Home
Preface
Introduction and Focus
Conference Committee
Review Committee
Review Process
Peer-reviewed Papers
Day 1 Day 2
Research-in-Progress Papers
Invited Speakers
Sponsors & Organisers
Contact
Table of Contents - Day 1 - Wednesday 12 August 2015
Stream 1 – Network Security (Reviewed Papers)
Stream 2 – Information Security Management (Reviewed Papers)
13:30-13:50
Location Aware Mobile Device Management
Jaco du Toit and Ian Ellefsen
Prerequisites for building a security incident response capability
Roderick Mooi and Reinhardt Botha
13:50-14:10
AFA-RFID: Physical Layer Authentication for Passive RFID Tags
Gregory Stuart Smith and Marijke Coetzee
A Model for the Design of Next Generation e-supply Chain Digital Forensic Readiness Tools
Derek Masvosvere and Hein Venter
14:10-14:30
Towards a PHP Webshell Taxonomy using Deobfuscation-assisted Similarity Analysis
Peter Wrench and Barry Irwin
Self-sanitization of digital images using steganography
Tayana Morkel
14:30-14:50
Characterization and analysis of NTP amplification based DDoS attacks
Lauren Rudman and Barry Irwin
State-on-nationals' electronic communications surveillance in South Africa: a murky legal landscape to navigate?
Murdoch Watney
Stream 3 – Trust (Reviewed Papers)
Stream 4 – Digital forensics (Reviewed Papers)
15:20-15:40
Intrusion Detection in Bluetooth Enabled Mobile Phones
Kishor Krishnan Nair, Albert Helberg and Johan Van Der Merwe
Evaluation and Analysis of a Software Prototype for Guidance and Implementation of a Standardized Digital Forensic Investigation Process
Melissa Ingels, Aleksandar Valjarevic and Hein Venter
15:40-16:00
Access Control for Local Personal Smart Spaces
Brian Greaves and Marijke Coetzee
The Current State of Digital Forensic Practitioners in South Africa
Jason Jordaan and Karen Bradshaw
16:00-16:20
Robustness of Computational Intelligent Assurance Models When Assessing e-Commerce Sites
Thembekile Mayayise and Isaac O. Osunmakinde
The state of Database Forensic research
Werner Hauger and Martin S Olivier
16:20-16:40
SMT-Constrained Symbolic Execution Engine for Integer Overflow Detection in C Code
Paul Muntean, Mustafizur Rahman, Andreas Ibing and Claudia Eckert
Towards a digital forensic science
Martin S Olivier