SEC Program
July 7 |
9:00 – 17:00 |
Meeting of the TC 11 9am - 5pm |
9:00 – 12:00 |
Workshop 1 |
18:00 – 21:00 |
Maori Welcome and Reception
|
July 8 |
9:00 – 1700 |
SEC Conference, Day 1
Welcome & Conference Keynote Address
- Morning tea
- Paper presentations
- Lunch
- Paper presentations
- Afternoon tea
- Paper presentations
|
19:00 – 23:00 |
Conference dinner
|
July 9 |
9:00 – 1700 |
SEC Conference, Day 2
- Keynote Address
- Morning tea
- Paper presentations
- Lunch
- Paper presentations
- Afternoon tea
|
19:00 – 23:00 |
Cultural event
|
July 10 |
9:00 – 12:00 |
SEC Conference, Day 3
- Paper presentations
- Morning tea
- Paper presentations
- Lunch
- Workshop 2
Detailed program is in Conference schedule
|
Papers accepted for presentation at SEC 2013
conference:
(in no particular
order)
Phishing and Organisational Learning: Wayne
Kearney and Hennie Kruger.
Key Derivation Function: The SCKDF Scheme: Chai Wen
Chuah, Edward Dawson and Leonie Simpson.
Enforcement of Privacy Requirements:
Padmanabhan Krishnan and Kostyantyn Vorobyov.
Evolving A Secure Internet: William Caelli,
Lam-For Kwok and Dennis Longley.
Program Transformation for Non-interference Verification
on Programs with Pointers: Mounir Assaf, Julien Signoles, Frédéric
Tronel and Éric Totel.
New Attacks on Song et al.'s Authentication Protocol for
Low-cost RFID Tags: Sarah Abughazalah.
Enhancing Click-Draw based Graphical Passwords using
Multi-Touch on Mobile Phones: Yuxin Meng, Wenjuan Li and Lam-For Kwok.
A Lightweight Gait Authentication on Mobile Phone
Regardless of Installation Error: Thang Hoang and Thuc Nguyen.
Improving Mobile Device Security with Operating
System-level Virtualization: Sascha Wessel, Frederic Stumpf, Ilja Herdt and
Claudia Eckert.
Extraction of ABNF Rules from RFCs to Enable Automated
Test Data Generation: Markus Gruber, Phillip Wieser, Stefan Nachtnebel,
Christian Schanes and Thomas Grechenig.
A Viable System Model of Information Security Governance:
Establishing a Baseline to Demonstrate the Importance of Direct Feedback
Between Governance and Operations Systems: Ezzat Alqurashi, Gary Wills and
Lester Gilbert.
Performance Analysis of File Carving Tools: Thomas
Laurenson.
Phishing for the truth: A scenario-based experiment of
users’ behavioural response to emails: Kathryn Parsons, Agata McCormac,
Malcolm Pattinson, Marcus Butavicius and Cate Jerram.
Malware Detection using a Cumulative Timeline Approach:
Rafiqul Islam, Irfan Altas and Saiful Islam.
Towards Security-enhanced and Privacy-preserving Mashup
Compositions: Heidelinde Hobel, Johannes Heurix, Amin Anjomshoaa and Edgar
Weippl.
A review of the theory of planned behaviour in the
context of information security policy compliance: Teodor Sommestad and
Jonas Hallberg.
Screening Smartphone Applications using Behavioral
Signatures: Suyeon Lee, Jehyun Lee and Heejo Lee.
Applying DAC principles to the RDF graph data model:
Sabrina Kirrane, Alessandra Mileo and Stefan Decker.
Cost-Benefit Evaluation of Malware Proliferation
Mitigation Strategies with Epidemiology Modelling and Game Theory:
Theodoros Spyridopoulos, George Oikonomou, Theo Tryfonas and Mengmeng Ge.
Sustainable Pseudo-random Number Generator: Huafei
Zhu, Wee-Siong Ng and See-Kiong Ng.
Generating Realistic Application Workloads for Mix-Based
Systems for Controllable, Repeatable and Usable Experimentation: Karl-Peter
Fuchs, Dominik Herrmann and Hannes Federrath.
On Privacy-Preserving Ways to Porting the Austrian eID
System to the Public Cloud: Bernd Zwattendorfer and Daniel Slamanig.
An empirical evaluation of the Android Security Framework:
Alessandro Armando, Alessio Merlo and Luca Verderame.
A security engineering process approach for the future
development of complex aircraft cabin systems: Hartmut Hintze,
Benjamin Wiegraefe and Ralf God.
Secure Outsourcing: an investigation of the fit between
clients and providers: Gurpreet Dhillon, Romilla Chowdhuri and Filipe
Sá-Soares.
Mobile Device Encryption Systems: Peter Teufl, Thomas
Zefferer and Christof Stromberger.
Using CIRA for Privacy Risk Analysis of an Identity
Management System: Lisa Rajbhandari and Einar Snekkenes.
A Case for Societal Digital Security Culture: Lotfi
Ben Othmane, Harold Weffers, Rohit Ranchal, Pelin Angin, Bharat Bhargava and
Mohd Murtadha Mohamad.
Performance analysis of scalable attack representation
models: Jin B. Hong and Dong Seong Kim.
ADAPT: A Game Inspired Attack-Defense And Performance
Taxonomy: Chris Simmons, Sajjan Shiva, Harkeerat Singh Bedi and Vivek
Shandilya.
Smartphone Volatile Memory Acquisition for Security
Analysis and Forensics Investigation: Vrizlynn Thing and Zheng-Leong Chua.