air Force Institute of Technology, AFIT/ENV, WPAFB, Ohio, USA
11:40 - 12:00pm A Load Service Structure Using a P2P Network Based Reputation System in Ad-hoc Networks
Ming-Chang Huang
University of North Carolina at Charlotte, North Carolina, USA
12:00 - 12:20pm FREE SLOT
12:20 - 01:20pm LUNCH (On Your Own)
SESSION 6-SAM
COMPUTER SECURITY II
Dr. Rita Barrios, University of Detroit Mercy, USA
July 23, 2013 (Tuesday)
01:20am - 03:00pm
(LOCATION: Cohiba 11)
01:20 - 01:40pm FREE SLOT
01:40 - 02:00pm Correlation Analysis of Cyber Threat Information in Heterogeneous Security Systems
Jae-Kook Lee and Chae-Tae Im
Applied Security Technology Team, Korea Internet and Security
Agency, Seoul, Korea
02:00 - 02:20pm Towards a Service Migration Architecture for Service Availability
Yanjun Zuo
University of North Dakota, Grand Forks, North Dakota, USA
02:20 - 02:40pm FAPA: A Model to Prevent Flooding Attacks in Clouds
Kazi Zunnurhain and Susan V. Vrbsky
The University of Alabama Tuscaloosa, Alabama, USA
02:40 - 03:00pm Detecting the Insider Threat: Going Beyond the Network Layer
Rita M. Barrios
Computer Information Systems - Cyber Security, University of Detroit Mercy, Detroit, Michigan, USA
03:00 - 03:20pm BREAK
SESSION 7-SAM
CRYPTOGRAPHIC TECHNOLOGIES II
Chair: Dr. Cristina Soviany, IDES Technologies, Belgium
July 23, 2013 (Tuesday)
03:20pm - 05:40pm
(LOCATION: Cohiba 11)
03:20 - 03:40pm Performance Evaluation of Asymmetric Algorithms in Embedded Platforms Used in WSN
Gustavo da S. Quirino, Edward David Moreno, Leila B. C. Matos
IFBA, Bahia, Brazil
UFS, Sergipe, Brazil
03:40 - 04:00pm Implementing the ECC Brainpool Curve Generation Procedure Using Open Source Software
V. Gayoso Martinez and L. Hernandez Encinas
Information Security Institute, Spanish National Research Council (CSIC), Serrano, Madrid, Spain
04:00 - 04:20pm Power and Electromagnetic Analysis Attack on a Smart Card Implementation of CLEFIA
Yongdae Kim, Jaehwan Ahn, Heebong Choi
The Attached Institute of Electronics and Telecommunications, Research Institute, Daejeon, Korea
04:20 - 04:40pm Prime Base, Prime Moduli PRN Generator
Palak Thakkar, Scott Imhoff, John Harms
Raytheon Company, Intelligence and Information Systems, Colorado, USA
04:40 - 05:00pm Cryptographic Technologies Track: Verifiable Symmetric Searchable Encryption for Multiple Groups of Users
Zachary A. Kissel and Jie Wang
University of Massachusetts Lowell, Massachusetts, USA
05:00 - 05:20pm Verifiable Dynamic Multi-Secret Sharing Scheme
Aditya Nalwaya, P. D. Vyavahare, Manish Panchal
Department of Electronics and Telecommunication Engineering, S.G.S. Institute Of Technology and Science, Indore, India
05:20 - 05:40pm Advanced Data Encryption Standard: Overcoming Deficiencies of DES
Chadi Riman and Hicham H. Hallal
Fahad Bin Sultan University Tabuk, Saudi Arabia
06:00 - 09:00pm TUTORIALS + PANEL DISCUSSIONS
(Please see the lists at the beginning of this book)
July 24
6:45am - 5:00pm REGISTRATION (LOCATION: Cohiba 5)
SESSION 8-SAM
COMPUTER AND NETWORK SECURITY
Chair: Youn Chan Jung, Catholic University of Korea, Korea
July 24, 2013 (Wednesday)
08:00am - 09:20am
(LOCATION: Cohiba 11)
08:00 - 08:20am Mobile Root Exploit Detection Based on System Events Extracted from Android Platform
You Joung Ham, Won-Bin Choi, Hyung-Woo Lee
School of Computer Engineering, Hanshin University, Republic of Korea
08:20 - 08:40am ASNM: Advanced Security Network Metrics for Attack Vector Description
Homoliak I., Barabas M., Chmelar P., Drozd M., Hanacek, P.
