27.06.2013 Views

7th International Conference on Information Warfare and Security ...

7th International Conference on Information Warfare and Security ...

7th International Conference on Information Warfare and Security ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Wednesday 21 March 2012<br />

18:30 Hotel Deca Bar<br />

Pre‐c<strong>on</strong>ference registrati<strong>on</strong> <strong>and</strong> welcome meeting (Until 1930)<br />

Thursday 22 March 2012<br />

09:00 Registrati<strong>on</strong> <strong>and</strong> coffee<br />

09:30 Room: 102<br />

Welcome from the c<strong>on</strong>ference chair: Dr. Barbara Endicott‐Popovsky, Center for Informati<strong>on</strong> Assurance <strong>and</strong> Cybersecurity, University of Washingt<strong>on</strong>, Seattle, USA<br />

09:45 Keynote address: Kirk Bailey, CISO, University of Washingt<strong>on</strong><br />

10:30 <str<strong>on</strong>g>C<strong>on</strong>ference</str<strong>on</strong>g> splits into streams<br />

Room: 022<br />

Stream A: Cyber <strong>Security</strong><br />

Chair: Ginny Greiman<br />

10:45 The Influence of Cyber <strong>Security</strong> Levels of South African<br />

Citizens <strong>on</strong> Nati<strong>on</strong>al <strong>Security</strong><br />

Jansen van Vuuren Joey, Marthie Grobler Council of<br />

Scientific <strong>and</strong> Industrial Research <strong>and</strong> Jannie Zaaiman,<br />

University of Venda, South Africa<br />

11:15 Study of the Percepti<strong>on</strong> of Cyber Threats <strong>and</strong> the Fear<br />

of Cybercrime<br />

Bernik Igor <strong>and</strong> Gorazd Mesko, University of Maribor,<br />

Slovenia<br />

11:45 SCADA Systems in South Africa <strong>and</strong> Their<br />

Vulnerabilities<br />

Chileshe Grace <strong>and</strong> Renier van Heerden, University of<br />

Pretoria, South Africa<br />

12:15 Cyber <strong>Security</strong> Awareness Initiatives in South Africa: A<br />

Synergy‐Approach<br />

Dlamini Innocentia Zama <strong>and</strong> Mapule M Modise, CSIR,<br />

South Africa<br />

<str<strong>on</strong>g>7th</str<strong>on</strong>g> <str<strong>on</strong>g>Internati<strong>on</strong>al</str<strong>on</strong>g> <str<strong>on</strong>g>C<strong>on</strong>ference</str<strong>on</strong>g> <strong>on</strong> Informati<strong>on</strong> <strong>Warfare</strong> <strong>and</strong> <strong>Security</strong><br />

University of Washingt<strong>on</strong>, Seattle, USA<br />

21‐23 March 2012<br />

Room: 026<br />

Stream B: Attacks<br />

Chair: Larisa Bret<strong>on</strong><br />

Supply Chain Attacks: Basic Input Output Systems (BIOS),<br />

Mux Multiplexers, <strong>and</strong> Field Programmable Gate Arrays<br />

(FPGA)<br />

Rohret David, <strong>and</strong> Justin Willmann, Joint Informati<strong>on</strong><br />

Operat<strong>on</strong>s <strong>Warfare</strong> Center (JIOWC) Vulnerability<br />

Assessment Team (JVAT), USA<br />

Simulated E‐Bomb Effects On Electr<strong>on</strong>ically Equipped<br />

Targets<br />

Yurtoglu Enes, Turkish Air Force War College, Turkey<br />

Measures To Abate Evil Twin Attacks in 802.11<br />

M<strong>and</strong>al Say<strong>on</strong>nha <strong>and</strong> Nagadivya Veld<strong>and</strong>a, University of<br />

Oklahoma, USA<br />

Implementati<strong>on</strong> of Symmetric Block Ciphers using GPGPU<br />

Nishikawa Naoki , Keisuke Iwai <strong>and</strong> Takakazu Kurokawa,<br />

Nati<strong>on</strong>al Defense Academy, Japan<br />

Room: 111<br />

Stream C: I‐<strong>Warfare</strong><br />

Chairs: Leigh Armistead<br />

A Game Theoretic Model of Strategic C<strong>on</strong>flict in<br />

Cyberspace<br />

Schramm Harris<strong>on</strong>, David Alders<strong>on</strong>, Nedialko Dimitrov<br />

