Program | Full Papers (25 Minutes), Short Papers (15 Minutes) | |||
Date | Session | Time | Paper Title | Authors |
18-July-2022 | Breakfast | 09:00-09:30 | ||
Opening Remarks | 09:30-09:45 | |||
Keynote 1 (Session Chair: Jaideep Vaidya) |
09:45-10:45 | Security of Graphs link |
Ashish Kundu (Cisco Research, USA) | |
Distributed Systems (Session Chair: Stefano Paraboschi) |
10:45-12:00 | Liberate Your Servers: A Decentralized Content Compliance Validation Protocol | Bowen Liu and Jianying Zhou | |
---|---|---|---|---|
Knowledge Mining in Cybersecurity: From Attack to Defense | Khandakar Ashrafi Akbar, Sadaf Md Halim, Yibo Hu, Anoop Singhal, Latifur Khan and Bhavani Thuraisingham | |||
Attack-resilient Blockchain-based Decentralized Timed Data release | Jingzhe Wang and Balaji Palanisamy | |||
Lunch Break | 12:00-13:00 | |||
Data Privacy (Session Chair: Indrakshi Ray) |
13:00-15:00 | Mitigating Privacy Vulnerability Caused by Map Asymmetry | Ryota Hiraishi, Masatoshi Yoshikawa, Shun Takagi, Yang Cao, Sumio Fujita and Hidehito Gomi | |
MCoM: A Semi-Supervised Method for Imbalanced Tabular Security Data | Xiaodi Li, Latifur Khan, Mahmoud Zamani, Shamila Wickramasuriya and Kevin Hamlen | |||
Utility and Privacy Assessment of Synthetic Microbiome Data | Markus Hittmeir, Rudolf Mayer and Andreas Ekelhart | |||
Combining Defences against Data-Poisoning Based Backdoor Attacks on Neural Networks | Andrea Milakovic and Rudolf Mayer | |||
Assessing Differentially Private Variational Autoencoders under Membership Inference | Daniel Bernau, Jonas Robl and Florian Kerschbaum | |||
Coffee Break | 15:00-15:15 | |||
Panel 1 | 15:15-16:15 | Data/Application Security: Future Research Directions and Challenges | Panel Leader: Vijay Atluri (Rutgers University, USA) Panelists: Indrajit Ray (Colorado State University, USA), Stefano Paraboschi (Università degli Studi di Bergamo, Italy) and Anoop Singhal (NIST, USA) |
|
19-July-2022 | Breakfast | 09:00-09:30 | ||
Keynote 2 (Session Chair: Shamik Sural) |
09:30-10:30 | Scalable, Accurate, Robust Binary Analysis with Transfer Learning link |
Suman Jana (Columbia University, USA) | |
IoT Security (Session Chair: Balaji Palanisamy) |
10:30-12:00 | Local Intrinsic Dimensionality of IoT Networks for Unsupervised Intrusion Detection | Matt Gorbett, Hossein Shirazi and Indrakshi Ray | |
On the Data Privacy, Security, and Risk Postures of IoT Mobile Companion Apps | Shradha Neupane, Faiza Tazi, Upakar Paudel, Freddy Veloz Baez, Merzia Adamjee, Lorenzo De Carli, Sanchari Das and Indrakshi Ray | |||
Verification and Validation Methods for a Trust-by-Design Framework for the IoT | Davide Ferraris, Carmen Fernandez-Gago and Javier Lopez | |||
Lunch Break | 12:00-13:00 | |||
Privacy-Preserving Access and Computation (Session Chair: Anis Bkakria) |
13:00-14:30 | Robust and Provably Secure Attribute-Based Encryption Supporting Access Revocation and Outsourced Decryption | Anis Bkakria | |
Libertas: Backward Private Dynamic Searchable Symmetric Encryption Supporting Wildcards | Jeroen Weener, Florian Hahn and Andreas Peter | |||
End-to-End Protection of IoT Communications Through Cryptographic Enforcement of Access Control Policies | Stefano Berlato, Umberto Morelli, Roberto Carbone and Silvio Ranise | |||
Coffee Break | 14:30-14:45 | |||
Panel 2 | 14:45-15:45 | Security and Trust in Blockchain Systems | Panel Leader: Balaji Palanisamy (University of Pittsburgh, USA) Panelists: Yuzhe Tang (Syracuse University, USA), Thang Dinh (Virginia Commonwealth University, USA), Luis Bathen (IBM Research, USA), Sandip Chakraborty (IIT Kharagpur, India) |
|
Business Session | 15:45-16:15 | |||
20-July-2022 | Breakfast | 09:00-09:30 | ||
Keynote 3 (Session Chair: Yuan Hong) |
09:30-10:30 | Attribute Based Access Control - Challenges and Solutions link |
Vijay Atluri (Rutgers University, USA) | |
Quantum Security (Session Chair: Indrajit Ray) |
10:30-11:30 | Integrating and Evaluating Quantum-safe TLS in Database Applications | Anselme Tueno, David Boehm and Shin Ho Choe | |
Feel the Quantum Functioning: Instantiating Generic Multi-Input Functional Encryption from Learning with Errors | Alexandros Bakas, Antonis Michalas, Eugene Frimpong and Reyhaneh Rabbaninejad | |||
Security Operations and Policies (Session Chair: Hafiz Asif) |
11:30-12:00 | ReLOG: A Unified Framework for Relationship-Based Access Control over Graph Databases | Stanley Clark, Nikolay Yakovets, George H. L. Fletcher and Nicola Zannone | |
Security Operations Center Roles and Skills: A Comparison of Theory and Practice | Andreas Reisser, Manfred Vielberth, Sofia Fohringer and Guenther Pernul | |||
Closing Remarks | 12:00-12:15 | |||
Packet Lunch |