skip to main content
10.1145/2598918acmconferencesBook PagePublication Pagesasia-ccsConference Proceedingsconference-collections
SFCS '14: Proceedings of the 2nd international workshop on Security and forensics in communication systems
ACM2014 Proceeding
  • General Chairs:
  • Noureddine Boudriga,
  • Slim Rekhis
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
ASIA CCS '14: 9th ACM Symposium on Information, Computer and Communications Security Kyoto Japan 3 June 2014
ISBN:
978-1-4503-2802-9
Published:
03 June 2014
Sponsors:
Recommend ACM DL
ALREADY A SUBSCRIBER?SIGN IN

Reflects downloads up to 22 Feb 2025Bibliometrics
Skip Abstract Section
Abstract

It is our great pleasure to welcome you to the Second International Workshop on Security and Forensics in Communication Systems (ASIACCS-SFCS'2014). This year workshop continues the objectives of the first edition of the workshop aiming at discussing and building emerging security and digital forensic engineering, as disciplined sciences in charge of developing novel scientific and theoretical methods, techniques, and approaches to collect, process, and analyze information retrieved from systems affected by security incidents, in order to generate conclusive descriptions and propose decisions or proofs.

This year's workshop attempts to set up a tradition of being among the fora for presentation of research results and experience reports on leading edge issues of access control, including models, systems, applications, and theory. The mission of the workshop is to propose a platform for sharing novel security control solutions and investigation methods that fulfill the needs of networked applications and environments. It also aims at identifying new directions for future research and development in communication security and forensic science, and giving security researchers and practitioners the opportunity to share their perspectives with scientists and engineers interested in the various aspects of security.

The call for papers attracted multiple submissions from Asia, Europe, Africa, and North America. The program committee accepted only 6 papers that cover a variety of topics, including: security of cloud computing, investigation of data leakage, analysis of tracing systems, privacy preserving in cloud storage systems and the detection of explicit images.

We kindly encourage attendees to attend the invited talk presentations and the six talks planned for the workshop. These valuable and insightful talks can present an interesting forum for the exchange of ideas in innovative disciplines related to network security and forensic investigation. In particular, the invited talk "Security Investigation in Wireless Networks", presented by Dr. Slim Rekhis, from the University of Carthage, Tunisia will discuss the challenges and recent developments in the digital investigation in wireless networks, while highlighting the importance of evidences collection, system visibility and anti-forensic detection.

Skip Table Of Content Section
SESSION: Invited talk
invited-talk
Security investigation in wireless networks(invited talk)

Most of the theoretical techniques of digital investigation provided in the literature are neither able to cope with attacks in wireless networks, nor able to investigate anti-forensic attacks. In this talk, I will describe a formal approach for digital ...

SESSION: Forensic investigation of huge & continuous stream of data
research-article
Secure streaming forensic data transmission for trusted cloud

The proliferation of cloud computing requires excessive forensic data to be acquired, transmitted, and analyzed in a timely manner. However, current digital forensic technology is ill-suited to cloud as it exposes the problems of trusted data ...

research-article
A software design and algorithms for multicore capture in data center forensics

With rapid dissemination of cloud computing, data centers are quickly turning into platforms that host highly heterogeneous collections of services. Traditional approach to security and performance management finds it difficult to cope in such ...

SESSION: Theory & practice of security
research-article
A bayesian belief network for data leakage investigation

Today, it is common to share and to disseminate digital data in both the commercial and personal domains. Incidents of data leakage in which personal or commercial sensitive data is leaked to untrusted or non-intended recipients are also on the rise. ...

research-article
Cost-benefit analysis of kernel tracing systems for forensic readiness

We present a cost-benefit analysis of kernel tracing systems for forensic readiness. We use the comprehensive coverage provided by kernel tracing systems as the indicator of benefit, and calculate the performance and storage overheads caused by ...

research-article
LBA privacy preserving index and its theoretical analysis in cloud storage systems

In cloud storage systems, the index system, which maps a queried item to its storage location, is a key component. Due to the limited space in the storage nodes, it requires to compact the index for fast response. Moreover, since the index may be ...

research-article
Skin sheriff: a machine learning solution for detecting explicit images

Digital forensics experts are increasingly confronted with investigating large amounts of data and judging if it contains digital contraband. In this paper, we present an adaptable solution for detecting nudity or pornography in color images. We combine ...

Contributors
  • University of Carthage
  • University of Carthage

Index Terms

  1. Proceedings of the 2nd international workshop on Security and forensics in communication systems
      Index terms have been assigned to the content through auto-classification.

      Recommendations

      Acceptance Rates

      SFCS '14 Paper Acceptance Rate 6 of 10 submissions, 60%;
      Overall Acceptance Rate 6 of 10 submissions, 60%
      YearSubmittedAcceptedRate
      SFCS '1410660%
      Overall10660%