You are on page 1of 4

8th International Conference on Information Warfare and Security Regis University, Denver, USA 25-26 March 2013

Sunday 24 March 2013


18:30 Doubletree Hilton Hotel Pre-conference registration and welcome meeting (Until 1930)

Monday 25 March 2013


09:00 Registration and coffee 09:30 Room: Welcome from the conference chair: Dan Likarish 09:45 Keynote address: David L. Willson, Titan Info Security Group LLC, USA Active Defense: How to Legally Defend Beyond Your Network 10:30 Conference splits into streams Room: Stream A: Chair: Erik Moore 10:45 Improving Public-Private Sector Cooperation on Cyber Event Reporting McNally Julie, Bellevue University, USA Room: Stream B: Chair: Matthew Crosston Strategies for Combating Sophisticated Attacks Arnold Chad, Jonathan Butts and Krishanaprasad Thirunarayan Air Force Institute of Technology, USA Room: Stream C: Mini track on Modelling and Simulation for Cyber Defence Chairs: Joey Jansen van Vururen and Louise Leenen Scada Threats in the Modern Airport McCarthy John, Cranfield University, UK and Bill Mahoney, Nebraska University at Omaha, USA

11:15 Copyright protection based on contextual web watermarking Mir Nighat, Effat University, Saudi Arabia 11:45 The Potential Impact of Cyber-terrorism on National Security of Saudi Arabia Alqahtani Abdulrahman, Hull University, UK, (PhD Research Paper) 12:15 Replication and Diversity for Survivability in Cyberspace: A Game Theoretic Approach Kamhoua Charles, Kevin Kwiat, Partick Hurley, Air Force Research Laboratory, Joon Park, Syracuse University, New York and Mainak Chatterjee, University of Central Florida, Orlando, USA 12:45 07/03/2013 12:46 Lunch

Identifying Tools and Technologies for Professional Offensive Cyber Operations Grant Tim, R-BAR and Ronald Prins, Fox-IT, Delft, Netherlands Situation Management in Aviation Security - A GraphTheoretic Approach Koelle Rainer Eurocontrol Brussels, Belguim and Denis Kolev, Lancaster University, UK The Emergence of Cyber Activity as a Gateway to Human Trafficking Greiman Virginia Boston University and Christina Bain Harvard Kennedy School, Cambridge USA

Deep Routing Simulation Irwin Barry and Alan Herbert, Rhodes University, Grahamstown, South Africa Towards a South African Crowd Control Model Modise Mapule, Zama Dlamini, Sifiso Simelane, Linda Malinga, Thami Mnisi and Sipho Ngobeni, CSIR, Pretoria, South Africa

Lunch This timetable is subject to change

Lunch 1

Room: Stream A: Technical issues Chair: Tim Grant 14:00 Functional Resilience, Functional Resonance, and Threat Anticipation for Rapidly Developed Systems Rohret David, Michael Kraft and Michael Vella, Computer Sciences Corporation Inc., San Antonio USA

Room: Stream B: Hacking Chair: Wilmuth Mller

Room: Stream C: Mini track on Modelling and Simulation for Cyber Defence Chairs: Joey Jansen van Vururen and Louise Leenen

The Adam & Eve Paradox A Vulnerability Modeling in a Bit-Induced Reality Kraft Michael, David Rohret, Michael Vella and Jonathon Moore Erik, Academic Computing Services, Adams 12 Five Holston Computer Sciences Corporation, San Antonio, USA Star School District, Thornton, Colorado, USA (Non-Academic Paper)

14:30 Analysis of Programmable Logic Controller Firmware for Hacking for the Homeland: Patriotic Hackers Versus Threat Assessment and Forensic Investigation Hacktervists: Basnight Zachry, Jonathon Butts, Juan Lopez and Dahan Michael, Sapir College, Israel Thomas Dube Air Force Institute of Technology, USA 15:00 Design of a Hybrid Command and Control Mobile Botnet Pieterse Heloise, CSIR, South Africa and Martin Olivier, University of Pretoria, South Africa 15:30 16:00 Refreshments Refreshments

A Taxonomy of Web Service Attacks Chan Ka Fai Peter and Renier van Heerden, CSIR, Martin Oliver, University of Pretoria, South Africa

Development of a South African Cybersecurity Policy Implementation Framework Jansen van Vuuren Joey, Louise Leenen, Jackie Phahlamohlaka, CSIR, Pretoria and Jannie Zaaiman, University of Venda, Limpopo, South Africa Refreshments

Room: Panel Discussion to be led by Leigh Armistead How to improve metrics and analysis of the testing for cyber security effectiveness Close of conference day Close of conference day Bus leaves to go to The Fort Restaruant for the conference dinner Bus returns to the Doubletree Hotel Close of conference day

