Annual Computer Security Applications Conference (ACSAC) 2018

Monday, 3 December 2018
7:30-8:30
(Brisas Del Mar)
8:30-12:00
Miramar IMiramar IIBoardroom IBoardroom II

Two-Day Worshop

J. Todd McDonald, University of South Alabama, General Chair

Two-Day Workshop

Michael Clifford, Noblis, Bhavani Thuraisingham, UT Dallas, and Latifur Khan, UT Dallas

 

Half-Day Tutorial - Morning Only

Radia Perlman and Charlie Kaufman, Dell

Half-Day Tutorial - Morning Only

Hassan Takabi and Robert Podschwadt, University of North Texas

12:00-13:30
(Brisas Del Mar)
13:30-17:00
Miramar IMiramar IIBoardroom I

(Workshop Continues)

(Workshop Continues)

Half-Day Tutorial - Afternoon Only

Charlie Kaufman and Radia Pearlman, Dell

Tuesday, 4 December 2018
7:30-8:30
(Brisas Del Mar)
8:30-12:00
Miramar IMiramar IICondadoBoardroom IIN/AN/AN/A

(Workshop Continues)

(Workshop Continues)

One-Day Workshop

Harvey Rubinovitz, The MITRE Corporation, and Adam Hahn, Washington State University, General Co-Chairs

Irfan Ahmed, The University of New Orleans, Program Chair

One-Day Workshop

Theo Tryfonas, University of Bristol, and Debi Ashenden, University of Portsmounth, Programme Chairs

Giampaolo Bella, University of Catania, and Gabriele Lenzini, University of Luxembourg, Workshop Organizers

Full-Day Tutorial

CANCELED

Full-Day Tutorial

CANCELED

Full-Day Tutorial

CANCELED

12:00-13:30
(Brisas Del Mar)
13:30-17:00
Miramar IMiramar IICondadoBoardroom IIN/AN/AN/A

(Workshop Continues)

(Workshop Continues)

(Workshop Continues)

(Workshop Continues)

(Tutorial Continues)

CANCELED

(Tutorial Continues)

CANCELED

(Tutorial Continues)

CANCELED

18:00-20:00
(Lagoon Pool)
Wednesday, 5 December 2018
7:30-8:30
(Brisas Del Mar)
8:30-9:00
(Royal Ballroom)Session Chair: David Balenson, SRI International

ACSAC Conference Welcome: David Balenson, Conference Chair

Distinguished Paper Awards: Juan Caballero, IMDEA Software Institute, Program Chair

SLIDES

SWSIS Scholarship Awards: Mary Ellen Zurko, ACSA

SLIDES

9:00-10:00
(Royal Ballroom)Session Chair: David Balenson

Why Privacy Engineering Matters Now
Michelle Dennedy, Vice President and Chief Privacy Officer, Cisco

SLIDES

10:00-10:30
(Foyer)
10:30-12:00
Miramar IIRoyal BallroomMiramar I

Panel Moderator: Robert H’obbes’ Zakon, Zakon Group LLC

Panelists:
Dave Bryson, The MITRE Corporation
Anil John, Department of Homeland Security Science & Technology Directorate
Javier Malavé, Puerto Rico Science, Technology and Research Trust

