MIST 2012 Program
(Tentative)

November 8th, 2012

 

[MIST1] Managing Insider Threats
November 8th: 9:30-11:10

Session Chair:  Dr. Ilsun You (Korean Bible Univ., Republic of Korea)

 

-    Chronological Examination of Insider Threat Sabotage: Preliminary Observations
William Claycomb, Carly Huth, David McIntire and Lori Flynn
(CERT Insider Threat Center, Carnegie Mellon University, USA)

-    Design of Categorization Mechanism for Disaster-Information-Gathering System
Shinsaku Kiyomoto, Kazuhide Fukushima and Yutaka Miyake
(KDDI R&D Laboratories Inc, Japan)

-    Detection of Insider Attacks to the Web server
Kyungsan Cho and Byungha Choi (Dankook University, South Korea)

-    A Special Purpose Signature Scheme for Secure Computation of Traffic in a Distributed Network
Sree Vivek S1, Sharmila Deva Selvi S1, Ramarathnam Venkatesan2 and Chandrasekaran Pandurangan1
(1Indian Institute of Technology Madras, and 2Microsoft, India)

 

[Coffee Break] 11:10~11:30

 

[MIST2] Managing Insider Threats and Information Leakage for Cloud Computing Environments
November 8th: 11:30-12:30
Session Chair: 
 Dr. Shinsaku Kiyomoto (NICT, Japan)

-    A design of Onto-ACM(Ontology based Access Control Model) in Cloud Computing Environments
Chang Choi1, Junho Choi1, Byeongkyu Ko1, Kunseok Oh2 and Pankoo Kim1
(1Chosun University and 2Gwangju Health College, South Korea)

-    A Study on Design and Implementation of E-Discovery Service based on Cloud Computing
Taerim Lee, Hun Kim, Kyung Hyune Rhee and Sang Uk Shin
(Pukyoung National University, South Korea)

-    Efficient Certificateless Online/Offline Signature
Sharmila Deva Selvi S1, Sree Vivek S1, Vivek Krishna Pradhan2, and Chandrasekaran Pandurangan1
(1Indian Institute of Technology Madras, and 2Indian Institute of Science Eduction and Research, India)


[Lunch Break] 12:30~13:50


[MIST3] Invited Talk 1
November 8th: 13:50-14:50
Session Chair: Dr. William Claycomb (CERT Insider Threat Center, Carnegie Mellon University, USA)

-    Inside, Outside -- But Clearly Not on *Our* Side
Prof. Eugene H. Spafford (Purdue University, USA)

Abstract. Historically, the community was first concerned with insider attacks. Then, starting in the 1980s, we connected systems together and began to be concerned about outsiders. The pendulum swung nearly completely in that direction, to the point where insiders were often not considered. Now we are again considering insiders. Is this a good way to think about system protection? Is there a better way? What should we really be worried about? In this talk, I'll recount some of the issues of insider vs. outsider, history of detection, and likely future developments. I hope to provide some ideas about how to protect systems and consider the threats we face.



[Break] 14:50~15:00

 

[MIST4] Related Technologies 1
November 8th: 15:00-16:00
Session Chair: Prof. Chandrasekaran Pandurangan (Indian Institute of Technology Madras, India)

-    A Fault-Resistant AES implementation Using Differential Characteristic of Input and Output
Jeongsoo Park (Hoseo University, South Korea), Kiseok Bae (Kyungpook National University, South Korea),
Yongje Choi (ETRI, South Korea), Dooho Choi (ETRI, South Korea) and Jaecheol Ha (Hoseo University, South Korea)

-    Design and Experiments of small DDoS Defense System using Traffic Deflecting in Autonomous System
Ho-Seok Kang and Sung-Ryul Kim (Konkuk University, South Korea)

-    A New Efficient Verifiable Fuzzy Keyword Search Scheme
Wang Jianfeng (Xidian university, China), Hua Ma (Xidian university, China),
Qiang Tang (University of Luxembourg, Luxembourg), Jin Li (Guangzhou University, China)
 and Xiaofeng Chen (Xidian university, China)


 

