January 27 - 30 2015, Sydney, Australia
AISC aims at promoting research on all aspects of information security and increasing communication between academic and industrial researchers working in this area. We seek submissions from academic and industrial researchers on all theoretical and practical aspects of information security.
Suggested topics include, but are not restricted to: access control; anonymity and pseudonymity; cryptography and cryptographic protocols; database security; identity management and identity theft; intrusion detection and prevention; malicious software; network security; privacy enhancing technologies; and trust and risk.
Programme (28th January 2015)
11.00-12.40 Session 1: Cyber Security Workshop 1 (Invited Talks and Panel Discussion), Chairs: Rob Milner and Ian Welch , Room: EB.2.04
11.00-11.30 How do we form a stronger base of national cyber S&T security? Dr Mike Davies (Research Leader, Cyber Assurance and Operations, DSTO).
11.30-12.00 Recent TorrentLocker outbreaks in Australia. Dr Jonathan Oliver (Senior Architect at Trend Micro).
12.00-12.40 Panel discussion "Preparing for upcoming cyber security threats and challenges". Dr Mike Davies, Dr Jonathon Oliver and another speaker yet to be confirmed. Moderated by Dr Ian Welch (Victoria University of Wellington).
13.40-15.20 Session 2: Cyber Security Workshop 2 (Demonstrations), Chairs: Rob Milner and Ian Welch , Room: EB.2.04
Demonstrations of recent tools related to Cyber Security. The demonstrations take the form of short talks.
13.40-13.45 JMD: a hybrid approach for detecting Java malware, Ben Cheney.
13.45-13.55 Linebacker – Virtualisation Assisted View Comparison for Rootkit Detection. Toby Richer.
13.55-14.10 PRISM: high-assurance Trusted Computing Base. Tristan Newby.
14.10-14.20 Network Card Trojan. John Shield.
14.20-14.30 Digital Video Guard. John Shield.
14.30-14.40 VisRAID Visualizing Remote Access for Intrusion Detection. Ian Welch.
14.40-14.50 TorrentLocker Infection Demo. Jonathan Oliver.
14.50-15.20 Chance to talk with demonstrators and opportunity for additional demonstrations.
15:50 - 17:55 Session 3: AISC Conference Chair: Ian Welch , Room: EB.2.04
15:50 - 16:15 JMD: A Hybrid Approach for Detecting Java Malware. Adrian Herrera and Ben Cheney
16:15 - 16:40 Hypervisor based security architecture to protect web applications Dilshan Jayarathna, Udaya Tupakula and Vijay Varadharajan
16:40 - 17:05 Annex: A Middleware for Constructing High-Assurance Software Systems. Tristan Newby, Duncan Grove, Alex Murray, Chris Owen, Jim McCarthy and Chris North
17:05 - 17:30 On the Effectiveness of Virtualisation Assisted View Comparison for Rootkit Detection. Toby Richer, Grant Neale and Grant Osborne
17:30 - 17:55 Hardware Trojans - A Systemic Threat. John Shield, Bradley Hopkins, Mark Beaumont and Chris North
Posters (on display during breaks)
Title: Hypervisor-based security architecture to protect web applications. Presenter: Dilshan Jayarathna.
Title: Information Privacy Concerns of Real Estate Customers and Information Security in the Real Estate Industry: an Empirical Analysis Presenter: Deepa Mani.
Title: Correcting flaws in Mitchell’s analysis EPBC. Presenter: Binbin Di.
Title: Internet-wide Scanning Taxonomy and Framework with Practical Validation. Presenter: David Myers.
Title: Real-Time and Interactive Attacks on DNP3 Critical Infrastructure Using Scapy. Presenter: Nicholas Rodofile
Final Submission
Due 28th October (accepted full and short papers).
Please upload via the EasyChair website.
