Accepted Papers
  
  Full Length Papers
   
          - Ostinato: Cross-host Attack Correlation through Attack Activity Similarity Detection
 Sutanu Kumar Ghosh (University of Illinois, USA); Kiavash Satvat (University of Illinois, USA); Rigel Gjomemo (University of Illinois, USA); Venkat.N. Venkatakrishnan (University of Illinois, USA)
          
          - DKS-PKI: A Distributed Key Server Architecture for
            Public Key Infrastructure
 Abu Faisal (Queen’s University, Canada); Mohammad Zulkernine (Queen’s University, Canada)
            
          - Generating-Set Evaluation of Bloom Filter Hardening Techniques in Private Record Linkage
 Karin Mortl (University of Denver, USA); Rinku Dewri (University of Denver, USA)
            
            - SHIELD: A Multimodal Deep Learning Framework For Android Malware Detection
 Narendra Singh (IIT Patna, India); Somanath Tripathy (IIT Patna, India); Bruhadeshwar Bezawada (IIT Jammu, India)
            
            - Samyukta: A Unified Access Control Model using Roles, Labels, and Attributes
 Radhika B S (IIIT Dharwad, India); N V Narendra Kumar (IDRBT, India); R K Shyamasundar (IIT Bombay, India)
            
            - Attacks on ML Systems: From Security Risk Analysis to Attack Mitigation
 Qingtian Zou (Pennsylvania State University, USA); Lan Zhang (Pennsylvania State University, USA); Anoop Singhal (National Institute of Standards and Technology, USA); Xiaoyan Sun (California State University, USA); Peng Liu (Pennsylvania State University, USA)
            
            - Efficient and Effective Static Android Malware Detection Using Machine Learning
 Vidhi Bansal (Indira Gandhi Delhi Technical University for Women, India); Mohona Ghosh (Indira Gandhi Delhi Technical University for Women, India); Niyati Baliyan (Indira Gandhi Delhi Technical University for Women, India)
            
            - MILSA: Model Interpretation based Label Sniffing Attack in Federated Learning
 Debasmita Manna (IIT Patna, India); Harsh Kasyap (IIT Patna, India); Somanath Tripathy (IIT Patna, India)
Short Papers
   
       - IoTInDet: Detecting Internet of Things Intrusions with Class Scatter Ratio and Hellinger Distance Statistics
 Bhuvaneswari Amma N G (Vellore Institute of Technology, India); Valarmathi P (Vellore Institute of Technology, India)
            
            - Detecting Cloud originated DDoS attacks at the source using Out-cloud attack detection (OCAD)
 Gulshan Kumar Singh (Central University of Rajasthan, India); Gaurav Somani (Central University of Rajasthan, India)
            
            - Mining Attribute-Based Access Control Policies
 Maryam Davari (Queen’s University, Canada); Mohammad Zulkernine (Queen’s University, Canada)
            
            - Preventing Privacy-Violating Information Flows in JavaScript Applications using Dynamic Labelling
 Sandip Ghosal (Uppsala University, Sweden); R. K. Shyamasundar (IIT Bombay, India)
            
            - On the Impact of Model Tolerance in Power Grid Anomaly Detection Systems
 Srinidhi Madabhushi (University of Denver, USA); Rinku Dewri (University of Denver, USA)
Work-In-Progress Papers 
   
       - WiP: Control Plane Saturation Attack Mitigation in Software Defined Networks
 Neminath Hubballi (IIT Indore, India); Kanishk Patel (IIT Indore, India)
            
            - WiP: EventTracker-Event Driven Evidence Collection for Digital Forensics
 Aniket Sangwan (IIT Indore, India); Sarthak Jain (IIT Indore, India); Neminath Hubballi (IIT Indore, India)
            
            - WiP: Characterizing the Impact of Multiplexed DoS Attacks on HTTP and Detection
 Shaurya Sood (IIT Indore, India); Pritesh Palod (IIT Indore, India); Neminath Hubballi (IIT Indore, India)