Program   Full Papers (25 Minutes), Short Papers (15 Minutes)
Date Session Time Paper Title Authors
18-July-2022 Breakfast 09:00-09:30
Opening Remarks 09:30-09:45
Keynote 1
(Session Chair: Jaideep Vaidya)
09:45-10:45 Security of Graphs
Ashish Kundu (Cisco Research, USA)    
Distributed Systems
(Session Chair: Stefano Paraboschi)
10:45-12:00 Liberate Your Servers: A Decentralized Content Compliance Validation Protocol Bowen Liu and Jianying Zhou
Knowledge Mining in Cybersecurity: From Attack to Defense Khandakar Ashrafi Akbar, Sadaf Md Halim, Yibo Hu, Anoop Singhal, Latifur Khan and Bhavani Thuraisingham
Attack-resilient Blockchain-based Decentralized Timed Data release Jingzhe Wang and Balaji Palanisamy
Lunch Break 12:00-13:00
Data Privacy
(Session Chair: Indrakshi Ray)
13:00-15:00 Mitigating Privacy Vulnerability Caused by Map Asymmetry Ryota Hiraishi, Masatoshi Yoshikawa, Shun Takagi, Yang Cao, Sumio Fujita and Hidehito Gomi
MCoM: A Semi-Supervised Method for Imbalanced Tabular Security Data Xiaodi Li, Latifur Khan, Mahmoud Zamani, Shamila Wickramasuriya and Kevin Hamlen
Utility and Privacy Assessment of Synthetic Microbiome Data Markus Hittmeir, Rudolf Mayer and Andreas Ekelhart
Combining Defences against Data-Poisoning Based Backdoor Attacks on Neural Networks Andrea Milakovic and Rudolf Mayer
Assessing Differentially Private Variational Autoencoders under Membership Inference Daniel Bernau, Jonas Robl and Florian Kerschbaum
Coffee Break 15:00-15:15
Panel 1 15:15-16:15 Data/Application Security: Future Research Directions and Challenges Panel Leader: Vijay Atluri (Rutgers University, USA)
Panelists: Indrajit Ray (Colorado State University, USA), Stefano Paraboschi (Università degli Studi di Bergamo, Italy) and Anoop Singhal (NIST, USA)
19-July-2022 Breakfast 09:00-09:30
Keynote 2
(Session Chair: Shamik Sural)
09:30-10:30 Scalable, Accurate, Robust Binary Analysis with Transfer Learning
Suman Jana (Columbia University, USA)
IoT Security
(Session Chair: Balaji Palanisamy)
10:30-12:00 Local Intrinsic Dimensionality of IoT Networks for Unsupervised Intrusion Detection Matt Gorbett, Hossein Shirazi and Indrakshi Ray
On the Data Privacy, Security, and Risk Postures of IoT Mobile Companion Apps Shradha Neupane, Faiza Tazi, Upakar Paudel, Freddy Veloz Baez, Merzia Adamjee, Lorenzo De Carli, Sanchari Das and Indrakshi Ray
Verification and Validation Methods for a Trust-by-Design Framework for the IoT Davide Ferraris, Carmen Fernandez-Gago and Javier Lopez
Lunch Break 12:00-13:00
Privacy-Preserving Access and Computation
(Session Chair: Anis Bkakria)
13:00-14:30 Robust and Provably Secure Attribute-Based Encryption Supporting Access Revocation and Outsourced Decryption Anis Bkakria
Libertas: Backward Private Dynamic Searchable Symmetric Encryption Supporting Wildcards Jeroen Weener, Florian Hahn and Andreas Peter
End-to-End Protection of IoT Communications Through Cryptographic Enforcement of Access Control Policies Stefano Berlato, Umberto Morelli, Roberto Carbone and Silvio Ranise
Coffee Break 14:30-14:45
Panel 2 14:45-15:45 Security and Trust in Blockchain Systems Panel Leader: Balaji Palanisamy (University of Pittsburgh, USA)
Panelists: Yuzhe Tang (Syracuse University, USA), Thang Dinh (Virginia Commonwealth University, USA), Luis Bathen (IBM Research, USA), Sandip Chakraborty (IIT Kharagpur, India)
Business Session 15:45-16:15
20-July-2022 Breakfast 09:00-09:30
Keynote 3
(Session Chair: Yuan Hong)
09:30-10:30 Attribute Based Access Control - Challenges and Solutions
Vijay Atluri (Rutgers University, USA)
Quantum Security
(Session Chair: Indrajit Ray)
10:30-11:30 Integrating and Evaluating Quantum-safe TLS in Database Applications Anselme Tueno, David Boehm and Shin Ho Choe
Feel the Quantum Functioning: Instantiating Generic Multi-Input Functional Encryption from Learning with Errors Alexandros Bakas, Antonis Michalas, Eugene Frimpong and Reyhaneh Rabbaninejad
Security Operations and Policies
(Session Chair: Hafiz Asif)
11:30-12:00 ReLOG: A Unified Framework for Relationship-Based Access Control over Graph Databases Stanley Clark, Nikolay Yakovets, George H. L. Fletcher and Nicola Zannone
Security Operations Center Roles and Skills: A Comparison of Theory and Practice Andreas Reisser, Manfred Vielberth, Sofia Fohringer and Guenther Pernul
Closing Remarks 12:00-12:15
Packet Lunch