ICSA Research Group

24/05/2011

ICSA meeting 25 May 2011 – Agenda

Filed under: Agenda — Martin Olivier @ 21:26

At our meeting tomorrow we will

  1. Discuss attack scenarios (see Kamil’s email below)
  2. Visa requirements to attend conferences
  3. Sing “Happy birthday” to a special person
  4. Any other business
Wrt attack scenarios the following:
We would like everyone to try come up with a scenario in which a digital forensic investigation would be useful to discover the perpetrator of a crime involving personal information.
 
The scenario should be within the context of an organisation or company.
 
I [Kamil] look forward to seeing the products of your imagination and intellect!
Advertisements

23/05/2011

Bosberaad

Filed under: Fun — Martin Olivier @ 10:27

The pictures tell the story…

Invitation

The invitation

Food!

Food!

Deep thought

Deep thought

Aha!

Aha!

19/05/2011

Emmanuel defends his MSc

Filed under: News — Martin Olivier @ 13:02

Emmanuel today defended his MSc with panache!  The title of his dissertation is Reputation based trust in service-oriented network environments.


12/05/2011

A picture of us

Filed under: News — Martin Olivier @ 07:17
ICSA members

ICSA members

10/05/2011

IEEE Computer: Special Issue on Security and Privacy in an Online World

Filed under: CFP — Martin Olivier @ 22:12

Here is an excellent opportunity to publish in an ISI journal with an amazing turnaround time.  Look at the CFP.

The only problem: Papers are due on 1 June 2011…

I have recorded the details on my conference page for ease of reference.

Our annual proposal day

Filed under: News — Martin Olivier @ 20:32

Tomorrow, 11 May 2011 (11/5/11!), ICSA’s annual proposal day will take place.  At this event (almost) all our students will state and justify the problems they will solve during their research projects.  (In some cases they will even be able to claim that they have solved the problem!)  Visitors are more than welcome to attend any or all the presentations in the ICSA Lab.

Date: Wednesday 11 May, 2011

Time: 10:30 for 11:00

Place: ICSA Lab, IT Building – East Wing, Level 4, University of Pretoria Main Campus, Lynwood Rd Pretoria. For a map, please see http://web.up.ac.za/default.asp?ipkCategoryID=2322

Here is the programme: 

 
Wednesday 11 May 2011 – ICSA Lab, IT Building Level 4.60, UP
Main Campus

10:45am

Arrival – drinks

11:00-11:10

Welcome and Opening

       Prof Hein Venter: About the ICSA Lab 

 

Session 1

Session Chairperson: Kamil Reddy

11:11-11:16

Digital Forensic Readiness for Wireless Sensor Network Environments Francois Mouton, MSc

11:17-11:22

A Network Forensics Implementation to Detect Mobile Botnets using Artificial Immune Systems, Içkin Vural, MSc

11:23-11:28

Digital Forensics in Online Virtual Worlds Anastassia Rakitianskaia, MSc

11:29-11:32

Database Anti-Forensics, Heloise Pieterse, Hons

11:33-11:38

 A Digital forensic framework for SOA and Web Services, Peter Chan, MSc

11:39-11:42

Investigation on the techniques for digital forensics on cloud computers, Dirk Ras, Hons

11:43-11:48

Desco, COS 301, Undergrads

11:49-11:52

On Some Aspects of Honey-Pots through Forensics, Mpho Makutsoane, Hons

11:53-11:58

FPCM and it’s role in Digital Forensics, Pedro De Souza, MSc

11:59-12:04

Using Digital Forensic techniques to combat Unsolicited electronic communication Current focus: Designing and implementing a monitoring tool that collects digital forensic information
pertaining to electronic communication specifically email, Ruan van Staden, Msc

12:05-12:10

XML – Trail – Developing a model for XML Forensics,Dirk Kotze, MSc

12:11-12:21

Digital Forensics readiness framework for public key infrastructure systems, Aleksandar Valjarevic, PhD

