Click here to Download the Brief Program Schedule | Click here to Download the Detailed Program Schedule |
18th International Conference on Information Systems Security (ICISS 2022) | |||
IIT Tirupati, December 16-20, 2022 | |||
Session | Time | Paper/Keynote | Presenter |
Friday, December 16th 2022 | |||
Welcome | 08:00 - 09:30 | Registration / Networking | |
Session - 1 | 09:30 - 13:00 | Tutorials: Techniques of Malware Design/Deployment (Part - 1) Tea Break from 11:30 - 11:45 |
Saurabh Sharma (Kaspersky) |
13:00 - 14:00 | Lunch Break | ||
Session - 2 | 14:00 - 16:00 | Tutorials: An Introduction to Mitre Att&ck and Framework | Harshal Tupsamudre (Qualys) |
16:00 - 16:15 | Tea Break | ||
Session - 3 | 16:15 - 18:15 | Tutorials: Techniques of Malware Design/Deployment (Part - 2) | Saurabh Sharma (Kaspersky) |
Saturday, December 17th 2022 | |||
Inauguration | 09:00 - 09:30 | Welcome Address | |
Session - 4 Chair: Dr Somanath Tripathy (IIT Patna) |
09:30 - 10:30 | Keynote Talk: The Rise of Cyber Physical Security – In Light of Cyber Physical Systems | Dr Chandrakant D. Patel |
10:30 - 11:00 | Invited Talk: Advanced Persistent Threats: A Study in Indian Context | Mr Himanshu Dubey | |
11:00 - 11:30 | Generating-Set Evaluation of Bloom Filter Hardening Techniques in Private Record Linkage - Karin Mortl (University of Denver, USA); Rinku Dewri (University of Denver, USA) | ||
11:30 - 11:45 | Tea Break | ||
Session - 5 Chair: Dr Rinku Dewri (DU, USA) |
11:45 - 12:15 | Ostinato: Cross-host Attack Correlation through Attack Activity Similarity Detection - Sutanu Kumar Ghosh (University of Illinois, USA); Kiavash Satvat (University of Illinois, USA); Rigel Gjomemo (University of Illinois, USA); Venkat.N. Venkatakrishnan (University of Illinois, USA) | |
12:15 - 12:45 | SHIELD: A Multimodal Deep Learning Framework For Android Malware Detection - Narendra Singh (IIT Patna, India); Somanath Tripathy (IIT Patna, India); Bruhadeshwar Bezawada (IIT Jammu, India) | ||
12:45 - 13:15 | Samyukta: A Unified Access Control Model using Roles, Labels, and Attributes - Radhika B S (IIIT Dharwad, India); N V Narendra Kumar (IDRBT, India); R K Shyamasundar (IIT Bombay, India) | ||
13:15 - 14:00 | Lunch Break | ||
Session - 6 Chair: Dr Shalini Kesar (SUU, USA) |
14:00 - 15:00 | 1. IoTInDet: Detecting Internet of Things Intrusions with Class Scatter Ratio and Hellinger Distance Statistics - Bhuvaneswari Amma N G (Vellore Institute of Technology, India); Valarmathi P (Vellore Institute of Technology, India) 2. WiP: Control Plane Saturation Attack Mitigation in Software Defined Networks - Neminath Hubballi (IIT Indore, India); Kanishk Patel (IIT Indore, India) 3. WiP: EventTracker-Event Driven Evidence Collection for Digital Forensics - Aniket Sangwan (IIT Indore, India); Sarthak Jain (IIT Indore, India); Neminath Hubballi (IIT Indore, India) |
|
15:00 - 15:30 | Efficient and Effective Static Android Malware Detection Using Machine Learning - Vidhi Bansal (Indira Gandhi Delhi Technical University for Women, India); Mohona Ghosh (Indira Gandhi Delhi Technical University for Women, India); Niyati Baliyan (Indira Gandhi Delhi Technical University for Women, India) | ||
15:30 - 16:00 | MILSA: Model Interpretation based Label Sniffing Attack in Federated Learning - Debasmita Manna (IIT Patna, India); Harsh Kasyap (IIT Patna, India); Somanath Tripathy (IIT Patna, India) | ||
16:00 - 16:15 | Tea Break | ||
Session - 7* |
16:15 - 18:15 | Tutorials: Secure Digital Transformation Leveraging Aadhaar (Part 1) | Vijayakumar Manjunatha (eMudhra) |
16:15 - 18:15 | Tutorials: Techniques of Malware Design/Deployment (Part 3) | Saurabh Sharma (Kaspersky) | |
Sunday, December 18th 2022 | |||
Session - 8 Chair: Dr Sithu D Sudarsan (CDAC) |
09:30 - 10:30 | Keynote Talk: Security and Privacy in Federated Learning | Prof Ling Liu |
