| Program | Full Papers (25 Minutes), Short Papers (15 Minutes) | |||
| Date | Session | Time | Paper Title | Authors |
| 18-July-2022 | Breakfast | 09:00-09:30 | ||
| Opening Remarks | 09:30-09:45 | |||
| Keynote 1 (Session Chair: Jaideep Vaidya) |
09:45-10:45 | Security of Graphs link |
Ashish Kundu (Cisco Research, USA) | |
| Distributed Systems (Session Chair: Stefano Paraboschi) |
10:45-12:00 | Liberate Your Servers: A Decentralized Content Compliance Validation Protocol | Bowen Liu and Jianying Zhou | |
|---|---|---|---|---|
| Knowledge Mining in Cybersecurity: From Attack to Defense | Khandakar Ashrafi Akbar, Sadaf Md Halim, Yibo Hu, Anoop Singhal, Latifur Khan and Bhavani Thuraisingham | |||
| Attack-resilient Blockchain-based Decentralized Timed Data release | Jingzhe Wang and Balaji Palanisamy | |||
| Lunch Break | 12:00-13:00 | |||
| Data Privacy (Session Chair: Indrakshi Ray) |
13:00-15:00 | Mitigating Privacy Vulnerability Caused by Map Asymmetry | Ryota Hiraishi, Masatoshi Yoshikawa, Shun Takagi, Yang Cao, Sumio Fujita and Hidehito Gomi | |
| MCoM: A Semi-Supervised Method for Imbalanced Tabular Security Data | Xiaodi Li, Latifur Khan, Mahmoud Zamani, Shamila Wickramasuriya and Kevin Hamlen | |||
| Utility and Privacy Assessment of Synthetic Microbiome Data | Markus Hittmeir, Rudolf Mayer and Andreas Ekelhart | |||
| Combining Defences against Data-Poisoning Based Backdoor Attacks on Neural Networks | Andrea Milakovic and Rudolf Mayer | |||
| Assessing Differentially Private Variational Autoencoders under Membership Inference | Daniel Bernau, Jonas Robl and Florian Kerschbaum | |||
| Coffee Break | 15:00-15:15 | |||
| Panel 1 | 15:15-16:15 | Data/Application Security: Future Research Directions and Challenges | Panel Leader: Vijay Atluri (Rutgers University, USA) Panelists: Indrajit Ray (Colorado State University, USA), Stefano Paraboschi (Università degli Studi di Bergamo, Italy) and Anoop Singhal (NIST, USA) |
|
| 19-July-2022 | Breakfast | 09:00-09:30 | ||
| Keynote 2 (Session Chair: Shamik Sural) |
09:30-10:30 | Scalable, Accurate, Robust Binary Analysis with Transfer Learning link |
Suman Jana (Columbia University, USA) | |
| IoT Security (Session Chair: Balaji Palanisamy) |
10:30-12:00 | Local Intrinsic Dimensionality of IoT Networks for Unsupervised Intrusion Detection | Matt Gorbett, Hossein Shirazi and Indrakshi Ray | |
| On the Data Privacy, Security, and Risk Postures of IoT Mobile Companion Apps | Shradha Neupane, Faiza Tazi, Upakar Paudel, Freddy Veloz Baez, Merzia Adamjee, Lorenzo De Carli, Sanchari Das and Indrakshi Ray | |||
| Verification and Validation Methods for a Trust-by-Design Framework for the IoT | Davide Ferraris, Carmen Fernandez-Gago and Javier Lopez | |||
| Lunch Break | 12:00-13:00 | |||
| Privacy-Preserving Access and Computation (Session Chair: Anis Bkakria) |
13:00-14:30 | Robust and Provably Secure Attribute-Based Encryption Supporting Access Revocation and Outsourced Decryption | Anis Bkakria | |
| Libertas: Backward Private Dynamic Searchable Symmetric Encryption Supporting Wildcards | Jeroen Weener, Florian Hahn and Andreas Peter | |||
| End-to-End Protection of IoT Communications Through Cryptographic Enforcement of Access Control Policies | Stefano Berlato, Umberto Morelli, Roberto Carbone and Silvio Ranise | |||
| Coffee Break | 14:30-14:45 | |||
| Panel 2 | 14:45-15:45 | Security and Trust in Blockchain Systems | Panel Leader: Balaji Palanisamy (University of Pittsburgh, USA) Panelists: Yuzhe Tang (Syracuse University, USA), Thang Dinh (Virginia Commonwealth University, USA), Luis Bathen (IBM Research, USA), Sandip Chakraborty (IIT Kharagpur, India) |
|
| Business Session | 15:45-16:15 | |||
| 20-July-2022 | Breakfast | 09:00-09:30 | ||
| Keynote 3 (Session Chair: Yuan Hong) |
09:30-10:30 | Attribute Based Access Control - Challenges and Solutions link |
Vijay Atluri (Rutgers University, USA) | |
| Quantum Security (Session Chair: Indrajit Ray) |
10:30-11:30 | Integrating and Evaluating Quantum-safe TLS in Database Applications | Anselme Tueno, David Boehm and Shin Ho Choe | |
| Feel the Quantum Functioning: Instantiating Generic Multi-Input Functional Encryption from Learning with Errors | Alexandros Bakas, Antonis Michalas, Eugene Frimpong and Reyhaneh Rabbaninejad | |||
| Security Operations and Policies (Session Chair: Hafiz Asif) |
11:30-12:00 | ReLOG: A Unified Framework for Relationship-Based Access Control over Graph Databases | Stanley Clark, Nikolay Yakovets, George H. L. Fletcher and Nicola Zannone | |
| Security Operations Center Roles and Skills: A Comparison of Theory and Practice | Andreas Reisser, Manfred Vielberth, Sofia Fohringer and Guenther Pernul | |||
| Closing Remarks | 12:00-12:15 | |||
| Packet Lunch |