12:22-12:25

USSD Forensics, Marli Steenkamp, Hons

12:26-12:31

Stereoscopic Image Tampering, Mark-Anthony Fouche, MSc

12:32-12:42

On the Management of a Forensic Readiness Framework for Information Privacy Incidents in Large Organisations , Kamil Reddy, PhD

12:43-12:48

The use of digital forensic techniques to detect digital images containing specific objects or human traits like faces, Enos Mabuto, MSc

12:49-12:59

Forensic Readiness- Mitigating risk exposure of cyber-bullying to the children of South-Africa utilising cellular phones, Stephen Serra, PhD

13:00-13:30

BREAK – Coffee and Snacks

 

Session 2

Session Chairperson: Tayana Morkel

13:31-13:34

The Effect Social Networks have on the Spread of Information“, but this will be changing and moving towards a Trust and Social Engineering direction,Nikitah Bobhate, Hons

13:35-13:40

The design of a wireless LAN digital forensic readiness model, Sipho Ngobeni, MSc

13:41-13:44

A Net-Centric Software Engineering Model catering for System Processes and
existing Architectures in a Web Environment? Chris Le Roy, Hons.

13:45-13:50

Image Steganography, Tayana Morkel, MSc.

13:51-13:54

Wireless acquisition of information of Mobile Devices, Phillip Tremwith, Hons

13:55-14:00

Isolation of a digital crime scene in a cloud infrastructure, Waldo Delport, MSc

14:01-14:04

Scaling the threat with regards to mobile security Roland Rehrl, Hons

14:05-14:10

Fairness of MANET trust protocols, Ivan Burke, MSc.

14:11-14:14

Rethinking software engineering and the need for a software profession, Ben Van Zyl, Hons

14:15-14:20

Antiphishing with charged PSO, Vivek Vishe, MSc.

14:21-14:24

Security in Software Engineering and Architecture, Darren Young, Hons

14:25-14:30

Querying the evidence, Reino Mostert, MSc

14:31-14:36

On the composition of database layers for a database forensic investigation,Hector Beyers, MSc

14:37-14:40

Closing

14:41-15:00

Drinks – Informal session

ICSA meets Shock Front

Filed under: News — Martin Olivier @ 20:10
Shock Front

Shock Front meets ICSA

The COS 301 team Shock Front will build our (ICSA’s) Digital Evidence Scope. The picture above was taken at the first meeting between ICSA and Shock Front, which ostensibly was a shock for the latter… We look forward to seeing the results!

04/05/2011

University of Pretoria Postdoctoral Fellowships

Filed under: News — Martin Olivier @ 12:10
If any of you know of anyone interested in doing a postdoc in security, please share the following information with him or her.  Ask such a person to contact us as soon as possible.
The call for applications for the above-mentioned research funding opportunity is now open.

The University of Pretoria has a number of postdoctoral and research fellowships available to enable recent graduates to carry out advanced research at the institution. These fellowships are tenable in any discipline and prospective fellows are advised to find a suitable research leader/mentor.

Candidates should contact research leaders with whom they wish to work. Interested candidates can use the UP website (www.up.ac.za) to identify research leaders in their discipline.

Prospective research leaders (mentors) are responsible for the submission of completed application forms.

Eligibility Criteria
Applicants

These fellowships are intended for individuals under the age of 40 years who have completed their doctoral degrees in the last five years.

For application procedure and more information- visit Post-Doctoral Fellowships or Postdoctoral Fellowship Programme

03/05/2011

Agenda for Wednesday, 4 May

Filed under: News — Martin Olivier @ 16:10
Our agenda for Wednesday is as follows:
1) Review of an ISSA paper;
2) Arrangements wrt our proposal day
(We will meet despite the fact that UP considers 4 May as a Monday.)

01/05/2011

Vafa is a dad

Filed under: News — Martin Olivier @ 17:03

During the early years of ICSA Vafa was an associate member of ICSA.  (He shared our lab and much else, but his supervisor was not one of us :-o.)  The good news that he is now the father of Bayan Ian reached us recently.  We would like to congratulate the family and wish them all the best for the future!

Older Posts »

Create a free website or blog at WordPress.com.