SAM'16: Wednesday, July 27, 2016 Schedule
To select a different schedule CLICK HERE
7:00am - 5:00pm: REGISTRATION (Second Floor, Conference Lobby: 1-5)
SESSION 7-SAM: SECURITY EDUCATION + INFORMATION ASSURANCE +
HARDWARE SECURITY
Co-Chairs: Prof. Levent Ertaul,
California State University East Bay, USA;
Prof. Ken Ferens,
University of Manitoba, Canada
July 27, 2016 (Wednesday); 08:00am - 10:20am
(LOCATION: Ballroom 2)
08:00 - 08:20am: FREE SLOT
08:20 - 08:40am: An Automated Tool for Evaluating Hardware Trojans and Detection
Methods
Nicholas Houghton, Samer Moein, Fayez Gebali, Aaron T. Gulliver
Department of Electrical and Computer Engineering,
University of Victoria, B.C., Canada
08:40 - 09:00am: Generic Semantics Specification and Processing for Inter-System
Information Flow Tracking
Pascal Birnstill, Christoph Bier, Paul Wagnery, Juergen Beyerer
Fraunhofer Institute of Optronics, System Technologies and Image
Exploitation IOSB, Karlsruhe, Germany;
Karlsruhe Institute of Technology, Karlsruhe, Germany
09:00 - 09:20am: Selecting Classification Features for Detection of Mass Emergency
Events on Social Media
Viktor Pekar, Jane Binner, Hossein Najafi, Chris Hale
Business School, University of Birmingham, Birmingham, UK;
Computer Science and Information Systems, University of Wisconsin,
River Falls, Wisconsin, USA; Electronic Systems Lab,
Georgia Institute of Technology, USA
09:20 - 09:40am: PUF Based Lightweight Hardware Trust Anchor for Secure Embedded
Systems
Kai Fischer, Erwin Hess, Andreas Mucha, Fabian Riess
Siemens AG. Corporate Technology, Munich, Germany
09:40 - 10:00am: Towards a Mathematical Model for Autonomously Organizing Security
Metric Ontologies
Gregory Vert, Bryce Barrette, Bilal Gonen
College of Security and Intelligence, Embry Riddle Aeronautical
University, Florida, USA;
Computer Science, University of West Florida, Florida, USA
10:00 - 10:20am: Secret Sharing Scheme Based on Edge Dominating Set
Nadia M. G. Al-Saidi, Mohammed M. Abdulhadi, Mustafa Saed
Applied Mathematics, University of Technology, Baghdad, Iraq
10:20 - 10:40pm: BREAK
SESSION 8-SAM: BIOMETRICS AND FORENSICS
Co-Chairs: Dr. Haydar Teymourlouei,
Bowie State University, USA;
Dr. Khaled Ali Shehata,
Arab Academy for Science & Technology, Egypt
July 27, 2016 (Wednesday); 10:40am - 12:20pm
(LOCATION: Ballroom 2)
10:40 - 11:00am: Subject Movement at Different Force Levels in a Fingerprint
Recognition System
Kevin Chan, Jeffrey Chudik, Katrina Molina, Alex Hirsch,
Brennon Morning, Evan Pulliam, Drew Radcliff, Stephen Elliott
Department of Technology Leadership and Innovation,
Purdue University, West Lafayette, Indiana, USA
11:00 - 11:20am: Digital Forensic Analysis of SIM Cards
Mohamed T. Abdel Azim, Ahmed F. Shosha
Nile University, Cairo, Egypt
11:20 - 11:40am: A Multimodal Biometric System with Several Degrees of Feature
Fusion for Target Identities Recognition
Sorin Soviany, Cristina Soviany, Sorin Puscoci
I.N.S.C.C., Romania; Feature Analytics, Belgium
11:40 - 12:00pm: Digital Forensic Analysis of Web-Browser Based Attacks
Sally M. Mohamed, Nashwa Abdelbaki, Ahmed F. Shosha
School of Communication and Information Technology,
Nile University Cairo, Egypt
12:00 - 12:20pm: EasyAuth - Implementation of a Multi-Factor Authentication Scheme
Based on Sound, Fingerprint and One Time Passwords (OTP)
