isdfs 2016-4-6-v5

20

Click here to load reader

Upload: uddhav-gautam

Post on 22-Jan-2017

207 views

Category:

Documents


9 download

TRANSCRIPT

Page 1: ISDFS 2016-4-6-v5

4th International Symposium on Digital

Forensics and Security

April 25-27, 2016

University of Arkansas – Little Rock

Little Rock, Arkansas - USA

IEEE

Page 2: ISDFS 2016-4-6-v5

Hosted

at

4th International Symposium on Digital Forensics and Security Page 2

Page 3: ISDFS 2016-4-6-v5

Preface from the Conference Program Chairs We are delighted to welcome you to the IEEE sponsored 4th International Symposium on Digital Forensics and Security in Little Rock, Arkansas, USA. In keeping with the tradition of IEEE conferences, we present you with a program of cutting-edge research in the field of Digital Forensics, Security, Data Privacy, and Cryptography, in the form of papers, posters, and panel discussions. The program continues to show a healthy mixture of high standards of selectivity coupled with wide participation from our academic and industrial community: 4th ISDFS2016 received 58 papers of which 30 papers were accepted, providing an overall acceptance rate of 51.7%. All manuscript submitted for the conference went through a double-blind referee process. The papers presented at the conference are also published in its proceedings.

Any ISDFS conference is only as good as the people who take time out of their very busy schedule to help put it all together. As Conference Program Chairs, we would like to extend our sincere gratitude to our committee members, reviewers, consortium members, and sponsors. We are also grateful to the University of Arkansas-Little Rock for offering to host this year’s conference and for their invaluable work in providing the necessary infrastructure and support for a successful conference. Finally, without your participation this conference would not have been possible. We would like to take this opportunity to express our gratitude and appreciation to you.

ISDFS Symposium started four years ago. This is the fourth in a series of symposia designed to not only focus on important and timely issues in specific areas of the technology but also strengthen the links between scientists in the world. The consortium concept was born four years ago in a conference at Firat University in Turkey. The conference was mostly financed by the university with supporting funds from the Turkish Government. The meeting was deemed a great success, more than fulfilling the expectations of the organizers and included attendees from the US, Europe and UK (as well as from Turkey itself).

A second ISDFS Symposium was organized at Sam Houston State University in Huntsville, TX, USA, in 2014 with financial backing from Sam Houston State University. There was a substantial increase in international participation, with people attending from the United States, Turkey, Eastern Europe, and Portugal. New collaborations were established and a permanent Consortium Scientific Committee was established to make the ISDFS Symposium a periodic event. The selected publications were included into the conference proceedings.

4th International Symposium on Digital Forensics and Security Page 3

Page 4: ISDFS 2016-4-6-v5

Following the success of these meetings, in particular in successfully bringing together scientists from US and Europe, the third Symposium was organized at Gazi University in Turkey. With total attendees close to 200, the importance of this annual gathering became obvious. The scholarly works were accepted at the third symposium were published in the conference proceedings. A selected portion of the papers were later published in the Journal of Information Security Science (www.ijiss.org)

The 4th symposium, by gaining the sponsorship of IEEE and IEEE Region 5, has standardized its quality settings. The snowball effect of the symposium will continue next year at Petru Maior University in Romania.

Dr. Coskun Bayrak Dr. Yusuf Ozturk ISDFS General Co-Chair ISDFS General Co-Chair University of Arkansas-Little Rock San Diego State University Little Rock, AR, USA San Diego, CA, USA

ACKNOWLEDGEMENTS We extend our appreciation to the following units or individuals for their support • IEEE National Society and IEEE Regional Chapter • University of Arkansas at Little Rock • Dr Lawrence Whitman, Engineering and Information Technology

(EIT) College of University of Arkansas at Little Rock • Dr. Cihan Varol, Computer Science Department at Sam Houston State

University • Dr. Kenji Yoshigoe, Computer Science Department at University of

Arkansas at Little Rock • Office of Communications at UALR, Local TV and Radio Stations

covering the event. • Mrs. Cathy Shank, Engineering and Information Technology (EIT)

College of University of Arkansas at Little Rock • Joshua Sablatura and Keerthi Koneru, Computer Science Department

at Sam Houston State University • Yasaman Emami and Addhav Guatam, Computer Science Department

at University of Arkansas at Little Rock. • Faculty, Students, and Staff of Computer Science Department at the

University of Arkansas-Little Rock.

