Skip to main content

The main conference, including 4 keynotes and 2 tutorials, will be held on Dec 17-18-19.

(Tentative Program)
December 17, 2018 (Monday)
8:30am-9:30am: Registration
9:30am-10:00am: Welcome and Opening remarks
10:00am-11:00am: KEYNOTE-1: VS Subrahmanyam "Bots, Socks, and Vandals: An Overview of Malicious Actors on the Web"
11:00am-11:15am: Coffee break.
11:15am-12:45pm: SESSION-1 (UBIQUITOUS COMPUTING)

  • Kirk Boyer, Hao Chen, Jingwei Chen, Jian Qui and Rinku Dewri. A Characterization of the Mass Surveillance Potential of Road Traffic Monitors
  • Bhagyesh Patil, Parjanya Vyas and R. K. Shyamasundar. SecSmartLock: An Architecture and Protocol for Designing Secure Smart Locks
  • Nimmy K, Sriram Sankaran and Krishnashree Achuthan. A Novel Multi-factor Authentication Protocol for Smart Home Environments

    12:45pm-2:30pm: LUNCH 2:30pm-3:30pm: KEYNOTE-2: Atul Prakash "Robust Physical-World Attacks on Deep Learning Visual Classifiers and Detectors"
    3:30pm-3:45pm: Coffee break
    3:45pm-5:15pm: SESSION-2 (MODELING AND ANALYSIS OF ATTACKS)
  • Ghanshyam S. Bopche, Gopal N. Rai, B. M. Mehtre and G.R. Gangadharan. Modeling and Analyzing Multistage Attacks Using Recursive Composition Algebra
  • Aditya K, Slawomir Grzonkowski and Nhienan Lekhac. RiskWriter: Predicting Cyber Risk of an Enterprise
  • Sadegh M. Milajerdi, Birhanu Eshete, Rigel Gjomemo and Venkat Venkatakrishnan. ProPatrol: Attack Investigation via Extracted High-Level Tasks
    ---
    December 18, 2018 (Tuesday)
    9:00am-10:00am: KEYNOTE-3: Prateek Saxena "On The Security of Blockchain Consensus Protocols"
    10:00am-11:00am: SESSION-3 (SMARTPHONE SECURITY)
  • Suryakanta Panda, Madhu Kumari and Samrat Mondal. SGP: A Safe Graphical Password System Resisting Shoulder-Surfing Attack on Smartphones
  • Sreesh K, Renuka Kumar and Sreeranga Rajan. Towards Accuracy in Similarity Analysis of Android Applications
    11:00am-11:15am: Coffee break.
    11:15am-12:45pm: SESSION-4 (CRYPTOGRAPHY AND THEORY)
  • Jyotirmoy Pramanik, Partha Sarathi Roy, Sabyasachi Dutta, Avishek Adhikari and Kouichi Sakurai. Secret Sharing Schemes on Compartmental Access Structure in Presence of Cheaters
  • Riddhi Ghosal and Sanjit Chatterjee. Privacy Preserving Multi-Server k-means Computation over Horizontally Partitioned Data
  • Sumanta Chatterjee. Secure Moderated Bargaining Game
    12:45pm-2:30pm: LUNCH
    2:30pm-4pm: TUTORIAL on Secure Multi-party Computation by Nishant Chandran and Divya Gupta
    4pm-4:15pm: Coffee break.
    4:15pm-5:45pm: SESSION-5 (ENTERPRISE AND CLOUD SECURITY)
  • Khaoula Es-Salhi, Nora Cuppens and David Espes. SONICS: a segmentation method for integrated ICS and Corporate System
  • Gaurav Pareek and Purushothama B R. Proxy Re-encryption Scheme for Access Control Enforcement Delegation on Outsourced Data in Public Cloud
  • Alexandre Kabil, Thierry Duval, Nora Cuppens-Boulahia, Gerard Le-Comte, Yoran Halgand and Christophe Ponchel. From Cyber Security Activities to Collaborative Virtual Environments Practices through the 3D CyberCOP Platform
    ---
    December 19, 2018 (Wednesday)
    9:00am-10:00am: KEYNOTE-4: Sriram Rajamani "Specifying and Checking Data Use Policies"
    10:00am-11:30am: SESSION-6 (MACHINE LEARNING AND SECURITY)
  • Udaya Sameer Venkata, Ishaan Dali and Ruchira Naskar. A Deep Learning based Digital Forensic Solution to Blind Source Identification of Facebook Images
  • Jamimamul Bakas and Ruchira Naskar. A Digital Forensic Technique for Inter-Frame Video Forgery Detection based on 3D CNN
  • Jamimamul Bakas, Praneta Rawat, Kalyan Kokkalla and Ruchira Naskar. Re-compression based JPEG Tamper Detection and Localization using Deep Neural Network, Eliminating Compression Factor Dependency
    11:30am-11:45am: COFFEE BREAK.
    11:45am-1:15pm: SESSION-7 (PRIVACY)
  • Alexander Marsalek, Bernd Prünster, Bojan Suzic and Thomas Zefferer. SeDiCom: A Secure Distributed Privacy-Preserving Communication Platform
  • Vishwas Patil and Rk Shyamasundar. Efficacy of the Right-to-be-Forgotten on Facebook
  • Ajinkya Rajput and K. Gopinath. Analysis of Newer Aadhaar Privacy Models
    1:15pm-2:30pm: LUNCH
    2:30pm-4:00pm: TUTORIAL on Secure Machine Learning BY Somesh Jha
    4:00pm-4:15pm: COFFEE BREAK
    4:15pm-5:45pm: SESSION-6 (CLIENT SECURITY AND AUTHENTICATION)
  • Suryakanta Panda and Samrat Mondal. drPass: A Dynamic and Reusable Password Generator Protocol
  • Amit Pathania, Radhika B S and Rudrapatna Shyamasundar. MySecPol: A Client-Side Policy Language for Safe and Secure Browsing
  • Abhishek Tiwari and Rajarshi Pal. Gaze-Based Graphical Password Using Webcam
    ---

