Annual Symposium on Information Assurance >> ASIA

Share

Navigation Menu
ASIA Main Page
Call for Papers
Organizing Committee
Symposium Proceedings
Best Paper Awards
Keynote Speakers
Author/Presenter Info.
Reviewers
NYS Cyber Security Conf.
Directions & Parking
Accomodations
EISO Website
UAlbany Business Website
Pictures
Contact Us
Want to Sponsor?
End of Menu

Connect

Twitter logo image Facebook logo image YouTube logo image
Years for Selection: 2006 - 2007 - 2008 - 2009 - 2010 - 2011 - 2012 - 2013 - 2014 - 2015 - 2016 - 2017 -
This is the proceedings for ASIA '14. To see proceedings from other years, simply click on the appropriate link above. If citing from any papers, please use the following citation information: In the Proceedings of ASIA '14: 9th Annual Symposium on Information Assurance (ASIA '13), June 3-4, 2014, Empire State Plaza, Albany, NY.

>>
Download full ASIA '14 Proceedings

Beginning Pages
>> Cover | Back Cover, pp.
>> Message from the ASIA General Chair (Sanjay Goel), pp.
>> Symposium Agenda, pp. i-ii
>> Table of Contents, pp. iii - iv

Keynote: Day 1
>> Fireside Chat: A Candid Conversation with the GovernorŐs Cyber Security Advisory Board, p. 1
William F. Pelgrin, Benjamin M. Lawsky, Thomas P. Abt, Richard E. Clarke, Shawn Henry, Philip R. Reitinger, and Hon. Howard A. Schmidt, GovernorŐs Cyber Security Advisory Board
Session 1: Cyber Attacks and Hacking
>> Paper: AVOIDIT: A Cyber Attack Taxonomy, pp. 2-12
Chris Simmons, Sajjan Shiva, Harkeerat Singh Bedi and Dipankar Dasgupta, University of Memphis

>> Paper: Even Hackers Deserve Usability: An Expert Evaluation of Penetration Testing Tools , pp. 13-21
Michael Bingham, Adam Skillen, and Anil Somayaji, Carleton University
***WINNER BEST PAPER AWARD***

Session 2: Risk Assessment
>> Paper: A Comprehensive Risk-based Auditing Framework for Small and Medium Sized Financial Institutions, p. 22
Petter Lovaas, Niagara University >> Research-in-Progress Paper: An Exploratory Survey of the Effects of Perceived Control and Perceived Risk on Information Privacy, pp. 23-28
Clare Doherty and Michael Lang, National University of Ireland, Galway

Session 3: Covert Channels
>> Research-in-Progress Paper: Google Maps KML Covert Channel, pp. 29-33
Allen Sabernick and Daryl Johnson, Rochester Institute of Technology
>> Paper: A Channel for Exchanging Information Covertly Using Game Save File in Prison Architect, pp. 34-38
Hashem Assayari and Daryl Johnson, Rochester Institute of Technology

Session 4: Emerging Topics
>> Paper: An Adaptive Approach for Active Multi-Factor Authentication , pp. 39-47
Abhijit Kumar Nag, Dipankar Dasgupta, and Kalyanmoy Deb*; University of Memphis, *Michigan State University

Keynote: Day 2
>> The AdministrationŐs Perspective on Cyber Security , p. 48
Michael Daniel, White House Special Assistant to the President and Cyber Security Coordinator

Session 5:Security Policies and Fraud
>> Invited Talk: Exploring the Role of the Temporary Workforce on Information Security Policy Compliance, pp. 49
Shwadhin Sharma and Merrill Warkentin, Mississippi State University
>> Case Study Paper: Fraud Detection through Routine Use of CAATTs, pp. 50-56
Sachin Lala, Manish Gupta, and Raj Sharman, University at Buffalo, SUNY

Session 6: Game Theory in Security
>> Invited Paper: Cyber Espionage: A Cultural Expression, pp. 57-61
Andre Karamanian and Char Sample*; Cisco, *Carnegie Mellon University
>> Paper: Application of Stackelberg Security Games in Information Security, p. 62-64
Ashot Abrahamyan, Russian-Armenian (Slavonic) University, Armenia

Session 7: Digital Forensics
>> Paper: Quantifying the Danger of Mobile Banking Applications on the Android Platform, pp. 65-70
Brett Ferris, Jay Stahle, and Ibrahim Baggili, University of New Haven
>> Paper: Automated Input Generator for Android Applications, pp. 71-76
Shobit N. Dutia, Youngho Kim, and Tae Oh, Rochester Institute of Technology

Session 8: Software Security
>> Abstract: Enhancing Security in the Software Development Life Cycle (SDLC), p. 77
Ibukun Eweoya and Sanjay Misra, Covenant University, Ova, Nigeria
>> Abstract: Identification of Suspected Files using Timeline Construction Approach, p. 78
Gaurav Balaiwar and Upasna Singh, Defence Institute of Advanced Technology (DU), India

Closing Pages
>> Author Biographies, pp. 79-84
>> Author Index, p. 85
Quotes

Those who do not archive the past are condemned to retype it!

- Garfinkel and Spafford

As we know,
There are known knowns.
There are things we know we know.
We also know
There are known unknowns.
That is to say
We know there are some things
We do not know.
But there are also unknown unknowns, the ones we don't know.
We don't know.

- Donald Rumsfeld, U.S. Secretary of Defense