SCHEDULE. The 7 th International Conference on Security for Information Technology and Communications (SECITC'14)



Similar documents
STAGES FOR THE DEVELOPMENT OF THE AUDIT PROCESSES OF DISTRIBUTED INFORMATICS SYSTEMS 1

NSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense

RAISA Romanian Association for Information Security Assurance PURPOSE OBJECTIVES

Journal of Mobile, Embedded and Distributed Systems, vol. I, no. 1, 2009 ISSN

Bellevue University Cybersecurity Programs & Courses

09:00 Official Opening 09:00 - Marco Obiso, ITU/UN-Geneva, World cybersecurity coordinator - H.E. Jean-Hubert Lebet, Ambassador of Switzerland to

SECURITY EVALUATION IN COLLABORATIVE M-LEARNING SYSTEMS

Cyber DTU. Lars Ramkilde Knudsen

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

MOBILE SMARTPHONES AS SECURE SIGNATURE-CREATION DEVICES

HOTEL RAMADA,

SACI 2004 will take place on May 25-26, 2004, at Politehnica University of Timisoara.

Introduction to Cybersecurity Overview. October 2014

Statement of Purpose The JOURNAL OF INFORMATION SYSTEMS & OPERATION MANAGEMENT (ISSN ), published two times annually by the Romanian

SACI th IEEE International Symposium on Applied Computational Intelligence and Informatics. Timişoara, Romania May 15-17, 2014

Logging for Cloud Computing Forensic Systems

Cloud Search Based Applications for Big Data - Challenges and Methodologies for Acceleration

Introduction to Cyber Security / Information Security

IEEE International Conference on Computing, Analytics and Security Trends CAST-2016 (19 21 December, 2016) Call for Paper

KING FAHD UNIVERSITY OF PETROLEUM & MINERALS COLLEGE OF COMPUTER SCIENCES AND ENGINEERING DEPARTMENT OF INFORMATION & COMPUTER SCIENCE

Services. Cybersecurity. Capgemini & Sogeti. Guiding enterprises and government through digital transformation while keeping them secure

Network Security Essentials:

addressed. Specifically, a multi-biometric cryptosystem based on the fuzzy commitment scheme, in which a crypto-biometric key is derived from

FACULTY OF AUTOMATION AND COMPUTERS

e-code Academy Information Security Diploma Training Discerption

Certifications and Standards in Academia. Dr. Jane LeClair, Chief Operating Officer National Cybersecurity Institute

Secure Internet of Things Project (SITP)

A Systems Engineering Approach to Developing Cyber Security Professionals

Human Factors in Information Security

Build Your Own Security Lab

What is Really Needed to Secure the Internet of Things?

Page 1. Lecture 1: Introduction to. Introduction to Computer Networks Security. Input file DES DES DES DES. Output file

A Generic Framework to Enhance Two- Factor Authentication in Cryptographic Smart-card Applications

Dept. of Financial Information Security

Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.

Internet of Things and Embedded Software Security.

Centers of Academic Excellence in Cyber Security (CAE-C) Knowledge Units Review

True Identity solution

Penetration Testing - a way for improving our cyber security

CESG Certification of Cyber Security Training Courses

INCREASINGLY, ORGANIZATIONS ARE ASKING WHAT CAN T GO TO THE CLOUD, RATHER THAN WHAT CAN. Albin Penič Technical Team Leader Eastern Europe

Education in Biomedical Engineering in the Republic of Moldova Victor Sontea, Serghei Railean

CRYPTOGRAPHY AS A SERVICE

INFORMATION SECURITY TRAINING CATALOG (2015)

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM

UCL MSc in Information Security. Dr Emiliano De Cristofaro MSc Course Director 2015/16

THE EUROPEAN FORUM QUALITY SOCIAL SERVICES IN EVERY COMMUNITY CHALLENGES AND OPPORTUNITIES

KEY TRENDS AND DRIVERS OF SECURITY

Computer Security. Principles and Practice. Second Edition. Amp Kumar Bhattacharjee. Lawrie Brown. Mick Bauer. William Stailings

ITAR Compliance Best Practices Guide

Strong Authentication for Future Web Applications

WHITE PAPER Usher Mobile Identity Platform

Over 20 years experience in Information Security Management, Risk Management, Third Party Oversight and IT Audit.

