SRISecCon 2014 Dec. 1, 2014 to Dec. 3, 2014, Perth,Austrailia

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
THE IMPACT OF CUSTOM ROM BACKUPS ON ANDROID EXTERNAL STORAGE ERASURE Peter Hannay , Haydon Hope The Android operating system is the current market leader on mobile devices such as smartphones ...
THE APPLICATION OF AN AGILE APPROACH TO IT SECURITY RISK MANAGEMENT FOR SMES Damien Hutchinson This paper demonstrates the application of an agile risk management approach to perform assetbased risk ...
UP-DATING INVESTIGATION MODELS FOR SMART PHONE PROCEDURES Brian O. Cusack , Raymond Lutui The convergence of services in Smart Technologies such as iPhones, Androids and multiple tablet work ...
AUTHENTICATION AND AUTHORISATION IN ENTRUSTED UNIONS Milan Petkovic , Tanya Ignatenko , Mike Johnstone This paper reports on the status of a project whose aim is to implement and ...
A FORENSIC OVERVIEW OF THE LG SMART TV Andy Jones , Iain Sutherland , Konstantinos Xynos , Tom Drange The television set has evolved from the valve systems of the 1920’s to the current ...
SECURING IDENTITY INFORMATION WITH IMAGE WATERMARKS Brian O. Cusack , Reza Khaleghparast In this paper, we describe the requirements for embedding watermarks in images used for identity ...
TOWARDS A SET OF METRICS TO DETECT AND GENERATE SYNTHETIC FILE SYSTEMS Ben Whitham File system researchers often rely on generating their own synthetic document repositories, due to data ...
MITIGATING MAN-IN-THE-MIDDLE ATTACKS ON SMARTPHONES – A DISCUSSION OF SSL PINNING AND DNSSEC Veelasha Moonsamy , Deakin University Since their introduction, smartphones remain one of the most used handheld devices and this trend ...
FORENSIC EXAMINATION AND ANALYSIS OF THE PREFETCH FILES ON THE BANKING TROJAN MALWARE INCIDENTS Andri Heriyanto Whenever a program runs within the operating system, there will be data or artefacts created ...
A SURVEY OF IPV6 ADDRESS USAGE IN THE PUBLIC DOMAIN NAME SYSTEM Andrew Woodward , Clinton Carpene The IPv6 protocol has been slowly increasing in use on the Internet. The main reason ...
LISTENING TO BOTNET COMMUNICATION CHANNELS TO PROTECT INFORMATION SYSTEMS Brian O. Cusack , Sultan Almutairi Botnets are a weapon of choice for people who wish to exploit information systems for ...
EVALUATING THE SECURITY VULENERABILITIES OF THE IP6to4 TUNNELLING MECHANISM Brian O. Cusack , Raymond Lutui The two versions of Internet Protocol (IP) rely on mechanisms that will convert one protocol ...
THE ZOMBIES STRIKE BACK: TOWARDS CLIENT-SIDE BEEF DETECTION Maxim Chernyshev , Peter Hannay A web browser is an application that comes bundled with every consumer operating system, including ...
THE IMPACT OF SOCIAL CONSTRUCTIVISM ON ERP SYSTEMS SECURITY: A CRITICAL SOCIAL REVIEW Kennedy Njenga Little is understood about the effects of social constructivism that shapes conflicting concerns regarding Enterprise ...
LOCATIONAL WIRELESS AND SOCIAL MEDIA-BASED SURVEILLANCE Maxim Chernyshev The number of smartphones and tablets as well as the volume of traffic generated by ...
SECURING THE INTERNET OF THINGS INFRASTRUCTURE – STANDARDS AND TECHNIQUES Zubair Baig The Internet of Things (IoT) infrastructure is a conglomerate of electronic devices interconnected through the ...
Keynote Presentation Jason Brown , Jeffrey Malone , Roger Bradbury Security's Role In Building Enterprise Resilience During this presentation Jason will discuss the nature of ...
PREREQUISITES FOR CREATING RESOURCES AND COMPOSITIONS FOR CYBER DEFENCE Tuija Kuusisto , Rauno Kuusisto The aim of this paper is to increase understanding about the prerequisites which evolving cyber ...
ATTRIBUTE-BASED ENCRYPTION WITH ENCRYPTION AND DECRYPTION OUTSOURCING Muhammad Asim , Milan Petkovic , Tanya Ignatenko In this paper we propose a new scheme for ciphertext-policy attribute-based encryption that allows outsourcing ...
DECTECTING COVERT COMMUNICATION CHANNELS IN RASTER IMAGES Brian O. Cusack , Jarrett Chambers Digital image steganography is a method for hiding secret messages within everyday Internet communication channels. ...
