Annual Computer Security Applications Conference (ACSAC) 2014

Full Program »


Thursday, 11 December 2014
17:15 - 18:00

DH Holmes BC

Chair: Raheem Beyah

  1. ScanDroid: Static Analysis Tool to promote Secure Design Methodology for the Android Environment, Edward Hill, Keheira Henderson, and Xiaohong Yuan (North Carolina A&T State University)

  2. Using Couple Maps from the Nature for PKC, Hugo Solís-Sánchez and Elena Gabriela Barrantes (Universidad de Costa Rica)

  3. Towards Security of Additive Layer Manufacturing, Mark Yampolskiy, Todd R. Andel, J. Todd McDonald, William B. Glisson, and Alec Yasinsac (University of South Alabama)

  4. Advancing Defenses against SQL Injection Attacks through a Vulnerability Forensic Parsing Service, Rohan Malcolm(1), Sean Thorpe(1), Julian Jarrett(1), Tyrone Grandison(2), and Leon Stenneth(3) (1. University of Technology, St. Andrew, Jamaica, 2. Proficiency Labs International, 3. Nokia Connected Driving)

  5. A University Case Study on Using the Metasploit Framework to Perform Post Exploitation in Vulnerable Campus Networks, Sean Thorpe, Kedrian James, Andre Stevens, Nickiesha Bonnick, Alex Thompson, Michael Williams, Omar Gordon, Tussant Tucker, and Tyrone Grandison (University of Technology, Kingston, Jamaica)

  6. Virtual Machine Introspection with Xen on ARM, Tamas K Lengyel (TU Munich)

  7. Macro Supply Chain Security Decision Analytics, Gio Kao, Jason Hamlet, Ryan Helinski, John Michalski, and Han Lin (Sandia National Laboratories)

  8. Overview of the NSF SATC and related programs, Jeremy Epstein (National Science Foundation)


Powered by OpenConf®
Copyright©2002-2014 Zakon Group LLC