Program
There are a number of other sessions (not listed as part of SAM'13 in this schedule) that are of potential interest to SAM'13 participants (sessions belonging to other joint conferences.) Therefore, you are encouraged to also check the schedules of other joint conferences. In particular, sessions in ICWN'13, FECS'13, ICOMP'13, and IKE'13 discuss topics that are within the scope of SAM'13; these have been scheduled so that selected SAM'13 attendees can also participate in them.
Note that each conference is divided into a number of topical sessions. These sessions are not necessarily scheduled in the same room/location. Therefore, conference attendees are to check the location of the session(s) they wish to attend; The conference room numbers (Locations) appear in this document.
July 21 | |
---|---|
03:00 - 09:00pm | REGISTRATION (LOCATION: Cohiba 5) |
July 22 | |
6:30am - 5:00pm | REGISTRATION (LOCATION: Cohiba 5) |
08:30 - 08:45am |
Congress Opening Remarks - July 22, Monday Professor Hamid R. Arabnia (Chair, Steering Committee & Coordinator) University of Georgia, Georgia, USA (LOCATION: Tropicana Theater) |
08:50 - 09:45am |
Keynote Lecture 1 - July 22, Monday Accessing and Computing Meaning Professor Victor Raskin Distinguished Professor of English and Linguistics Professor of Computer Science Purdue University, Indiana, USA (LOCATION: Tropicana Theater) |
09:55 - 10:50am |
Keynote Lecture 2 - July 22, Monday Visualization and Data Mining for High Dimensional Datasets Professor Alfred Inselberg Professor, School of Mathematical Sciences, Tel Aviv University, Israel Senior Fellow, San Diego Supercomputing Center Inventor of the multidimensional system of Parallel Coordinates Author of textbook "Parallel Coordinates: VISUAL Multidimensional Geometry", (praised by Stephen Hawking among others.) (LOCATION: Tropicana Theater) |
11:00 - 11:40am |
Keynote Lecture 3 - July 22, Monday How Intellectual Property is Changing the Global Economic Landscape, and What Universities and Companies Must Do to Prepare Dr. Sandeep Chatterjee Chief Executive Officer (CEO), Shuv Gray LLC, USA Named Young Global Leader for 2011 by the World Economic Forum for his "professional accomplishments, commitment to society and potential to contribute to shaping the future of the world." (LOCATION: Tropicana Theater) |
11:45 - 11:55am |
Information talk - July 22, Monday Directory of Published Papers - a database Laurance Baschkin InterDok Media Services, USA (LOCATION: Tropicana Theater) |
12:00 - 01:00pm | LUNCH (On Your Own) |
SESSION 1-SAM SECURITY MANAGEMENT + SECURITY EDUCATION + COMPUTER SECURITY + HARDWARE SECURITY Chair: Dr. Dusan Stevanovic, York University, Toronto, Canada July 22, 2013 (Monday) 01:00pm - 02:20pm (LOCATION: Cohiba 11) |
|
01:00 - 01:20pm |
Using Client-Side JavaScript to Mitigate Drive-by-Downloads Abner Mendoza and Narasimha Shashidhar Sam Houston State University, Huntsville, Texas, USA |
01:20 - 01:40pm |
Secure NAND Flash Architecture Resilient to Strong Fault-Injection Attacks Using Algebraic Manipulation Detection Code Pei Luo, Zhen Wang, Mark Karpovsky Reliable Computing Lab, Electrical and Computer Engineering, Boston University, Boston, MA, USA Mediatek Wireless, Inc., USA |
01:40 - 02:00pm |
An Integrated Approach to Defense Against Degrading Application-Layer DDoS Attacks Dusan Stevanovic and Natalija Vlajic Department of Computer Science and Engineering, York University, Toronto, Canada |
02:00 - 02:20pm |
Multi-disciplinary Approach to Cyber Security Education Wendy A. Lawrence-Fowler The University of Texas-Pan American, Texas, USA |
