{"title":"Teaching malware analysis: The design philosophy of a model curriculum","authors":"N. Shashidhar, Peter A. Cooper","doi":"10.1109/ISDFS.2016.7473529","DOIUrl":"https://doi.org/10.1109/ISDFS.2016.7473529","url":null,"abstract":"The field of malware analysis comprises the art and science of dissecting malicious software using diverse tools and techniques in an effort to comprehend their inner workings so as to mitigate the effects. Clearly, the study and analysis of these tools and techniques fall within the general purview of the broad disciplines of Digital Forensics, Information Assurance, Cyber Security and general principles of Computing Science. In this paper, we explore and discuss the current state of malware analysis courses as they are taught in academic institutions in the U.S. and the world. We contend that there are not very many malware analysis (or closely related) courses being offered in many universities across the U.S. Furthermore, there are several for-profit courses that are taught by online institutions that teach reverse engineering, malware analysis and related topics. Based on our research, we conclude that the domain of malware analysis has effectively been relegated from the academic realm to the domain of the practitioner's skill set. It is this exploration that we are interesting in undertaking in this paper. We then proceed to analyze and review some popular textbooks and online training materials for their soundness and efficacy in teaching the subject to substantiate our above mentioned claims. Finally, we conclude by presenting a model curriculum for this subject based on sound pedagogical ideas and methods.","PeriodicalId":136977,"journal":{"name":"2016 4th International Symposium on Digital Forensic and Security (ISDFS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130830658","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Enhancing of biometric authentication with pass strings and cryptographic checksums","authors":"Veerareddy Vaka, Dale Lindskog, P. Zavarsky","doi":"10.1109/ISDFS.2016.7473538","DOIUrl":"https://doi.org/10.1109/ISDFS.2016.7473538","url":null,"abstract":"Summary form only given. Conventional biometric authentication systems store the biometric template or a hash of its digitization, which raises concerns around template privacy and revocability. In this paper, we propose a biometric hash generation scheme, where the normalized biometric template is concatenated with a pass string (PS), e.g. a password or PIN, in order to achieve a robust and secure biometric authentication scheme that overcomes problems around privacy and revocability. The scheme presented here is an improved form of two-factor authentication (2FA) which could enhance biometric authentication in such systems as automated teller machines (ATM), and at same time protect the privacy of biometrics and ease biometric revocability.","PeriodicalId":136977,"journal":{"name":"2016 4th International Symposium on Digital Forensic and Security (ISDFS)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132453901","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}