    There will be four keynote speeches during the conference. We are happy to announce the keynote speakers for the conference

    Atul Prakash

    Prof. Atul  Prakash,
    Department of EECS,
    University of Michigan-Ann Arbor
    

    Atul Prakash is a Professor in the EECS Department at the University of Michigan, where he as served on the faculty since 1989. He earned a Ph.D. from the University of California, Berkeley, in 1989 and a B.Tech. from IIT Delhi in 1982. His research interests are in Security and privacy, cyber-physical systems, computer-supported cooperative work, and distributed systems. Most recently, he has been working on security for Internet of Things and on the security and privacy of Financial Web sites.


    Sriram Rajamani

    Sriram Rajamani, 
    Managing Director and Distinguished Scientist, 
    Microsoft Research India
    

    Sriram Rajamani is Distinguished Scientist and Managing Director of Microsoft Research India. His research interests are in designing, building and analyzing computer systems in a principled manner. Over the years he has worked on various topics including Hardware and Software Verification, Type Systems, Language Design, Distributed Systems, Security and Privacy, Cloud Security and Probabilistic Programming.

    Together with Tom Ball, he was awarded the CAV 2011 Award for “contributions to software model checking, specifically the development of the SLAM/SDV software model checker that successfully demonstrated computer-aided verification techniques on real programs.” Sriram was elected ACM Fellow in 2015 for contributions to software analysis and defect detection. Recently, Sriram has been elected Fellow of Indian National Academy of Engineering.

    Sriram has a PhD from UC Berkeley, MS from University of Virginia and BEng from College of Engineering, Guindy, all with specialization in Computer Science. Sriram was general chair for POPL 2015 in India, and was program Co-Chair for CAV 2005. He co-founded the Mysore Park Series, and the ISEC conference series in India. He served on the CACM editorial board till recently.


    Prateek Saxena

    Prateek Saxena, 
    Assistant Professor, Computer Science Division, 
    National University of Singapore
    

    Prateek Saxena is an Assistant Professor in the Computer Science Department at National University of Singapore. He work on computer security, and its intersection with formal methods and programming languages. His present research projects are on cryptocurrencies, trusted computing, binary analysis, and web security. He got his Phd in Computer Science from the University of California, Berkeley in 2012 and visited Microsoft Research Redmond during the summer of 2015.


    V.S. Subrahmanian

    V.S. Subrahmanian,
    Professor, Department of Computer Science,
    Dartmouth
    

    Subrahmanian joins Dartmouth from the University of Maryland, where he has built a career over three decades as a professor in the department of computer science and the University of Maryland Institute for Advanced Computer Studies, for which he served as director from 2003 to 2010; founding co-director of the Laboratory for Computational Cultural Dynamics; and founding director of the Center for Digital International Government. He is a fellow of the American Association for the Advancement of Science and the Association for the Advancement of Artificial Intelligence, and his research has been funded by the Defense Advanced Research Projects Agency (DARPA) and the U.S. Army and Navy, among others.

    A prolific scholar, Subrahmanian is author or coauthor of 140 peer-reviewed journal papers. In 2015, he published The Global Cyber-Vulnerability Report, an analysis of more than 20 billion reports generated by 4 million computers in 44 countries, and led a team that won DARPA’s Twitter Influence Bot Detection Challenge, a competition to develop means of identifying and eliminating propaganda-spreading automated social media accounts. His work has been featured in national media, including PBS’s Nova, NBC Nightly News, The New York Times, The Washington Post, and The Wall Street Journal, among other outlets. He received his doctorate from Syracuse University, and was awarded a National Science Foundation National Young Investigator Award and the Distinguished Young Scientist Award from the Maryland Science Center/Maryland Academy of Science.