Annual Symposium on Information Assurance >> ASIA

Share

Navigation Menu
ASIA Main Page
Call for Papers
Organizing Committee
Symposium Proceedings
Best Paper Awards
Keynote Speakers
Author/Presenter Info.
Reviewers
NYS Cyber Security Conf.
Directions & Parking
Accomodations
EISO Website
UAlbany Business Website
Pictures
Contact Us
Want to Sponsor?
End of Menu

Connect

Twitter logo image Facebook logo image YouTube logo image
Years for Selection: 2006 - 2007 - 2008 - 2009 - 2010 - 2011 - 2012 - 2013 - 2014 - 2015 - 2016 - 2017 -
These are the proceedings for ASIA '17. To see proceedings from other years, simply click on the appropriate link above. If citing from any papers, please use the following citation information: In the Proceedings of ASIA '17: 12th Annual Symposium on Information Assurance (ASIA '17), June 7-8, 2017, Empire State Plaza, Albany, NY.

>>
Download full ASIA '17 Proceedings


Keynote: Day 1
>> Asymmetric Cyberwarfare: The Business Case for Insecurity, p. 1
Reg Harnish, CEO, GreyCastle

Session 1: Security of Networked Systems
>> Information Security Practices for Crowdsourcing Projects, pp. 2-7
Edgar John Borges, Sergey Butakov and Shaun Aghili, Concordia University of Edmonton, Canada
>> Secure Power Trading in Cooperative Relay Network with Asymmetric Cournot Duopoly Model, pp. 8-13
Khyati Chopra, Ranjan Bose, Indian Inst. of Tech., New Delhi, India, and Anupam Joshi, Univ. of Maryland


Session 2: Behavioral Security
>> Using Intervention Mapping to Breach the Cyber-Defense Deficit, pp. 14-22
Karen Renaud, University of Glasgow, UK and Merrill Warkentin, Mississippi State University, MS, USA >> Expansive Learning in Cyber Defense: Transformation of Organizational Information Security Culture, p. 23-28
Shuyuan Mary Ho, Alison von Eberstein and Christy Chatmon, Florida State University Tallahassee, FL, USA

Session 3: Cryptography
>> Distinguishability in Protocol Analysis: Formally Analyzing Guessing Attacks, pp. 29-36
Siva Anantharaman, LIFO - eeee Orleans, France, Kimberly A. Gero, The College of Saint Rose, Paliath Narendran, University at Albany, SUNY and Michael Rusinowitch, Loria-INRIA Lorraine, France
>> An RSA-based Electro-Optical Secure Cryptosystem, pp. 37-40
Aloka Sinha, Indian Inst. of Tech., New Delhi, India

Session 4: IOT Security
>> Security Challenges and Improvement Strategy for Implantable Medical Devices, pp. 41-44 Dylan Makowski, Yonghong Tong and Petter Lovaas, Niagara University, NY, USA
>> Analysis, Detection and Mitigation of Cyber Attacks on an IOT Platform, pp. 45-53 Upasna Singh, Nitesh K Bharadwaj and Ansuman Samajpati, Defence Institute of Advanced Tech., Pune, India

Keynote: Day 2
>> Explaining cyber-innsecurity as defense adaption, p. 54
Lior Tabansky, Blavatnik Interdisciplinary Cyber Research Center
>> International and Cross-National Threats and Legal Responses in Cybersecurity, p. 55
Elana Broitman, New America, NYC

Session 5: Privacy
>> Patient Adoption of Accountable Care Organization Cloud Platforms Amidst Privacy Concerns: Investigating the Role of Information Ownership and Paid Access, pp. 56-60
Pamella Howell, University at Buffalo, SUNY and Victoria Kisekka, University at Albany, SUNY
>> A Proposed Assurance model to Assess Security and Privacy risks in IaaS and PaaS Environments, p. 61-67
Amarachi J. Maduka, Shaun Aghili, and Sergey Butakorv, Concordia University of Edmonton, Canada

Session 6: Incident Response and Forensics
>> Challenges and Strategies for Malware Analysis for Incident Response and Prevention, p. 68-71
Michael Kuntz, Yonghong Tong and Petter Lovaas, Niagara University, NY, USA
>> Image-based Keyword Search and Activity Retrieval for Social Media Forensics, pp. 72-80
Natasha Kholgade Banerjee, Clarkson University, Michael Simms, Simms Law Office, and Sean Banerjee, Clarkson University

Session 7: Emerging Cyber Threats
>> Study of Potential Attacks on Rubber PIN Pads based on Mobile Thermal Imaging, pp. 81-85
Jasjit Singh Sidhu, Sergey Butakov and Pavol Zavarsky, Concordia University of Edmonton, Canada
>> Attacking Smartphones by Sharing Innocuous Images via QR Codes, p. 86-92
Rishabh Dudheria, New York Institute of Technology Nanjing, China

Session 8: IOT and CRM Security
>> Framework to Analyze the Vulnerabilities in IOT, pp. 93-99
Pavankumar Mulgund, Manish Gupta, Suvir Singh, Siddharth Walia and Raj Sharman, University at Buffalo, SUNY
>> COBIT 5 Based Audit Plan for CRM Systems, p. 100-104
Julia Onchieku, Sergey Butakov and Shaun Aghili, Concordia University of Edmonton, Canada

Quotes

Those who do not archive the past are condemned to retype it!

- Garfinkel and Spafford

As we know,
There are known knowns.
There are things we know we know.
We also know
There are known unknowns.
That is to say
We know there are some things
We do not know.
But there are also unknown unknowns, the ones we don't know.
We don't know.

- Donald Rumsfeld, U.S. Secretary of Defense