<strong>and</strong> Carlyle W. Matt, Naval Postgraduate School,<br />

M<strong>on</strong>erey, CA, USA<br />

Decisi<strong>on</strong>‐Making by Effective C2I system<br />

Blaha Martin <strong>and</strong> Katerina Brabcova University of<br />

Defence, Czech Republic<br />

From Traditi<strong>on</strong>al Local to Global Cyberspace – Slovenian<br />

Perspectives <strong>on</strong> Informati<strong>on</strong> <strong>Warfare</strong><br />

Bernik Igor <strong>and</strong> Kaja Prislan, University of Maribor,<br />

Slovenia<br />

Room: 175<br />

Stream D: Mini Track <strong>on</strong> Critical Infrastructure<br />

Protecti<strong>on</strong><br />

Chair: Juan Lopez Jr.<br />

Securing America Against Cyberwar<br />

McCun Jays<strong>on</strong>, Dwight Haworth University of<br />

Nebraska at Omaha, USA<br />

<strong>Security</strong> Preprocessor for Industrial C<strong>on</strong>trol<br />

Networks<br />

Hieb Jeffrey, Graham James, Jacob Schreiver <strong>and</strong><br />

Kyle Moss, University of Louisville, USA<br />

Using Attack Trees to Assess the <strong>Security</strong> of SCADA<br />

systems<br />

Lopez Jr. Juan, Jeffrey Hemmes, Jeffrey Humphries,<br />

Air Force Institute of Technology, Dayt<strong>on</strong>, OH <strong>and</strong><br />

Jas<strong>on</strong> Nielsen, Airforce Intelligence Surveillance <strong>and</strong><br />

Rec<strong>on</strong>naissance Agency, San Ant<strong>on</strong>io, TX, USA<br />

Comparing Models of Offensive Cyber Operati<strong>on</strong>s Detecting Hidden Logic Bombs in Critical<br />

Grant Tim, Netherl<strong>and</strong>s Defence Academy, Netherl<strong>and</strong>s, Infrastructure Software<br />

Ivan Burke <strong>and</strong> Renier Van Heerden, Council for Scientific Agrawal Hira, James Alberi, Lisa Bahler, Josephine<br />

<strong>and</strong> Industrial Research, South Africa<br />

Micallef, <strong>and</strong> Alex<strong>and</strong>r Virodov, Telcordia<br />

Technologies, NJ, Mark Magenheimer <strong>and</strong> Shane<br />

Snyder US Army CERDEC, MD, Vidroha Debroy <strong>and</strong><br />

Eric W<strong>on</strong>g The University of Texas at Dallas, TX, USA<br />

12:45 Lunch Lunch Lunch Lunch<br />

19/03/2012 13:08 This timetable is subject to change 1


Room: 022<br />

Stream A: Cyber <strong>Security</strong><br />

Chair: Jannie Zaaiman<br />

14:00 Protecting Health Informati<strong>on</strong> Privacy <strong>and</strong> Safety <strong>on</strong><br />

the Internet: eHealth Systems <strong>and</strong> Legal Perspectives<br />

Greiman Virginia, Tanya Zlateve <strong>and</strong> Lou Chitkushev,<br />

Bost<strong>on</strong> University, USA<br />

14:30 C<strong>on</strong>vergence of Electr<strong>on</strong>ic <strong>Warfare</strong> <strong>and</strong> Computer<br />

Network Exploitati<strong>on</strong>/Attacks within the Radio<br />

Frequency Spectrum<br />

Rohret David <strong>and</strong> Abiud Jimenez, Joint Informati<strong>on</strong><br />

Operati<strong>on</strong>s <strong>Warfare</strong> Center (JIOWC) Assessment<br />

