Annual Symposium on Information Assurance >> ASIA
Navigation Menu ASIA Main Page Call for Papers Organizing Committee Symposium Proceedings Best Paper Awards Keynote Speakers Author/Presenter Information Reviewers NYS Cyber Security Conference Directions & Parking Accomodations OCS Website UAlbany Business Website Pictures Contact Us Want to Sponsor? End of Menu Facebook Twitter Years for Selection: 2006 - 2007 - 2008 - 2009 - 2010 - 2011 - 2012 - 2013

This is the proceedings for ASIA 12. To see proceedings from other years, simply click on the appropriate link above. If citing from any papers, please use the following citation information: In the Proceedings of the 7th Annual Symposium on Information Assurance (ASIA 12) / Secure Knowledge Management (SKM 2012), June 5-6, 2012, Empire State Plaza, Albany, NY.

Beginning Pages
>> Cover | Back Cover, pp.
>> Message from the ASIA/SKM General Chair (Sanjay Goel), pp.
>> Symposium Agenda, pp. i-ii
>> Table of Contents, pp. iii

ASIA/SKM Invited Talk
>> Measuring Secure Behavior: A Research Commentary, pp. 1-8
Merrill Warkentin, Mississippi State University; Detmar Straub, Georgia State University & Kalana Malimage, Mississippi State University

Session 1: Forensic / IT Audit
>> Metadata Based Forensic Analysis of Digital Information in the Web, pp. 9-15
Usama Salama, Vijay Varadharajan & Michael Hitchens, Macquarie University, Australia

>> IT Audit Challenges for Small and Medium-Sized Financial Institutions, pp. 16-22
Petter Lovas & Suzanne Wagner, Niagara University

Session 2: Cloud Security/Survivability Systems
>> Do Cloud Security Announcements Affect Firm Valuation?, pp. 23-28
Srikanth Parameswaran, Srikanth Venkatesan & Manish Gupta, University at Buffalo, State University of New York
>> Towards a Logical Framework for Migration-Based Survivability, pp. 29-33
Yanjun Zuo, University of North Dakota

ASIA/SKM Keynote
>> The State of ICS Security: A Year in Review, p. 34
Billy Rios, Google, Inc.

Session 3: Anti-Virus/Worms
>> Android Anti-Virus Analysis, pp. 35-41
Rahul Ramachandran, Tae Oh & William Stackpole, Rochester Institute of Technology

>> Computer Worm Attack using IDS and Trace Back Approaches, pp. 42-47
Sanjay Misra & Akuboh Victor Uneojo, Federal University of Technology, Minna

Session 4: Email/User Security
>> Not Sealed But Delivered: The (Un)Usability of S/MIME Today, pp. 48-61
Ann Fry, Sonia Chiasson, & Anil Somayaji, Carleton University, Ottawa, Canada
>> The Current State of Ordinary User Security, pp. 62-67
Leon Reznik, Andrew Christian, Ankit Patel, Brian Treich & Mohammed Alromaih, Rochester Institute of Technology

Session 5: Mobile Security
>> Blackberry Structure and Anti-Malware Analysis, pp. 68-71
Emily Cummins, Bill Stackpole & Tae Oh, Rochester Institute of Technology
>> Anti-Spyware Analysis for iOS: An Evaluation of Current Security Products Available for iOS, pp. 72-79
Carlos Gonzalez, Bill Stackpole & Tae Oh, Rochester Institute of Technology

Closing Pages
>> Author Biographies, pp. 80-84
>> Author Index, pp. 85

Those who do not archive the past are condemned to retype it!

- Garfinkel and Spafford

As we know,
There are known knowns.
There are things we know we know.
We also know
There are known unknowns.
That is to say
We know there are some things
We do not know.
But there are also unknown unknowns, the ones we don't know.
We don't know.

- Donald Rumsfeld, U.S. Secretary of Defense