ICSA Research Group


ICSA meeting 25 May 2011 – Agenda

Filed under: Agenda — Martin Olivier @ 21:26

At our meeting tomorrow we will

  1. Discuss attack scenarios (see Kamil’s email below)
  2. Visa requirements to attend conferences
  3. Sing “Happy birthday” to a special person
  4. Any other business
Wrt attack scenarios the following:
We would like everyone to try come up with a scenario in which a digital forensic investigation would be useful to discover the perpetrator of a crime involving personal information.
The scenario should be within the context of an organisation or company.
I [Kamil] look forward to seeing the products of your imagination and intellect!



Filed under: Fun — Martin Olivier @ 10:27

The pictures tell the story…


The invitation



Deep thought

Deep thought




Emmanuel defends his MSc

Filed under: News — Martin Olivier @ 13:02

Emmanuel today defended his MSc with panache!  The title of his dissertation is Reputation based trust in service-oriented network environments.


A picture of us

Filed under: News — Martin Olivier @ 07:17
ICSA members

ICSA members


IEEE Computer: Special Issue on Security and Privacy in an Online World

Filed under: CFP — Martin Olivier @ 22:12

Here is an excellent opportunity to publish in an ISI journal with an amazing turnaround time.  Look at the CFP.

The only problem: Papers are due on 1 June 2011…

I have recorded the details on my conference page for ease of reference.

Our annual proposal day

Filed under: News — Martin Olivier @ 20:32

Tomorrow, 11 May 2011 (11/5/11!), ICSA’s annual proposal day will take place.  At this event (almost) all our students will state and justify the problems they will solve during their research projects.  (In some cases they will even be able to claim that they have solved the problem!)  Visitors are more than welcome to attend any or all the presentations in the ICSA Lab.

Date: Wednesday 11 May, 2011

Time: 10:30 for 11:00

Place: ICSA Lab, IT Building – East Wing, Level 4, University of Pretoria Main Campus, Lynwood Rd Pretoria. For a map, please see http://web.up.ac.za/default.asp?ipkCategoryID=2322

Here is the programme: 

Wednesday 11 May 2011 – ICSA Lab, IT Building Level 4.60, UP
Main Campus


Arrival – drinks


Welcome and Opening

       Prof Hein Venter: About the ICSA Lab 


Session 1

Session Chairperson: Kamil Reddy


Digital Forensic Readiness for Wireless Sensor Network Environments Francois Mouton, MSc


A Network Forensics Implementation to Detect Mobile Botnets using Artificial Immune Systems, Içkin Vural, MSc


Digital Forensics in Online Virtual Worlds Anastassia Rakitianskaia, MSc


Database Anti-Forensics, Heloise Pieterse, Hons


 A Digital forensic framework for SOA and Web Services, Peter Chan, MSc


Investigation on the techniques for digital forensics on cloud computers, Dirk Ras, Hons


Desco, COS 301, Undergrads


On Some Aspects of Honey-Pots through Forensics, Mpho Makutsoane, Hons


FPCM and it’s role in Digital Forensics, Pedro De Souza, MSc


Using Digital Forensic techniques to combat Unsolicited electronic communication Current focus: Designing and implementing a monitoring tool that collects digital forensic information
pertaining to electronic communication specifically email, Ruan van Staden, Msc


XML – Trail – Developing a model for XML Forensics,Dirk Kotze, MSc


Digital Forensics readiness framework for public key infrastructure systems, Aleksandar Valjarevic, PhD


USSD Forensics, Marli Steenkamp, Hons


Stereoscopic Image Tampering, Mark-Anthony Fouche, MSc


On the Management of a Forensic Readiness Framework for Information Privacy Incidents in Large Organisations , Kamil Reddy, PhD


The use of digital forensic techniques to detect digital images containing specific objects or human traits like faces, Enos Mabuto, MSc


Forensic Readiness- Mitigating risk exposure of cyber-bullying to the children of South-Africa utilising cellular phones, Stephen Serra, PhD


BREAK – Coffee and Snacks


Session 2

Session Chairperson: Tayana Morkel


The Effect Social Networks have on the Spread of Information“, but this will be changing and moving towards a Trust and Social Engineering direction,Nikitah Bobhate, Hons


The design of a wireless LAN digital forensic readiness model, Sipho Ngobeni, MSc


A Net-Centric Software Engineering Model catering for System Processes and
existing Architectures in a Web Environment? Chris Le Roy, Hons.


Image Steganography, Tayana Morkel, MSc.


Wireless acquisition of information of Mobile Devices, Phillip Tremwith, Hons


Isolation of a digital crime scene in a cloud infrastructure, Waldo Delport, MSc


Scaling the threat with regards to mobile security Roland Rehrl, Hons


Fairness of MANET trust protocols, Ivan Burke, MSc.


Rethinking software engineering and the need for a software profession, Ben Van Zyl, Hons


Antiphishing with charged PSO, Vivek Vishe, MSc.


Security in Software Engineering and Architecture, Darren Young, Hons


Querying the evidence, Reino Mostert, MSc


On the composition of database layers for a database forensic investigation,Hector Beyers, MSc




Drinks – Informal session

ICSA meets Shock Front

Filed under: News — Martin Olivier @ 20:10
Shock Front

Shock Front meets ICSA

The COS 301 team Shock Front will build our (ICSA’s) Digital Evidence Scope. The picture above was taken at the first meeting between ICSA and Shock Front, which ostensibly was a shock for the latter… We look forward to seeing the results!


University of Pretoria Postdoctoral Fellowships

Filed under: News — Martin Olivier @ 12:10
If any of you know of anyone interested in doing a postdoc in security, please share the following information with him or her.  Ask such a person to contact us as soon as possible.
The call for applications for the above-mentioned research funding opportunity is now open.

The University of Pretoria has a number of postdoctoral and research fellowships available to enable recent graduates to carry out advanced research at the institution. These fellowships are tenable in any discipline and prospective fellows are advised to find a suitable research leader/mentor.

Candidates should contact research leaders with whom they wish to work. Interested candidates can use the UP website (www.up.ac.za) to identify research leaders in their discipline.

Prospective research leaders (mentors) are responsible for the submission of completed application forms.

Eligibility Criteria

These fellowships are intended for individuals under the age of 40 years who have completed their doctoral degrees in the last five years.

For application procedure and more information- visit Post-Doctoral Fellowships or Postdoctoral Fellowship Programme


Agenda for Wednesday, 4 May

Filed under: News — Martin Olivier @ 16:10
Our agenda for Wednesday is as follows:
1) Review of an ISSA paper;
2) Arrangements wrt our proposal day
(We will meet despite the fact that UP considers 4 May as a Monday.)


Vafa is a dad

Filed under: News — Martin Olivier @ 17:03

During the early years of ICSA Vafa was an associate member of ICSA.  (He shared our lab and much else, but his supervisor was not one of us :-o.)  The good news that he is now the father of Bayan Ian reached us recently.  We would like to congratulate the family and wish them all the best for the future!

Older Posts »

Create a free website or blog at WordPress.com.