SESSION 2-SAM BIOMETRIC AND FORENSICS Co-Chairs: Dr. Cristina Soviany, IDES Technologies, Belgium Dr. Gregory Vert, Texas A&M University, USA July 22, 2013 (Monday) 02:20pm - 04:20pm (LOCATION: Cohiba 11) |
|
02:20 - 02:40pm |
Fingerprinting Malware Using Bioinformatics Tools Building a Classifier for the Zeus Virus Jay Pedersen, Dhundy Bastola, Ken Dick, Robin Gandhi, William Mahoney University of Nebraska at Omaha, Omaha, Nebraska, USA |
02:40 - 03:00pm |
Combination of Fingerprint and Password System KyoungYul Bae and Hyun Byun Sangmyung University, Republic of Korea |
03:00 - 03:20pm | BREAK |
03:20 - 03:40pm |
A Biometric Authentication System That Automatically Generates Feature Points Hiroshi Dozono, Youki Inaba, Masanori Nakakun Saga University, Japan Fukuoka University, Fukuoka, Japan |
03:40 - 04:00pm |
A Biometric Security Model with Identities Detection and Local Feature-level Fusion Sorin Soviany and Cristina Soviany Communications Terminals and Telematics Department, I.N.S.C.C., Bucharest, Romania IDES Technologies, Bruxelles, Belgium |
04:00 - 04:20pm |
Framework for Next Generation Digital Forensics Models Mohsen M. Doroodchi and Amjad Ali Center for Security Studies, University of Maryland, Maryland, USA |
SESSION 3-SAM COMPUTER SECURITY I Chair: Prof. Kathy Liszka, University of Akron, USA July 22, 2013 (Monday) 04:20pm - 05:20pm (LOCATION: Cohiba 11) |
|
04:20 - 04:40pm |
QR Code Steganography Donny Jacob Ohana and Narasimha Shashidhar Sam Houston State University, Huntsville, Texas, USA |
04:40 - 05:00pm |
Dynamic Analysis of Malicious Code and Response System Ajay Katangur, Vinay Chaitankar, Dulal Kar, Somasheker Akkaladevi Texas A&M University-Corpus Christi, Corpus Christi, Texas, USA Virginia State University, Petersburg, Virginia, USA |
05:00 - 05:20pm |
Towards High Reliability of a Multi-Agent System Designed for Intrusion Detection in MANET Leila Mechtri, Fatiha T. Djemili, Salim Ghanemi Badji-Mokhtar University, Annaba, Algeria |
06:00 - 09:00pm |
TUTORIALS + PANEL DISCUSSIONS (Please see the lists at the beginning of this book) |
09:10 - 11:30pm |
CONFERENCE RECEPTION DINNER / SOCIAL July 22 - Monday 09:00pm - 11:45pm (LOCATION: Pavilion) |
July 23 | |
6:45am - 5:00pm | REGISTRATION (LOCATION: Cohiba 5) |
SESSION 4-SAM CRYPTOGRAPHIC TECHNOLOGIES I Chair: Dr. Levent Ertaul, California State University, East Bay, USA July 23, 2013 (Tuesday) 08:00am - 10:20pm (LOCATION: Cohiba 11) |
|
08:00 - 08:20am |
Towards An Efficient Protocol for Privacy and Authentication in Wireless Networks Clifton Mulkey, Dulal Kar, Ajay Katangur Texas A&M University-Corpus Christi, Texas, USA |
08:20 - 08:40am |
A Robust User Authentication Scheme for Multi- Server Environment Using Smart Cards Tien-Ho Chen, Hsiu-lien Yeh, Tseng-Yi Chen, Wei-Kuan Shih National Tsing Hua University, Hsinchu, Taiwan |
08:40 - 09:00am |
Secure Wireless Fax Module Shakeel Durrani, Rida Amee, Imran Jattala, Nassar Ikram Horizon Tech Services Islamabad, Pakistan |
09:00 - 09:20am |
Elliptic Curve Cryptography Coprocessor for Mobile Ad-Hoc Networks Micho Radovnikovich and Debatosh Debnath Department of Electrical and Computer Engineering, Oakland University, Rochetser, Michigan, USA |
09:20 - 09:40am |
Investigation of System Performance of Quantum Cryptography Key Distribution in Network Security Mehrdad S. Sharbaf CSUDH, Computer Science Department, Carson, California, USA |
09:40 - 10:00am |
Securing RTP Packets Using Persistent Packet Key Encryption Scheme For Real-Time Multimedia Applications Younchan Jung and Enrique Festijo School of Information, Communications & Electronics Engineering, Catholic University of Korea, Gyeonggi-do, Korea |
10:00 - 10:20am |
Using Secure Multi-Party Computation When Processing Distributed Health Data Anders Andersen University of Tromso, Tromso, Norway |