4th International Symposium on Digital Forensics and Security Page 4

Page 5: ISDFS 2016-4-6-v5

ORGANIZATION COMMITTEE

General Chair(s)

Coskun BAYRAK, USA Yusuf Ozturk, USA

University of Arkansas at Little Rock San Diego State University

Local Organizing Committee

Coskun Bayrak, USA Symposium Chair

Cihan Varol, USA Program Chair

Daniel Berleant, USA Keynote Chair

Gulustan Dogan, Turkey Special Session Chair

Fani Milanova, USA Workshop Chair

Shucheng Yu, USA Technical Chair

Brian Keltch, USA Sponsor Chair

Kay Clark, USA Symposium Secretariat and Social

program Chair

Kenji Yoshigoe, USA Finance Chair

Chia-Chu Chiang, USA Publication Chair

Uddhav Guatam,

Yasaman Emami, and

Tolgahan Cakaloglu, USA

Technical Support (Web Design, Banner

Design, Development and Server

Supporting)

4th International Symposium on Digital Forensics and Security Page 5

Page 6: ISDFS 2016-4-6-v5

CONSORTIUM AND SCIENTIFIC BOARD MEMBERS

University of Arkansas at Little Rock,

USA (Coskun Bayrak)

San Diego State University, USA

(Yusuf Ozturk)

Firat University, Turkey (Asaf Varol) Sam Houston State University, USA

(Peter Cooper)

Police Academy, Turkey (Vahit Bıçak) Polytechnic Institute of Cávado and

Ave, Portugal

(Maria Manuela Cruz Cunha)

Universitatea "Petru Maior" din Tîrgu

Mureş, Romania (Haller Piroska)

Hacettepe University, Turkey

(Çetin Arslan)

Balikesir University, Turkey

(Selçuk Kavut)

Gazi University, Turkey

(Seref Sagiroglu)

Qafqaz University, Azerbaijan

(Abzettin Adamov)

Qafqaz University, Azerbaijan

(Ali Shahintash)

Bremen University, Germany

(Bernd Krieg-Brueckner)

West Virginia University, USA

(Bojan Cukic)

West Virginia University, USA

(Brian Woerner)

Sunderland University, UK

(Chris Bowerman)

Sam Houston State University, USA

(Cihan Varol)

İstanbul Technical University, Turkey

(Esref Adali)

Teluq University, Canada

(Hamadou Saliah-Hassane)

Riga Technical University, Latvia

(Larisa Zaiceva)

Lamar University, USA (Ruhai Wang) Cherkasy State Technological

University, Ukraine (Tamara Kachala)

University of Arkansas at Little Rock,

USA (Shucheng Yu)

University of Arkansas at Little Rock,

USA (Kenji Yoshigoe)

4th International Symposium on Digital Forensics and Security Page 6

Page 7: ISDFS 2016-4-6-v5

PROGRAM COMMITTEEE MEMBERS Alejandro Villegas, USA Alok Tongaonkar, USA Bo Luo, USA Bojan Cukic, USA Brian Woerner, USA Cagatay Catal, Turkey Chengjun Wang, USA Chia-Chu Chiang, USA Cihan Varol, USA Daniel Berleant, USA Daryl Johnson, USA Ed Pearson, USA Garrett Calpouzos, USA Gongjun Yan, USA Gulustan Dogan, Turkey Guofei Gu, USA Hamadou Saliah-Hassane, Canada Harald Baıer, German Ion Tutanescu, Romania Jiang Keyu, USA Jie Wu, USA Kai Zeng, USA Kenji Yoshigoe, USA Larisa Zaiceva, Latvia Lei Chen, USA