Brno University of Technology, Czech Republic
08:40 - 09:00am Detecting Distributed SQL Injection Attacks in a Eucalyptus Cloud Environment
Alan Kebert, Bikramjit Banerjee, Glover George, Juan Solano, and Wanda Solano
University of Southern Mississippi, Hattiesburg, Mississippi, USA
National Center for Critical Information Processing and Storage, National Aeronautics and Space Administration (NASA), Stennis Space Center, Mississippi, USA
09:00 - 09:20am A High-Throughput and Low-Complexity Secure Linear Network Coding Protocol
Majid Adeli and Huaping Liu
Oregon State University, Corvallis, Oregon, USA
SESSION 9-SAM
SECURITY APPLICATIONS
Co-Chairs:
Prof. Nizar Al Holou, University of Detroit Mercy, USA
Dr. Milica Barjaktarovic, Hawaii Pacific University, Hawaii, USA
July 24, 2013 (Wednesday)
09:20am - 10:40am
(LOCATION: Cohiba 11)
09:20 - 09:40am A Self-Protecting Security Framework for CDA Documents
George Hsieh and Ebelechukwu Nwafor
Norfolk State University, Norfolk, Virginia, USA
09:40 - 10:00am Multi-Applications Secure Mobile Platform
Hao Zhao and Sead Muftic
Royal Institute of Technology (KTH), Stockholm, Sweden
10:00 - 10:20am Social Networks Steganography Using Unions of Lucas Sequences
Nikolaos G. Aroukatos, Kostas Manes, Kostas Rigos
Department of Informatics, University of Piraeus, Greece
10:20 - 10:40am Inter-Cloud Trust Model Security
Dana Al-Tehmazi
Department of Computer Science, Ahlia University, Bahrain
10:40 - 11:00am BREAK
SESSION 10-SAM
SECURITY MANAGEMENT + SECURITY EDUCATION + HARDWARE SECURITY + SECURITY APPLICATIONS
Chair: Dr. Andrea Huszti, University of Debrecen, Hungary
July 24, 2013 (Wednesday)
11:00am - 12:20pm
(LOCATION: Cohiba 11)
11:00 - 11:20am Securing the Bolts Before the Horse has Bolted: A New Perspective on Managing Collaborative Assurance
Simon Reay Atkinson, Seyedamir Tavakolitabaezavareh, David Walker, Li Liu, Liaquat Hossain
Complex Civil Systems Research Group, Faculty of Engineering and IT, University of Sydney, Australia
11:20 - 11:40am Anonymous Retrieval of k-NN POI in Location Based Services (LBS)
Charles Asanya and Ratan Guha
University of Central Florida, Orlando, Florida, USA
11:40 - 12:00pm Cyber-security Defense in Large-scale M2M System Actual Issues and Proposed Solutions
Mohammad Fal Sadikin
DAI-Labor, Germany
12:00 - 12:20pm Multi-Vendor PayWord with Payment Approval
Andrea Huszti
Faculty of Informatics, University of Debrecen, Debrecen, Hungary
12:20 - 01:20pm LUNCH (On Your Own)
SESSION 11-SAM
INFORMATION ASSURANCE
Chair: Dr. Esmiralda Moradian, Stockholm University, Sweden
July 24, 2013 (Wednesday)
01:20pm - 04:00pm
(LOCATION: Cohiba 11)
01:20 - 01:40pm Java Design Pattern Obfuscation
Praneeth Kumar Gone and Mark Stamp
San Jose State University, California, USA
01:40 - 02:00pm A Synthetic Solution Scheme for SOA Security Assurance
Bing Xu, Tianbo Lu, Wanjiang Han, Xiaoyan Zhang, Lingling Zhao
Beijing University of Posts & Telecommunications, Beijing, P. R. China
02:00 - 02:20pm Mandatory Access Control for Web Applications and Workflows
Maxime Fonda, Christian Toinard, Stephane Moinard
Ecole Nationale Superieure, d'Ingenieurs de Bourges, Bourges, France
QualNet, Vasselay, France
02:20 - 02:40pm Decision Support for Risk Assessment of IT-Security Risks
Esmiralda Moradian and Maria Kalinina
Stockholm University, Kista, Sweden
