Iciss 2014 Agenda

Post on 06-Dec-2015

217 views 3 download

Tags:

description

Conference ICISS 2014 agenda

Transcript of Iciss 2014 Agenda

Institute for Development and Research in Banking Technology (Established by Reserve Bank of India)

Tenth International Conference on Information Systems Security

ICISS – 2014 IDRBT Hyderabad

18 – 20 December 2014

Venue: IDRBT Auditorium

Conference Day I – Thursday Dec 18

0900 – 1000 hrs : Registration

INAUGURAL SESSION

1000 – 1010 hrs : Welcome Address

A.S. Ramasastri, Director, IDRBT

1010 – 1020 hrs : General Chairs

Venu Govindaraju, B M Mehtre

1010 – 1020 hrs : Programme Chairs

Atul Prakash and R Shyamasundar

1020 – 1100 hrs : Inaugural address

Chief Guest. Dr. C. Rangarajan

1100 – 1105 hrs : Vote of Thanks

B.M. Mehtre

1105 – 1130 hrs : Tea Break

Plenary Session – 1

Session Chair: Venu Govindaraju, SUNY, Buffalo

1130– 1230 hrs : Key Note 1

Adversarial and Uncertain Reasoning for Adaptive Cyber Defense: Building the Scientific Foundation

Sushil Jajodia, George Mason University, USA

1230 – 1330 hrs : Lunch Break (Venue: IDRBT Lawns)

Technical Session – I

Security Inferences Session Chair: Ashok K Agarwal, CSI, Hyderabad

1330 – 1400 hrs : Inference-Proof Data Publishing by Minimally Weakening a Database Instance

Joachim Biskup and Marcel Preuß

1400 – 1430 hrs : Extending Dolev-Yao with assertions

R. Ramanujam, Vaishnavi Sundararajan and S P Suresh

1430 – 1500 hrs : Inferring Accountability from Trust Perceptions

Koen Decroix, Denis Butin, Joachim Jansen and Vincent Naessens

1500 – 1530 hrs

:

Client Side Web Session Integrity as a Non-Interference Property (25+5Min)

Wilayat Khan, Stefano Calzavara, Michele Bugliesi, Willem De Groef and

Frank Piessens

Technical Session - II

Location based Security Services Session Chair: S K Udgata, University of Hyderabad

1530 – 1600 hrs :

Preserving Privacy in Location-Based Services using Sudoku Structures

Sumitra Biswal, Goutam Paul and Shashwat Raizada

1600 – 1615 hrs : Location Obfuscation Framework for Training-Free Localization System (SHORT PAPER)

Thong M. Doan, Han .N Dinh, Nam T. Nguyen and Phuoc T. Tran

PhD Forum Presentations (Venue: IDRBT Conference Hall – 205)

Chair: V.N. Sastry, IDRBT

1530 – 1600 hrs

1530 – 1700 hrs

:

End to End Secure Data Aggregation in Wireless Sensor Networks

Keyur Parmer, Doctoral Student, NIT, Surat

1600 – 1630 hrs : Automatic Authentication of Printed Security Documents

Biswajit Halder, Doctoral Student, University of Burdwan

1630 – 1700 hrs : Intrusion Detection Mechanisms for P2P Networks

Pratik Narang, Doctoral Student, BITS, Hyderabad

Business Meeting Session Chair: Sushil Jajodia

1700 – 1710 hrs : Opening Remarks

Sushil Jajodia

Von

1710 – 1750 hrs : Bid Presentation

MNIT, Jaipur

Conference Day II – Friday Dec 19 Plenary Session – 2

Session Chair: B.M. Mehtre, IDRBT

0930 – 1030 hrs : Key Note 2 The Bug that Bites

Herbert Bos, Vrije Universiteit Amsterdam , The Netherlands

1030 – 1100 hrs : Tea Break

Technical Session – III

Security Policies Session Chair: Koduri Srinivas, IEEE, Hyderabad

1100 – 1130 hrs : Impact of Multiple t-t SMER Constraints on Minimum User Requirement in RBAC,

Arindam Roy, Shamik Sural and Arun Kumar Majumdar

1130 – 1200 hrs : Temporal RBAC Security Analysis using Logic Programming in the Presence of Administrative Policies

