The 5th Symposium on Configuration Analytics and Automation will be Collocated with the 8th Annual Security Automation Conference 2012 at The Baltimore Convention Center <http://www.bccenter.org/> . Here is the program and more information about location and travel grant can be found at: www.safeconfig.org.
SafeConfig 2012: Technical Program Day 1 : October 3 10.45 - 11.00 Welcome 11.00 - 11.45 Invited talk by Nick Feamster, University of Maryland and Georgia Tech. 11.45 - 12.30 Session I: Configuration modeling and checking Towards A Unified Modeling and Verification of Network and System Security Configuration Mohammed Noraden Alsaleh, University of North Carolina Charlotte; Ehab Al-Shaer, University of North Carolina Charlotte; Adel El-Atawy, Google Modeling and Checking the Security of DIFC System Configuration Mingyi Zhao, Pennsylvania State University; Peng Liu, Pennsylvania State University 12.30 - 1.30 Lunch 1:30 - 3:00 Session II: Vulnerability and risk assessment Increasing Android Security using a Lightweight OVAL-based Vulnerability Assessment Framework Martín Barrère, INRIA; Gaëtan Hurel, INRIA; Remi Badonnel, LORIA; Olivier Festor, INRIA Nancy - Grand Est A Declarative Logic-based Approach for Threat Analysis of Advanced Metering Infrastructure Mohammad Ashiqur Rahman, University of North Carolina Charlotte; Ehab Al-Shaer, University of North Carolina Charlotte Risk based Access Control using Classification Nazia Badar, Rutgers University; Jaideep Vaidya, Rutgers University; Vijay Atluri, Rutgers University; Basit Shafiq, LUMS 3:00 - 3:45 Break 3:45 4:30 Invited talk by Alex Liu, Michigan State University. 4:30 - 5:15 Panel discussion: Configuration challenges for next-generation systems and networks Panelists: Nick Feamster, Alex Liu, Ehab Al-Shaer Moderator: Geoffrey Xie Day 2 : October 4 11:00 - 12:30 Session III: Configuration analytics Generic Configuration Navigation System Shankaranarayanan Puzhavakath Narayanan, Purdue University; Seungjoon Lee, AT&T Labs Research; Subhabrata Sen, AT&T Labs Research The Right Files at the Right Time Hayawardh Vijayakumar, Pennsylvania State University; Trent Jaeger, Pennsylvania State University Rule Configuration Checking in Secure Cooperative Data Access Meixing Le,George Mason University; Krishna Kant, National Science Foundation; Sushil Jajodia, George Mason University 12:30 - 1:30 Lunch 1:30 - 3:00 Session IV: Diagnostics and discovery Programmable Diagnostic Network Measurement with Localization and Traffic Observation Michael Clement, Naval Postgraduate School; Dennis Volpano, Naval Postgraduate School Discovery of Unexpected Services and Communication Paths in Networked Systems (short paper) Ichita Higurashi, University of Tsukuba; Akira Kanaoka, University of Tsukuba; Masahiko Kato, Internet Initiative Japan Inc.; Eiji Okamoto, University of Tsukuba Tracing Attacks on Advanced Persistent Threat in Networked Systems Masahiko Kato, Internet Initiative Japan Inc.; Takumi Matsunami, Kyushu Institute of Technology; Akira Kanaoka,University of Tsukuba; Hiroshi Koide, Kyushu Institute of Technology; Eiji Okamoto, University of Tsukuba 3:00 - 3:45 Break and Poster Session --------------------------------------------------------------------------- Ehab Al-Shaer, PhD | Professor and Director of Cyber Defense and Network Assurability (CyberDNA) Research Center UNC Charlotte | Dept. of Software and Information Systems (Woodward Building) 9201 University City Blvd. | Charlotte, NC 28223 Phone: 704-687-8663 | Fax: 704-687-6065 [email protected] | http://www.cyberDNA.uncc.edu/~ehab --------------------------------------------------------------------------- _______________________________________________ IEEE Communications Society Tech. Committee on Computer Communications (TCCC) - for discussions on computer networking and communication. [email protected] https://lists.cs.columbia.edu/cucslists/listinfo/tccc