Cyber Security In High-Performance Computing Environment Prakashan Korambath Institute for Digital Research and Education, UCLA July 17, 2014

Cloud and Security (Cloud hacked via Cloud) Lukas Grunwald

Biometric Authentication Platform for a Safe, Secure, and Convenient Society

CRYPTUS DIPLOMA IN IT SECURITY

AB 1149 Compliance: Data Security Best Practices

2016 TÜBİTAK BİLGEM Cyber Security Institute

Designing and Coding Secure Systems

Strengths and Weaknesses of Cybersecurity Standards

Course Content Summary ITN 262 Network Communication, Security and Authentication (4 Credits)

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

INFORMATION SECURITY TRAINING CATALOG (2016)

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

Guide for Designing Cyber Security Exercises

If you know the enemy and know yourself, you need not fear the result of a hundred battles.

Summary. I. V. Arzamartsev, G. I. Borzunov A Method of Analysis of Multithreaded Applications Based on Symbolic Execution

1. Fault Attacks for Virtual Machines in Embedded Platforms. Supervisor: Dr Konstantinos Markantonakis,

NSA/DHS National Centers of Academic Excellence in Information Assurance/Cyber Defense 2014 List of Knowledge Units and Focus Areas

A Model-based Methodology for Developing Secure VoIP Systems

ATTORNEY LIST revised January 2009

The Case for Support: The Center for Cyber Security Studies at the U. S. Naval Academy

Cyber Exercises, Small and Large

CYBERSECURITY: ISSUES AND ISACA S RESPONSE

Weighted Total Mark. Weighted Exam Mark

Internet Banking Two-Factor Authentication using Smartphones

Research on Situation and Key Issues of Smart Mobile Terminal Security

SCADA Security Training

POLICIES TO MITIGATE CYBER RISK

Northrop Grumman Cybersecurity Research Consortium

InfoSec Academy Application & Secure Code Track

DESIGN AND IMPLEMENTATION OF A SECURE MULTI-CLOUD DATA STORAGE USING ENCRYPTION

Christos Douligeris cdoulig at unipi dot gr. Department of Informatics University of Piraeus

Device-Centric Authentication and WebCrypto

Protecting your information

Mitigating Server Breaches with Secure Computation. Yehuda Lindell Bar-Ilan University and Dyadic Security

Network Security - ISA 656 Review

Effective Defense in Depth Strategies

Transcription:

SCHEDULE of The 7 th International Conference on Security for Information Technology and Communications (SECITC'14) Powered by Informatics Security / IT&C Security Master Bucharest University of Economic Studies Information Technology Security Master Military Technical Academy Conference Partners Advanced Technologies Institute Media Partner

SECITC 2014 SCHEDULE www.secitc.eu Day 1 12 th June 2014 On Site Registration Date: 12 th June 2014, hour 08.30 AM, room Alba Iulia, National Military Palace Opening Meeting Date room Alba Iulia, National Military Palace: 12 th June 2014, hour 09.00 AM, room Alba Iulia, National Military Palace Affiliation 09.00 AM FOREWARD Representatives from Bucharest University of Economic Studies Military Technical Academy Representatives Department of Economic Informatics and Cybernetics Department of Computer Science and Military Information Systems ISM IT&C Security Master Program InfoSec Security of Information Technology Master Program ITA Advanced Technologies Institute CERT-RO, CYBERINT, CERTMIL 09.20 AM Prof. Victor Valeriu PATRICIU, Ph.D. Cyber-security versus Cyber-warfare Military Technical Academy 09.40 AM Adrian FLOREA Practical aspects on cloud information certsign security 10.00 AM Bogdan CIORTOLOMAN Trusted liaison between Romanian ORNISS authorities and NATO and EU structures on information security issues 10.20 AM Dan TOFAN Current state of cybersecurity within Romania CERT-RO 10.40 AM Mihaela VASILIU ISACA Academic Opportunities ISACA Coffee Break - 11.00 11.30

