The 4th International Conference on Security of Information and Networks

(SIN 2011), 14-19 November 2011

Sydney, Australia

 

Conference Program 

 

Monday,  14th Nov, 2011

 

08:30 – 09:00

Arrival Refreshment

09:00 – 10:00

Invited Talk I (Session Chair: Mehmet Orgun)

·         Fault Tolerance for Fight-Through   

Dr Kevin Kwiat,,

        Principal Computer Engineer, The Cyber Science Branch of the U.S. Air Force Research

        Laboratory (AFRL), Rome, New York, USA

10:00 – 10:30

Morning Tea

 

ROOM 3

ROOM 4

 

NETWORK SECURITY

(Session Chair: Rajan Shankaran)

CRYPTOGRAPY

(Session Chair: Ron Steinfeld)

10:30 – 11:05

 

·         Corporate networks security evaluation based on attack graphs

Evgeny Abramov; Artem Andreev; Denis  Mordvin; Oleg Makarevich

·         Using Decision Trees for Generating Adaptive SPIT Signatures

Mohamed Nassar; Sylvain Martin; Guy Leduc; Olivier Festor

11:05 – 11:40

 

·         Deploying secure satellite networks

Wolfgang Fritsche

 

·         A different algebraic analysis on ZUC stream cipher

Mufeed ALMashrafi (Kenneth Wong will prsent the paper for Mufeed)

11:40 – 12:05

 

·         Research on Survivability Metrics Based on Survivable Process of Network System

Liang Ming; Minhuan Huang; Dongxia Wang; Xiaohui Kuang; Chunlei Wang; Xuewei Feng

·         Algebraic analysis of the SSS stream cipher

Mufeed ALMashrafi; Kenneth Wong; Leonie Simpson; Harry Bartlett; Ed Dawson

12:05 – 13:30

Lunch

 

 

ROOM 3

ROOM 4

 

NETWORK SECURITY

(Session Chair: Mehmet Orgun)

ACCESS CONTROL

(Session Chair: Michael Hitchens)

13:30 – 14:05

 

·         Rational distance-bounding protocols over noisy channels

Long Nguyen

·         Logic Based Authorization Program and Its implementation

Chun Ruan; Seyed Shahrestani

14:05 – 14:40

 

·         Trust based Fusion over Noisy Channels through Anomaly Detection in Cognitive Radio Network

Shameek Bhattacharjee; Saptarshi Debroy; Mainak Chatterjee; Kevin Kwiat

·         Model checking security policy model using both UML static and dynamic diagrams

Liang Cheng; Yang Zhang

 

14:40 – 15:05

 

·         piMANET - A Policy Integrated Security Framework for Mobile Ad Hoc Network

Soumya Maity; Padmalochan Bera; Soumya Ghosh

·         Proposal and Implementation of Enhanced Authentication that Enables Self-Wipe

Zhaogong Guo; Kouichi Yasaki; Yousuke Nakamura; Kazuaki Nimura; Isamu Yamada

15:05 – 15:35

 

Afternoon Tea

 

 

ROOM 3

ROOM 4

 

NETWORK SECURITY

 (Session Chair: Atilla Elηl)

CRYPTOGRAPY

(Session Chair: Josef Pieprzyk)

15:35 – 16:10

 

·         Security Analysis of a Femtocell device

Ravishankar Borgaonkar; Kevin Redon; Jean-Pierre Seifert

·         Cryptanalysis of the Stream Cipher BEAN

Martin Εgren; Martin Hell

16:10 – 16:45

 

·         Counteracting DDoS Attacks in WLAN

Udaya Tupakula; Vijay Varadharajan; Sunil Vuppala

·         The Optimal Linear Multi-Secret Sharing Scheme for Non-Threshold Access Structure

Chunming Tang; Shuguang Dai; Yuenai Chen

16:45 – 17:10

 

·         Acceleration of Packet Filtering using GPGPU

Lakshminarayanan V.; Kamal Cahndra; Mark Zwolinski; Manoj Gaur; Vijay Laxmi

·         Different Models of Information Protection System, Based On The Functional Knapsack

Valeriy Osipyan

19:00

Reception – Belgian Beer Cafι

 

 

  

Tuesday,  15th Nov, 2011

 

09:00 – 10:00

Invited Talk II (Session Chair: Josef Pieprzyk)

·         Rethinking Cyber Security

Professor Vijay Varadharajan,
Microsoft Chair in Innovation in Computing, Macquarie University, Sydney, NSW, Australia

10:00 – 10:30

Morning Tea

 

ROOM 3

ROOM 4

 

NETWORK SECURITY

(Session Chair: Mehmet Orgun)

CRYPTOGRAPY & COMPUTER SECURITY

(Session Chair: Rajan Shankaran)

10:30 – 11:05

 

·         A Secure and Anonymous Cooperative Sensing Protocol for Cognitive Radio Networks

Helena Rifa-Pous; Carles Garrigues

·         Algebraic analysis of GOST encryption algorithm

Ekaterina Maro; Evgeniya Ishchukova; Ludmila Babenko

11:05 – 11:40

 