10:20 - 11:00am |
POSTER/DISCUSSION SESSION A-SAM July 23, 2013 (Tuesday) (LOCATION: Cohiba 8-9) |
|
|
SESSION 5-SAM SYSTEMS ENGINEERING AND SECURITY + COMPUTER SECURITY + NETWORK SECURITY Chair: Dr. Michael R. Grimaila, Air Force Institute of Technology, USA July 23, 2013 (Tuesday) 11:00am - 12:20pm (LOCATION: Cohiba 11) |
|
11:00 - 11:20am |
New Quasigroup Based Random Number Generator Matthew Battey, Abhishek Parakh, William Mahoney University of Nebraska at Omaha, Omaha, Nebraska, USA |
11:20 - 11:40am |
A Systems Engineering Approach for Assured Cyber Systems Logan Mailloux, Brent Langhals, Michael Grimaila Air Force Institute of Technology, AFIT/ENV, WPAFB, Ohio, USA |
11:40 - 12:00pm |
A Load Service Structure Using a P2P Network Based Reputation System in Ad-hoc Networks Ming-Chang Huang University of North Carolina at Charlotte, North Carolina, USA |
12:00 - 12:20pm | FREE SLOT |
12:20 - 01:20pm | LUNCH (On Your Own) |
SESSION 6-SAM COMPUTER SECURITY II Dr. Rita Barrios, University of Detroit Mercy, USA July 23, 2013 (Tuesday) 01:20am - 03:00pm (LOCATION: Cohiba 11) |
|
01:20 - 01:40pm | FREE SLOT |
01:40 - 02:00pm |
Correlation Analysis of Cyber Threat Information in Heterogeneous Security Systems Jae-Kook Lee and Chae-Tae Im Applied Security Technology Team, Korea Internet and Security Agency, Seoul, Korea |
02:00 - 02:20pm |
Towards a Service Migration Architecture for Service Availability Yanjun Zuo University of North Dakota, Grand Forks, North Dakota, USA |
02:20 - 02:40pm |
FAPA: A Model to Prevent Flooding Attacks in Clouds Kazi Zunnurhain and Susan V. Vrbsky The University of Alabama Tuscaloosa, Alabama, USA |
02:40 - 03:00pm |
Detecting the Insider Threat: Going Beyond the Network Layer Rita M. Barrios Computer Information Systems - Cyber Security, University of Detroit Mercy, Detroit, Michigan, USA |
03:00 - 03:20pm | BREAK |
SESSION 7-SAM CRYPTOGRAPHIC TECHNOLOGIES II Chair: Dr. Cristina Soviany, IDES Technologies, Belgium July 23, 2013 (Tuesday) 03:20pm - 05:40pm (LOCATION: Cohiba 11) |
|
03:20 - 03:40pm |
Performance Evaluation of Asymmetric Algorithms in Embedded Platforms Used in WSN Gustavo da S. Quirino, Edward David Moreno, Leila B. C. Matos IFBA, Bahia, Brazil UFS, Sergipe, Brazil |
03:40 - 04:00pm |
Implementing the ECC Brainpool Curve Generation Procedure Using Open Source Software V. Gayoso Martinez and L. Hernandez Encinas Information Security Institute, Spanish National Research Council (CSIC), Serrano, Madrid, Spain |
04:00 - 04:20pm |
Power and Electromagnetic Analysis Attack on a Smart Card Implementation of CLEFIA Yongdae Kim, Jaehwan Ahn, Heebong Choi The Attached Institute of Electronics and Telecommunications, Research Institute, Daejeon, Korea |
04:20 - 04:40pm |
Prime Base, Prime Moduli PRN Generator Palak Thakkar, Scott Imhoff, John Harms Raytheon Company, Intelligence and Information Systems, Colorado, USA |
04:40 - 05:00pm |
Cryptographic Technologies Track: Verifiable Symmetric Searchable Encryption for Multiple Groups of Users Zachary A. Kissel and Jie Wang University of Massachusetts Lowell, Massachusetts, USA |
05:00 - 05:20pm |
Verifiable Dynamic Multi-Secret Sharing Scheme Aditya Nalwaya, P. D. Vyavahare, Manish Panchal Department of Electronics and Telecommunication Engineering, S.G.S. Institute Of Technology and Science, Indore, India |
05:20 - 05:40pm |
Advanced Data Encryption Standard: Overcoming Deficiencies of DES Chadi Riman and Hicham H. Hallal Fahad Bin Sultan University Tabuk, Saudi Arabia |
06:00 - 09:00pm |
TUTORIALS + PANEL DISCUSSIONS (Please see the lists at the beginning of this book) |
July 24 | |
6:45am - 5:00pm | REGISTRATION (LOCATION: Cohiba 5) |