[Coffee Break] 16:00-16:30

[MIST5] Panel Discussion: ¡°Key Challenges in Defending Against Insider Threats¡±
November 8th: 16:30-18:10
Chair: Dr. Dongwan Shin (New Mexico Tech, USA)
Panelists: 
Prof. Eugene H. Spafford (Purdue University, USA), Prof. Dieter Gollmann (Hamburg University of Technology, Germany),
Dr. William R. Claycomb (Carnegie Mellon University, USA), Dr. Ruo Ando (NICT, Japan)


[Workshop Dinner] 19:00 ~


November 9th, 2012

 

[MIST6] Information Leakage Prevention 1
November 9th: 9:00-10:30

Session Chair:  Dr. Dongwan Shin (New Mexico Tech, USA)

 

-    Detecting Information Leakage via a HTTP Request Based on the Edit Distance
Chiba Kazuki, Yosiaki Hori and Kouichi Sakurai
(Institute of Systems, Information Technologies and Nanotechnologies / Kyushu-university, Japan)

-    Securing the "Bring Your Own Device" Policy
Alessandro Armando, Gabriele Costa, Alessio Merlo and Luca Verderame (University of Genova, Italy)

-    Strategic Information Splitting Using Biometric Patterns
Marek Ogiela and Lidia Ogiela (AGH University of Science and Technology, Poland)

-    Personal Identification Based on Cognitive Analysis of Selected Medical Visualization
Marek Ogiela and Lidia Ogiela (AGH University of Science and Technology, Poland)

 

[Coffee Break] 10:30~11:00

[MIST7] Invited Talk 2
November 9th: 11:00-12:00
Session Chair: Kangbin Yim (Soonchunhyang University, South Korea)

-    Security for Cyber-physical Systems
Prof. Dieter Gollmann (Hamburg University of Technology, Germany)

Abstract. Cyber-physical systems are characterized by an IT infrastructure controlling effects in the physical world. Attacks are intentional actions that try to cause undesired effects in the physical world.
We will examine to which extent traditional IT security techniques can protect against attacks on cyber-physical systems, and which additional measures could be deployed to strengthen their security.

 

[Lunch Break] 12:00~13:25


[MIST8] Information Leakage Prevention 2
November 9th: 13:25-14:40

Session Chair:  Dr. Gabriele Costa (University of Genova, Italy)

 

-    Extraction of Platform-unique Information as an Identifier
Kangwon Lee1, Kyungroul Lee1, Jaecheon Byun1, Sunghoon Lee2, Hyobeom Ahn3 and Kangbin Yim1
(1Soonchunhyang University, 2EDA Korea, and 3Kongju University, South Korea)

-    A Brief Survey on Rootkit Techniques in Malicious Codes
Sungkwan Kim1, Junyoung Park1, Kyungroul Lee1, Ilsun You2 and Kangbin Yim1
(1Soonchunhyang University and 2Korean Bible University, South Korea)

-    An Android Security Extension to Protect Personal Information
against Illegal Accesses and Privilege Escalation Attacks
Yeongung Park, Chanhee Lee, Seong-Je Cho and Jongmoo Choi (Dankook University, South Korea)

 

[Coffee Break] 14:40~15:05

[MIST9] Cryptographic Technologies
November 9th: 15:05-16:20

Session Chair:   Dr. Kenji Yasunaga (Institute of Systems, Information Technologies and Nanotechnologies, Japan)

 

-    Short signature from factoring assumption in the standard model
Zhiwei Wang, Guozi Sun and Danwei Chen
(Nanjing University of Posts and Telecommunications, China)

-    PKI Based Signcryption Without Pairing : An Efficient Scheme With Tight Security Reduction
Sharmila Deva Selvi S1, Sree Vivek S1, Salini Selvaraj Kowsalya2 and Chandrasekaran Pandurangan1
(1Indian Institute of Technology Madras, and 2Anna University, India)

-    Lattice Forward-Secure Identity Based Encryption Scheme
Kunwar Singh1, Chandrasekaran Pandurangan2 and A.K. Banerjee1
(1NIT Trichy, 2Indian Institute of Technology Madras, India)