Mark Yampolskiy, USA Martuza Jadiwala, USA Mehmet Demirci, Turkey Mehmet Kaya, Turkey Mert Bal, Turkey Michael F. Siok, USA Ming Yang, USA Nafiz Arica, Turkey Narasimha Shashidhar, USA Nazife Baykal, Turkey Qinghua Li, USA Qingzhong Liu, USA Rohit Chadha, USA Ruhai Wang, USA Shaoen Wu, USA Shengli Yuan, USA Sherman S.M. Chow, CN Shucheng Yu, USA Tamara Kachala, Ukrain Umit Karabiyik, USA Uraz Yavanoglu, Turkey Weiping Wang, Canada Wojciech Mazurczyk, Poland Yiming Ji, USA Zhuo Lu, USA

4th International Symposium on Digital Forensics and Security Page 7

Page 8: ISDFS 2016-4-6-v5

REGISTRATION AND COMMUNICATION The registration is through the website at http://bweb.host.ualr.edu/home. For more information and communication, please use [email protected] or call +1 501 569-8137. Once the registration is completed, there will be a check-in at the hotel and conference site.

HOSPITALITY As part of the southern hospitality, a city tour is arranged via Little Rock Tours. Please make sure to sign up at the front desk when you are checking in. The tour starts at 13:00 PM on Wednesday and will cover the most of the historic sites in the city of Little Rock. A tour guide will be available in the bus to cover the interesting historic details. The city tour is scheduled to return to the Crowne Plaza Hotel at 18:00 PM.

4th International Symposium on Digital Forensics and Security Page 8

Page 9: ISDFS 2016-4-6-v5

LIST OF SPONSORS We thank the sponsors for their generous support of our society and conference.

IEEE REGION 5

And

4th International Symposium on Digital Forensics and Security Page 9

Page 10: ISDFS 2016-4-6-v5

ISDFS 2016 Quick View

April 25, 2016 Monday

08:00 – 12:00 Registration and Information DSC-LL201 09:00 – 09:15 Opening Session SSC 104 09:15 – 09:30 Welcome Session SSC 104 09:30 – 10:30 Keynote Session – 1 SSC 104 10:30 – 10:40 Coffee Break DSC 201-T 10:40 – 12:00 Plenary Session – 1 DSC-LL201-I 12:00 – 13:00 Lunch Break DSC-Upper

Concourse 13:00 – 14:00 Panel Session – 1 DSC-LL201-I 14:00 – 15:20 Plenary Session – 2 DSC-LL201-I 15:20 – 15:40 Coffee Break DSC-LL201-T 15:40 – 17:40 Plenary Session – 3 DSC-LL201-I

April 26, 2016 Tuesday

08:00 – 12:00 Registration and Information DSC-LL201 08:30 – 09:30 Keynote Session – 2 DSC-LL201-I

09:30 – 10:00 Poster Session + Coffee Break DSC-Upper Concourse

10:00 – 12:00 Plenary Session – 4 DSC-LL201-I 12:00 – 13:00 Lunch Break DSC-Upper

Concourse 13:00 – 14:00 Panel Session – 2 DSC-LL201-I 14:00 – 15:20 Plenary Session – 5 DSC-LL201-I 15:20 – 15:40 Coffee Break DSC-LL201-T 15:40 – 17:20 Plenary Session – 6 DSC-LL201-I 17:20 – 17:45 Concluding Remarks DSC-LL201-I 18:30 – 21:00 Gala Dinner Crowne Plaza

April 27, 2016 Wednesday

09:00 – 13:00 Workshop: Developing Essential Tools for both Offensive and Defensive Security