Session Chair: Zhiqiang Lin, Ohio State UniversityShredder: Breaking Exploits through API SpecializationShachee Mishra, Stony Brook University; Michalis Polychronakis, Stony Brook UniversityTIFF: Using Input Type Inference To Improve FuzzingVivek Jain, International Institute of Information Technology; Sanjay Rawat, Vrije Universiteit, Amsterdam; Cristiano Giuffrida, Vrije Universiteit, Amsterdam; Herbert Bos, Vrije Universiteit, AmsterdamOn the Effectiveness of Type-based Control Flow IntegrityReza Mirzazade Farkhani, Northeastern University; Saman Jafari, Northeastern University; Sajjad Arshad, Northeastern University; William Robertson, Northeastern University; Engin Kirda, Northeastern University; Hamed Okhravi, MIT Lincoln LaboratoryPractical Integrity Protection with Oblivious HashingMohsen Ahmadvand, Technical University of Munich; Anahit Hayrapetyan, Technical University of Munich; Sebastian Banescu, Technical University of Munich; Alexander Pretschner, Technical University of Munich Session Chair: Adam Aviv, United States Naval AcademyTyping-Proof: Usable, Secure and Low-Cost Two-Factor Authentication Based on Keystroke TimingsXiming Liu, School of Information Systems, Singapore Management University; Yingjiu Li, School of Information Systems, Singapore Management University; Robert H. Deng, School of Information Systems, Singapore Management UniversityLatent Typing Biometrics in Online Collaboration ServicesShane McCulley, University of New Orleans; Vassil Roussev, University of New OrleansBeware of Your Screen: Anonymous Fingerprinting of Device Screens for Off-line Payment ProtectionZhe Zhou, Fudan University; Di Tang, CUHK; Wenhao Wang, Chinese Academy of Sciences; Xiaofeng Wang, IU Bloomington; Zhou Li, ACM Member; Kehuan Zhang, CUHKA Measurement Study of Authentication Rate-Limiting Mechanisms of Modern WebsitesBo Lu, The Ohio State University; Xiaokuan Zhang, The Ohio State University; Ziman Ling, The Ohio State University; Yinqian Zhang, The Ohio State University; Zhiqiang Lin, The Ohio State University
12:00-13:30
(Brisas Del Mar)
13:30-15:00
Miramar IIRoyal BallroomMiramar I

Moderator: Harvey Rubinovotz, The MITRE Corporation, Workshops Chair

Session Chair: Kevin Roundy, Symantec Research LabsAccurate Malware Detection by Extreme AbstractionFady Copty, IBM Research - Haifa; Matan Danos, IBM Research - Haifa; Orit Edelstein, IBM Research - Haifa; Cindy Eisner, IBM Research - Haifa; Dov Murik, IBM Research - Haifa; Benjamin Zeltser, IBM Research - HaifaUsing Loops For Malware Classification Resilient to Feature-unaware PerturbationsAravind Machiry, UC Santa Barbara; Nilo Redini, UC Santa Barbara; Eric Gustafson, UC Santa Barbara; Yanick Fratantonio, EURECOM; Yung Ryn Choe, Sandia National Laboratories; Christopher Kruegel, UC Santa Barbara; Giovanni Vigna, UC Santa BarbaraMADE: Malicious Activity Detection in EnterprisesAlina Oprea, Northeastern University; Zhou Li, RSA; Robin Norris, EMC CIRC; Kevin Bowers, RSALOBO - Evaluation of Generalization Deficiencies in Twitter Bot ClassifiersJuan Echeverria, University College London; Nicolas Kourtellis, Telefonica I+D; Ilias Leontiadis, Telefonica I+D; Emiliano De Cristofaro, University College London; Gianluca Stringhini, University College London; Shi Zhou, University College London Session Chair: Georgios Portokalidis, Stevens Institute of TechnologySide-Channel Analysis of SM2: A Late-Stage Featurization Case StudyNicola Tuveri, Tampere University of Technology; Sohaib ul Hassan, Tampere University of Technology; Cesar Pereida García, Tampere University of Technology; Billy Brumley, Tampere University of TechnologyMicroWalk: A Framework for Finding Side Channels in BinariesJan Wichelmann, Universität zu Lübeck; Ahmad Moghimi, Worcester Polytechnic Institute; Thomas Eisenbarth, Universität zu Lübeck; Berk Sunar, Worcester Polytechnic InstituteAnalyzing Cache Side Channels Using Deep Neural NetworksTianwei Zhang, Amazon Web Services; Yinqian Zhang, The Ohio State University; Ruby Lee, Princeton UniversityMemCloak: Practical Access Obfuscation for Untrusted MemoryWeixin Liang, Zhejiang University; Kai Bu, Zhejiang University; Ke Li, Zhejiang University; Jinhong Li, Zhejiang University; Arya Tavakoli, Simon Fraser University
15:00-15:30
(Foyer)
15:30-17:00
Miramar IIRoyal BallroomMiramar I

Moderator: Tomas Vagoun, Federal Networking and IT R&D Program (NITRD)

Jeremy Epstein, National Science Foundation
Tristan Nguyen, Air Force Office of Scientific Research
Sharothi Pikar, Office of the Under Secretary of Defense (Research & Engineering)

