Annual Computer Security Applications Conference 2015

Full Program »


Thursday, 10 December 2015
17:15 - 18:00

Sierra C

Chair: Thomas Moyer, MIT Lincoln Laboratory

  1. Mobile Cross Platform Analysis, Walter Squires and Paolina Centonze (Iona College)
  2. A new access control framework for Iot environment, Youssef Saoubou (ENSEM-IPI), Anas Abou El Kalam (IPI), Siham Benhadou (ENSEM)
  3. Graphical Security Modeling and Assessment for the Internet of Things, Mengmeng Ge and Dong Seong Kim (University of Canterbury)
  4. A new approach to protect SCADA based critical infrastructure against internal and external cybercriminal threats, Mounia El Anbal(1-2), A. Abou El Kalam(1), S. Benhadou (2), F. Moutaouakkil(2) and H. Medromi (2) (1. IPI Paris, IGS Group, France, 2. ENSEM Casablanca, Morocco)
  5. An Automated Method of Classifying and Analyzing Malware based Operating System Calls, Ezhil Kalaimannan, Clark Mitchell, Sikha Bagui and Subash Bagui. (University of West Florida)
  6. Accelerating the Performance of RLWE-based Fully Homomorphic Encryption with GPGPU. Ahmad Al Badawi (1), Bharadwaj Veeravalli (1), Khin Mi Mi Aung (2), (1. National University of Singapore, 2. Data Storage Institute, A*STAR)
  7. MILS Analysis Tool for AADL, Charles Payne, Hazel Shackleton, and Steve Vestal (Adventium Labs)
  8. It's So Easy to Write Undetectable Mobile Malware, Atif Memon (Department of Computer Science, University of Maryland, College Park, MD, USA), Ali Anwar (Montgomery Blair High School, Silver Spring, MD, USA)
  9. Honeypot Network Forensics, Nick Novotny, Joe Jones, Rushabh Vyas, John Balaska, Connie Justice (Computer Information Technology, Purdue School of Engineering and Technology, IUPUI)
  10. Building a Secure and Trusted Avionics Wireless Network for Future Aircraft, Raja Naeem Akram (ISG, SCC, Royal Holloway, University of London)
  11. SmartOrBAC : Enforcing security and privacy in IoT, Imane Bouij-Pasquier (UCA – ENSA of Marrakesh Morocco)
  12. Remotely-stored oblivious write-only filesystem, Daniel S. Roche (United States Naval Academy)
  13. Hatrick: A System for Real-time Threat Detection in Cyber Physical Systems, Charith Wickramaarachchi (University of Southern California)


Powered by OpenConf®
Copyright©2002-2015 Zakon Group LLC