Celebrating Fifteen Years of COMSNETS

    

COMSNETS 2023

15th International Conference on COMmunication Systems & NETworkS

January 3 - 8 | Hybrid Conference
Chancery Pavilion Hotel, Residency Road, Bengaluru, India

Initiative by COMSNETS Association

In-Cooperation With
Technical Co-Sponsors
Conference Partners


Cyber Security and Privacy Workshop

Event Date: Wedesday, 4 January 2023


Important Dates


Paper Submission Deadline 10th November 2022   20th November 2022, AoE
Notification of Acceptance 10th December 2022
Camera-ready Submission 15th December 2022
Workshop Date 4th January 2023

Schedule

Wedesday, 4 January 2023
Venue: SIGMA 1
Time Title Speaker/Authors
Session 1: Security
10:00-11:00 Keynote Talk: Security of Critical Cyber Physical Systems: A C3i Hub Perspective Sandeep K. Shukla
11:00-11:30 Tea break
11:30-11:50 Moving-Target-Defense based Security Mechanisms: A System Management Perspective Kaliappa Ravindran; Michael Iannelli; Arun Adiththan
11:50-12.10 Boolean Similarity Measure for Assessing Temporal Variation in the Network Attack Surface Ghanshyam Bopche; Deepnarayan Tiwari; Gopal N. Rai
12:10-12:30 RcAMA - An Recursive Composition Algebra-based Framework for Detection of Multistage Attacks Ghanshyam Bopche; Gopal N. Rai; Deepnarayan Tiwari
12:30-12:50 Health Assessment of 1485 Top Level Domain's Name Servers Sanjay Adiwal; Balaji Rajendran; Pushparaj Shetty D; Sithu D Sudarsan
12:50-1:10 Investigating IoT Systems Security Attacks using Network Forensics Ayushi Mishra; Priyanka Bagade
1:10-2:00 Lunch
Session 2: Blockchain
2:00-2:20 Secure Onboarding and Management of Electronic Shelf Labels in Retail Giridhar Mandyam; Mauro Scagnol; Nicolas Graube
2:20-2:40 Practical Coded Sharding for Blockchains Kanchi Gopinath; Nilesh Rathi
2:40-3:00 MyoChain: A Blockchain Protocol for Delay Bounded Transaction Confirmation Aditya Ahuja; Vigneswaran R; Rajan M A; Sachin Lodha
3:00-3:20 crossTrustChain: Cross-Chain Interoperability using Multivariate Trust Models Dhruv Avinash Patel; Harsh Anand; Suchetana Chakraborty
3:20-3:40 A ZK-SNARK based Proof of Assets Protocol for Bitcoin Exchanges Swaroopa Reddy
3:40-4:00 Tea break
Session 3: Privacy
4:00-4:20 ProFace: A Cancelable Face Template Protection Approach Surabhi Garg; Arun Kumar Jindal; Rajan M A; Srinivasa Rao Chalamala
4:20-4:40 Detecting Sensitive Information from Unstructured Text in a Data-Constrained Environment Saurabh Anand; Manish Shukla; Sachin Lodha
4:40-5:00 State of Internet Privacy and Tales of ECH-TLS Manjesh K Hanawal; Sameer G Kulkarni; Vinod S Khandkar
5:00-6:00 Panel Sandeep K. Shukla; Salil Kanhere; Mridula Singh; Tulika Pandey; Sachin Lodha

Keynote speakers

Sandeep K. Shukla

Professor, Department of Computer Science and Engineering, IIT Kanpur.

Visit Homepage

C3i Hub is a technology innovation hub funded by the Department of Science of Technology, Government of India -- with the charter for research, training, innovation and incubation in the field of cyber physical systems security. Examples of Critical Cyber Physical systems include the power grid, transportation automation, factory automation, water and sewage plants, oil and gas pipelines etc. Due to increased cyber threats from nation state actors and terrorist groups and various incidents around the world, security of these cyber physical systems are of particular importance. C3i Hub has been working on this frontier aspect of cyber security research, providing training and incubating startups so as to create indigenous innovation, and industry in the field of cyber security of cyber physical systems. In this talk, we will discuss the critical cyber physical system security in general and then discuss the activities of C3i Hub towards indigenous cyber security ecosystem development in this field.