Session Chair: Gianluca Stringhini, Boston UniversityStateDroid: Stateful Detection of Stealthy Attacks in Android Apps via Horn-Clause VerificationMohsin Junaid, University of Texas at Arlington; Jiang Ming, University of Texas at Arlington; David Kung, University of Texas at ArlingtonImproving Accuracy of Android Malware Detection with Lightweight Contextual AwarenessJoey Allen, Georgia Institute of Technology; Matthew Landen, Georgia Institute of Technology; Sanya Chaba, Georgia Institute of Technology; Yang Ji, Georgia Institute of Technology; Simon Chung, Georgia Institute of Technology; Wenke Lee, Georgia Institute of TechnologyA Large Scale Investigation of Obfuscation Use in Google PlayDominik Wermke, Leibniz University Hannover; Nicolas Huaman, Leibniz University Hannover; Yasemin Acar, Leibniz University Hannover; Brad Reaves, North Carolina State University; Patrick Traynor, University of Florida; Sascha Fahl, Ruhr-Universität BochumWhy Johnny Can’t Make Money With His Contents: Pitfalls of Designing and Implementing Content Delivery AppsSze Yiu Chau, Purdue University; Bincheng Wang, The University of Iowa; Jianxiong Wang, Purdue University; Omar Chowdhury, The University of Iowa; Aniket Kate, Purdue University; Ninghui Li, Purdue University Session Chair: Michalis Polychronakis, Stony Brook UniversityAn Extensive Evaluation of the Internet's Open ProxiesAkshaya Mani, Georgetown University; Tavish Vaidya, Georgetown University; David Dworken, Northeastern University; Micah Sherr, Georgetown UniversitySENSS Against Volumetric DDoS AttacksSivaramakrishnan Ramanathan, USC/ISI; Jelena Mirkovic, USC/ISI; Minlan Yu, Harvard; Ying Zhang, FacebookWi Not Calling: Practical Privacy and Availability Attacks in Wi-Fi CallingJaejong Baek, Arizona State Umiversity; Sukwha Kyung, Arizona State University; Haehyun Cho, Arizona State University; Ziming Zhao, Arizona State University; Yan Shoshitaishvili, Arizona State University; Adam Doupé, Arizona State University; Gail-Joon Ahn, Arizona State University and SAMSUNG ResearchTracking Users across the Web via TLS Session ResumptionErik Sy, University of Hamburg; Christian Burkert, University of Hamburg; Hannes Federrath, University of Hamburg; Mathias Fischer, University of Hamburg
18:30-21:00
(Ocean Garden)

Dinner will include a trio performing local music. After dinner, Folkloric Show Guamanique will perform traditional Puerto Rican dances - a show not to be missed!

Dinner will be held outside in the Ocean Garden. In case of inclement weather we will move to the Grand Ballroom.

Thursday, 6 December 2018
7:30-8:30
(Brisas Del Mar)
9:00-10:00
(Royal Ballroom)Session Chair: David Balenson

AI in Cybersecurity: Applications, Open Problems, and Future Directions
Alina Oprea, Professor of Computer Science, Northeastern University

SLIDES

10:00-10:30
(Foyer)
10:30-12:00
Miramar IIRoyal BallroomMiramar I

Panel Moderator: Jeremy Epstein, National Science Foundation

Panelists:
Donna Price, Georgians for Verified Voting
Honorable Tom Hicks, Chairman US Election Assistance Commission
Roberto E. Benítez, Puerto Rico State Elections Commission 
SLIDES
 

 

