Iciss 2014 Agenda

4
Institute for Development and Research in Banking Technology (Established by Reserve Bank of India) Tenth International Conference on Information Systems Security ICISS 2014 IDRBT Hyderabad 18 20 December 2014 Venue: IDRBT Auditorium Conference Day I Thursday Dec 18 0900 1000 hrs : Registration INAUGURAL SESSION 1000 1010 hrs : Welcome Address A.S. Ramasastri, Director, IDRBT 1010 1020 hrs : General Chairs Venu Govindaraju, B M Mehtre 1010 1020 hrs : Programme Chairs Atul Prakash and R Shyamasundar 1020 1100 hrs : Inaugural address Chief Guest. Dr. C. Rangarajan 1100 1105 hrs : Vote of Thanks B.M. Mehtre 1105 1130 hrs : Tea Break Plenary Session 1 Session Chair: Venu Govindaraju, SUNY, Buffalo 11301230 hrs : Key Note 1 Adversarial and Uncertain Reasoning for Adaptive Cyber Defense: Building the Scientific Foundation Sushil Jajodia, George Mason University, USA 1230 1330 hrs : Lunch Break (Venue: IDRBT Lawns) Technical Session I Security Inferences Session Chair: Ashok K Agarwal, CSI, Hyderabad 1330 1400 hrs : Inference-Proof Data Publishing by Minimally Weakening a Database Instance Joachim Biskup and Marcel Preuß 1400 1430 hrs : Extending Dolev-Yao with assertions R. Ramanujam, Vaishnavi Sundararajan and S P Suresh 1430 1500 hrs : Inferring Accountability from Trust Perceptions Koen Decroix, Denis Butin, Joachim Jansen and Vincent Naessens 1500 1530 hrs : Client Side Web Session Integrity as a Non-Interference Property (25+5Min) Wilayat Khan, Stefano Calzavara, Michele Bugliesi, Willem De Groef and Frank Piessens

description

Conference ICISS 2014 agenda

Transcript of Iciss 2014 Agenda

Page 1: Iciss 2014 Agenda

Institute for Development and Research in Banking Technology (Established by Reserve Bank of India)

Tenth International Conference on Information Systems Security

ICISS – 2014 IDRBT Hyderabad

18 – 20 December 2014

Venue: IDRBT Auditorium

Conference Day I – Thursday Dec 18

0900 – 1000 hrs : Registration

INAUGURAL SESSION

1000 – 1010 hrs : Welcome Address

A.S. Ramasastri, Director, IDRBT

1010 – 1020 hrs : General Chairs

Venu Govindaraju, B M Mehtre

1010 – 1020 hrs : Programme Chairs

Atul Prakash and R Shyamasundar

1020 – 1100 hrs : Inaugural address

Chief Guest. Dr. C. Rangarajan

1100 – 1105 hrs : Vote of Thanks

B.M. Mehtre

1105 – 1130 hrs : Tea Break

Plenary Session – 1

Session Chair: Venu Govindaraju, SUNY, Buffalo

1130– 1230 hrs : Key Note 1

Adversarial and Uncertain Reasoning for Adaptive Cyber Defense: Building the Scientific Foundation

Sushil Jajodia, George Mason University, USA

1230 – 1330 hrs : Lunch Break (Venue: IDRBT Lawns)

Technical Session – I

Security Inferences Session Chair: Ashok K Agarwal, CSI, Hyderabad

1330 – 1400 hrs : Inference-Proof Data Publishing by Minimally Weakening a Database Instance

Joachim Biskup and Marcel Preuß

1400 – 1430 hrs : Extending Dolev-Yao with assertions

R. Ramanujam, Vaishnavi Sundararajan and S P Suresh

1430 – 1500 hrs : Inferring Accountability from Trust Perceptions

Koen Decroix, Denis Butin, Joachim Jansen and Vincent Naessens

1500 – 1530 hrs

:

Client Side Web Session Integrity as a Non-Interference Property (25+5Min)

Wilayat Khan, Stefano Calzavara, Michele Bugliesi, Willem De Groef and

Frank Piessens

Page 2: Iciss 2014 Agenda

Technical Session - II

Location based Security Services Session Chair: S K Udgata, University of Hyderabad

1530 – 1600 hrs :

Preserving Privacy in Location-Based Services using Sudoku Structures

Sumitra Biswal, Goutam Paul and Shashwat Raizada

1600 – 1615 hrs : Location Obfuscation Framework for Training-Free Localization System (SHORT PAPER)

Thong M. Doan, Han .N Dinh, Nam T. Nguyen and Phuoc T. Tran

PhD Forum Presentations (Venue: IDRBT Conference Hall – 205)

Chair: V.N. Sastry, IDRBT

1530 – 1600 hrs

1530 – 1700 hrs

:

End to End Secure Data Aggregation in Wireless Sensor Networks

Keyur Parmer, Doctoral Student, NIT, Surat

1600 – 1630 hrs : Automatic Authentication of Printed Security Documents

Biswajit Halder, Doctoral Student, University of Burdwan

1630 – 1700 hrs : Intrusion Detection Mechanisms for P2P Networks

Pratik Narang, Doctoral Student, BITS, Hyderabad

Business Meeting Session Chair: Sushil Jajodia

1700 – 1710 hrs : Opening Remarks

Sushil Jajodia

Von

1710 – 1750 hrs : Bid Presentation

MNIT, Jaipur

Conference Day II – Friday Dec 19 Plenary Session – 2

Session Chair: B.M. Mehtre, IDRBT

0930 – 1030 hrs : Key Note 2 The Bug that Bites

Herbert Bos, Vrije Universiteit Amsterdam , The Netherlands

1030 – 1100 hrs : Tea Break

Technical Session – III

Security Policies Session Chair: Koduri Srinivas, IEEE, Hyderabad

1100 – 1130 hrs : Impact of Multiple t-t SMER Constraints on Minimum User Requirement in RBAC,