SESSION 8-SAM COMPUTER AND NETWORK SECURITY Chair: Youn Chan Jung, Catholic University of Korea, Korea July 24, 2013 (Wednesday) 08:00am - 09:20am (LOCATION: Cohiba 11) |
|
08:00 - 08:20am |
Mobile Root Exploit Detection Based on System Events Extracted from Android Platform You Joung Ham, Won-Bin Choi, Hyung-Woo Lee School of Computer Engineering, Hanshin University, Republic of Korea |
08:20 - 08:40am |
ASNM: Advanced Security Network Metrics for Attack Vector Description Homoliak I., Barabas M., Chmelar P., Drozd M., Hanacek, P. Brno University of Technology, Czech Republic |
08:40 - 09:00am |
Detecting Distributed SQL Injection Attacks in a Eucalyptus Cloud Environment Alan Kebert, Bikramjit Banerjee, Glover George, Juan Solano, and Wanda Solano University of Southern Mississippi, Hattiesburg, Mississippi, USA National Center for Critical Information Processing and Storage, National Aeronautics and Space Administration (NASA), Stennis Space Center, Mississippi, USA |
09:00 - 09:20am |
A High-Throughput and Low-Complexity Secure Linear Network Coding Protocol Majid Adeli and Huaping Liu Oregon State University, Corvallis, Oregon, USA |
SESSION 9-SAM SECURITY APPLICATIONS Co-Chairs: Prof. Nizar Al Holou, University of Detroit Mercy, USA Dr. Milica Barjaktarovic, Hawaii Pacific University, Hawaii, USA July 24, 2013 (Wednesday) 09:20am - 10:40am (LOCATION: Cohiba 11) |
|
09:20 - 09:40am |
A Self-Protecting Security Framework for CDA Documents George Hsieh and Ebelechukwu Nwafor Norfolk State University, Norfolk, Virginia, USA |
09:40 - 10:00am |
Multi-Applications Secure Mobile Platform Hao Zhao and Sead Muftic Royal Institute of Technology (KTH), Stockholm, Sweden |
10:00 - 10:20am |
Social Networks Steganography Using Unions of Lucas Sequences Nikolaos G. Aroukatos, Kostas Manes, Kostas Rigos Department of Informatics, University of Piraeus, Greece |
10:20 - 10:40am |
Inter-Cloud Trust Model Security Dana Al-Tehmazi Department of Computer Science, Ahlia University, Bahrain |
10:40 - 11:00am | BREAK |
SESSION 10-SAM SECURITY MANAGEMENT + SECURITY EDUCATION + HARDWARE SECURITY + SECURITY APPLICATIONS Chair: Dr. Andrea Huszti, University of Debrecen, Hungary July 24, 2013 (Wednesday) 11:00am - 12:20pm (LOCATION: Cohiba 11) |
|
11:00 - 11:20am |
Securing the Bolts Before the Horse has Bolted: A New Perspective on Managing Collaborative Assurance Simon Reay Atkinson, Seyedamir Tavakolitabaezavareh, David Walker, Li Liu, Liaquat Hossain Complex Civil Systems Research Group, Faculty of Engineering and IT, University of Sydney, Australia |
11:20 - 11:40am |
Anonymous Retrieval of k-NN POI in Location Based Services (LBS) Charles Asanya and Ratan Guha University of Central Florida, Orlando, Florida, USA |
11:40 - 12:00pm |
Cyber-security Defense in Large-scale M2M System Actual Issues and Proposed Solutions Mohammad Fal Sadikin DAI-Labor, Germany |
12:00 - 12:20pm |
Multi-Vendor PayWord with Payment Approval Andrea Huszti Faculty of Informatics, University of Debrecen, Debrecen, Hungary |
12:20 - 01:20pm | LUNCH (On Your Own) |
SESSION 11-SAM INFORMATION ASSURANCE Chair: Dr. Esmiralda Moradian, Stockholm University, Sweden July 24, 2013 (Wednesday) 01:20pm - 04:00pm (LOCATION: Cohiba 11) |
|
01:20 - 01:40pm |
Java Design Pattern Obfuscation Praneeth Kumar Gone and Mark Stamp San Jose State University, California, USA |
01:40 - 02:00pm |
A Synthetic Solution Scheme for SOA Security Assurance Bing Xu, Tianbo Lu, Wanjiang Han, Xiaoyan Zhang, Lingling Zhao Beijing University of Posts & Telecommunications, Beijing, P. R. China |
02:00 - 02:20pm |
Mandatory Access Control for Web Applications and Workflows Maxime Fonda, Christian Toinard, Stephane Moinard Ecole Nationale Superieure, d'Ingenieurs de Bourges, Bourges, France QualNet, Vasselay, France |