Session Chair: Adam Doupé, Arizona State UniversityTowards Automated Generation of Exploitation Primitives for Web BrowsersBehrad Garmany, Ruhr-Universität Bochum; Martin Stoffel, Ruhr-Universität Bochum; Robert Gawlik, Ruhr-Universität Bochum; Philipp Koppe, Ruhr-Universität Bochum; Tim Blazytko, Ruhr-Universität Bochum; Thorsten Holz, Ruhr-Universität BochumRAPID: Resource and API-Based Detection Against In-Browser MinersJuan David Parra Rodriguez, University of Passau; Joachim Posegga, University of PassauRaising the Bar: Evaluating Origin-wide Security ManifestsSteven Van Acker, Chalmers University of Technology; Daniel Hausknecht, Chalmers University of Technology; Andrei Sabelfeld, Chalmers University of TechnologyA Multi-tab Website Fingerprinting AttackYixiao Xu, Tsinghua University; Tao Wang, Hong Kong University of Science and Technology; Qi Li, Tsinghua University; Qingyuan Gong, Fudan University; Yang Chen, Fudan University; Yong Jiang, Tsinghua University Session Chair: Ehab Al-Shaer, UNC CharlottePoisoning Attacks to Graph-Based Recommender SystemsMinghong Fang, Iowa State University; Guolei Yang, Iowa State University; Neil Zhenqiang Gong, Iowa State University; Jia Liu, Iowa State UniversitySHIELD: A Framework for Efficient and Secure Machine Learning Classification in Constrained EnvironmentsJan Henrik Ziegeldorf, RWTH Aachen University; Jan Metzke, RWTH Aachen University; Klaus Wehrle, RWTH Aachen UniversityModel Extraction Warning in MLaaS ParadigmManish Kesarwani, IBM Research Lab; Bhaskar Mukhoty, Indian Institute of Technology, Kanpur; Vijay Arya, IBM Research Lab; Sameep Mehta, IBM Research LabI Know What You See: Power Side-Channel Attack on Convolutional Neural Network AcceleratorsLingxiao Wei, The Chinese University of Hong Kong; Bo Luo, The Chinese University of Hong Kong; Yu Li, The Chinese University of Hong Kong; Yannan Liu, The Chinese University of Hong Kong & Sangfor Technologies; Qiang Xu, The Chinese University of Hong Kong
12:00-13:30
(Brisas Del Mar)
13:30-15:00
Miramar IIRoyal BallroomMiramar I
Session Chair: Randy Smith

Creating Failure Scenarios for Natural Gas Critical Infrastructure, Michael Locasto, SRI International

Password Sequence (PSQ) - A Novel Approach for Implementing Long Passwords, Joseph D Scrandis, Towson University

Encrypting Configuration Sections in ASP.NET 4.5 Using DPAPI: A Real Life Experience, Sercan Alabay, Uludag University, Turkey  TEXT

Session Chair: Stephen Schwab, USC Information Sciences InstituteHiding in the Shadows: Empowering ARM for Stealthy Virtual Machine IntrospectionSergej Proskurin, Technical University of Munich; Tamas Lengyel, The Honeynet Project; Marius Momeu, Technical University of Munich; Claudia Eckert, Technical University of Munich; Apostolis Zarras, Maastricht UniversityA Measurement Study on Linux Container Security: Attacks and CountermeasuresXin Lin, School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China and Institute of Information Engineering, CAS, Beijing, China and Data Assurance and Communication Security Research Center, CAS, Beijing, China; Lingguang Lei, Institute of Information Engineering, CAS, Beijing, China and Data Assurance and Communication Security Research Center, CAS, Beijing, China; Yuewu Wang, Institute of Information Engineering, CAS, Beijing, China and Data Assurance and Communication Security Research Center, CAS, Beijing, China; Jiwu Jing, Institute of Information Engineering, CAS, Beijing, China and Data Assurance and Communication Security Research Center, CAS, Beijing, China; Kun Sun, George Mason University, Fairfax, USA; Quan Zhou, Institute of Information Engineering, CAS, Beijing, China and Data Assurance and Communication Security Research Center, CAS, Beijing, ChinaSecure Out-of-band Remote Management of Virtual Machines with Transparent PassthroughShota Futagami, Kyushu Institute of Technology; Tomoya Unoki, Kyushu Institute of Technology; Kenichi Kourai, Kyushu Institute of TechnologyPrime+Count: Novel Cross-world Covert Channels on ARM TrustZoneHaehyun Cho, Arizona State University; Penghui Zhang, Arizona State University; Donguk Kim, SAMSUNG Research; Jinbum Park, SAMSUNG Research; Choonghoon Lee, SAMSUNG Research; Ziming Zhao, Arizona State University; Adam Doupé, Arizona State University; Gail-Joon Ahn, Arizona State University and SAMSUNG Research Session Chair: Mary Ellen Zurko, MIT-LLComparing Video Based Shoulder Surfing with Live SimulationAdam Aviv, United States Naval Academy; Flynn Wolf, University of Maryland, Baltimore County; Ravi Kuber, University of Maryland, Baltimore CountyDo Social Disorders Facilitate Social Engineering? A Case Study of Autism and Phishing AttacksAjaya Neupane, University of California Riverside; Kiavash Satvat, University of Alabama at Birmingham; Nitesh Saxena, University of Alabama at Birmingham; Despina Stavrinos, University of Alabama at Birmingham; Haley Johnson Bishop, University of Alabama at BirminghamI Need this Back, Later! An Exploration of Practical Secret SharingOliver Wiese, Freie Universität Berlin; Christoph Weinhold, Freie Universität Berlin; Jan-Ole Malchow, Freie Universität Berlin; Volker Roth, Freie Universität BerlinTake It or Leave It: A Survey Study on Operating System Upgrade PracticesSadegh Farhang, Pennsylvania State University; Jake Weidman, Pennsylvania State University; Mohammad Mahdi Kamani, Pennsylvania State University; Jens Grossklags, Technical University of Munich; Peng Liu, Pennsylvania State University
15:00-15:30
(Foyer)
15:30-17:00
Miramar IIRoyal BallroomMiramar I