Copyright details:
Vol. 161 - 13th Australasian Information Security Conference (AISC 2015) -
Editors: Ian Welch and Xun Yi
Important Dates
Paper submission
18th August, 201425 August 2014
Author notification 7th October, 2014
Final version 28th October, 2014
Author registration 3rd November, 2014
Early bird registration ends 1st December, 2014
Conference dates 27th-30th January, 2015
(All deadlines are on the date specified at 11:59 pm in the UTC-12 timezone. For example, New Zealand 26th August at 23:59)
The main conference website is available
here.
Call for Papers
ACSW-AISC2015_CFP.pdf
All submissions must be original work, not previously published elsewhere, and not currently submitted to any other conference or journal. Submission of a paper should be regarded as an undertaking that, should the paper be accepted, at least one of the authors will attend the conference to present the work. Presentations will be 15 minutes in duration. Note that it is insufficient for an author to register and pay for the conference to be regarded as fulfilling this obligation.
As with previous years, registration for ACSW will enable delegates to attend sessions in any conference participating in the Australasian Computer Science Week.
The proceedings of this event will be published by the Australian Computer Society (ACS) in the CRPIT Series.
There will be an award for the best student paper. A paper categorized as a ``student paper'' should be marked with ``Student Paper'' at the top of the anonymous submission. The definition of a ``student paper'' is a paper where at least 75% of the work is done by the student (and usually, the student's name appears as the first author).
Papers will be judged on originality, significance, correctness and clarity. The contribution of the paper should be clearly explained in both general and technical terms. Submission of a paper includes a commitment that, should the paper be accepted, at least one author will attend the workshop to present the work.
Papers must be submitted electronically and be received by the submission deadline. Late submissions and non-electronic submissions will not be considered.
Submission of papers will be managed through EasyChair,
http://www.easychair.org/conferences/?conf=acswaisc2015, a comprehensive conference paper management system. First create your own account there then login and follow the prompts to submit your anonymous paper for double blind reviewing. If there are any issues with submission, please email
acswaisc2015@easychair.org.
Guidelines for Authors
Note that for the initial submission that a single column format is acceptable (as specified in the CFP), you will need to conform to the formatting guidelines below if accepted.
Papers must be between 4 and 10 pages long (sans reference and Appendix), and 20 page limit (total overall). Papers are required to conform to the formatting guidelines of the series
Conferences in Research and Practice in Information Technology (CRPIT). See the
Procedures and Resources for Authors Submitting to CRPIT Published Conferences and Workshops.
The accepted format for submissions is Portable Document Format (PDF). Microsoft Word and Latex template files are available at the CRPIT web site.
By submitting to the conference, authors accept that they are aware of the
Guidelines on Research Practice in Computer Science by the Computer Research and Education Association (CORE). In particular, authors are encouraged to review the points on authorship.
Programme Committee
- Lynn Batten, Deakin University
- Philip Branch, Swinburne University of Technology
- Ljiljana Brankovic, University of Newcastle
- Kim-Kwang Raymond Choo, University of South Australia
- Sherman S. M. Chow, Chinese University of Hong Kong
- Olivier De Vel, DSTO
- Denise De Vries, Flinders University
- Juan Gonzalez Nieto, QUT
- Feng Hao, Newcastle University
- Dong Seong Kim, University of Canterbury
- Van Lam Le, Can Tho University
- Paul Montague, DSTO
- Shaoning Pang, Unitec Insitute of Technology
- Josef Pieprzyk, Queensland University of Technology
- Giovanni Russello, The University of Auckland
- Christian Seifert, Microsoft Cooperation
- Ron Steinfeld, Monash University
- Clark Thomborson, University of Auckland
- Emiliano Tramontana, University of Catania
- Giang Vu Thi Huong, Hanoi University of Science and Technology
- Ian Welch, Victoria University of Wellington
- Yang Xiang, Deakin University
- Xun Yi, RMIT
See the
main site.
Conference Program
See the
main site.
For any queries, please contact
Ian Welch (contact
ian.welch@vuw.ac.nz).