MIST 2012 Program
(Tentative)
November 8th, 2012
[MIST1] Managing Insider Threats
November 8th: 9:30-11:10
Session Chair: Dr. Ilsun You (Korean Bible Univ.,
Republic of Korea)
- Chronological
Examination of Insider Threat Sabotage: Preliminary Observations
William Claycomb, Carly Huth, David McIntire and Lori Flynn
(CERT Insider Threat Center, Carnegie Mellon University, USA)
- Design of
Categorization Mechanism for Disaster-Information-Gathering System
Shinsaku Kiyomoto, Kazuhide Fukushima and Yutaka Miyake
(KDDI R&D Laboratories Inc, Japan)
- Detection of
Insider Attacks to the Web server
Kyungsan Cho and Byungha Choi (Dankook University, South Korea)
- A Special
Purpose Signature Scheme for Secure Computation of Traffic in a Distributed
Network
Sree Vivek S1, Sharmila Deva Selvi S1, Ramarathnam
Venkatesan2 and Chandrasekaran Pandurangan1
(1Indian Institute of Technology Madras, and 2Microsoft,
India)
[Coffee Break] 11:10~11:30
[MIST2] Managing Insider Threats and
Information Leakage for Cloud Computing Environments
November 8th: 11:30-12:30
Session Chair: Dr. Shinsaku
Kiyomoto (NICT, Japan)
- A design of
Onto-ACM(Ontology based Access Control Model) in Cloud Computing Environments
Chang Choi1, Junho Choi1, Byeongkyu Ko1,
Kunseok Oh2 and Pankoo Kim1
(1Chosun University and 2Gwangju Health College, South
Korea)
- A Study on
Design and Implementation of E-Discovery Service based on Cloud Computing
Taerim Lee, Hun Kim, Kyung Hyune Rhee and Sang Uk Shin
(Pukyoung National University, South Korea)
- Efficient
Certificateless Online/Offline Signature
Sharmila Deva Selvi S1, Sree Vivek S1, Vivek Krishna
Pradhan2, and Chandrasekaran Pandurangan1
(1Indian Institute of Technology Madras, and 2Indian
Institute of Science Eduction and Research, India)
[Lunch Break] 12:30~13:50
[MIST3] Invited Talk 1
November 8th: 13:50-14:50
Session Chair: Dr. William Claycomb (CERT Insider Threat Center, Carnegie
Mellon University, USA)
- Inside,
Outside -- But Clearly Not on *Our* Side
Prof. Eugene H. Spafford (Purdue University, USA)
Abstract. Historically, the community was first concerned with insider
attacks. Then, starting in the 1980s, we connected systems together and began
to be concerned about outsiders. The pendulum swung nearly completely in that
direction, to the point where insiders were often not considered. Now we are
again considering insiders. Is this a good way to think about system
protection? Is there a better way? What should we really be worried about? In
this talk, I'll recount some of the issues of insider vs. outsider, history of
detection, and likely future developments. I hope to provide some ideas about
how to protect systems and consider the threats we face.