SSC 104

13:00 – 18:00 City Tour Pick Up from UALR

4th International Symposium on Digital Forensics and Security Page 10

Page 11: ISDFS 2016-4-6-v5

ISDFS 2016 Detail View

April 25, 2016 Monday

08:00 – 12:00 REGISTRATION AND INFORMATION DSC-LL201

09:00 – 09:15 OPENING SESSION Coskun Bayrak, Conference Chair SSC 104

09:15 – 09:30 WELCOME SESSION Lawrence Whitman, Dean of IET SSC 104

09:30 – 10:30

KEYNOTE SESSION – 1 Capabilities and Practicality of Analog Computing in Cyber-Physical Safety and Security Cetin Kaya Koc, University of California, Santa Barbara

SSC 104

10:30 – 10:40 COFFEE BREAK DSC 201-T

10:40 –12:00 PLENARY SESSION - 1 Chair: Mengjun Xie, University of Arkansas at Little Rock

DSC-LL201-I

10:40-11:00 Detecting Unprotected SIP-based Voice Over IP Traffic Leonardo Carvajal, Lei Chen, Cihan Varol, and Danda Rawat

11:00-11:20 Visualization of the Social Bot’s Fingerprints Mehmet Kaya, Shannon Conley, and Asaf Varol

11:20-11:40 Graphics processing unit based next generation DDoS prevention system Selcuk Keskin, Hasan Tugrul Erdogan, and Taskin Kocak

11:40-12:00 Generating High Quality Data for the Protection of Modern Critical Infrastructures Bela Genge, Istvan Kiss, Piroska Haller, and Christos Siaterlis

12:00 – 13:00 LUNCH BREAK DSC-Upper Concourse

4th International Symposium on Digital Forensics and Security Page 11

Page 12: ISDFS 2016-4-6-v5

13:00 – 14:00

PANEL SESSION – 1 Cyber Security Education: A Higher Education perspective Chair: Yusuf Ozturk Panelists: Mengjun Xie, Susan Lincke, Seref Sagiroglu, and Asaf Varol

DSC-LL201-I

14:00 –15:20 PLENARY SESSION – 2 Chair: Qinghua Li, University of Arkansas DSC-LL201-I

14:00-14:20 The Metadata Legal Conundrum from a Public Records Act Perspective Alejandro Villegas

14:20-14:40 Teaching Malware Analysis: The Design Philosophy of A Model Curriculum Narasimha Shashidhar and Peter Cooper

14:40-15:00 Integrating Ethics and Risk Management Susan J. Lincke

15:00-15:20 The Attorney’s Role in Cyber Security Compliance: Conducting Cyber Security Compliance Due Diligence Alejandro Villegas

15:20 – 15:40 COFFEE BREAK DSC 201-T

15:40 –17:40 PLENARY SESSION - 3 Chair: Narasimha Shashidhar, Sam Houston State University

DSC-LL201-I

15:40-16:00 Control Flow Change in Assembly as a Classifier in Malware Analysis Andree Linke and Nhien-An Le-Khac

16:00-16:20 Model of Hierarchical Disk Investigation Umit Karabiyik and Sudhir Aggarwal

16:20-16:40

Toward a new tool to extract the Evidence from a Memory Card of Mobile phones Rob Witteman, Arjen Meijer, M-T. Kechadi, and Nhien-An Le-Khac

16:40-17:00 The Role of Digital Forensics in Combating Cybercrimes Malek Harbawi and Asaf Varol

17:00-17:20

Integrated model: Statistical features, Memory analysis for Scanner and Printer Forensics Shah Fahd, Waseem Iqbal, Muhammad Arif, and Muhammad Imran Javed

4th International Symposium on Digital Forensics and Security Page 12

Page 13: ISDFS 2016-4-6-v5

17:20-17:40

A Secured Resource Access Management in Educational Cloud Computing Environment Hamadou Saliah-Hassane, Saley Mato Idrissa, Djibo Karimou, Bisso Saley

April 26, 2016 Tuesday

08:00 – 12:00 REGISTRATION AND INFORMATION DSC-LL201

08:30 – 09:30

KEYNOTE SESSION – 2 The Current State of Digital Forensics Marcus Roger, Purdue University, West Lafayette, IN