Professor Sandeep K. Shukla is an IEEE fellow, and ACM Distinguished Scientist. He is currently a professor of Computer Science and Engineering department at IIT Kanpur which he headed during 2017-2020. He was the editor in chief of the ACM Transactions on Embedded Computing Systems during 2013-2020. He is currently associate editors of ACM Transactions on Cyber Physical Systems, and Journal of the British Blockchain Association. In the past Prof. Shukla has served as associate editors of IEEE Transactions on Computers, IEEE Transactions on Industrial Informatics, IEEE Design and Test, and IEEE Embedded Systems Letters. Before joining IIT Kanpur in 2015, he was a professor at Virginia Tech, USA. He served as ACM Distinguished Speaker, and IEEE Computer Society Distinguished Visitor in the past. Prof. Shukla has authored over 200 peer reviewed journal and conference papers and authored/edited 10 books. He was awarded the Presidential Early Career Award in Science and Engineering (PECASE) in 2004, The Bessel Award by Humboldt Foundation in 2009, a Distinguished Alumnus Award by SUNY Albany in 2007, a Ramanujan Fellowship in 2015. Prof. Shukla’s major research interests are Cyber Security of Critical Infrastructures, Cyber Security of IT/OT systems, and Applications of Blockchain Technology in Security and Privacy.



Panel Discussion on Cybersecurity Research: Crystal-gazing Cybersecurity and Privacy for T20s


Panelists

Sandeep K. Shukla
Sandeep K. Shukla
IIT Kanpur, India

Professor Sandeep K. Shukla is an IEEE fellow, and ACM Distinguished Scientist. He is currently a professor of Computer Science and Engineering department at IIT Kanpur which he headed during 2017-2020. He was the editor in chief of the ACM Transactions on Embedded Computing Systems during 2013-2020. He is currently associate editors of ACM Transactions on Cyber Physical Systems, and Journal of the British Blockchain Association. In the past Prof. Shukla has served as associate editors of IEEE Transactions on Computers, IEEE Transactions on Industrial Informatics, IEEE Design and Test, and IEEE Embedded Systems Letters. Before joining IIT Kanpur in 2015, he was a professor at Virginia Tech, USA. He served as ACM Distinguished Speaker, and IEEE Computer Society Distinguished Visitor in the past. Prof. Shukla has authored over 200 peer reviewed journal and conference papers and authored/edited 10 books. He was awarded the Presidential Early Career Award in Science and Engineering (PECASE) in 2004, The Bessel Award by Humboldt Foundation in 2009, a Distinguished Alumnus Award by SUNY Albany in 2007, a Ramanujan Fellowship in 2015. Prof. Shukla’s major research interests are Cyber Security of Critical Infrastructures, Cyber Security of IT/OT systems, and Applications of Blockchain Technology in Security and Privacy.

Salil Kanhere
Salil Kanhere
UNSW, Sydney, Australia

Salil Kanhere is a Professor in the School of Computer Science and Engineering at UNSW Sydney, where he leads the Information Security and Privacy Research Group (IsPri). He is also affiliated with the UNSW Institute for Cyber Security (IFCYBER). His research is broadly at the intersection of cybersecurity, distributed computing, cyber-physical and IoT systems and pervasive computing. He has co-authored more than 300 peer-reviewed articles on these topics and has received 8 best paper awards. Salil received the Friedrich Wilhelm Bessel Research Award (2020) and the Humboldt Research Fellowship (2014), both from the Alexander von Humboldt Foundation in Germany. He has held visiting positions at I2R Singapore, Technical University Darmstadt, University of Zurich, Graz University of Technology and RWTH Aachen. He is a Senior Member of the IEEE and ACM, an ACM Distinguished Speaker, and an IEEE Computer Society Distinguished Visitor. He serves as the Editor in Chief of the Ad Hoc Networks journal and as an Associate Editor of IEEE Transactions on Network and Service Management, Computer Communications, and Pervasive and Mobile Computing. He has served as General Chair and Program Chair for several IEEE/ACM international conferences and is on the advisory board of three SMEs. Salil co-authored a book titled Blockchain for Cyberphysical Systems published by Artech House.