Moderator: Tomas Vagoun, Federal Networking and IT R&D Program (NITRD)

Maya Bernstein, US Department of Health & Human Services
Raymond Brown, NSA
Rene Peralta, NIST

Session Chair: Michael Locasto, SRI InternationalType-after-Type: Practical and Complete Type-Safe Memory ReuseErik van der Kouwe, Leiden University; Taddeus Kroes, Vrije Universiteit Amsterdam; Chris Ouwehand, Vrije Universiteit Amsterdam; Herbert Bos, Vrije Universiteit Amsterdam; Cristiano Giuffrida, Vrije Universiteit AmsterdamMapping to Bits: Efficiently Detecting Type Confusion ErrorsChengbin Pang, Nanjing University; Yunlan Du, Nanjing University; Bing Mao, Nanjing University; Shanqing Guo, Shandong UniversityA Heuristic Framework to Detect Concurrency VulnerabilitiesChangming Liu, Huazhong University of Science and Technology; Deqing Zou, Huazhong University of Science and Technology; Peng Luo, Huazhong University of Science and Technology; Bin Zhu, Microsoft Research Asia; Hai Jin, Huazhong University of Science and TechnologyICSD: An Automatic System for Insecure Code Snippet Detection in Stack Overflow over Heterogeneous Information NetworkYanfang Ye, West Virginia University; Shifu Hou, West Virginia University; Lingwei Chen, West Virginia University; Xin Li, West Virginia University; Shouhuai Xu, University of Texas at San Antonio; Liang Zhao, George Mason University; Jiabin Wang, Tencent Security Lab; Qi Xiong, Tencent Security Lab Session Chair: Omar Haider Chowdhury, The University of IowaCrystal (ball): I Look at Physics and Predict Control Flow! Just-Ahead-Of-Time Controller RecoverySriharsha Etigowni, Rutgers University; Shamina Hossain-McKenzie, University of Illinois at Urbana-Champaign; Maryam Kazerooni, University of Illinois at Urbana-Champaign; Katherine Davis, Texas A&M University; Saman Zonouz, Rutgers UniversityNoise Matters: Using Sensor and Process Noise Fingerprint to Detect Stealthy Cyber Attacks and Authenticate sensors in CPSChuadhry Mujeeb Ahmed, Singapore University of Technology and Design; Aditya P. Mathur, Singapore University of Technology and Design; Jianying Zhou, Singapore University of Technology and DesignFinding Dependencies between Cyber-Physical Domains for Security Testing of Industrial Control SystemsJohn H. Castellanos, Singapore University of Technology and Design; Martín Ochoa, Universidad del Rosario; Jianying Zhou, Singapore University of Technology and DesignPointing in the Right Direction - Securing Memory Accesses in a Faulty WorldRobert Schilling, Graz University of Technology / Know Center GmbH; Mario Werner, Graz University of Technology; Pascal Nasahl, Graz University of Technology; Stefan Mangard, Graz University of Technology
17:15-18:15
(Royal Ballroom)Session Chair: Adam Aviv, United States Naval Academy
18:30-20:30
(Royal Ballroom Foyer)Session Chair: Adam Aviv, United States Naval Academy
Friday, 7 December 2018
7:30-8:30
(Brisas Del Mar)
8:30-10:00
Royal BallroomMiramar I
