Organised by:

Sponsored by 

SOPHOS

The First International Workshop on 

 

Cyberpatterns

 

Unifying Design Patterns with Security, Attack and Forensic Patterns

9-10 July 2012,  Abingdon, Oxfordshire , UK

In association with:

Program


Home
Topics
Program
Keynotes
Panel
Dates
Local Info
PC Members
CFP
Registration
Submission

Programme Outline: (revised, 30 June)

Monday 9 July

10.00 每 10.20      Registration, coffee (Seminar room 1)

10.20 每 10.30      Welcome and introduction (Seminar room 1)

10.30 每 11.30

First plenary 每 Keynote speech by Sean Barnum (Seminar room 1)

11.30 每 11.45

COFFEE

11.45 每 13.00

Session A (Seminar room 1)

Session B (Hamilton room)

13.00 每 14.00

Lunch

14.00 每 15.40

Session C (Seminar room 1)

Session D (Hamilton room)

15.40 每 16.00

TEA/COFFEE

16.00 每 17.30

Panel Discussion: Patterns in Practice (Seminar room 1)

19.00 每 19.30

Pre-dinner drinks

19.30 每

DINNER

 

Tuesday 10 July

9.00 每 10.00

Second plenary 每 Keynote speech by Kevin Lano (Hamilton room)

10:00 每 10.15

COFFEE

10.15 每 11.30

Session E (Hamilton room)

Session F (Quiet room)

11.30 每 11.40

Pause

11.40 每 13.00

Closing Plenary: Formulation of Initial Road-Map (Hamilton room)

13.00 每

Lunch

Session Details: 

Session A (11.45 每 13.00, Monday, 9 July, 2012; Seminar Room 1):

A1: Hong Zhu, Oxford Brookes University, UK. Towards A General Theory of Patterns

A2: Ian Bayley, Oxford Brookes University, UK. Towards A Common Formal Framework for Patterns

A3: Shamal Faily, John Lyle and Simon Parkin, University of Oxford, UK. Tool-supported Premortems with Attack and Security Patterns

Session B (11.45 每 13.00, Monday, 9 July, 2012; Hamilton Room):

B1: Alberto E. Schaeffer-Filho, Andreas Mauthe, David Hutchison and Paul Smith, University of Lancaster, UK. Management Patterns for Network Resilience: Design and Verification of Policy Configurations

B2: Muhammad Asim, Bo Zhou, David Llewellyn-Jones, Qi Shi and Prof. Madjid Merabti, Liverpool John Moores University, UK. Dynamic Monitoring of Composed Services

B3: Susan Appleby and Colin Carter, CESG, UK. What really matters in a security architecture? A new meta-model for systems and cyber security

Session C (14.00 每 15.40, Monday, 9 July, 2012; Seminar Room 1):

C1: Martin Ruskov, Paul Ekblom and M. Angela Sasse, University College London, UK. A Simulation of Information Security Behaviour in Organisations

C2: Tim Storer, William Bradley Glisson and Karen Renaud, University of Glasgow, UK. Patterns of Information Security Postures in Large Scale Socio-Technical Systems

C3: Clive Blackwell, Oxford Brookes University, UK. A Strategy for Formalizing Attack Patterns

C4: Bo Zhou, David Llewellyn-Jones, David Lamb, Muhammad Asim, Qi Shi and Madjid Merabti., Liverpool John Moores University, UK. A Heuristic Approach for Secure Service Composition Adaptation

Session D (14.00 每 15.40, Monday, 9 July, 2012; Hamilton Room):

D1: Faye Mitchell, Oxford Brookes University, UK. An Overview of Artificial Intelligence based Pattern Matching in a Security and Digital Forensic context

D2: Renato Amorim, Birkbeck College, University of London, UK. and Peter Komisarczuk, University of West London, UK, On Partitional Clustering of Malware

D3: Harjinder Lallie and Nathan Griffiths, University of Warwick, UK. Where has this hard disk been? : Extracting geospatial intelligence from digital storage systems

D4: Noor-Ul-Hassan Shirazi, Alberto E. Schaeffer-Filho and David Hutchison, University of Lancaster, UK. Attack Pattern Recognition through Correlating Cyber Situational Awareness in Computer Networks

Session E (10.00 每 11.30, Tuesday, 10 July, 2012; Hamilton room):

E1: Paul Kearney, BT, UK. Security Design Patterns in the MASTER Workbench

E2: David Llewellyn-Jones, Qi Shi and Madjid Merabti, Liverpool John Moores University, UK. Extending AOP Principles for the Description of Network Security Patterns

E3: Nick Walker, Natalie Coull, Ian Ferguson and Allan Milne, University of Abertay Dundee, UK. On the use of Design Patterns to Capture Memory Corruption Vulnerabilities

Session F (10.00 每 11.30, Tuesday, 10 July, 2012; Quiet Room):

F1: Clive Blackwell, Oxford Brookes University, UK. Using Attack Patterns to Develop a Penetration Testing Framework

F2: Daniel Bilar and Sergey Bratus, Siege Technologies, USA. Composition Patterns of Hacking

(Download a printable version of workshop program)  


Home Topics Program Keynotes Panel Dates Local Info PC Members CFP Registration Submission
Last updated: June 30, 2012.