THE POTENTIALS AND CHALLENGES OF BIG DATA IN PUBLIC HEALTH Rena N Vithiatharan The potential to use big data sources for public health increases with the broadening availability ...
DESIGN REQUIREMENTS FOR GENERATING DECEPTIVE CONTENT TO PROTECT DOCUMENT Ben Whitham For nearly 30 years, fake digital documents have been used to identify external intruders and ...
BIG DATA IN HEALTHCARE: WHAT IS IT USED FOR? Rebecca Hermon , Trish Williams Big data analytics is a growth area with the potential to provide useful insight in ...
A FORENSICALLY-ENABLED IAAS CLOUD COMPUTING ARCHITECTURE Nathan Clarke , Steven Furnell , Saad Alqahtany , Christoph Reich Current cloud architectures do not support digital forensic investigators, nor comply with today’s digital forensics ...
BYOD IN EHEALTH: HERDING CATS AND STABLE DOORS, OR A CATASTROPHE WAITING TO HAPPEN Krishnun Sansurooah , Trish Williams The use of personal devices in the work environment has crossed the boundaries of work ...
SUITABILITY OF LACUNARITY MEASURE FOR BLIND STEGANALYSIS Ahmed Ibrahim Blind steganalysis performance is influenced by several factors including the features used for classification. This ...
AVOIDING EPIC FAILS: SOFTWARE AND STANDARDS DIRECTIONS TO INCREASE CLINICAL SAFETY Trish Williams , Vincent Mccauley The safety issues related to IT and software are gaining more exposure within the Healthcare ...
RAPID FORENSIC CRIME SCENE ANALYSIS USING INEXPENSIVE SENSORS Dan Blackman Network forensics is the study of traffic in order to validate possible network intrusions, violations ...
MANAGING WIRELESS SECURITY RISKS IN MEDICAL SERVICES Brian Kyaw Medical systems are designed for a range of end users from different professional skill groups ...
FINDING EVIDENCE OF WORDLISTS BEING DEPLOYED AGAINST SSH HONEYPOTS – IMPLICATIONS AND IMPACTS Priya Rabadia , Criag Valli This paper is an investigation focusing on activities detected by three SSH honeypots that utilised ...
SECURITY AND ELECTRONIC HEALTH RECORDS IN A RESOURCE LIMITED SETTING: THE CASE OF SMART-CARE ELECTRONIC HEALTH RECORD IN ZAMBIA Keith Mweebo This paper presents a case study of security issues related to the operationalization of smart-care, ...
A GOVERNANCE APPROACH TO MANAGING INFORMATION SECURITY IN HEALTHCARE Rachel Mahncke Securing healthcare information is becoming significantly important given the global focus on privacy legislation and ...
EFFICACY OF PROPERTY MARKING: POLICE IDENTIFICATION OF STOLEN PROPERTY Craig Separovic , David Brooks Property marking, as a situational crime prevention technique, has been found to be largely ineffectual ...
CUSTOMISING DOCTOR-NURSE COMMUNICATIONS Brian O. Cusack , Dave Parry Doctor-Nurse communications are critical for patient safety and work-flow effectiveness. Our research question was: What ...
COUNTERING CRIME IN HOSTILE ENVIRONMENTS: SECURING VULNERABLE HUMAITARIAN AID WORKERS IN PAPUA NEW GUINEA William Bailey Crime is a core issue for companies and more recently for NGOs working in Papua ...
AN ANALYSIS OF SECURITY ISSUES IN BUILDING AUTOMATION SYSTEMS Mike Johnstone , Matthew Peacock The purpose of Building Automation Systems (BAS) is to centralise the management of a wide ...
I REMEMBER RICHELIEU: IS ANYTHING SECURE ANYMORE? Mike Johnstone , Michael Crowley Petraeus-gate, hacked nude celebrity photos in the cloud, and the recent use of a search ...
CACHE-TIMING ATTACK AGAINST AES CRYPTO-SYSTEM COUNTERMEASURES - A REVIEW Yaseen Taha , Settana Abdullah , Naila Saad , Houwida Elshoush Side channel attacks are based on side channel information, which is information that is leaked ...
UNDERSTANDING THE ROLE OF SOCIAL GROUPS IN RADICALISATION Kira Harris The inability to form psychological profiles of individual members across a variety of extremist groups, ...
A USER-ORIENTED NETWORK FORENSIC ANALYSER: THE DESIGN OF A HIGH-LEVEL PROTOCOL ANALYSER Nathan Clarke , Steven Furnell , Dany Joy , Fudong Li Network forensics is becoming an increasingly important tool in the investigation of cyber and computer-assisted ...
THE BAD GUYS ARE USING IT. ARE YOU? Hong-eng Koh From Occupy Wall Street to 2011 England riots to Arab Spring to Mumbai 26/11 to ...