·         Detour Attack In OLSR

Manish Kumar; Rajbir Kaur; Vijay Laxmi; Manoj Gaur

 

·         Fault Attack to the Elliptic Curve Digital Signature Algorithm with Multiple Bit Faults

Gerardo Pelosi; Alessandro Barenghi; Andrea Palomba; Luca Breveglieri; Guido Bertoni

11:40 – 12:05

 

·         Towards Hiding Federated Digital Identity: Stop-Dissemination Mechanism in Content Centric Internetworking

Amine Elabidi; Ghazi Ben Ayed; Sonia Mettali Gammar; Farouk Kamoun

·         Exploration of a Hand-based Graphical Password Scheme

Haichang Gao; Lichang Ma; Jinhua Qiu; Xiyang Liu

12:05 – 13:30

Lunch

 

ROOM 3

ROOM 4

 

COMPUTER SECURITY

(Session Chair: Atilla Elηl)

WATER MARKING

(Session Chair: Josef Pieprzyk)

13:30 – 14:05

 

·         On Automatic Detection of SQL Injection Attacks by the Feature Extraction of the Single Character

Michio Sonoda; Takeshi Matsuda; Daiki Koizumi; Shigeichi Hirasawa

·         Collusion Resistant Fingerprinting of Digital Audio

Andrew Tirkel; Tomas Hall; Charles Osborne; Nicholas Meinhold; Oscar Moreno

14:05 – 14:40

 

·         A Model-Based Attack Injection Approach for Security Validation

Anderson Morais; Ana Cavalli; Eliane Martins

·         Echo Hiding Based Stereo Audio Watermarking Against Pitch-Scaling Attacks

Iynkaran Natgunanathan; Yong Xiang

14:40 – 15:05

 

·         An approach to enhance the security of remote health monitoring systems

Mahmoud Elkhodr; Seyed Shahrestani; Hon Cheung

·         On the Security and Practicality of a Buyer Seller Watermarking Protocol for DRM

Geong Sen Poh; Muhammad Reza Z'aba

15:05 -15:35

Afternoon Tea

 

ROOM 3

ROOM 4

 

NETWORK SECURITY

(Session Chair: Atilla Elηl)

COMPUTER SECURITY

(Session Chair: Josef Pieprzyk)

15:35 – 16:10

 

·         Detection of Neighbor Solicitation and Advertisement Spoofing in IPv6 Neighbor Discovery Protocol

Ferdous Barbhuiya; Santosh Biswas; Sukumar Nandi

·         TW-KEAP: An Efficient Four-Party Key Exchange Protocol for End-to-End Communications

Wei-Kuo Chiang;Jian-Hao Chen

16:10 – 16:45

 

·         A Sybil Attack Detection Approach using Neighboring Vehicles in VANET

Jyoti Grover;Nitesh Prajapati;Manoj Gaur;Vijay LaxmI

·         Secure Random Number Generation in Wireless Sensor Networks

Fabrizio Milazzo; Giuseppe Lo Re; Marco Ortolani

16:45 – 17:10

 

·         WinSEND: Windows SEcure Neighbor Discovery

Ahmad Alsa'deh; Hosnieh Rafiee; Christoph Meinel

·         Extending the scope of CardSpace

Haitham Al-Sinani; Chris Mitchell

19:00

BANQUET

  

 

 

Wednesday,  16th Nov, 2011

 

 

ROOM 3

ROOM 4

 

NETWORK SECURITY

(Session Chair: Josef Pieprzyk)

 

09:00 – 09:35 

·         A HTTP Cookie Covert Channel

Bo Yuan; William Huba; Daryl Johnson; Peter Lutz

09:35 – 10:10

·         Improving Operation Time Bounded Mission Critical Systems' Attack-Survivability through Controlled Source-Code Transformation

Alban Vignaux; Arnaud Auguste; Korel Bogdan; Shangpin Ren; Kevin Kwiat

10:10 – 10:40

Morning Tea

 

 

ROOM 3

ROOM 4

 

NETWORK and COMPUTER SECURITY

 (Session Chair: Mehmet Orgun)

 

 

10:40 – 11:05

 

·         On the Impacts of Join and Leave on the Propagation Ratio of Topology -Aware Active Worms

 Ahmad Jafarabadi; Mohammad Abdollahi Azgomi

11:05 – 11:30

 

·         Counterfactually Reasoning About Security

Manuel Peralta; Supratik Mukhopadhyay; Ramesh Bharadwaj

11:30 – 11:55

 

·         Obscurity of Network Security Course Curriculum

 Suleyman Kondakci

11:55 – 12:20

 

·         Microcontroller-Based Implementation of parseKey+ for Limited Resources Embedded ApplicationS

Atilla Elηl; Behnam Rahnama; Reza Makvandi

12:20 – 12:45

·         Formal Analysis of Usage Control Policies

Boulares Ouchenne; Ousmane Kone

 

Closing Drinks