Vulnerabiity Team (JVAT), USA<br />

15:00 Cyberpower: Learning from the Rich, Historical<br />

Experience of War<br />

B<strong>on</strong>ner Ernest, Air University, USA<br />

Room: 026<br />

Stream B: Mini Track <strong>on</strong> The Legal C<strong>on</strong>text/Dimensi<strong>on</strong><br />

for IW<br />

Chair: Dan Ryan<br />

Establishing Cyberspace Sovereignty<br />

Barcomb Kris, Robert Mills, Dennis Krill <strong>and</strong> Michael<br />

Saville, Air Force Institute of Technology, USA<br />

Attributi<strong>on</strong>: Digital Forensics <strong>on</strong> the Cyber Battlefield<br />

Ryan Daniel <strong>and</strong> Julie Ryan, George Washingt<strong>on</strong><br />

University, USA<br />

A Progress Report <strong>on</strong> the IW Ops Manual<br />

Tikk Ringas, Eneken , Tor<strong>on</strong>to University Munk School of<br />

<str<strong>on</strong>g>Internati<strong>on</strong>al</str<strong>on</strong>g> Affairs, Canada (presentati<strong>on</strong> <strong>on</strong>ly)<br />

Room: 111<br />

Stream C: Authenticati<strong>on</strong> <strong>and</strong> Identificati<strong>on</strong><br />

Chair: Jeffrey McD<strong>on</strong>ald<br />

A Novel Friendly Image‐Based CAPTCHA with Auto‐<br />

Generati<strong>on</strong> of Test Data<br />

Chun‐Jung Lee, Wei‐Bin Lee, Chin‐Sheng Liu, Chyi‐Ren<br />

Dow, Feng Chia University, Kevin Ho, Providence<br />

University <strong>and</strong> Tsung‐Hung Lin, Nati<strong>on</strong>al Chin‐Yi<br />

University of Technology, Taiwan (R.O.C.)<br />

Trolling Online for Real World Identities<br />

Perr Christopher, Daniel Compt<strong>on</strong> <strong>and</strong> John Hamilt<strong>on</strong>,<br />

Auburn University, USA<br />

A Novel Biometric System Based <strong>on</strong> T<strong>on</strong>gueprint Images<br />

Shahriari Mohammad Reza Islamic Azad University, UAE<br />

Branch, Dubai, Shirin Manafi Islamic Azad University,<br />

Tehren, Azad University <strong>and</strong> Sepehr Sadeghian, IRAN<br />

University of Science & Technology, Iran<br />

Room: 175<br />

Stream D: Strategy <strong>and</strong> NIDs<br />

Chair: Dino Schweitzer<br />

The Crawl, Walk, Run Progressi<strong>on</strong> for Strategic<br />

Communicati<strong>on</strong><br />

Paul Christopher, RAND Corp., USA<br />

The Islamic Republic of Iran Strategy’s against Soft<br />

<strong>Warfare</strong><br />

Anoosheh Ebrahim, Islamic Azad university,<br />

Rafsanjan branch , Iran<br />

15:30 Refreshments Refreshments Refreshments Refreshments<br />

16:00<br />

Room: 175<br />

Panel Discussi<strong>on</strong> to be led by Leigh Armistead<br />

Informati<strong>on</strong> warfare, collateral damage, <strong>and</strong> the issue of scale<br />

Panelists include Michael Hamilt<strong>on</strong>, CISO of the City of Seattle<br />

17:00 Close of c<strong>on</strong>ference day Close of c<strong>on</strong>ference day Close of c<strong>on</strong>ference day Close of c<strong>on</strong>ference day<br />

19:00<br />

Bus leaves Deca Hotel for the <str<strong>on</strong>g>C<strong>on</strong>ference</str<strong>on</strong>g> Dinner at Ivar’s Salm<strong>on</strong> House<br />

22:00<br />

Bus returns to the Deca Hotel<br />

19/03/2012 12:50 This timetable is subject to change 2


09:30<br />

10:20 Introducti<strong>on</strong> to ICIW 2013 in Denver by Dan Likarish<br />

10:30 Refreshments<br />

Poster c<strong>on</strong>tributors will st<strong>and</strong> by their posters for<br />

participants to discuss their research<br />

Room: 022<br />

Stream A: Denial of Service <strong>and</strong> Network Attacks<br />

Chair: Robert Mills<br />

11:00 An Approach for Cross‐Domain Intrusi<strong>on</strong> Detecti<strong>on</strong><br />