DSC-LL201-I

09:30 – 10:00 POSTER SESSION + COFFEE BREAK DSC-Upper Concourse

10:00–12:00 PLENARY SESSION – 4 Chair: Nhien-An Le-Khac, University College Dublin

DSC-LL201-I

10:00-10:20 Previously Overlooked Bias Signatures for RC4 Maytham Hammond and Kenji Yoshigoe

10:20-10:40 Improvement of ETSFS Algorithm for Secure Database Prathyusha Uduthalapally and Bing Zhou

10:40-11:00 Android Malware Analysis Approach Based on Control Flow Graphs and Machine Learning Algorithms Mehmet Ali Atici, Seref Sagiroglu, and Ibrahim Alper Dogru

11:00-11:20 Client-Initiated HTTP Covert Channels Using Relays Gregory Daneault and Daryl Johnson

11:20-11:40 A Review on Mobile Threats and Machine Learning Based Detection Approaches Bilgehan Arslan, Sedef Gündüz, and Seref Sagiroglu

11:40-12:00 Advanced Cargo Security Handheld Network Access Device Sergio Enriquez and Yusuf Ozturk

12:00 – 13:00 LUNCH BREAK DSC-Upper Concourse

13:00 – 14:00

PANEL SESSION – 2 San Bernardino Case: The legal battle between Apple and Government Chair: Coskun Bayrak Panelists: Peter Cooper, Nhien-An Le-Khac,

DSC-LL201-I

4th International Symposium on Digital Forensics and Security Page 13

Page 14: ISDFS 2016-4-6-v5

Yusuf Ozturk, and Alejandro Villegas

14:00 –15:20 PLENARY SESSION - 5 Chair: Gulustan Dogan, Yildiz Technical University

DSC-LL201-I

14:00-14:20 A Reputation Based Trust Center Model for Cyber Security Hakan Kilinc and Ugur Cagal

14:20-14:40 DynamicMultiProTru: An Adaptive Trust Model for Wireless Sensor Networks Gulustan Dogan, Koksal Avincan, and Ted Brown

14:40-15:00 Occlusion Analysis for Face Frontalization Anil Celik and Nafiz Arica

15:00-15:20 Veritabanlarında İşlem Denetimi ve Tarihsel Veri Modelleme Yaklaşımı Hayrettin Evirgen and Ibrahim Dokuzer

15:20 – 15:40 COFFEE BREAK DSC 201-T

15:40 –17:20 PLENARY SESSION - 6 Chair: Chia-Chu Chiang, University of Arkansas at Little Rock

DSC-LL201-I

15:40-16:00 Secure Behavioral Biometric Authentication with Leap Motion Grady Xiao, Mariofanna Milanova, and Mengjun Xie

16:00-16:20 Real Time Face Recognition System (RTFRS) Suad Haji and Asaf Varol

16:20-16:40 The Forensic Effectiveness of Virtual Disk Sanitization Joshua Sablatura and Umit Karabiyik

16:40-17:00

Increasing Digital Investigator Availability Through Efficient Workflow Management And Automation Ronald In de Braekt, N-A. Le-Khac, J. Farina, M. Scanlon, and T. Kechadi

17:00-17:20 Multibiometrics Approach on Biometric Passport Pictures by Using Fingerprint Minutiae Points Sercan Aygun and Muammer Akcay

17:20 – 17:45 CONCLUDING REMARKS DSC-LL201-I

18:30 – 21:00 GALA DINNER Crowne Plaza

4th International Symposium on Digital Forensics and Security Page 14

Page 15: ISDFS 2016-4-6-v5

April 27, 2016 Wednesday

09:00 – 13:00

WORKSHOP Essential Tools for both Offensive and Defensive Security Yusuf Ozturk, Ugul Cagal, and Hakan Kilinc