Arindam Roy, Shamik Sural and Arun Kumar Majumdar

1130 – 1200 hrs : Temporal RBAC Security Analysis using Logic Programming in the Presence of Administrative Policies

Sadhana Jha, Shamik Sural, Jaideep Vaidya and Vijayalakshmi Atluri

1200 – 1230 hrs : A Formal Methodology for Modeling Threats to Enterprise Assets

Jaya Bhattacharjee, Anirban Sengupta and Chandan Mazumdar

1230 – 1300 hrs : A Novel Approach for Searchable CP-ABE with Hidden Ciphertext-Policy Mukti Padhya and Devesh Jinwala

1300 – 1400 hrs : Lunch Break (Venue: IDRBT Lawns)

Plenary Session – 3

Session Chair: Atul Prakash, University of Michigan

1400 – 1500 hrs : Key Note 3 SNIPS: A Software-Defined Approach for Scaling Intrusion Prevention

Systems via Offloading

Vyas Sekar, Carnegie Mellon University, USA

Page 3: Iciss 2014 Agenda

1500 – 1530 hrs : Break

Technical Session – IV

Forensics

Session Chair: Chandan Mazumdar, Jadavpur University, Kolkata

1530 – 1600 hrs : Analysis of fluorescent paper pulps for detecting Counterfeit Indian paper money Biswajit Halder, Rajkumar Darbar, Utpal Garain and Abhoy Ch. Mondal

1600 – 1615 hrs : A Vein Biometric based Authentication System (SHORT PAPER)

Puneet Gupta and Phalguni Gupta

1615 – 1630 hrs : Digital Forensic Technique for Double Compression based JPEG Image Forgery

Detection (SHORT PAPER)

Pankaj Malviya and Ruchira Naskar

Technical Session – V (Venue: IDRBT Conference Hall – 205)

Security User Interfaces

Session Chair: Vijay Atluri, Rutgers University, USA

1630 – 1700 hrs : Towards a more democratic mining in Bitcoins

Goutam Paul, Pratik Sarkar and Sarbajit Mukherjee

1700 – 1730 hrs : Basic Research on Graphical Authentication

Peter Mayer, Melanie Volkamer and Michaela Kauer

1730 – 1800 hrs : Security Extension Providing User Anonymity and Relaxed Trust Requirement in Non-3GPP Access to The EPS

Hiten Choudhury, Basav Roychoudhury and Dilip Saikia

1800 – 1815 hrs : A Usage-Pattern Perspective for Privacy Ranking of Android Apps

(SHORT PAPER)

Xiaolei Li, Xinshu Dong and Zhenkai Liang

1815 – 1900 hrs : Break

1900 – 2000 hrs : Cultural Programme

2000 onwards : Conference Dinner (Venue: IDRBT Lawns)

Conference Day III – Saturday Dec 20 Plenary Session – 4

Session Chair: R K Shyamasundar, TIFR

0930 – 1030 hrs : Key Note 4

Application Architectures for Critical Data Isolation

Zhenkai Liang, National University of Singapore

1030 – 1100 hrs : Break

Technical Session – VI

Security Attacks

Session Chair: M B Srinivas, BITS Hyderabad

1100 – 1130 hrs : Privacy Leakage Attacks in Browsers by Colluding Extensions

Anil Saini, Manoj Gaur, Vijay Laxmi, Tushar Singhal and Mauro Conti

1130 – 1200 hrs : CORP: A browser policy to mitigate web inltration attacks

Krishna Telikicherla, Venkatesh Choppella and Bruhadeshwar Bezawada

1200 – 1230 hrs : An Improved Methodology Towards Providing Immunity Against Weak Shoulder

Surfing Attack

Nilesh Chakraborty and Samrat Mondal

Page 4: Iciss 2014 Agenda

1230 – 1300 hrs : Catching Classical and Hijack-based Phishing Attacks

Tanmay Thakur and Rakesh Verma

1300 – 1400 hrs : Lunch Break (Venue: IDRBT Lawns)

Technical Session – VII

Malware Detection

Session Chair: Arun Agarwal, University of Hyderabad

1400 – 1430 hrs : PMDS: Permission-based Malware Detection System

Paolo Rovelli and Ýmir Vigfússon

1430 – 1500 hrs : Efficient Detection of Multi-step Cross-Site Scripting Vulnerabilities

Alexandre Vernotte, Frederic Dadeau, Franck Lebeau, Bruno Legeard, Fabieneureux and François Piat

1500 – 1530 hrs : CliSeAu: Securing Distributed Java Programs by Cooperative Dynamic Enforcement

Richard Gay, Jinwei Hu and Heiko Mantel

1530 – 1545 hrs : Automatic Generation of Compact Alphanumeric Shellcodes for x86 (SHORT PAPER)

Aditya Basu, Anish Mathuria and Nagendra Chowdary

1545 – 1600 hrs : Valedictory Session

Awards Participants Feedback

1600 hrs : Close