[Break] 14:50~15:00
[MIST4] Related Technologies 1
November 8th: 15:00-16:00
Session Chair: Prof. Chandrasekaran Pandurangan (Indian Institute of
Technology Madras, India)
- A
Fault-Resistant AES implementation Using Differential Characteristic of Input
and Output
Jeongsoo Park (Hoseo University, South Korea), Kiseok Bae (Kyungpook
National University, South Korea),
Yongje Choi (ETRI, South Korea), Dooho Choi (ETRI, South Korea) and Jaecheol Ha
(Hoseo University, South Korea)
- Design and Experiments of small DDoS Defense
System using Traffic Deflecting in Autonomous System
Ho-Seok Kang and Sung-Ryul Kim (Konkuk
University, South Korea)
- A New
Efficient Verifiable Fuzzy Keyword Search Scheme
Wang Jianfeng (Xidian university, China), Hua Ma (Xidian university, China),
Qiang Tang (University of Luxembourg, Luxembourg), Jin Li (Guangzhou
University, China)
and Xiaofeng Chen (Xidian
university, China)
[Coffee Break] 16:00-16:30
[MIST5] Panel Discussion: ¡°Key Challenges in
Defending Against Insider Threats¡±
November 8th: 16:30-18:10
Chair: Dr. Dongwan Shin (New Mexico Tech, USA)
Panelists: Prof. Eugene H. Spafford (Purdue University, USA), Prof. Dieter Gollmann
(Hamburg University of Technology, Germany),
Dr. William R. Claycomb (Carnegie Mellon University, USA), Dr. Ruo Ando (NICT,
Japan)
[Workshop Dinner] 19:00 ~
November 9th,
2012
[MIST6] Information Leakage Prevention 1
November 9th: 9:00-10:30
Session Chair: Dr. Dongwan Shin (New Mexico Tech,
USA)
- Detecting
Information Leakage via a HTTP Request Based on the Edit Distance
Chiba Kazuki, Yosiaki Hori and Kouichi Sakurai
(Institute of Systems, Information Technologies and Nanotechnologies /
Kyushu-university, Japan)
- Securing the
"Bring Your Own Device" Policy
Alessandro Armando, Gabriele Costa, Alessio Merlo and Luca Verderame
(University of Genova, Italy)
- Strategic
Information Splitting Using Biometric Patterns
Marek Ogiela and Lidia Ogiela (AGH University of Science and Technology,
Poland)
- Personal
Identification Based on Cognitive Analysis of Selected Medical Visualization
Marek Ogiela and Lidia Ogiela (AGH University of Science and Technology,
Poland)
[Coffee Break] 10:30~11:00
[MIST7] Invited Talk 2
November 9th: 11:00-12:00
Session Chair: Kangbin Yim (Soonchunhyang University, South Korea)
-
Security for Cyber-physical Systems
Prof.
Dieter Gollmann (Hamburg University of Technology, Germany)
Abstract.
Cyber-physical systems are characterized by an IT infrastructure controlling
effects in the physical world. Attacks are intentional actions that try to
cause undesired effects in the physical world.
We will examine to which extent traditional IT security techniques can protect
against attacks on cyber-physical systems, and which additional measures could
be deployed to strengthen their security.
[Lunch Break] 12:00~13:25
[MIST8] Information Leakage Prevention 2
November 9th: 13:25-14:40
Session Chair: Dr. Gabriele Costa (University of
Genova, Italy)
- Extraction of
Platform-unique Information as an Identifier
Kangwon Lee1, Kyungroul Lee1, Jaecheon Byun1,
Sunghoon Lee2, Hyobeom Ahn3 and Kangbin Yim1
(1Soonchunhyang University, 2EDA Korea, and 3Kongju
University, South Korea)
- A Brief
Survey on Rootkit Techniques in Malicious Codes
Sungkwan Kim1, Junyoung Park1, Kyungroul Lee1,
Ilsun You2 and Kangbin Yim1
(1Soonchunhyang University and 2Korean Bible University,
South Korea)
-
An Android Security Extension to Protect
Personal Information
against Illegal Accesses and Privilege Escalation Attacks
Yeongung Park, Chanhee Lee, Seong-Je Cho and Jongmoo Choi (Dankook
University, South Korea)
[Coffee Break] 14:40~15:05
[MIST9] Cryptographic Technologies
November 9th: 15:05-16:20
Session Chair: Dr. Kenji Yasunaga (Institute of
Systems, Information Technologies and Nanotechnologies, Japan)
- Short
signature from factoring assumption in the standard model
Zhiwei Wang, Guozi Sun and Danwei Chen
(Nanjing University of Posts and Telecommunications, China)
- PKI Based
Signcryption Without Pairing : An Efficient Scheme With Tight Security
Reduction
Sharmila Deva Selvi S1, Sree Vivek S1, Salini Selvaraj
Kowsalya2 and Chandrasekaran Pandurangan1
(1Indian Institute of Technology Madras, and 2Anna
University, India)
- Lattice
Forward-Secure Identity Based Encryption Scheme
Kunwar Singh1, Chandrasekaran Pandurangan2 and A.K.
Banerjee1
(1NIT Trichy, 2Indian Institute of Technology Madras,
India)