Mridula Singh
Mridula Singh
CISPA, Germany

Mridula Singh is (tenure-track) Faculty at CISPA – Helmholtz Center for Information Security in Saarbrucken, Germany. Her research interests are primarily in the areas of Systems Security, Wireless Networks, and Ubiquitous Computing. She is currently exploring various aspects of wireless and security to design secure autonomous systems. She pursued Ph.D. in Computer Science from ETH Zurich, Switzerland. The work she did during her Ph.D. is instrumental in enabling secure passive keyless entry and start systems of various car models. She holds an M.Tech degree with a specialization in Mobile and Ubiquitous Computing from IIIT-Delhi. She co-founded Trishulam while pursuing her master's degree. She worked as a research engineer at Xerox Research Center India, where she was involved in smart transportation and healthcare projects.

Moderator

Sachin Lodha
Sachin Lodha
TCS Research, India

Sachin Lodha is part of TCS's Corporate Research and Innovation team and heads its Cybersecurity and Privacy research that is working on diverse problems pertaining to trustworthy AI, de-risking cloud, securing IoT, privacy by design, and human aspects. He has special interest in data privacy and related topics. His efforts on that front have led to multiple research papers, patents, and award-winning innovations that are available as commercial TCS products.
Sachin Lodha is a member of ACM India Council, ACM India’s Cybersecurity Task Force, TCS’s own Cybersecurity Task Force, and the Working Group for drafting the guidelines on “Anonymization of Data” under the project “e-Governance Standards and Guidelines” supported by MeitY, Government of India. Previously he was a member of the Cyber4AI Task Force constituted with due approval of Prof K VijayRaghavan, Principal Scientific Advisor to Government of India, and the Steering Committee for India wide Lightweight Cipher Design Challenge launched by National Centre of Excellence for Cybersecurity Technology Development and Entrepreneurship. He is also an ACM India Eminent Speaker.


Accepted Papers

  1. A ZK-SNARK based Proof of Assets Protocol for Bitcoin Exchanges
    Swaroopa Reddy (IIT Hyderabad, India)

  2. Boolean Similarity Measure for Assessing Temporal Variation in the Network Attack Surface
    Ghanshyam Bopche (National Institute of Technology Tiruchirappalli, India) Deepnarayan Tiwari (National Payments Corporation of India (NCPI), India) Gopal N. Rai (Collins Aerospace India (Pvt.) Limited, India)

  3. crossTrustChain: Cross-Chain Interoperability using Multivariate Trust Models
    Dhruv Avinash Patel (IIT Jodhpur, India) Harsh Anand (IIT Jodhpur, India) Suchetana Chakraborty (Indian Institute of Technology Jodhpur, India)

  4. Detecting Sensitive Information from Unstructured Text in a Data-Constrained Environment
    Saurabh Anand (Tata Consultancy Services, India) Manish Shukla (TCS Innovation Labs - TRDDC, India) Sachin Lodha (Tata Research Development and Design Centre, India)

  5. Health Assessment of 1485 Top Level Domain's Name Servers
    Sanjay Adiwal (CDAC Bangalore, India) Balaji Rajendran (Centre for Development of Advanced Computing, India) Pushparaj Shetty D (National Institute of Technology Karnataka Surathkal & NITK Surathkal, India) Sithu D Sudarsan (CDAC Bangalore, India)

  6. Investigating IoT Systems Security Attacks using Network Forensics
    Ayushi Mishra (Indian Institute of Technology, Kanpur, India) Priyanka Bagade (IIT KANPUR, India)

  7. Moving-Target-Defense based Security Mechanisms: A System Management Perspective
    Kaliappa Ravindran (City University of New York, USA) Michael Iannelli (City University of New York (CUNY - City Colllege), USA) Arun Adiththan (General Motors, USA)

  8. MyoChain: A Blockchain Protocol for Delay Bounded Transaction Confirmation
    Aditya Ahuja (Indian Institute of Technology Delhi, India) Vigneswaran R (Tata Consultancy Services, India) Rajan M A (Tata Consultancy Services, India) Sachin Lodha (Tata Research Development and Design Centre, India)