02:20 - 02:40pm |
Decision Support for Risk Assessment of IT-Security Risks Esmiralda Moradian and Maria Kalinina Stockholm University, Kista, Sweden |
02:40 - 03:00pm |
Creating Stronger Yet Easily Pronounceable Passwords Milica Barjaktarovic Hawaii Pacific University, Honolulu, Hawaii, USA |
03:00 - 03:20pm | BREAK |
03:20 - 03:40pm |
A Flexible Role-Based Delegation Model with Dynamic Delegation Role Structure Approach Zidong Liu, Weiqing Sun, Mansoor Alam University of Toledo, Toledo, Ohio, USA |
03:40 - 04:00pm |
A User-Centric Privacy-Aware Protection System Li Yang and Travis Tynes Department of Computer Science, University of West Georgia, Carrollton, Georgia, USA |
06:00 - 09:00pm |
TUTORIALS + PANEL DISCUSSIONS (Please see the lists at the beginning of this book) |
July 25 | |
6:45am - 5:00pm | REGISTRATION (LOCATION: Cohiba 5) |
SESSION 12-SAM CYBERSECURITY EDUCATION Chair: Prof. George Markowsky, University of Maine, USA July 25, 2013 (Thursday) 08:00am - 10:00am (LOCATION: Cohiba 11) |
|
08:00 - 08:20am |
The 2013 NECCDC - Lessons Learned George Markowsky, Daryl Johnson, Andy Moody, Ray Soucy University of Maine, Orono, Maine, USA |
08:20 - 08:40am |
Experiences with the Promise and Potential of Service Learning in an Online Information Security Curriculum Raymond Albert University of Maine at Fort Kent, Fort Kent, Maine, USA |
08:40 - 09:00am |
Visualizing Cybersecurity Events George Markowsky and Linda Markowsky University of Maine, Orono, Maine, USA |
09:00 - 09:20am |
XSS Cookie Injection Covert Channel Kyle D. Feeney and Daryl Johnson Networking, Security & Systems Administration, Rochester Institute of Technology, Rochester, New York, USA |
09:20 - 09:40am |
Composite Covert Channels through EVE Online Ross Radford and Daryl Johnson Networking, Security & Systems Administration, Rochester Institute of Technology, Rochester, New York, USA |
09:40 - 10:00am |
SSDP Covert Channel Wesley Delva and Daryl Johnson Networking, Security & Systems Administration, Rochester Institute of Technology, Rochester, New York, USA |
10:00 - 10:40am | BREAK |
SESSION 13-SAM NETWORK SECURITY Co-Chairs: Dr. Levent Ertaul, California State University East Bay, USA Dr. Alan Kebert, The University of Southern Mississippi, USA July 25, 2013 (Thursday) 10:40am - 01:00pm (LOCATION: Cohiba 11) |
|
10:40 - 11:00am |
Private Proximity Testing for Location Based Services L. Ertaul, A. Balluru, A. Perumalsamy Math and Computer Science Department, California State University, East Bay, California, USA |
11:00 - 11:20am |
DROP-FAST: Using Cloud for Defending Against DDoS Rashad Aliyev, Dongwon Seo, Heejo Lee Department of Computer Science and Engineering, Korea University, Seoul, Republic of Korea |
11:20 - 11:40am |
Challenges of Kerberos Variance in with High QoS Expectations Yoney Kirsal-Ever, Yonal Kirsal, Alberto Polzonetti, Leonardo Mostarda, and Enver Ever School of Science & Technology, Middlesex University, London, UK School of Science & Technology, University of Camerino, Italy |
11:40 - 12:00pm |
Port Knocking - An Additional Layer of Security for SSH and HTTPS Jigar A. Raval and Samuel Johnson Computer Center, Physical Research Laboratory, Gujarat, India |
12:00 - 12:20pm |
Implementation of Boneh Protocol 3 in Location Based Services (LBS) to Provide Proximity Services L. Ertaul, N. Shaikh, S. Kotipalli California State University East Bay, Hayward, California, USA |
12:20 - 01:00pm |
Privacy-Aware Proximity Based Service Using Hide and Crypt Protocol: Implementation L. Ertaul, B. F. S. Imagnu, S. Kilaru California State University East Bay, Hayward, California, USA |