Annual Computer Security Applications Conference (ACSAC) 2013

Full Program »

Poster Reception with light refreshments

Thursday, 12 December 2013
18:15 - 21:00

Lafitte AB

Chair: Raheem Beyah

Featured Posters:

  1. Cyber Security Training Perspectives, Joni A. Amorim (University of Skövde - HiS, Sweden), Maurice Hendrix (Coventry University, UK), Sten F. Andler (University of Skövde - HiS, Sweden), James Llinas (State Univ. of NY at Buffalo, USA), Per M. Gustavsson (Swedish Nat. Def. College, Sweden), Martin Brodin (Actea Consulting, Sweden)

  2. Pinning & Binning: Real Time Classification of Certificates, Zheng Dong, Apu Kapadia, L. Jean Camp (Indiana University, USA)

  3. Obfuscation of Critical Infrastructure Network Traffic using Fake Communication, Sungho Jeon, Jeong-Han Yun, and Woo-Nyon Kim (The Attached Institute of ETRI, Daejeon, South Korea)

  4. Dynamic Security Policy Control for Protecting LAN from Attacks by Insecure Internal Network Devices, Yutaka Juba, Hung-Hsuan Huang, Kyoji Kawagoe (Ritsumeikan University, Japan)

  5. HInjector: Injecting Hypercall Attacks for Evaluating VMI-based Intrusion Detection Systems, Aleksandar Milenkoski (Karlsruhe Institute of Technology, Germany), Bryan D. Payne (Nebula Inc., USA), Nuno Antunes, Marco Vieira (University of Coimbra, Portugal), and Samuel Kounev (Karlsruhe Institute of Technology, Germany)

  6. Structural Mining for Malware Detection, Masoud Narouei, Mansour Ahmadi, Ashkan Sami, Marco Vieira, and Babak Yadegari (Shiraz University, Iran)

  7. VAS-AKA: First Symmetric Batch Verification Protocol for Securely Deliver Value Added Services to Multiple Mobile Users, Neetesh Saxena, Narendra S. Chaudhari (Indian Institute of Technology Indore, India)

  8. Cloud Storage System which Prevents Information Leakage from Client, Kuniyasu Suzaki, Toshiki Yagi, Kazukuni Kobara (National Institute of Advanced Industrial Science and Technology), Nobuko Inoue, Tomoyuki Kawade (SciencePark Corporation)

  9. HookLocator: Function Pointer Integrity Checking in Kernel Pools via Virtual Machine Introspection, Irfan Ahmed and Aleksandar Zoranic (University of New Orleans, USA)


Powered by OpenConf®
Copyright©2002-2014 Zakon Group LLC