Cyber Security and Privacy Workshop
Event Date: Wedesday, 4 January 2023
Important Dates
Paper Submission Deadline | |
Notification of Acceptance | |
Camera-ready Submission | |
Workshop Date | 4th January 2023 |
Schedule
Wedesday, 4 January 2023 | ||
Venue: SIGMA 1 | ||
Time | Title | Speaker/Authors |
Session 1: Security | ||
10:00-11:00 | Keynote Talk: Security of Critical Cyber Physical Systems: A C3i Hub Perspective | Sandeep K. Shukla |
11:00-11:30 | Tea break | |
11:30-11:50 | Moving-Target-Defense based Security Mechanisms: A System Management Perspective | Kaliappa Ravindran; Michael Iannelli; Arun Adiththan |
11:50-12.10 | Boolean Similarity Measure for Assessing Temporal Variation in the Network Attack Surface | Ghanshyam Bopche; Deepnarayan Tiwari; Gopal N. Rai |
12:10-12:30 | RcAMA - An Recursive Composition Algebra-based Framework for Detection of Multistage Attacks | Ghanshyam Bopche; Gopal N. Rai; Deepnarayan Tiwari |
12:30-12:50 | Health Assessment of 1485 Top Level Domain's Name Servers | Sanjay Adiwal; Balaji Rajendran; Pushparaj Shetty D; Sithu D Sudarsan |
12:50-1:10 | Investigating IoT Systems Security Attacks using Network Forensics | Ayushi Mishra; Priyanka Bagade |
1:10-2:00 | Lunch | |
Session 2: Blockchain | ||
2:00-2:20 | Secure Onboarding and Management of Electronic Shelf Labels in Retail | Giridhar Mandyam; Mauro Scagnol; Nicolas Graube |
2:20-2:40 | Practical Coded Sharding for Blockchains | Kanchi Gopinath; Nilesh Rathi |
2:40-3:00 | MyoChain: A Blockchain Protocol for Delay Bounded Transaction Confirmation | Aditya Ahuja; Vigneswaran R; Rajan M A; Sachin Lodha |
3:00-3:20 | crossTrustChain: Cross-Chain Interoperability using Multivariate Trust Models | Dhruv Avinash Patel; Harsh Anand; Suchetana Chakraborty |
3:20-3:40 | A ZK-SNARK based Proof of Assets Protocol for Bitcoin Exchanges | Swaroopa Reddy |
3:40-4:00 | Tea break | |
Session 3: Privacy | ||
4:00-4:20 | ProFace: A Cancelable Face Template Protection Approach | Surabhi Garg; Arun Kumar Jindal; Rajan M A; Srinivasa Rao Chalamala |
4:20-4:40 | Detecting Sensitive Information from Unstructured Text in a Data-Constrained Environment | Saurabh Anand; Manish Shukla; Sachin Lodha |
4:40-5:00 | State of Internet Privacy and Tales of ECH-TLS | Manjesh K Hanawal; Sameer G Kulkarni; Vinod S Khandkar |
5:00-6:00 | Panel | Sandeep K. Shukla; Salil Kanhere; Mridula Singh; Tulika Pandey; Sachin Lodha |
Keynote speakers
C3i Hub is a technology innovation hub funded by the Department of Science of Technology, Government of India -- with the charter for research, training, innovation and incubation in the field of cyber physical systems security. Examples of Critical Cyber Physical systems include the power grid, transportation automation, factory automation, water and sewage plants, oil and gas pipelines etc. Due to increased cyber threats from nation state actors and terrorist groups and various incidents around the world, security of these cyber physical systems are of particular importance. C3i Hub has been working on this frontier aspect of cyber security research, providing training and incubating startups so as to create indigenous innovation, and industry in the field of cyber security of cyber physical systems. In this talk, we will discuss the critical cyber physical system security in general and then discuss the activities of C3i Hub towards indigenous cyber security ecosystem development in this field.
