Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.5555/2667510dlproceedingsBook PagePublication PagesaiscConference Proceedingsconference-collections
AISC '14: Proceedings of the Twelfth Australasian Information Security Conference - Volume 149
2014 Proceeding
  • Editors:
  • Udaya Parampalli,
  • Ian Welch
Publisher:
  • Australian Computer Society, Inc.
  • P.O. Box 319 Darlinghurst, NSW 2010
  • Australia
Conference:
Auckland New Zealand January 20 - 23, 2014
ISBN:
978-1-921770-32-6
Published:
20 January 2014
Sponsors:
Datacom, Australian Comp Soc, SERL, Auckland University of Technology, Univ. of Western Sydney, The University of Auckland, New Zealand, CORE - Computing Research and Education, Colab, IITP

Bibliometrics
Skip Abstract Section
Abstract

The 12th annual meeting of the Australasian Information Security Conference (ACSW-AISC 2014) was held in Auckland, at the city campus of Auckland University of Technology (AUT), New Zealand, as part of the Australasian Computer Science Week, January 20-23, 2014. Originally, our conference was called the Australasian Information Security Workshop. In 2008, it was renamed the Australasian Information Security Conference. The main aim of the ACSW-AISC is to provide a venue for researchers to present their work on all aspects of information security, and to promote collaboration between academic and industrial researchers working in this area

Skip Table Of Content Section
research-article
Bugs in the wetware: the psychology of computer insecurity
Page 3

A fairly standard response with computer security failures is to blame the user. The real culprit though is the way in which the human mind works. Millennia of evolutionary conditioning and the environment in which users operate cause them to act, and ...

research-article
Free
YALIH, yet another low interaction honeyclient
Pages 7–15

Low-interaction honeyclients employ static detection techniques such as signatures, heuristic or anomaly detection in the identification of malicious websites. They are associated with low detection rate and failure to identify zero-day and obfuscated ...

research-article
Free
Poisoned GOOSE: exploiting the GOOSE protocol
Pages 17–22

This paper presents a vulnerability within the generic object oriented substation event (GOOSE) communication protocol. It describes an exploit of the vulnerability and proposes a number of attack variants. The attacks sends GOOSE frames containing ...

research-article
Free
Weak key-IV pairs in the A5/1 stream cipher
Pages 23–36

A5/1 is a shift register based stream cipher which provides privacy for the GSM system. In this paper, we analyse the loading of the secret key and IV during the initialisation process of A5/1. We demonstrate the existence of weak key-IV pairs in the A5/...

research-article
Free
Formalising human recognition: a fundamental building block for security proofs
Pages 37–45

A fundamental part of many authentication protocols which authenticate a party to a human involves the human recognizing or otherwise processing a message received from the party. Examples include typical implementations of Verified by Visa in which a ...

research-article
Free
An authorised pseudonym system for privacy preserving location proof architectures
Pages 47–56

An emerging class of Location Based Services (LBSs) needs verified mobile device locations for service provision. For example, an automated car park billing system requires verified locations of cars to confirm the place and the duration of parked cars. ...

research-article
Free
Practical modbus flooding attack and detection
Pages 57–65

The Modicon Communication Bus (Modbus) protocol is one of the most commonly used protocols in industrial control systems. Modbus was not designed to provide security. This paper confirms that the Modbus protocol is vulnerable to flooding attacks. These ...

research-article
Free
A case study of user-level spam filtering
Pages 67–75

There are number of Anti-Spam filters that have reduced the amount of email spam in the inbox but the problem still continues as the spammers circumvent these techniques. The problems need to be addressed from different aspects. Major problem for ...

research-article
Free
Algebraic analysis of Trivium-like ciphers (poster)
Pages 77–81

Trivium is a bit-based stream cipher in the final portfolio of the eSTREAM project. In this paper, we apply the algebraic attack approach of Berbain et al. to Trivium-like ciphers and perform new analyses on them. We demonstrate a new algebraic attack ...

research-article
Free
Hypervisor-based security architecture for validating DNS services (poster)
Pages 83–86

Domain Name System (DNS) is one of the critical services in the current Internet infrastructure. However DNS is vulnerable to a range of attacks. One of the fundamental weaknesses with the existing DNS protocols is that the request and response messages ...

Contributors
  • University of Melbourne
  • Victoria University of Wellington
Index terms have been assigned to the content through auto-classification.

Recommendations

Acceptance Rates

AISC '14 Paper Acceptance Rate 7 of 17 submissions, 41%;
Overall Acceptance Rate 48 of 105 submissions, 46%
YearSubmittedAcceptedRate
AISC '1417741%
AISC '1318844%
AISC '11221045%
AISC '10211048%
AISC '08271348%
Overall1054846%