17:00 19:00 22:00

07/03/2013 12:46

This timetable is subject to change

Tuesday 26 March 2013


09:30 Room: Keynote address: William Hugh Murray, USA The Drums of War 10:20 Introduction to ICIW 2013 10:30 Refreshments Poster contributors will stand by their posters for participants to discuss their research Room: Stream A: Information and Cyber-War Chair: Michael Dahan Refreshments Poster contributors will stand by their posters for participants to discuss their research Room: Stream B: Chair: Barry Irwin Refreshments Poster contributors will stand by their posters for participants to discuss their research Room: Stream C: Mini Track on The Human Factors of Cyber Operations Chair: Robert Mills Improving Cyber Warfare Decision Making by Incorporating Leadership Styles and Situational Context into Polyhuristics Decision Theory Caudle Daryl, Advanced Education Concepts, Wilmington, DE, USA (PhD Research Paper)

11:00 Consequences of Diminishing Trust in Cyberspace Results From a SCADA-Based Cyber Security Competition Dasgupta Dipankar and Denise Ferebee, The University Novak Heath and Daniel Likarish , Regis University, Dever, of Memphis, USA Colorado, USA

11:30 Offensive Cyber Initiative Framework (OCIF) Raid and Re-spawn Project Rohret David, Micheal Vella and Michael Kraft, Computer Sciences Corporation, USA (Non-Academic Paper) 12:00 Towards a Theory of Just Cyberwar Giesen Klaus-Gerd, Universit d'Auvergne, ClermontFerrand, France

Exercising state sovereignty in cyberspace: An international DUQUS DILEMMA: The Ambiguity Assertion and the cyber-order under construction? Futility of Sanitized Cyber War Liaropoulos Andrew, University of Piraeus, Greece Crosston Matthew, Bellevue University, USA

An Investigation of the Current State of Mobile Strategy Device Management within South Africa Burke Ivan, and F. Mouton CSIR, Pretoria, South Africa

Investigating Hypothesis Generation in Cyber Defense Analysis through an Analogue Task Vickhouse Rachel and Spencer Bryant, Right patterson Air Force Base, Adam Bryant, Riverside Research, Beavercreek, Ohio, USA Lunch

12:30

Lunch

Lunch

07/03/2013 12:46

This timetable is subject to change

Room: Stream A: Information and Cyber-War Chair: Klaus-Gerd Giesen

Room: Stream B: Legal issues Chair: Sam Chung

14:00 Thirst for Information: the Growing Pace of Information What Lawyers Want: Legally Significant Questions That Warfare and Strengthening Positions of Russia, the USA Only IT Specialists Can Answer and China Shiryaev Yaroslav, University of Warwick, Coventry, UK Vasilyeva Inna and Yana Vasilyeva Kuban State University of Technology, Russian Federation 14:30 The Weakest Link The ICT Supply Chain and Information Warfare Shoemaker Daniel and Charles Wilson, University of Detroit Mercy, USA 15:00 Defamation in Cyber Space: Who Do You Sue? Godara Samiksha, Shamsher Bahadur Saxena College Of Law, India

Room: Stream C: Mini Track on The Human Factors of Cyber Operations Chair: Robert Mills Top-Level Goals in Reverse Engineering Executable Software Bryant Adam, Robert Mills, Michael Grimaila and Gilbert Peterson Air Force Institute of Technology, Ohio, USA

Room: A summary of issues raised during the conference Led by Dan Likarish and DougHart Prize for the best poster will be awarded Close of Conference Close of Conference Close of Conference

15:30

Work in Progress and Posters: To be displayed from noon on Thursday until Noon on Friday Poster presenters will stand by their posters to discuss research with others from 1000-1030 on Friday
Evaluation of Cryptographic Security Schemes for Air Traffic Controls Next Generation Upgrade Finke Cindy, Jonathan Butts, Robert Mills and Micheal Grimaila Air Force Institute of Technology, USA Attack-Aware Supervisory Control and Data Acquisition (SCADA) Alexander Otis, Sam Chung and Barbara EndicottPopovsky University of Washington, Seattle, USA Action and reaction: Strategies and tactics of the current political cyberwarfare in Russia Lysenko Volodymyr and Barbara Endicott-Popovsky, University of Washington, Seattle, USA Attack Mitigation Through Memory Encryption of SecurityEnhanced Commodity Processors Henson Michael and Stephen Taylor, Dartmouth College, USA Cyber Disarmament Treaties and the Failure to Consider Adequately Zero-Day Threats Baer Merritt, Harvard Law School, Cabridge, USA

07/03/2013 12:46

This timetable is subject to change

You might also like