SECTION 1 Cryptographic Algorithms and Protocols room Alba Iulia Chairman: Prof. Victor-Valeriu PATRICIU, PhD. 11.30 Marius Daniel DAVID, Monica BORDA Comparison of the most common fusion techniques used in a multimodal biometric system with a biometric cryptosystem 11.45 George TEȘELEANU A Monte Carlo Method for Factorization Using Rainbow Techniques 12.00 Raluca DAVID, Monica BORDA TLS Protocol: Improvement using One-Time-Pad function 12.15 Marius-Alexandru VELCIU, Victor-Valeriu PATRICIU Using Shared Vault constructions for bio-cryptographic algorithms 12.30 Diana-Stefania MAIMUT, Randomness and Primary Testing on Embedded Devices Andrei MARGHESCU, Mariana SAFTA 12.45 Iuliana PAUN An ECDSA Implementation for Smart Card Devices 13.00 Bogdan-Cosmin CHIFOR, Wireless sensor network security Victor Valeriu PATRICIU 13.15 Marius-Viorel GRIGORAS, Luciana MOROGAN Password Cracking using P Systems with Active Membranes 13.30 Kerem KAŞKALOĞLU Near Zero Bitcoin Transaction Fees Cannot Last Forever 13.45 Diana-Stefania MAIMUT, Andrei MARGHESCU, Emil SIMION Steganographic Techniques Relying on Secure Cryptosystems 14.00 Alecsandru PĂTRAȘCU, Emil SIMION Kernel Based Supervised Learning Systems for Critical Infrastructures Cyber Protection Coffee Break 14.15 15.00 SECTION 2 Security Technologies for IT&C room Alba Iulia Chairman: Prof. Ion BICA, Ph.D. 15.00 Nicolae ROSIA Linux framework for general operations offloading on FPGA-CPU hybrid architectures 15.15 Petru-Radu NARITA Securing SharePoint Server with Windows Azure Multi- Factor Authentication 15.30 Alexandra-Emanuela Biometric Security - Fingerprint Recognition System VACARUS 15.45 Sorin POPA Secure Applications Integration with Apache Camel 16.00 Alexandru-Costin AVRAM Smart Waste Management using Internet of Things Architecture 16.15 Ioan BUBU Banking Software Applications Security 16.30 Alexandru Valentin BESCIU Implementing Security in a Vulnerable CRM 16.45 George STANESCU Risk Assessment Model for Mobile Malware

Day 2 13 th June 2014 13 th June 2014, hour 09.00 AM, room Alba Iulia, National Military Palace Affiliation 09.30 AM Prof. David NACACCHE, Ph.D. 10.15 AM Andrzej KLESNICKI 11.00 AM Mihaela VASILIU Products of small primes in formal arithmetic, information theory and cryptology Continuous Monitoring why not only government need it? Cloud Challenges Coffee Break - 11.20 11.30 SECTION 2 Security Technologies for IT&C room Alba Iulia Chairman: Assoc. Prof. Catalin BOJA, Ph.D. Universite Paris II PRES Sorbonne Universites, France Qualys, Poland ISACA, Romania 11.30 Andreja SAMČOVIĆ, Marija MILOVANOVIĆ Application of Spread Spectrum Techniques in Image Watermarking by Using Wavelets 11.45 Răzvan TOADER PayPal Transactions Security 12.00 Andreea Magdalena DAE Multipurpose Platform for Electronic Currency System 12.15 Felician ALECU, Paul POCATILU, Sergiu CAPISIZU Interception of GSM Calls by Turning off the GSM Encryption 12.30 Cristian TOMA, Marius POPA, Cristian CIUREA, Claudiu Secure Issues in IoT Internet of Things Architecture for Sensors Data Processing VINTE 12.45 OCTAVIAN MACHIDON Enhancing Cloud Computing security with reconfigurable System-on-Chip architectures 13.00 Andrei-Sorin JERCA Ethical Hacking Exercises Exploiting OpenSSL 13.15 Bogdan BEDA Single Page Web Applications Security 13.30 Roxana TURCU Security in Electronic Payment Systems Coffee Break 13.45 15.00 SECTION 3, 4 & 5 Information Security Management, Cyber Defense & Digital Forensic room Alba Iulia Chairman: Assoc. Prof. Emil SIMION, PhD. 15.00 Mihai DOINEA, Catalin Behavioral Security in Mobile Software BOJA, Bogdan IANCU 15.15 Mihai-Gabriel IONIȚĂ Autoimmune Cyber Retaliation Based on Collaborative Defense Techniques 15.30 Alexandru GROSU Software Tools for Source Code Analysis 15.45 Georgiana MATEESCU, Marius VLĂDESCU, Valentin SGÂRCIU Holistic Approach to Evaluate The Cloud Adoption

16.00 Marius VLĂDESCU, Event Correlation for Enterprise Internal Security Georgiana MATEESCU, Valentin SGÂRCIU 16.15 Alecsandru PĂTRAȘCU Anomaly Detection in Datacenters for Cloud Computing Digital Forensics 16.30 Cosmin BUBULAN Digital Forensics Capabilities in an Open Source Framework 16.45 SECITC 2014 Ending Session