Nguyen Thuy, Mark G<strong>on</strong>dree, Jean Khosalm, David<br />

Shifflett, Timothy Levin <strong>and</strong> Cynthia Irvine Naval<br />

Postgraduate School, USA<br />

11:30 Classifying Network Attack Scenarios Using an Ontology<br />

Van Heerden Renier Pelser, CSIR, Pretoria, Ivan Burke<br />

<strong>and</strong> Barry Irwin, Rhodes University, South Africa<br />

12:00 A Targeted Wireless Denial of Service Attack: Deauth or<br />

not to Deauth, that is the Questi<strong>on</strong><br />

Kraft Michael <strong>and</strong> J<strong>on</strong>ath<strong>on</strong> Holst<strong>on</strong>, JIOWC, TX, USA<br />

Room: 102<br />

Keynote address: Dr Eneken Tikk Ringas, Tor<strong>on</strong>to University Munk School of <str<strong>on</strong>g>Internati<strong>on</strong>al</str<strong>on</strong>g> Affairs, Canada<br />

"Rules of the Road" for a Polarized Cyberspace ‐ A View <strong>on</strong> Current <str<strong>on</strong>g>Internati<strong>on</strong>al</str<strong>on</strong>g> Cyber Law <strong>and</strong> Policy Priorities<br />

Refreshments<br />

Poster c<strong>on</strong>tributors will st<strong>and</strong> by their posters for<br />

participants to discuss their research<br />

Room: 026<br />

Stream B: Mini Track <strong>on</strong> Asymmetric <strong>Warfare</strong> in<br />

Cyberspace – Prospects <strong>and</strong> Potentials<br />

Co‐Chairs: Dan Shoemaker <strong>and</strong> R<strong>on</strong>ald C. Dodge<br />

Intelligence <strong>and</strong> Influence Potential in Virtual Worlds<br />

Stein George, USAF Center for Strategy & Technology, USA<br />

Virtual N<strong>on</strong>State Actors as Clausewitzian Centers of<br />

Gravity: An Examinati<strong>on</strong> for Sensemaking, Elaborati<strong>on</strong> <strong>and</strong><br />

Discussi<strong>on</strong><br />

Bret<strong>on</strong> Larisa, University of the District of Columbia, USA<br />

A Practical Method for Minimizati<strong>on</strong> of Attack Surfaces in<br />

Informati<strong>on</strong> <strong>Warfare</strong><br />

Wils<strong>on</strong> Charles, University of Detroit Mercy <strong>and</strong> Bradley<br />

Wilkers<strong>on</strong>, Eastern Michigan University, USA<br />

Refreshments<br />

Poster c<strong>on</strong>tributors will st<strong>and</strong> by their posters for<br />

participants to discuss their research<br />

Room: 111<br />

Stream C: ICT <strong>Security</strong> <strong>and</strong> Network protocols<br />

Chair: Dwight Haworth<br />

ICT <strong>Security</strong> in the Modern Airport: Can Organic Growth<br />

Ever be Secure?<br />

McCarthy John, D<strong>on</strong> Milne, Bucks New University <strong>and</strong><br />

Bryan Mills Servicetech Engl<strong>and</strong>, UK (Presentati<strong>on</strong> <strong>on</strong>ly)<br />

Fairness of Trust Based Mobile ad hoc Network Protocols<br />

Burke Ivan, CSIR <strong>and</strong> Martin Olivier, University of Pretoria,<br />

South Africa<br />

12:30 Lunch Lunch Lunch<br />

19/03/2012 12:52 This timetable is subject to change 3


13:30<br />

Room: 022<br />

Stream A: Software Issues<br />

Chair: Harris<strong>on</strong> Schramm<br />

14:00 Examining Tradeoffs for Hardware‐Based Intellectual<br />

Property Protecti<strong>on</strong><br />

McD<strong>on</strong>ald Jeffrey, University of South Alabama <strong>and</strong><br />

