Search this site
Embedded Files

CANSec Overview Home Call for Paticipation Keynote Program Logistics Registration

Workshop Program(in pdf)

April 4 (Friday), Chancellor Hotel

  • 5:00pm: Registration at Bella Vista Room of Chancellor Hotel

  • 6:00-9:00pm: Dinner at Bella Vista Room of Chancellor Hotel

  • Free parking for attendees who do not stay at Chancellor Hotel: 3rd floor of the garage at the back of the hotel, i.e., Fayetteville Municipal Parking Deck

  • Welcome and Introduction given by David Andrews

April 5 (Saturday), Hillside Auditorium (Room 206), University of Arkansas

  • 8:00am: Registration

  • 8:00-9:00am: Breakfast at Upper Atrium of Hillside Auditorium

  • 9:00-9:15am: Welcome Remarks by Dean John English, College of Engineering, University of Arkansas

  • 9:15-10:15am: Keynote Speech

    • Battles of Cryptographic Algorithms: From AES to CAESAR in Software & Hardware

      • Kris Gaj, George Mason Unviersity

  • 10:15-10:30am: Break

  • 10:30-11:50am: Paper Presentation Session 1 (Session chair: Qinghua Li)

    • 10:30-10:50: Bridging the Gap between HW/SW Co-Design and Formal Methods

      • David Andrews, University of Arkansas

    • 10:50-11:10: Is the social network connection service really security?----Study of CSRF

      • Lin Shi, Kun Song, Keyu Jiang, Fort Hays State University

    • 11:10-11:30: TP-Link Wireless Router Security

      • Boqian Yuan, Keyu Jiang, Fort Hays State University

    • 11:30-11:50: Analysis and Acceleration of NTRU Lattice-Based Cryptographic System

      • Tianyu Bai, Hai Jiang, Arkansas State University

  • 11:50am-12:30pm: PhD Forum 1 (Session chair: Fengjun Li)

    • 11:50-12:00: Bringing Order to the Cloud and Moving Target Defense Approaches

      • Alexandru G. Bardas, Kansas State University

    • 12:00-12:10: Topology and Migration-Aware Energy Efficient Virtual Network Embedding for Green Data Centers

      • Xinjie Guan, University of Missouri - Kansas City

    • 12:10-12:20: Online Social Network Privacy Protection

      • Yuhao Yang, University of Kansas

    • 12:20-12:30: Applying fuzzy hashing technique to speed up malware clustering analysis

      • Yuping Li, Kansas State University

  • 12:30-1:30pm: Lunch at Upper Atrium of Hillside Auditorium

  • 1:00-1:30pm: Poster Session at Lobby of Hillside Auditorium

    • WiFiHonk:Smartphone-based Beacon Stuffed WiFi Car2X-Communication System for Vulnerable Road User Safety

      • Kaustubh Dhondge, Sejun Song, Younghwan Jang, Sunae Shin, Hyungbae Park, Baek-Young Choi, University of Missouri - Kansas City

    • Topology and Migration-Aware Energy Efficient Virtual Network Embedding for Green Data Centers

      • Xinjie Guan, Baek-Young Choi, Sejun Song, University of Missouri - Kansas City

    • Performance Evaluation of High Speed TCP Variants Using Direct Code Execution and ns-3

      • Siddharth Gangadhar, Truc Anh Ngoc Nguyen, Santosh Gondi, James Sterbenz, University of Kansas

    • Cyber-Physical Systems Security: Background, Problems and Challenges

      • Abdulmalik Humayed, Bo Luo, University of Kansas

    • Telecommunication Network Vulnerability and Geodiverse Routing Protocol

      • Yufei Cheng, James Sterbenz, University of Kansas

    • Improving The Resilience of Backbone Networks

      • Mohammed J.F. Alenazi, James Sterbenz, University of Kansas

    • PUF Design in Hardware

      • Hongyuan Ding, Shiming Li, Miaoqing Huang, University of Arkansas

    • Hardware-Based implementation of a Network-Based Intrusion and Botnet Detection System

      • Tbatou Adil, Christophe Bobda, University of Arkansas

    • Mobile Banking Security Using GPS Location Authentication

      • Matthew Moccaro, Dale Thompson, University of Arkansas

  • 1:30-3:10pm: Paper Presentation Session 2 (Session chair: Bo Luo)

    • 1:30-2:10: Private Sector IT Security

      • Adam Holland, Michael Parks, Qui Le, Wal-Mart Stores, Inc.

    • 2:10-2:30: Private Spread Spectrum-Based Data Aggregation for smart Grid Networks

      • Navid Alamatsaz, Arash Boustani, Murtuza Jadliwala, Wichita State University

    • 2:30-2:50: Efficient Privacy-Aware Incentives for Mobile Sensing

      • Qinghua Li, University of Arkansas

    • 2:50-3:10: Protecting Privacy in a Clinical Data Warehouse

      • Zhichun Xiao, Peking University

  • 3:10-3:50pm: PhD Forum 2 (Session chair: Xinming (Simon) Ou)

    • 3:10-3:20: Modeling Critical Node Attacks in Mobile Wireless Networks

      • Dongsheng Zhang, University of Kansas

    • 3:20-3:30: A Fundamental Approach to Scalability for Software-Defined Networks

      • Hyungbae Park, University of Missouri - Kansas City

    • 3:30-3:40: Network capacity improvement in speed spectrum based cognitive radio networks

      • Arash Boustani, Wichita State University

    • 3:40-3:50: Secure Real-Time Operating System for CPS

      • Xiaolong Wang, Kansas State University

  • 3:50-4:00pm: Break

  • 4:00-5:20pm: Paper Presentation Session 3 (Session chair: Hai Jiang)

    • 4:00-4:20: Amandroid: A General Inter-component Data Flow Analysis Framework for Security Study of Android Apps

      • Xinming Ou, Robby, Sankardas Roy, Fengguo Wei, Kansas State University

    • 4:20-4:40: Internet Fraud

      • Ce Xiao, Keyu Jiang, Fort Hays State University

    • 4:40-5:00: WiFiHonk:Smartphone-based Beacon Stuffed WiFi Car2X-Communication System for Vulnerable Road User Safety

      • Kaustubh Dhondge, Sejun Song, Younghwan Jang, Sunae Shin, Hyungbae Park, Baek-Young Choi, University of Missouri - Kansas City

    • 5:00-5:20: Survey of Attribute-Based Encryption

      • Zhi Qiao, Shuwen Liang, Spencer Davis, Hai Jiang, Arkansas State University

  • 5:20pm: Closing Remarks

© Copyright 2014 Central Area Networking and Security Workshop - All rights reserved.

Google Sites
Report abuse
Page details
Page updated
Google Sites
Report abuse