Annual Symposium on Information Assurance >> ASIA


Navigation Menu
ASIA Main Page
Call for Papers
Organizing Committee
Symposium Proceedings
Best Paper Awards
Keynote Speakers
Author/Presenter Info.
NYS Cyber Security Conf.
Directions & Parking
CISO Website
UAlbany Business Website
Contact Us
Want to Sponsor?
End of Menu


Twitter logo image Facebook logo image YouTube logo image
Years for Selection: 2006 - 2007 - 2008 - 2009 - 2010 - 2011 - 2012 - 2013 - 2014 - 2015 - 2016 - 2017 - 2018

This is the proceedings for ASIA 12. To see proceedings from other years, simply click on the appropriate link above. If citing from any papers, please use the following citation information: In the Proceedings of the 7th Annual Symposium on Information Assurance (ASIA 12) / Secure Knowledge Management (SKM 2012), June 5-6, 2012, Empire State Plaza, Albany, NY.

Beginning Pages
>> Cover | Back Cover, pp.
>> Message from the ASIA/SKM General Chair (Sanjay Goel), pp.
>> Symposium Agenda, pp. i-ii
>> Table of Contents, pp. iii

ASIA/SKM Invited Talk
>> Measuring Secure Behavior: A Research Commentary, pp. 1-8
Merrill Warkentin, Mississippi State University; Detmar Straub, Georgia State University & Kalana Malimage, Mississippi State University

Session 1: Forensic / IT Audit
>> Metadata Based Forensic Analysis of Digital Information in the Web, pp. 9-15
Usama Salama, Vijay Varadharajan & Michael Hitchens, Macquarie University, Australia

>> IT Audit Challenges for Small and Medium-Sized Financial Institutions, pp. 16-22
Petter Lovas & Suzanne Wagner, Niagara University

Session 2: Cloud Security/Survivability Systems
>> Do Cloud Security Announcements Affect Firm Valuation?, pp. 23-28
Srikanth Parameswaran, Srikanth Venkatesan & Manish Gupta, University at Buffalo, State University of New York
>> Towards a Logical Framework for Migration-Based Survivability, pp. 29-33
Yanjun Zuo, University of North Dakota

ASIA/SKM Keynote
>> The State of ICS Security: A Year in Review, p. 34
Billy Rios, Google, Inc.

Session 3: Anti-Virus/Worms
>> Android Anti-Virus Analysis, pp. 35-41
Rahul Ramachandran, Tae Oh & William Stackpole, Rochester Institute of Technology

>> Computer Worm Attack using IDS and Trace Back Approaches, pp. 42-47
Sanjay Misra & Akuboh Victor Uneojo, Federal University of Technology, Minna

Session 4: Email/User Security
>> Not Sealed But Delivered: The (Un)Usability of S/MIME Today, pp. 48-61
Ann Fry, Sonia Chiasson, & Anil Somayaji, Carleton University, Ottawa, Canada
>> The Current State of Ordinary User Security, pp. 62-67
Leon Reznik, Andrew Christian, Ankit Patel, Brian Treich & Mohammed Alromaih, Rochester Institute of Technology

Session 5: Mobile Security
>> Blackberry Structure and Anti-Malware Analysis, pp. 68-71
Emily Cummins, Bill Stackpole & Tae Oh, Rochester Institute of Technology
>> Anti-Spyware Analysis for iOS: An Evaluation of Current Security Products Available for iOS, pp. 72-79
Carlos Gonzalez, Bill Stackpole & Tae Oh, Rochester Institute of Technology

Closing Pages
>> Author Biographies, pp. 80-84
>> Author Index, pp. 85

Those who do not archive the past are condemned to retype it!

- Garfinkel and Spafford

As we know,
There are known knowns.
There are things we know we know.
We also know
There are known unknowns.
That is to say
We know there are some things
We do not know.
But there are also unknown unknowns, the ones we don't know.
We don't know.

- Donald Rumsfeld, U.S. Secretary of Defense