Session Chair: Martin Ochoa, Cyxtera TechnologiesLROV: Practical Library-aware Provenance TracingFei Wang, Purdue University; Yonghwi Kwon, Purdue University; Shiqing Ma, Purdue University; Xiangyu Zhang, Purdue University; Dongyan Xu, Purdue UniversityNow You See Me: Real-time Dynamic Function Call DetectionFranck de Goër; Sanjay Rawat; Dennis Andriesse, VU Sec; Herbert Bos, VU Sec; Roland Groz, LIG - Univ. Grenoble-AlpesAn Historical Analysis of the SEAndroid Policy EvolutionBumjin Im, Rice University; Ang Chen, Rice University; Dan Wallach, Rice UniversityIAC: On the Feasibility of Utilizing Neural Signals for Access ControlMd Lutfor Rahman, UC Riverside; Ajaya Neupane, UC Riverside; Chengyu Song, UC Riverside Session Chair: Sebastien Bardin, CEAFinding The Greedy, Prodigal, and Suicidal Contracts at ScaleIvica Nikolic, School of Computing, NUS; Aashish Kolluri, School of Computing, NUS; Ilya Sergey, University College London; Prateek Saxena, School of Computing, NUS; Aquinas Hobor, Yale-NUS College and School of Computing, NUSOsiris: Hunting for Integer Bugs in Ethereum Smart ContractsChristof Ferreira Torres, SnT/University of Luxembourg; Julian Schütte, Fraunhofer AISEC; Radu State, SnT/University of LuxembourgSmarTor: Smarter Tor with Smart ContractsAndre Greubel, University of Wuerzburg; Alexandra Dmitrienko, University of Wuerzburg; Samuel Kounev, University of WuerzburgObscuro: A Bitcoin Mixer using Trusted Execution EnvironmentsMuoi Tran, National University of Singapore; Loi Luu, Kyber Network; Min Suk Kang, National University of Singapore; Iddo Bentov, Cornell University; Prateek Saxena, National University of Singapore
10:00-10:30
(Foyer)
10:30-11:15
Royal BallroomMiramar I
Session Chair: Alexandros Kapravelos, North Carolina State UniversityThere’s a Hole in that Bucket! A Large-scale Analysis of Misconfigured S3 BucketsAndrea Continella, Politecnico di Milano; Mario Polino, Politecnico di Milano; Marcello Pogliani, Politecnico di Milano; Stefano Zanero, Politecnico di MilanoDeDoS: Defusing DoS with Dispersion Oriented SoftwareHenri Maxime Demoulin, University of Pennsylvania; Tavish Vaidya, Georgetown University; Isaac Pedisich, University of Pennsylvania; Bob DiMaiolo, University of Pennsylvania; Jingyu Qian, Georgetown University; Chirag Shah, University of Pennsylvania; Yuankai Zhang, Georgetown University; Ang Chen, Rice University; Andreas Haeberlen, University of Pennsylvania; Boon Thau Loo, University of Pennsylvania; Linh Thi Xuan Phan, University of Pennsylvania; Micah Sherr, Georgetown University; Clay Shields, Georgetown University; Wenchao Zhou, Georgetown University Session Chair: Daniel Zappala, Brigham Young UniversityImproving Security and Usability of Passphrases with Guided Word ChoiceNikola K. Blanchard, Institut de Recherche en Informatique Fondamentale; Clément Malaingre, Teads France; Ted Selker, Selker Design ResearchOn The Systematic Development and Evaluation Of Password Security Awareness-Raising MaterialsPeter Mayer, Karlsruhe Institute of Technology; Melanie Volkamer, Karlsruhe Institute of Technology; Christian Schwartz, usd AG
11:30-12:00
(Royal Ballroom)

Don't leave early -- attend our closing plenary to learn about next year's conference and participate in our prize giveaway!

12:30-17:00
(Lobby)

Excursion to the Arecibo Observatory (Radio Telescope)

16:00-21:00
(Lobby)

Evening Kayaking Adventure – Bioluminescent Bay @ Las Cabezas de San Juan Nature Reserve (First Trip)

18:30-23:30
(Lobby)

Evening Kayaking Adventure – Bioluminescent Bay @ Las Cabezas de San Juan Nature Reserve (Second Trip)

 



Powered by OpenConf®
Copyright©2002-2018 Zakon Group LLC