02:40 - 03:00pm Creating Stronger Yet Easily Pronounceable Passwords
Milica Barjaktarovic
Hawaii Pacific University, Honolulu, Hawaii, USA
03:00 - 03:20pm BREAK
03:20 - 03:40pm A Flexible Role-Based Delegation Model with Dynamic Delegation Role Structure Approach
Zidong Liu, Weiqing Sun, Mansoor Alam
University of Toledo, Toledo, Ohio, USA
03:40 - 04:00pm A User-Centric Privacy-Aware Protection System
Li Yang and Travis Tynes
Department of Computer Science, University of West Georgia, Carrollton, Georgia, USA
06:00 - 09:00pm TUTORIALS + PANEL DISCUSSIONS
(Please see the lists at the beginning of this book)
July 25
6:45am - 5:00pm REGISTRATION (LOCATION: Cohiba 5)
SESSION 12-SAM
CYBERSECURITY EDUCATION
Chair: Prof. George Markowsky, University of Maine, USA
July 25, 2013 (Thursday)
08:00am - 10:00am
(LOCATION: Cohiba 11)
08:00 - 08:20am The 2013 NECCDC - Lessons Learned
George Markowsky, Daryl Johnson, Andy Moody, Ray Soucy
University of Maine, Orono, Maine, USA
08:20 - 08:40am Experiences with the Promise and Potential of Service Learning in an Online Information Security Curriculum
Raymond Albert
University of Maine at Fort Kent, Fort Kent, Maine, USA
08:40 - 09:00am Visualizing Cybersecurity Events
George Markowsky and Linda Markowsky
University of Maine, Orono, Maine, USA
09:00 - 09:20am XSS Cookie Injection Covert Channel
Kyle D. Feeney and Daryl Johnson
Networking, Security & Systems Administration, Rochester Institute of Technology, Rochester, New York, USA
09:20 - 09:40am Composite Covert Channels through EVE Online
Ross Radford and Daryl Johnson
Networking, Security & Systems Administration, Rochester Institute of Technology, Rochester, New York, USA
09:40 - 10:00am SSDP Covert Channel
Wesley Delva and Daryl Johnson
Networking, Security & Systems Administration, Rochester Institute of Technology, Rochester, New York, USA
10:00 - 10:40am BREAK
SESSION 13-SAM
NETWORK SECURITY
Co-Chairs:
Dr. Levent Ertaul, California State University East Bay, USA
Dr. Alan Kebert, The University of Southern Mississippi, USA
July 25, 2013 (Thursday)
10:40am - 01:00pm
(LOCATION: Cohiba 11)
10:40 - 11:00am Private Proximity Testing for Location Based Services
L. Ertaul, A. Balluru, A. Perumalsamy
Math and Computer Science Department, California State University, East Bay, California, USA
11:00 - 11:20am DROP-FAST: Using Cloud for Defending Against DDoS
Rashad Aliyev, Dongwon Seo, Heejo Lee
Department of Computer Science and Engineering, Korea University, Seoul, Republic of Korea
11:20 - 11:40am Challenges of Kerberos Variance in with High QoS Expectations
Yoney Kirsal-Ever, Yonal Kirsal, Alberto Polzonetti, Leonardo Mostarda, and Enver Ever
School of Science & Technology, Middlesex University, London, UK
School of Science & Technology, University of Camerino, Italy
11:40 - 12:00pm Port Knocking - An Additional Layer of Security for SSH and HTTPS
Jigar A. Raval and Samuel Johnson
Computer Center, Physical Research Laboratory, Gujarat, India
12:00 - 12:20pm Implementation of Boneh Protocol 3 in Location Based Services (LBS) to Provide Proximity Services
L. Ertaul, N. Shaikh, S. Kotipalli
California State University East Bay, Hayward, California, USA
12:20 - 01:00pm Privacy-Aware Proximity Based Service Using Hide and Crypt Protocol: Implementation
L. Ertaul, B. F. S. Imagnu, S. Kilaru
California State University East Bay, Hayward, California, USA