Levent Ertaul, Ishita Thanki
California State University East Bay, Hayward, California, USA
12:20 - 01:20pm: LUNCH (On Your Own)
SESSION 9-SAM: CRYPTOGRAPHICS TECHNOLOGIES II
Chair: Dr. Greg Vert,
Embry Riddle Aeronautical University, USA
July 27, 2016 (Wednesday); 01:20am - 03:00pm
(LOCATION: Ballroom 2)
01:20 - 01:40pm: FREE SLOT
01:40 - 02:00pm: KERMAN: A Key Establishment Algorithm Based on Harvesting
Randomness in MANETs
Mohammad Reza Khalili Shoja, George Traian Amariucai,
Shuangqing Weiy, Jing Dengz
Department of ECE, Iowa State University, Iowa, USA;
School of EECS, Louisiana State University, Louisiana, USA;
Department of CS, University North Carolina at Greensboro,
North Carolina, USA
02:00 - 02:20pm: Performance Comparison of AES-CCM and AES-GCM Authenticated
Encryption Modes
Levent Ertaul, Anup Mudan, Nausheen Sarfaraz
California State University East Bay, Hayward, California, USA
02:20 - 02:40pm: A DNA-Based Cryptographic Key Generation Algorithm
Shakir M. Hussain, Hussein Al-Bahadili
Faculty of IT, University of Petra, Amman, Jordan
02:40 - 03:00pm: FREE SLOT
03:00 - 03:40pm: POSTER SESSION C-SAM
(INCLUDES POSTER + SHORT & POSITION PAPERS)
July 27, 2016 (Wednesday)
(LOCATION: Hallways of Ballrooms 1-5)
O. A Denied-Events Based Detection Method Against SSH Brute-Force
Attack in Supercomputing Service Environment
Jae-Kook Lee, Sung-Jun Kim, Taeyoung Hong
Department of Supercomputing Infrastructure, KISTI,
Daejeon, Korea
O. How to Realize a Soft Tracking of People in Temporary Reception
Centres
G. L. Masala, M. L. Ganadu
Department of Political Science, Communication, Engineering and
Information Technologies and Department of Humanities and Social
Sciences, University of Sassari, Sassari, Italy
O. ...
SESSION 10-SAM: COMPUTER SECURITY + SECURITY APPLICATIONS
Chair: Dr. Kazi Zunnurhain,
Northern Kentucky University, USA
July 27, 2016 (Wednesday); 03:40am - 05:40pm
(LOCATION: Ballroom 2)
03:40 - 04:00pm: Using DroidDream Android Malware Behavior for Identification of
Other Android Malware Families
YeKung Kim, Kathy J. Liszka, Chien-Chung Chan
Department of CS, The University of Akron, Akron, Ohio, USA
04:00 - 04:20pm: Anomaly Detection and Machine Learning Methods for Network
Intrusion Detection: an Industrially Focused Literature Review
Colin Gilmore, Jason Haydaman
TRTech., Winnipeg, Canada
04:20 - 04:40pm: Cloud Application Model Personal Healthcare Record Implementation
Amer Jneid, Ashraf Gaffar
Arizona State University, Tempe, Arizona, USA;
Arizona State University, Meza, Arizona, USA
04:40 - 05:00pm: Using OWASP Vulnerabilities to Evaluate Open Source Web Scanners
Kathryn Johnston, Mario A. Garcia
Computer Science, California State University San Bernardino,
San Bernardino, California, USA; Department of Computer Science,
Texas A&M Corpus Christi, Corpus Christi, Texas, USA
05:00 - 05:20pm: Live Migration of Virtual Machine in Cloud: Survey of Issues
and Solutions
Hani Alshahrani, Ali Alshehri, Raed Alharthi, and
Abdulrahman Alzahrani
Department of Computer Science and Engineering,
Oakland University, Rochester, Michigan, USA
05:20 - 05:40pm: FREE SLOT
05:40 - 08:30pm: TUTORIALS + DISCUSSIONS
(Please refer to the lists at the begining of the program
book for details)To select a different schedule CLICK HERE