SSC 104

13:00 – 18:00 CITY TOUR Pick Up from UALR

4th International Symposium on Digital Forensics and Security Page 15

Page 16: ISDFS 2016-4-6-v5

Keynote Speakers

As digital electronics developed from 1940s and on, digital computers replaced analog computers for general-purpose applications. However, analog computing has always dominated over digital in certain problem domains, due to higher speed, fewer physical resources, and less power consumption. In particular, when the underlying problem is continuous in nature, analog solutions are often more efficient than digital. Most recently, a popular application of analog computing has been for accelerated training and evaluation of neural networks and other neuromorphic architectures. In mainstream computing, while enjoying computational performance and cost benefits of Moore's Law, computer scientists, and electrical engineers have naturally focused efforts on digital computing and the stored-program model. However, we are no longer seeing dramatic cuts in computing cost, yet appetite for low-cost and high-performance computing is growing in every sector. Correspondingly, analog computing will increasingly satisfy computing demand for certain applications. This talk focuses on the use of analog computing for cyber-physical systems (CPS) safety and security. In CPS we see demands for heavy duty algorithms running on resource constrained critical infrastructure systems. Cyber-physical systems are mixed discrete-continuous by nature, and analog computing will have application for safety or other dynamic control. The underlying mathematics solved by analog computers also has applications in domains beyond simulation of physical systems. For example, we are investigating applications of analog computing for realizing confidentiality, integrity, and authentication functions. Finally, we

Çetin Kaya Koç Capabilities and Practicality of Analog Computing in Cyber-Physical Safety and Security

4th International Symposium on Digital Forensics and Security Page 16

Page 17: ISDFS 2016-4-6-v5

will cover the generally available mathematical abstractions, expected resource costs, and performance when considering analog computation implemented with current analog CMOS integrated circuit technology. Biography: Dr. Koç received his Ph.D. in Electrical & Computer Engineering from University of California Santa Barbara in 1988. His research interests are in cryptographic hardware and embedded systems, secure hardware design, side-channel attacks and countermeasures, algorithms and architectures for computer arithmetic and finite fields.

The field of digital forensics has come a long way since its humble beginnings as a purely investigative technique used primarily by Law Enforcement. The talk will cover the history digital forensics from an investigative process to a forensic science. It will discuss the challenges that digital forensics has faced and the new challenges that come with defining the field as a forensic science. Biography Dr. Marcus K. Rogers is a Professor and Head of the Department of Computer & Information Technology at Purdue University. He is a University Faculty Scholar, Fellow of CERIAS and Fellow of the American Academy of Forensic Sciences (AAFS). Dr. Rogers is the Chair of the Digital & Multimedia Sciences Section of the AAFS, Chair of the Digital Evidence Education sub-committee NIST/OSAC- DE committee, Co-Chair of the Cyber Crime Dept of the IEEE Security & Privacy Journal and Chair of the IEEE-CS Committee on Ethics for Information Security Research. Dr. Rogers is a former Law Enforcement Officer (Canada) and publishes extensively in the area of digital forensics and its intersection with the behavioral sciences.

Marcus K Rogers The Current State of Digital Forensics

4th International Symposium on Digital Forensics and Security Page 17

Page 18: ISDFS 2016-4-6-v5

Emergency Contact Information

Campus Police: +1 501 569 3400 Conference General Chair: +1 501 569 8137 Crown Plaza Hotel: +1 501 223 3000 4th International Symposium on Digital Forensics and Security Page 18

Page 19: ISDFS 2016-4-6-v5

CAMPUS MAP Donaghey Student Center (DSC)

Map for Symposium Location

4th International Symposium on Digital Forensics and Security Page 19

Page 20: ISDFS 2016-4-6-v5

Notes:

Pop up Question: Little Rock is an old city. In fact, the map that founding fathers used covered the area from Delaware all the way to Santa Fe and contained 24 cities. One of them was Little Rock under different name. What was the original name of Little Rock?

Answer:_ _ _ _ _ _ _ _ _

4th International Symposium on Digital Forensics and Security Page 20