The 4th International
Conference on Security of Information and Networks
(SIN 2011), 14-19
November 2011
Sydney, Australia
Conference
Program
Monday, 14th Nov, 2011
|
||
08:30 09:00 |
Arrival Refreshment |
|
09:00 10:00 |
Invited Talk I (Session Chair: Mehmet Orgun) · Fault Tolerance for Fight-Through Dr Kevin Kwiat,, Principal Computer Engineer, The Cyber Science Branch of the U.S. Air Force Research Laboratory (AFRL), Rome, New York, USA |
|
10:00 10:30 |
Morning Tea |
|
|
ROOM 3 |
ROOM 4 |
|
NETWORK SECURITY (Session Chair: Rajan Shankaran) |
CRYPTOGRAPY (Session Chair: Ron Steinfeld) |
10:30 11:05
|
· Corporate networks security evaluation based on attack graphs Evgeny Abramov; Artem Andreev; Denis Mordvin; Oleg Makarevich |
· Using Decision Trees for Generating Adaptive SPIT Signatures Mohamed Nassar; Sylvain Martin; Guy Leduc; Olivier Festor |
11:05 11:40
|
· Deploying secure satellite networks Wolfgang Fritsche
|
· A different algebraic analysis on ZUC stream cipher Mufeed ALMashrafi (Kenneth Wong will prsent the paper for Mufeed) |
11:40 12:05
|
· Research on Survivability Metrics Based on Survivable Process of Network System Liang Ming; Minhuan Huang; Dongxia Wang; Xiaohui Kuang; Chunlei Wang; Xuewei Feng |
· Algebraic analysis of the SSS stream cipher Mufeed ALMashrafi; Kenneth Wong; Leonie Simpson; Harry Bartlett; Ed Dawson |
12:05 13:30 |
Lunch |
|
|
ROOM 3 |
ROOM 4 |
|
NETWORK SECURITY (Session Chair: Mehmet Orgun) |
ACCESS CONTROL (Session Chair: Michael Hitchens) |
13:30 14:05
|
· Rational distance-bounding protocols over noisy channels Long Nguyen |
· Logic Based Authorization Program and Its implementation Chun Ruan; Seyed Shahrestani |
14:05 14:40
|
· Trust based Fusion over Noisy Channels through Anomaly Detection in Cognitive Radio Network Shameek Bhattacharjee; Saptarshi Debroy; Mainak Chatterjee; Kevin Kwiat |
· Model checking security policy model using both UML static and dynamic diagrams Liang Cheng; Yang Zhang
|
14:40 15:05
|
· piMANET - A Policy Integrated Security Framework for Mobile Ad Hoc Network Soumya Maity; Padmalochan Bera; Soumya Ghosh |
· Proposal and Implementation of Enhanced Authentication that Enables Self-Wipe Zhaogong Guo; Kouichi Yasaki; Yousuke Nakamura; Kazuaki Nimura; Isamu Yamada |
15:05 15:35
|
Afternoon Tea |
|
|
ROOM 3 |
ROOM 4 |
|
NETWORK SECURITY (Session Chair: Atilla Elηl) |
CRYPTOGRAPY (Session Chair: Josef Pieprzyk) |
15:35 16:10
|
· Security Analysis of a Femtocell device Ravishankar Borgaonkar; Kevin Redon; Jean-Pierre Seifert |
· Cryptanalysis of the Stream Cipher BEAN Martin Εgren; Martin Hell |
16:10 16:45
|
· Counteracting DDoS Attacks in WLAN Udaya Tupakula; Vijay Varadharajan; Sunil Vuppala |
· The Optimal Linear Multi-Secret Sharing Scheme for Non-Threshold Access Structure Chunming Tang; Shuguang Dai; Yuenai Chen |
16:45 17:10
|
· Acceleration of Packet Filtering using GPGPU Lakshminarayanan V.; Kamal Cahndra; Mark Zwolinski; Manoj Gaur; Vijay Laxmi |
· Different Models of Information Protection System, Based On The Functional Knapsack Valeriy Osipyan |
19:00 |
Reception Belgian Beer Cafι |
Tuesday, 15th Nov, 2011
|
||
09:00 10:00 |
Invited Talk II (Session Chair: Josef Pieprzyk) · Rethinking Cyber Security Professor Vijay Varadharajan, |
|
10:00 10:30 |
Morning Tea |
|
|
ROOM 3 |
ROOM 4 |
|
NETWORK SECURITY (Session Chair: Mehmet Orgun) |
CRYPTOGRAPY & COMPUTER SECURITY (Session Chair: Rajan Shankaran) |
10:30 11:05
|
· A Secure and Anonymous Cooperative Sensing Protocol for Cognitive Radio Networks Helena Rifa-Pous; Carles Garrigues |
· Algebraic analysis of GOST encryption algorithm Ekaterina Maro; Evgeniya Ishchukova; Ludmila Babenko |
