KTH-SEECS Applied Information Security Lab

National University of Sciences and Technology (NUST)

Seminars/Conferences



Cyber Security Challenges and Opportunities in the Context of Pakistan -- 2015-03-04

Nust organized a brief session to highlight the increasing threats of Cyber Crimes and Cyber Terrorism in Pakistan. The aim of this session was to gather the major stakeholders from across the country to help enforce the 7 Action Cyber Secure Pakistan Plan and establishment of think tanks. They exchanged  their views on cyber security policy and thechallenges that are being faced in formulation and implementaion cyber security policy of Pakistan.

                           


Papers presented in ICOSST held at UET Lahore -- 2014-12-18

Mr. Irfan Azhar from KTH-AIS lab presented their research paper in the 6th IEEE INTERNATIONAL CONFERENCE ON OPEN-SOURCE SYSTEMS & TECHNOLOGIES 2014 (ICOSST) held in UET,Lahore during December 18-20, 2014. The papers is entitled as "Keeping Secret Keys Secret in Open Systems."

NUST Intra Research Conference -- 2014-11-08

Lab director Dr. Muhammad Awais Shibli presented the KTH-AIS Lab profile in NUST Intra Research Conference held on 8th November,2014 in CIPS,NUST. The presentation covered the research aims & scope, collaboration & linkages of AIS lab, its achievements till date, ongoing and finish research/funded projects, as wel as future intra-research and areas of collaborations.

 



A seminar on "Cloud Computing and Cloud Computing Security" by Assist. Prof. Dr. Muhammad Awais Shibli at Middle East Technical University (METU), Cyprus -- 2014-05-08

A seminar on "Cloud Computing and Cloud Computing Security" by Assist. Prof. Dr. Muhammad Awais Shibli (METU NCC Computer Engineering) organized by the IEEE Student Society, was given on 8 May 2014. The Seminar’s was focused on the evolution of Service Oriented Architecture (SOA) which has given birth to the promising cloud technology and enables the outsourcing of existing hardware and software IT infrastructure via the Internet. Despite of all the hype surrounding the cloud, enterprise customers are still reluctant to deploy their business in cloud. Security is one of the major issues which reduces the growth of cloud computing and complications with data privacy and data protection continue to plague the market. Many of the cloud security aspects are not unique to cloud setting: data is vulnerable to attack irrespective of where it is stored. Therefore, cloud computing security encompasses all the topics of computing security, including the design of security architectures, minimization of attack surfaces, protection from malware, and enforcement of access control. But there are some aspects of cloud computing security that appear to be specific to that domain: i) cloud is typically a shared resource, and other sharers (called tenants) may be attackers, ii) cloud-based data is usually intentionally widely accessible by potentially insecure protocols and APIs across public networks, iii) data in cloud is vulnerable to being lost (e.g., accidentally deleted) or incorrectly modified by the cloud provider, iv) data in cloud can be accessed by the cloud provider, its subcontractors and employees. Cloud service users need to be vigilant in understanding the risks of data breaches in this new environment and must have answers to the questions like: how to prevent malicious users from accessing and manipulating data they have no right to access. A combination of various security features such as encryption, access control, two-factor authentication, PKI, and SSO must be provided ‘as a service’ to address most of the identified threats in cloud computing dealing with the integrity, confidentiality, authenticity and availability of data and communications.

 


Papers presented in NCIA held at MCS Rwp -- 2013-12-11

Mr. Naveed Ahmad and Mr. Yasir Mehmood from KTH-AIS lab presented their research papers in the 2nd National Conference on Information Assurance 2013 (NCIA) held in MCS,Rwp during 11-12 December 2013. The papers entitled as "Survey on Secure Live Virtual Machine (VM) Migration in Cloud" and "Intrusion Detection System in Cloud Computing: Challenges and Opportunities" respectively.


Seminar on Cloud Computing -- 2013-12-06

The seminar on Cloud Computing: Buzzword or a Saviour was held on 6th December 2013.
News Link: http://seecs.nust.edu.pk/Seminars_workshops/pages/cloud_computing-kth/