Sadhana Jha, Shamik Sural, Jaideep Vaidya and Vijayalakshmi Atluri

1200 – 1230 hrs : A Formal Methodology for Modeling Threats to Enterprise Assets

Jaya Bhattacharjee, Anirban Sengupta and Chandan Mazumdar

1230 – 1300 hrs : A Novel Approach for Searchable CP-ABE with Hidden Ciphertext-Policy Mukti Padhya and Devesh Jinwala

1300 – 1400 hrs : Lunch Break (Venue: IDRBT Lawns)

Plenary Session – 3

Session Chair: Atul Prakash, University of Michigan

1400 – 1500 hrs : Key Note 3 SNIPS: A Software-Defined Approach for Scaling Intrusion Prevention

Systems via Offloading

Vyas Sekar, Carnegie Mellon University, USA

1500 – 1530 hrs : Break

Technical Session – IV

Forensics

Session Chair: Chandan Mazumdar, Jadavpur University, Kolkata

1530 – 1600 hrs : Analysis of fluorescent paper pulps for detecting Counterfeit Indian paper money Biswajit Halder, Rajkumar Darbar, Utpal Garain and Abhoy Ch. Mondal

1600 – 1615 hrs : A Vein Biometric based Authentication System (SHORT PAPER)

Puneet Gupta and Phalguni Gupta

1615 – 1630 hrs : Digital Forensic Technique for Double Compression based JPEG Image Forgery

Detection (SHORT PAPER)

Pankaj Malviya and Ruchira Naskar

Technical Session – V (Venue: IDRBT Conference Hall – 205)

Security User Interfaces

Session Chair: Vijay Atluri, Rutgers University, USA

1630 – 1700 hrs : Towards a more democratic mining in Bitcoins

Goutam Paul, Pratik Sarkar and Sarbajit Mukherjee

1700 – 1730 hrs : Basic Research on Graphical Authentication

Peter Mayer, Melanie Volkamer and Michaela Kauer

1730 – 1800 hrs : Security Extension Providing User Anonymity and Relaxed Trust Requirement in Non-3GPP Access to The EPS

Hiten Choudhury, Basav Roychoudhury and Dilip Saikia

1800 – 1815 hrs : A Usage-Pattern Perspective for Privacy Ranking of Android Apps

(SHORT PAPER)

Xiaolei Li, Xinshu Dong and Zhenkai Liang

1815 – 1900 hrs : Break

1900 – 2000 hrs : Cultural Programme

2000 onwards : Conference Dinner (Venue: IDRBT Lawns)

Conference Day III – Saturday Dec 20 Plenary Session – 4

Session Chair: R K Shyamasundar, TIFR

0930 – 1030 hrs : Key Note 4

Application Architectures for Critical Data Isolation

Zhenkai Liang, National University of Singapore

1030 – 1100 hrs : Break

Technical Session – VI

Security Attacks

Session Chair: M B Srinivas, BITS Hyderabad

1100 – 1130 hrs : Privacy Leakage Attacks in Browsers by Colluding Extensions

Anil Saini, Manoj Gaur, Vijay Laxmi, Tushar Singhal and Mauro Conti

1130 – 1200 hrs : CORP: A browser policy to mitigate web inltration attacks

Krishna Telikicherla, Venkatesh Choppella and Bruhadeshwar Bezawada

1200 – 1230 hrs : An Improved Methodology Towards Providing Immunity Against Weak Shoulder

Surfing Attack

Nilesh Chakraborty and Samrat Mondal

1230 – 1300 hrs : Catching Classical and Hijack-based Phishing Attacks

Tanmay Thakur and Rakesh Verma

1300 – 1400 hrs : Lunch Break (Venue: IDRBT Lawns)

Technical Session – VII

Malware Detection

Session Chair: Arun Agarwal, University of Hyderabad

1400 – 1430 hrs : PMDS: Permission-based Malware Detection System

Paolo Rovelli and Ýmir Vigfússon

1430 – 1500 hrs : Efficient Detection of Multi-step Cross-Site Scripting Vulnerabilities

Alexandre Vernotte, Frederic Dadeau, Franck Lebeau, Bruno Legeard, Fabieneureux and François Piat

1500 – 1530 hrs : CliSeAu: Securing Distributed Java Programs by Cooperative Dynamic Enforcement

Richard Gay, Jinwei Hu and Heiko Mantel

1530 – 1545 hrs : Automatic Generation of Compact Alphanumeric Shellcodes for x86 (SHORT PAPER)

Aditya Basu, Anish Mathuria and Nagendra Chowdary

1545 – 1600 hrs : Valedictory Session

Awards Participants Feedback

1600 hrs : Close