11:05 11:40
|
· Detour Attack In OLSR Manish Kumar; Rajbir Kaur; Vijay Laxmi; Manoj Gaur
|
· Fault Attack to the Elliptic Curve Digital Signature Algorithm with Multiple Bit Faults Gerardo Pelosi; Alessandro Barenghi; Andrea Palomba; Luca Breveglieri; Guido Bertoni |
11:40 12:05
|
· Towards Hiding Federated Digital Identity: Stop-Dissemination Mechanism in Content Centric Internetworking Amine Elabidi; Ghazi Ben Ayed; Sonia Mettali Gammar; Farouk Kamoun |
· Exploration of a Hand-based Graphical Password Scheme Haichang Gao; Lichang Ma; Jinhua Qiu; Xiyang Liu |
12:05 13:30 |
Lunch |
|
|
ROOM 3 |
ROOM 4 |
|
COMPUTER SECURITY (Session Chair: Atilla Elηl) |
WATER MARKING (Session Chair: Josef Pieprzyk) |
13:30 14:05
|
· On Automatic Detection of SQL Injection Attacks by the Feature Extraction of the Single Character Michio Sonoda; Takeshi Matsuda; Daiki Koizumi; Shigeichi Hirasawa |
· Collusion Resistant Fingerprinting of Digital Audio Andrew Tirkel; Tomas Hall; Charles Osborne; Nicholas Meinhold; Oscar Moreno |
14:05 14:40
|
· A Model-Based Attack Injection Approach for Security Validation Anderson Morais; Ana Cavalli; Eliane Martins |
· Echo Hiding Based Stereo Audio Watermarking Against Pitch-Scaling Attacks Iynkaran Natgunanathan; Yong Xiang |
14:40 15:05
|
· An approach to enhance the security of remote health monitoring systems Mahmoud Elkhodr; Seyed Shahrestani; Hon Cheung |
· On the Security and Practicality of a Buyer Seller Watermarking Protocol for DRM Geong Sen Poh; Muhammad Reza Z'aba |
15:05 -15:35 |
Afternoon Tea |
|
|
ROOM 3 |
ROOM 4 |
|
NETWORK SECURITY (Session Chair: Atilla Elηl) |
COMPUTER SECURITY (Session Chair: Josef Pieprzyk) |
15:35 16:10
|
· Detection of Neighbor Solicitation and Advertisement Spoofing in IPv6 Neighbor Discovery Protocol Ferdous Barbhuiya; Santosh Biswas; Sukumar Nandi |
· TW-KEAP: An Efficient Four-Party Key Exchange Protocol for End-to-End Communications Wei-Kuo Chiang;Jian-Hao Chen |
16:10 16:45
|
· A Sybil Attack Detection Approach using Neighboring Vehicles in VANET Jyoti Grover;Nitesh Prajapati;Manoj Gaur;Vijay LaxmI |
· Secure Random Number Generation in Wireless Sensor Networks Fabrizio Milazzo; Giuseppe Lo Re; Marco Ortolani |
16:45 17:10
|
· WinSEND: Windows SEcure Neighbor Discovery Ahmad Alsa'deh; Hosnieh Rafiee; Christoph Meinel |
· Extending the scope of CardSpace Haitham Al-Sinani; Chris Mitchell |
19:00 |
BANQUET |
Wednesday, 16th Nov, 2011
|
||
|
ROOM 3 |
ROOM 4 |
|
NETWORK SECURITY (Session Chair: Josef Pieprzyk) |
|
09:00 09:35 |
· A HTTP Cookie Covert Channel Bo Yuan; William Huba; Daryl Johnson; Peter Lutz |
|
09:35 10:10 |
· Improving Operation Time Bounded Mission Critical Systems' Attack-Survivability through Controlled Source-Code Transformation Alban Vignaux; Arnaud Auguste; Korel Bogdan; Shangpin Ren; Kevin Kwiat |
|
10:10 10:40 |
Morning Tea |
|
|
ROOM 3 |
ROOM 4 |
|
NETWORK and COMPUTER SECURITY (Session Chair: Mehmet Orgun) |
|
10:40 11:05
|
· On the Impacts of Join and Leave on the Propagation Ratio of Topology -Aware Active Worms Ahmad Jafarabadi; Mohammad Abdollahi Azgomi |
|
11:05 11:30
|
· Counterfactually Reasoning About Security Manuel Peralta; Supratik Mukhopadhyay; Ramesh Bharadwaj |
|
11:30 11:55
|
· Obscurity of Network Security Course Curriculum Suleyman Kondakci |
|
11:55 12:20
|
· Microcontroller-Based Implementation of parseKey+ for Limited Resources Embedded ApplicationS Atilla Elηl; Behnam Rahnama; Reza Makvandi |
|
12:20 12:45 |
· Formal Analysis of Usage Control Policies Boulares Ouchenne; Ousmane Kone |
|
|
Closing Drinks |