Menu

Notification to poster authors

Each poster author will be provided with a poster board. The poster boards are 6ft wide by 4ft tall (182.88cm wide by 121.92cm tall). The poster should not exceed 5ft 9in by 3ft 9in (175.26cm wide by 114.3cm tall). Please ensure that your poster meets these specifications. Moreover, the poster boards are Velcro and pushpin compatible. Velcro or pushpins will be provided at the conference.

We offer all RAID poster authors the opportunity to present their poster at the VizSec poster session on the 14th of September, without having to register for VizSec. We would like each poster author to send us an email at , with the subject "RAID and VizSec Poster Session", confirming whether or not they plan to attend the VizSec poster session, to ensure that we have enough poster boards for everybody. Note that this extended invitation is for the VizSec poster session only; in order to attend the paper presentations, the authors have to register to VizSec.

Poster Session

1. Toward Specification-based Intrusion Detection for Web Applications
Salman Niksefat, Mohammad Mahdi Ahaniha, Babak Sadeghiyan, and Mehdi Shajari

2. Towards Automatic Deduction and Event Reconstruction Using Forensic Lucid and Probabilities to Encode the IDS Evidence *
Serguei A. Mokhov, Joey Paquet, and Mourad Debbabi

3. A Client-Initialized and Server-Accomplished Defense Mechanism for Cross-Site Request Forgery *
Luyi Xing, Yuqing Zhang, Shenlong Chen

4. Aspect-based Attack Detection in Large-scale Networks
Martin Drašar, Jan Vykopal, Radek Krejčí, Pavel Čeleda

5. Eliminating Human Specification in Static Analysis
Ying Kong, Yuqing Zhang, Qixu Liu

6. Inferring Protocol State Machine from Real-World Trace
Yipeng Wang, Zhibin Zhang, and Li Guo

7. On Estimating Cyber Adversaries’ Capabilities - A Bayesian Model Approach
Jianchun Jiang, Weifeng Chen, and Liping Ding

8. A Distributed Honeynet at KFUPM: A Case Study
Mohammed Sqalli, Raed AlShaikh, Ezzat Ahmed

9. MEDUSA: Mining Events to Detect Undesirable uSer Actions in SCADA
Dina Hadziosmanovic, Damiano Bolzoni and Pieter Hartel

10. Detecting Network Anomalies in Backbone Networks *
Christian Callegari, Loris Gazzarrini, Stefano Giordano, Michele Pagano, and Teresa Pepe

11. Using IRP for Malware Detection
FuYong Zhang, DeYu Qi, and JingLin Hu

12. Toward Whole-System Dynamic Analysis for ARM-based Mobile Devices *
Ryan Whelan and David Kaeli

13. Security System for Encrypted Environments (S2E2) *
Robert Koch and Gabi Dreo Rodosek

14. Evaluation of the Common Dataset Used in Anti-Malware Engineering Workshop 2009
HOSOI Takurou and Kanta Matsuura

15. Detecting the Onset of Infection for Secure Hosts
Kui Xu, Qiang Ma, and Danfeng (Daphne) Yao

* Also presented at the VizSec Poster Session

Note: This website has been developed in Canada and as such, Canadian spelling rules have been applied throughout.
Home Hotel and Travel Venue Ottawa Info. Registration Sponsorship Call for Participation Program Technology Showcase Speakers Committees Contact