It is our great pleasure to welcome you to the Second International Workshop on Security and Forensics in Communication Systems (ASIACCS-SFCS'2014). This year workshop continues the objectives of the first edition of the workshop aiming at discussing and building emerging security and digital forensic engineering, as disciplined sciences in charge of developing novel scientific and theoretical methods, techniques, and approaches to collect, process, and analyze information retrieved from systems affected by security incidents, in order to generate conclusive descriptions and propose decisions or proofs.
This year's workshop attempts to set up a tradition of being among the fora for presentation of research results and experience reports on leading edge issues of access control, including models, systems, applications, and theory. The mission of the workshop is to propose a platform for sharing novel security control solutions and investigation methods that fulfill the needs of networked applications and environments. It also aims at identifying new directions for future research and development in communication security and forensic science, and giving security researchers and practitioners the opportunity to share their perspectives with scientists and engineers interested in the various aspects of security.
The call for papers attracted multiple submissions from Asia, Europe, Africa, and North America. The program committee accepted only 6 papers that cover a variety of topics, including: security of cloud computing, investigation of data leakage, analysis of tracing systems, privacy preserving in cloud storage systems and the detection of explicit images.
We kindly encourage attendees to attend the invited talk presentations and the six talks planned for the workshop. These valuable and insightful talks can present an interesting forum for the exchange of ideas in innovative disciplines related to network security and forensic investigation. In particular, the invited talk "Security Investigation in Wireless Networks", presented by Dr. Slim Rekhis, from the University of Carthage, Tunisia will discuss the challenges and recent developments in the digital investigation in wireless networks, while highlighting the importance of evidences collection, system visibility and anti-forensic detection.
Proceeding Downloads
Security investigation in wireless networks(invited talk)
Most of the theoretical techniques of digital investigation provided in the literature are neither able to cope with attacks in wireless networks, nor able to investigate anti-forensic attacks. In this talk, I will describe a formal approach for digital ...
Secure streaming forensic data transmission for trusted cloud
The proliferation of cloud computing requires excessive forensic data to be acquired, transmitted, and analyzed in a timely manner. However, current digital forensic technology is ill-suited to cloud as it exposes the problems of trusted data ...
A software design and algorithms for multicore capture in data center forensics
With rapid dissemination of cloud computing, data centers are quickly turning into platforms that host highly heterogeneous collections of services. Traditional approach to security and performance management finds it difficult to cope in such ...
A bayesian belief network for data leakage investigation
Today, it is common to share and to disseminate digital data in both the commercial and personal domains. Incidents of data leakage in which personal or commercial sensitive data is leaked to untrusted or non-intended recipients are also on the rise. ...
Cost-benefit analysis of kernel tracing systems for forensic readiness
We present a cost-benefit analysis of kernel tracing systems for forensic readiness. We use the comprehensive coverage provided by kernel tracing systems as the indicator of benefit, and calculate the performance and storage overheads caused by ...
LBA privacy preserving index and its theoretical analysis in cloud storage systems
In cloud storage systems, the index system, which maps a queried item to its storage location, is a key component. Due to the limited space in the storage nodes, it requires to compact the index for fast response. Moreover, since the index may be ...
Skin sheriff: a machine learning solution for detecting explicit images
Digital forensics experts are increasingly confronted with investigating large amounts of data and judging if it contains digital contraband. In this paper, we present an adaptable solution for detecting nudity or pornography in color images. We combine ...
Index Terms
- Proceedings of the 2nd international workshop on Security and forensics in communication systems
Recommendations
Acceptance Rates
Year | Submitted | Accepted | Rate |
---|---|---|---|
SFCS '14 | 10 | 6 | 60% |
Overall | 10 | 6 | 60% |