Y<strong>on</strong>g Kim, Air Force Insitute of Technology, USA<br />

14:30 Attributi<strong>on</strong> of Drive‐by Downloads involved in Osama’s<br />

death Malware Campaign<br />

Cherukuri Manoj <strong>and</strong> Srinivas Mukkamala, New<br />

Mexico Institute of Mining <strong>and</strong> Technology, USA<br />

15:00<br />

Room: 175<br />

Plenary presentati<strong>on</strong>: Voldymyr Lysenko, Center for Informati<strong>on</strong> Assurance <strong>and</strong> Cybersecurity, University of Washingt<strong>on</strong>, Seattle, USA<br />

The role of ICT in the Arab Spring<br />

Room: 026<br />

Stream B: <strong>Security</strong> Teaching <strong>and</strong> Awareness<br />

Chair: George Stein<br />

The Development of IO / IW Curriculums in the United<br />

States: A Review of Current Efforts <strong>and</strong> a Case Study from<br />

Norwich University<br />

Armistead Leigh, Edith Cowan University, Perth, Australia<br />

Effectively Teaching Cyber <strong>Warfare</strong> to a N<strong>on</strong>‐Technical<br />

Audience<br />

Bibighaus David, David Gibs<strong>on</strong>, Martin Carlisle David<br />

Merritt, Jeff Boleng <strong>and</strong> James Maher, United States Air<br />

Force Academy, USA<br />

Room: 111<br />

Stream C: Mini Track Call for Papers <strong>on</strong> Informati<strong>on</strong><br />

Assurance<br />

Chair: Natarajan Vijayarangan<br />

Visualizati<strong>on</strong> in Informati<strong>on</strong> <strong>Security</strong><br />

Schweitzer Dino, USAF Academy, USA <strong>and</strong> Steve Fult<strong>on</strong>,<br />

USAF Academy, USA<br />

BioONT: Improving Knowledge Organizati<strong>on</strong> <strong>and</strong><br />

Representati<strong>on</strong> in the Domain of Biometric Authenticati<strong>on</strong><br />

Buerle Stephen, State University of New York at Albaney,<br />

USA,<br />

15:30 Close of <str<strong>on</strong>g>C<strong>on</strong>ference</str<strong>on</strong>g> Close of <str<strong>on</strong>g>C<strong>on</strong>ference</str<strong>on</strong>g> Close of <str<strong>on</strong>g>C<strong>on</strong>ference</str<strong>on</strong>g><br />

Work in Progress <strong>and</strong> Posters<br />

Modeling Organizati<strong>on</strong>al Management by Adapting to Hackers at the State Service: Cyberwars Against Est<strong>on</strong>ia<br />

the Strengthening of the Informati<strong>on</strong>'s Protecti<strong>on</strong> <strong>and</strong> Georgia<br />

Requirements in the Innovative Organizati<strong>on</strong> Lysenko Volodymyr <strong>and</strong> Barbara Endicott‐Popovsky,<br />

Ciopa Stiuca Marcela Izabela <strong>and</strong> Cristian Silviu Banacu, University of Washingt<strong>on</strong>, Seattle, USA<br />

The Academy of Ec<strong>on</strong>omic Sciences, Romania<br />

Evaluati<strong>on</strong> of Traditi<strong>on</strong>al <strong>Security</strong> Soluti<strong>on</strong>s in the<br />

SCADA Envir<strong>on</strong>ment<br />

Larkin Robert, J<strong>on</strong>athan Butts , <strong>and</strong> Juan Lopez, AFIT,<br />

USA<br />

Room: 175<br />

A summary of issues raised during the c<strong>on</strong>ference<br />

Led by Voldymyr Lysenko <strong>and</strong> Barbara Endicott‐Popovsky<br />

Prize for the best poster will be awarded<br />

Behavioral‐Based Method for Detecting SCADA Malware<br />

Bushey Henry, J<strong>on</strong>athan Butts, <strong>and</strong> Juan Lopez, AFIT, USA<br />

Cyber Fratricide: A Literature Review of<br />

Abokhodair Norah, Aar<strong>on</strong> Alva, University of Washingt<strong>on</strong>,<br />

Seattle, USA<br />

An Infinite Dimensi<strong>on</strong>al Mathematical Flag for Defense<br />

Applicati<strong>on</strong>s<br />

Vijayarangan Avinash, BVM Global School at Bollineni<br />

Hillside, India (poster <strong>on</strong>ly)<br />

19/03/2012 12:53 This timetable is subject to change 4

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!