5:00pm: Registration at Bella Vista Room of Chancellor Hotel
6:00-9:00pm: Dinner at Bella Vista Room of Chancellor Hotel
Free parking for attendees who do not stay at Chancellor Hotel: 3rd floor of the garage at the back of the hotel, i.e., Fayetteville Municipal Parking Deck
Welcome and Introduction given by David Andrews
April 5 (Saturday), Hillside Auditorium (Room 206), University of Arkansas
8:00am: Registration
8:00-9:00am: Breakfast at Upper Atrium of Hillside Auditorium
9:00-9:15am: Welcome Remarks by Dean John English, College of Engineering, University of Arkansas
9:15-10:15am: Keynote Speech
Battles of Cryptographic Algorithms: From AES to CAESAR in Software & Hardware
Kris Gaj, George Mason Unviersity
10:15-10:30am: Break
10:30-11:50am: Paper Presentation Session 1 (Session chair: Qinghua Li)
10:30-10:50: Bridging the Gap between HW/SW Co-Design and Formal Methods
David Andrews, University of Arkansas
10:50-11:10: Is the social network connection service really security?----Study of CSRF
Lin Shi, Kun Song, Keyu Jiang, Fort Hays State University
11:10-11:30: TP-Link Wireless Router Security
Boqian Yuan, Keyu Jiang, Fort Hays State University
11:30-11:50: Analysis and Acceleration of NTRU Lattice-Based Cryptographic System
Tianyu Bai, Hai Jiang, Arkansas State University
11:50am-12:30pm: PhD Forum 1 (Session chair: Fengjun Li)
11:50-12:00: Bringing Order to the Cloud and Moving Target Defense Approaches
Alexandru G. Bardas, Kansas State University
12:00-12:10: Topology and Migration-Aware Energy Efficient Virtual Network Embedding for Green Data Centers
Xinjie Guan, University of Missouri - Kansas City
12:10-12:20: Online Social Network Privacy Protection
Yuhao Yang, University of Kansas
12:20-12:30: Applying fuzzy hashing technique to speed up malware clustering analysis
Yuping Li, Kansas State University
12:30-1:30pm: Lunch at Upper Atrium of Hillside Auditorium
1:00-1:30pm: Poster Session at Lobby of Hillside Auditorium
Kaustubh Dhondge, Sejun Song, Younghwan Jang, Sunae Shin, Hyungbae Park, Baek-Young Choi, University of Missouri - Kansas City
Topology and Migration-Aware Energy Efficient Virtual Network Embedding for Green Data Centers
Xinjie Guan, Baek-Young Choi, Sejun Song, University of Missouri - Kansas City
Performance Evaluation of High Speed TCP Variants Using Direct Code Execution and ns-3
Siddharth Gangadhar, Truc Anh Ngoc Nguyen, Santosh Gondi, James Sterbenz, University of Kansas
Cyber-Physical Systems Security: Background, Problems and Challenges
Abdulmalik Humayed, Bo Luo, University of Kansas
Telecommunication Network Vulnerability and Geodiverse Routing Protocol
Yufei Cheng, James Sterbenz, University of Kansas
Improving The Resilience of Backbone Networks
Mohammed J.F. Alenazi, James Sterbenz, University of Kansas
PUF Design in Hardware
Hongyuan Ding, Shiming Li, Miaoqing Huang, University of Arkansas
Hardware-Based implementation of a Network-Based Intrusion and Botnet Detection System
Tbatou Adil, Christophe Bobda, University of Arkansas
Mobile Banking Security Using GPS Location Authentication
Matthew Moccaro, Dale Thompson, University of Arkansas
1:30-3:10pm: Paper Presentation Session 2 (Session chair: Bo Luo)
1:30-2:10: Private Sector IT Security
Adam Holland, Michael Parks, Qui Le, Wal-Mart Stores, Inc.
2:10-2:30: Private Spread Spectrum-Based Data Aggregation for smart Grid Networks
Navid Alamatsaz, Arash Boustani, Murtuza Jadliwala, Wichita State University
2:30-2:50: Efficient Privacy-Aware Incentives for Mobile Sensing
Qinghua Li, University of Arkansas
2:50-3:10: Protecting Privacy in a Clinical Data Warehouse
Zhichun Xiao, Peking University
3:10-3:50pm: PhD Forum 2 (Session chair: Xinming (Simon) Ou)
3:10-3:20: Modeling Critical Node Attacks in Mobile Wireless Networks
Dongsheng Zhang, University of Kansas
3:20-3:30: A Fundamental Approach to Scalability for Software-Defined Networks
Hyungbae Park, University of Missouri - Kansas City
3:30-3:40: Network capacity improvement in speed spectrum based cognitive radio networks
Arash Boustani, Wichita State University
3:40-3:50: Secure Real-Time Operating System for CPS
Xiaolong Wang, Kansas State University
3:50-4:00pm: Break
4:00-5:20pm: Paper Presentation Session 3 (Session chair: Hai Jiang)
4:00-4:20: Amandroid: A General Inter-component Data Flow Analysis Framework for Security Study of Android Apps
Xinming Ou, Robby, Sankardas Roy, Fengguo Wei, Kansas State University
4:20-4:40: Internet Fraud
Ce Xiao, Keyu Jiang, Fort Hays State University
Kaustubh Dhondge, Sejun Song, Younghwan Jang, Sunae Shin, Hyungbae Park, Baek-Young Choi, University of Missouri - Kansas City
5:00-5:20: Survey of Attribute-Based Encryption
Zhi Qiao, Shuwen Liang, Spencer Davis, Hai Jiang, Arkansas State University
5:20pm: Closing Remarks