Day 2 Program (July 25)

8:20-8:30 Announcements

8:30-9:30 Keynote

Understanding Blockchains

Len Bass

9:30-9:45 Break

9:45–10:45 Session 1: Organizational Aspects of Security
CNN-based Android Malware Detection

Meenu Ganesh, Priyanka Pednekar, Pooja Prabhuswamy, Divyashri Sreedharan Nair, Younghee Park and Hyeran Jeon

Cyber Threat Intelligence-Sharing: Benefits and Risks

  Young Choi and Reid Stosik

Secure Password Translation for Document Protection in SOHO Companies

Hyung-Jong Kim and Soyeon Park

11:45–11:00 Break

11:00–12:00 Session 2: Organizational Aspects of Security

Security on the Inside: The Risk of Internal Threats to an IT System and Security

Young Choi and Jared Stuckemeyer

Cloud Reliability and Independence Standard: A Three Tiered System for Optimal Cloud Storage

Syed Rizvi, Evan English, Daniel Stacey and Donte Perino

Multi-Layer Defense Model for Securing Online Financial Transactions

Syed Rizvi, Joseph Gualdoni, Andrew Kurtz, Ilva Myzyri and Megan Wheeler

12:00–13:15 Lunch

13:15 – 14:15 Session 3: Applied Crypto

Discovering Cryptographic Algorithms in Binary Code through Loop Enumeration

Patrick Kochberger, Sebastian Schrittwieser, Damjan Buhov and Richard Thron

Secure Software Implementation for Bitcoin Anonymity

Seung-Min Kim, Jihye Lee and Yoonjeong Kim

Software Application to Evaluate the Complexity Theory of the RSA and Elliptic

Wendy Ayala, Walter Fuertes, Juan Fernando Galarraga Hurtado, Hernán Aules and Theofilos Toulkeridis

14:15 –14:45 Networking Break

14:45 – 15:45 Session 4: Security Training & Education

Software-based Platform for Education and Training of DDoS Attacks using Virtual Networks

Walter Fuertes, Anabel Tunala, Ronny Moncayo, Fausto Meneses and Theofilos Toulkeridis

Enriching Security Education Hands-on Labs with Practical Exercises

Min Jin Kwon, Gowoon Kwak, Siyoung Jun, Hyung-Jong Kim and Hae Young Lee

Automated Synthesis of Access Control Lists

Xiao Liu, Brett Holden and Dinghao Wu

15:45-16:00 Break

16:00 –16:30 Session 4: Lightening Talks

A Quantification of Effectiveness of Simulation Models by Managing Cost of Development

  Hyung-Jong Kim and Hae Young Lee

Common Requirements for Web Application Vulnerability Scanners for the Internet of Things

Hae Young Lee and Young Sun Park

16:30 – 17:30 Session 6: Secure Architectures

Adopting Attribute-Based Access Control to Data Distribution Service

Priya Murugesan, Swanima Chinnappa, Alaa Alaerjan and Dae-Kyoo Kim

An Architectural-Enhanced Secure Embedded System with a Novel Hybrid Search Scheme

Weike Wang, Muyang Liu, Pei Du, Zongmin Zhao, Yuntong Tian, Qiang Hao and Xiang Wang

An efficient method to securely store and handle genomic data

Youngjun Ki and Ji Won Yoon

17:30 – 18:00 Closing