  9. Practical Coded Sharding for Blockchains
    Kanchi Gopinath (Indian Institute of Science, India) Nilesh Rathi (IISc, India)

  10. ProFace: A Cancelable Face Template Protection Approach
    Surabhi Garg (TATA Consultancy Services, India) Arun Kumar Jindal (TATA Consultancy Services, India) Rajan M A (Tata Consultancy Services, India) Srinivasa Rao Chalamala (TATA Consultancy Services Ltd & IIIT Hyderabad, India)

  11. RcAMA - An Recursive Composition Algebra-based Framework for Detection of Multistage Attacks
    Ghanshyam Bopche (National Institute of Technology Tiruchirappalli, India) Gopal N. Rai (Collins Aerospace India (Pvt.) Limited, Hyderabad, India) Deepnarayan Tiwari (National Payments Corporation of India (NPCI), India)

  12. Secure Onboarding and Management of Electronic Shelf Labels in Retail
    Giridhar Mandyam (Qualcomm, USA) Mauro Scagnol (Qualcomm Technologies International Ltd, United Kingdom (Great Britain)) Nicolas Graube (Qualcomm Technologies International Ltd, United Kingdom (Great Britain))

  13. State of Internet Privacy and Tales of ECH-TLS
    Manjesh K Hanawal (Indian Institute of Technology Bombay, India) Sameer G Kulkarni (Indian Institute of Technology, Gandhinagar, India) Vinod S Khandkar (Indian Institute of Technology Bombay, India)


Call for Papers

The Cyber Security and Privacy (CSP) Workshop will be held in conjunction with the annual COMSNETS conference on January 4, 2023. This workshop is intended to be a forum where researchers can meet and discuss the latest in cyber security and privacy topics as they apply to communications systems. Security and Privacy researchers and professionals from government, industry and academia are invited to propose and present original work in the following topics (or related areas):

  • Authentication, authorization, and accounting
  • Information Security protocols and architectures
  • Security in wired, mobile and wireless communications
  • Security in grid/cloud/pervasive computing
  • Network Intrusion Detection and Prevention, firewalls, packet filters
  • Public Key Infrastructures, key management, credential management
  • Network and internet forensics techniques
  • Secure routing and security management
  • Malware, botnets, etc.
  • Embedded system security
  • Security in parallel and distributed systems
  • Blockchain and distributed ledger technologies
  • Security and privacy policies
  • Anonymous communication and censorship resistance
  • Security and privacy for e-commerce/m-commerce
  • Security and privacy in social networks
  • AI security and privacy
  • Internet of Things security and privacy
  • Mobile devices security and privacy
  • Web security and privacy

Researchers are invited to submit papers based on original work in these and other topics related to cyber security and privacy.


Submission Guidelines

  • The Cyber Security and Privacy Workshop invites submission of original work, not previously published, or under review at another conference or journal.
  • Submissions (including title, author list, abstract, all figures, tables, and references) should not exceed 6 pages in length. A minimum number of 3 pages are required.
  • Reviews will be single-blind: authors name and affiliation should be included in the submission.
  • Submissions must follow the formatting guidelines as given on IEEE Website; and those that do not meet the size and formatting requirements will not be reviewed.
  • All papers must be in Adobe Portable Document Format (PDF) and submitted through the CSP Workshop submission site on EDAS - https://edas.info/N29762 .
  • All workshop papers (full papers - both regular and invited) will appear in conference proceedings and submitted to IEEE Xplore as well as other Abstracting and Indexing (A&I) databases.

Program Committee

  • Zubair Baig , Deakin University, Australia
  • Sitaram Chamarty, TCS Research, India
  • Ernest Foo , Griffith University, Australia
  • Praveen Gauravaram, TCS Research, Australia
  • Kanchi Gopinath , IISc, India
  • Vireshwar Kumar, IIT Delhi
  • Shantanu Pal, Deakin University, Australia
  • Souradyuti Paul, IIT, Bhilai
  • Somitra Sanadhya , IIT Jodhpur

Workshop Co-Chairs

Yuval Elovici

Yuval Elovici

Ben-Gurion University of the Negev, Israel

Sachin Lodha

Sachin Lodha

TCS Research, India