1ST IEEE/IFIP Workshop on Security for Emerging Distributed Network Technologies (DISSECT)
Co-located with IEEE/IFIP IM 2015
Ottawa, Canada
Final Program (back to main page)
09:00 - 09:30
Welcome/Networking session
09:30 - 10:30
Keynote
Security Challenges in the eye of the Hurricane: Navigating the perfect networking storm of Virtualization, Mobility, and IoTChris Ullock (Nakina Systems)

10:30 - 11:00
Coffee break
11:00 - 12:30
Technical Session I
Networked, distributed systems security
Chair: Mohamed Faten Zhani, ÉTS, Canada- doi> Denial-of-Service Attacks in OpenFlow SDN Networks
Rajat Kandoi (Ericsson, Finland)
Markku Antikainen (Aalto University, Finland) - doi> A Simulation Model for Analysis of Attacks on the Bitcoin Peer-to-Peer Network Awarded best paper!
Till Neudecker (Karlsruhe Institute of Technology, Germany)
Philipp Andelfinger (Karlsruhe Institute of Technology, Germany)
Hannes Hartenstein (Karlsruhe Institute of Technology, Germany) - doi> Bayesian inference based decision reliability under imperfect monitoring
Shameek Bhattacharjee (University of Central Florida)
Mainak Chatterjee (University of Central Florida)
Kevin Kwiat (Air Force Research Laboratory)
Charles Kamhoua (Air Force Research Laboratory)
12:30 - 14:00
Lunch
14:00 - 15:30
Technical Session II
Security and privacy of mobile systems and cloud computing
Chair: Weverton Cordeiro, IFPA @ Itaituba, Brazil- doi> A Game-Theoretic Model for Defending Against Malicious Users in RecDroid
Bahman Rashidi (Virginia Commonwealth University)
Carol Fung (Virginia Commonwealth University) - doi> Data Remanence and Digital Forensic Investigation for CUDA Graphics Processing Units
Xavier Bellekens (Strathclyde University, UK)
Greig Paul (Strathclyde University, UK)
James M. Irvine (Strathclyde University, UK)
Christos Tachtatzis (Strathclyde University, UK)
Robert C. Atkinson (Strathclyde University, UK)
Tony Kirkham (Keysight Technologies)
Craig Renfrew (Keysight Technologies) - doi> Multi-level VM Replication based Survivability for Mission-critical Cloud Computing
Ming Zhao (Florida International University)
Francois D'Ugard (Florida International University)
Kevin A. Kwiat (Air Force Research Laboratory)
Charles A. Kamhoua (Air Force Research Laboratory)
15:30 - 16:00
Coffee break
16:00 - 17:00
Poster Session: Selected topics
Chair: Carol Fung, Virginia Commonwealth University, USA- doi> Spam Intrusion Detection in Computer Networks Using Intelligent Techniques
Patricia Bellin Ribeiro (College of Technology of São Paulo, Brazil)
Luis Alexandre da Silva (College of Technology of São Paulo, Brazil)
Kelton Augusto Pontara da Costa (College of Technology of São Paulo, Brazil) - doi> TOPASE: Detection of Brute Force Attacks used Disciplined IPs from IDS Log Awarded best poster!
Satomi Honda (FUJITSU LABORATORIES LTD., Japan)
Yuki Unno (FUJITSU LABORATORIES LTD., Japan)
Koji Maruhashi (FUJITSU LABORATORIES LTD., Japan)
Masahiko Takenaka (FUJITSU LABORATORIES LTD., Japan)
Satoru Torii (FUJITSU LABORATORIES LTD., Japan) - doi> Fogging the Cloud - Implementing and Evaluating Searchable Encryption Schemes in Practice
Manuel Koschuch (FH Campus Wien, Austria)
Michael Hombauer (FH Campus Wien, Austria)
Sigrid Schefer-Wenzl (FH Campus Wien, Austria)
Ulrich Haböck (FH Campus Wien, Austria)
Stefan Hrdlicka (FH Campus Wien, Austria) - doi> A Multi-Level Resilience Framework for Unified Networked Environments
Angelos K. Marnerides (Liverpool John Moores University, UK)
Akshay Bhandari (Indian Institute of Technology Madras, India)
Hema Murthy (Indian Institute of Technology Madras, India)
Andreas U. Mauthe (Lancaster University, UK) - doi> Distributed Security Management for the IoT
Nico Lincke (Fraunhofer SIT, Germany)
Nicolai Kuntze (Fraunhofer SIT, Germany)
Carsten Rudolph (Fraunhofer SIT, Germany)