Accepted Papers
Full Length Papers
- Ostinato: Cross-host Attack Correlation through Attack Activity Similarity Detection
Sutanu Kumar Ghosh (University of Illinois, USA); Kiavash Satvat (University of Illinois, USA); Rigel Gjomemo (University of Illinois, USA); Venkat.N. Venkatakrishnan (University of Illinois, USA)
- DKS-PKI: A Distributed Key Server Architecture for
Public Key Infrastructure
Abu Faisal (Queen’s University, Canada); Mohammad Zulkernine (Queen’s University, Canada)
- Generating-Set Evaluation of Bloom Filter Hardening Techniques in Private Record Linkage
Karin Mortl (University of Denver, USA); Rinku Dewri (University of Denver, USA)
- SHIELD: A Multimodal Deep Learning Framework For Android Malware Detection
Narendra Singh (IIT Patna, India); Somanath Tripathy (IIT Patna, India); Bruhadeshwar Bezawada (IIT Jammu, India)
- Samyukta: A Unified Access Control Model using Roles, Labels, and Attributes
Radhika B S (IIIT Dharwad, India); N V Narendra Kumar (IDRBT, India); R K Shyamasundar (IIT Bombay, India)
- Attacks on ML Systems: From Security Risk Analysis to Attack Mitigation
Qingtian Zou (Pennsylvania State University, USA); Lan Zhang (Pennsylvania State University, USA); Anoop Singhal (National Institute of Standards and Technology, USA); Xiaoyan Sun (California State University, USA); Peng Liu (Pennsylvania State University, USA)
- Efficient and Effective Static Android Malware Detection Using Machine Learning
Vidhi Bansal (Indira Gandhi Delhi Technical University for Women, India); Mohona Ghosh (Indira Gandhi Delhi Technical University for Women, India); Niyati Baliyan (Indira Gandhi Delhi Technical University for Women, India)
- MILSA: Model Interpretation based Label Sniffing Attack in Federated Learning
Debasmita Manna (IIT Patna, India); Harsh Kasyap (IIT Patna, India); Somanath Tripathy (IIT Patna, India)
Short Papers
- IoTInDet: Detecting Internet of Things Intrusions with Class Scatter Ratio and Hellinger Distance Statistics
Bhuvaneswari Amma N G (Vellore Institute of Technology, India); Valarmathi P (Vellore Institute of Technology, India)
- Detecting Cloud originated DDoS attacks at the source using Out-cloud attack detection (OCAD)
Gulshan Kumar Singh (Central University of Rajasthan, India); Gaurav Somani (Central University of Rajasthan, India)
- Mining Attribute-Based Access Control Policies
Maryam Davari (Queen’s University, Canada); Mohammad Zulkernine (Queen’s University, Canada)
- Preventing Privacy-Violating Information Flows in JavaScript Applications using Dynamic Labelling
Sandip Ghosal (Uppsala University, Sweden); R. K. Shyamasundar (IIT Bombay, India)
- On the Impact of Model Tolerance in Power Grid Anomaly Detection Systems
Srinidhi Madabhushi (University of Denver, USA); Rinku Dewri (University of Denver, USA)
Work-In-Progress Papers
- WiP: Control Plane Saturation Attack Mitigation in Software Defined Networks
Neminath Hubballi (IIT Indore, India); Kanishk Patel (IIT Indore, India)
- WiP: EventTracker-Event Driven Evidence Collection for Digital Forensics
Aniket Sangwan (IIT Indore, India); Sarthak Jain (IIT Indore, India); Neminath Hubballi (IIT Indore, India)
- WiP: Characterizing the Impact of Multiplexed DoS Attacks on HTTP and Detection
Shaurya Sood (IIT Indore, India); Pritesh Palod (IIT Indore, India); Neminath Hubballi (IIT Indore, India)