10:30 - 11:00 | DKS-PKI: A Distributed Key Server Architecture for Public Key Infrastructure - Abu Faisal (Queen’s University, Canada); Mohammad Zulkernine (Queen’s University, Canada) | ||
11:00 - 11:30 | Detecting Cloud originated DDoS attacks at the source using Out-cloud attack detection (OCAD) - Gulshan Kumar Singh (Central University of Rajasthan, India); Gaurav Somani (Central University of Rajasthan, India) | ||
11:30 - 11:45 | Tea Break | ||
Session - 9 |
11:45 - 13:00 | Panel Discussion on Cybersecurity Challenges in National Security | Dr Anil Kapoor |
13:00 - 14:00 | Lunch Break | ||
Session - 10 Chair: Dr Praveen Gauravaram (TCS-Research) |
14:00 - 15:00 | Keynote Talk: Research and Engineering Challenges of Blockchain and Web3 | Dr Ashish Kundu |
Session - 11* |
15:00 - 16:00 | Tutorials: Secure Digital Transformation Leveraging Aadhaar (Part 2) | Vijayakumar Manjunatha (eMudhra) |
15:00 - 16:00 | Tutorials: Techniques of Malware Design/Deployment (Part 4) | Saurabh Sharma (Kaspersky) | |
16:00 - 16:15 | Tea Break | ||
Session - 12 Chair: Dr Mahendran V (IIT Tirupati) |
16:15 - 17:15 | Keynote Talk: Web3 and the Interoperability of Asset Networks | Dr Thomas Hardjono |
17:15 - 18:15 | Business Meeting (On Invitation) | ||
Dinner | 19:30 onwards | Banquet Dinner - Venue (will be updated) | |
Monday, December 19th 2022 | |||
Session - 13 Chair: Dr Neminath Hubballi (IIT Indore) |
09:30 - 10:00 | Invited Talk: Securing Cyber-Physical and IoT Systems in Smart Living Environments | Prof Sajal Das |
10:00 - 11:00 | 1. Mining Attribute-Based Access Control Policies - Maryam Davari (Queen’s University, Canada); Mohammad Zulkernine (Queen’s University, Canada) 2. Preventing Privacy-Violating Information Flows in JavaScript Applications using Dynamic Labelling - Sandip Ghosal (Uppsala University, Sweden); R. K. Shyamasundar (IIT Bombay, India) 3. On the Impact of Model Tolerance in Power Grid Anomaly Detection Systems - Srinidhi Madabhushi (University of Denver, USA); Rinku Dewri (University of Denver, USA) |
||
11:00 - 11:30 | Attacks on ML Systems: From Security Analysis to Attack Mitigation - Qingtian Zou (Pennsylvania State University, USA); Lan Zhang (Pennsylvania State University, USA); Anoop Singhal (National Institute of Standards and Technology, USA); Xiaoyan Sun (California State University, USA); Peng Liu (Pennsylvania State University, USA) | ||
11:30 - 11:45 | Tea Break | ||
Session - 14 Chair: Dr Kalidas Y (IIT Tirupati) |
11:45 - 12:45 | Keynote Talk: Technology Transfer from Security Research Projects: A Personal Perspective | Prof Asokan |
12:45 - 13:00 | WiP: Characterizing the Impact of Multiplexed DoS Attacks on HTTP and Detection - Shaurya Sood (IIT Indore, India); Pritesh Palod (IIT Indore, India); Neminath Hubballi (IIT Indore, India) | ||
13:00 - 14:00 | Lunch Break | ||
Session - 15 Chair: Dr Shachee Mishra (IBM-Research) & Dr Sajal Das (MUST, USA) |
14:00 - 15:00 | PhD Forum Poster Presentations | |
Session - 16* |
15:00 - 16:00 | Tutorials: An Overview of Encrypted Traffic Analysis for Cyber Security (Part 1) | Debapriyay Mukhopadhyay (Vehere Technologies) |
15:00 - 16:00 | Tutorials: Techniques of Malware Design/Deployment (Part 5) | Saurabh Sharma (Kaspersky) | |
16:00 - 16:15 | Tea Break | ||
Session - 17* |
16:15 - 18:15 | Tutorials: An Overview of Encrypted Traffic Analysis for Cyber Security (Part 2) | Debapriyay Mukhopadhyay (Vehere Technologies) |
16:15 - 18:15 | Tutorials: Techniques of Malware Design/Deployment (Part 6) | Saurabh Sharma (Kaspersky) | |
Tuesday, December 20th 2022 | |||
Tirumala Darshan | Morning | Tirumala Special Entry Darshan will be arranged for interested participants Darshan Entrance Ticket of Rs 300/- to be borne by the participants |
* marked Tutorial sessions will happen in parallel