Professor Sandeep K. Shukla is an IEEE fellow, and ACM Distinguished Scientist. He is currently a professor of Computer Science and Engineering department at IIT Kanpur which he headed during 2017-2020. He was the editor in chief of the ACM Transactions on Embedded Computing Systems during 2013-2020. He is currently associate editors of ACM Transactions on Cyber Physical Systems, and Journal of the British Blockchain Association. In the past Prof. Shukla has served as associate editors of IEEE Transactions on Computers, IEEE Transactions on Industrial Informatics, IEEE Design and Test, and IEEE Embedded Systems Letters. Before joining IIT Kanpur in 2015, he was a professor at Virginia Tech, USA. He served as ACM Distinguished Speaker, and IEEE Computer Society Distinguished Visitor in the past. Prof. Shukla has authored over 200 peer reviewed journal and conference papers and authored/edited 10 books. He was awarded the Presidential Early Career Award in Science and Engineering (PECASE) in 2004, The Bessel Award by Humboldt Foundation in 2009, a Distinguished Alumnus Award by SUNY Albany in 2007, a Ramanujan Fellowship in 2015. Prof. Shukla’s major research interests are Cyber Security of Critical Infrastructures, Cyber Security of IT/OT systems, and Applications of Blockchain Technology in Security and Privacy.
Panel Discussion on Cybersecurity Research: Crystal-gazing Cybersecurity and Privacy for T20s
Panelists
Sandeep K. Shukla
IIT Kanpur, IndiaProfessor Sandeep K. Shukla is an IEEE fellow, and ACM Distinguished Scientist. He is currently a professor of Computer Science and Engineering department at IIT Kanpur which he headed during 2017-2020. He was the editor in chief of the ACM Transactions on Embedded Computing Systems during 2013-2020. He is currently associate editors of ACM Transactions on Cyber Physical Systems, and Journal of the British Blockchain Association. In the past Prof. Shukla has served as associate editors of IEEE Transactions on Computers, IEEE Transactions on Industrial Informatics, IEEE Design and Test, and IEEE Embedded Systems Letters. Before joining IIT Kanpur in 2015, he was a professor at Virginia Tech, USA. He served as ACM Distinguished Speaker, and IEEE Computer Society Distinguished Visitor in the past. Prof. Shukla has authored over 200 peer reviewed journal and conference papers and authored/edited 10 books. He was awarded the Presidential Early Career Award in Science and Engineering (PECASE) in 2004, The Bessel Award by Humboldt Foundation in 2009, a Distinguished Alumnus Award by SUNY Albany in 2007, a Ramanujan Fellowship in 2015. Prof. Shukla’s major research interests are Cyber Security of Critical Infrastructures, Cyber Security of IT/OT systems, and Applications of Blockchain Technology in Security and Privacy.
Salil Kanhere
UNSW, Sydney, AustraliaSalil Kanhere is a Professor in the School of Computer Science and Engineering at UNSW Sydney, where he leads the Information Security and Privacy Research Group (IsPri). He is also affiliated with the UNSW Institute for Cyber Security (IFCYBER). His research is broadly at the intersection of cybersecurity, distributed computing, cyber-physical and IoT systems and pervasive computing. He has co-authored more than 300 peer-reviewed articles on these topics and has received 8 best paper awards. Salil received the Friedrich Wilhelm Bessel Research Award (2020) and the Humboldt Research Fellowship (2014), both from the Alexander von Humboldt Foundation in Germany. He has held visiting positions at I2R Singapore, Technical University Darmstadt, University of Zurich, Graz University of Technology and RWTH Aachen. He is a Senior Member of the IEEE and ACM, an ACM Distinguished Speaker, and an IEEE Computer Society Distinguished Visitor. He serves as the Editor in Chief of the Ad Hoc Networks journal and as an Associate Editor of IEEE Transactions on Network and Service Management, Computer Communications, and Pervasive and Mobile Computing. He has served as General Chair and Program Chair for several IEEE/ACM international conferences and is on the advisory board of three SMEs. Salil co-authored a book titled Blockchain for Cyberphysical Systems published by Artech House.
Mridula Singh
CISPA, GermanyMridula Singh is (tenure-track) Faculty at CISPA – Helmholtz Center for Information Security in Saarbrucken, Germany. Her research interests are primarily in the areas of Systems Security, Wireless Networks, and Ubiquitous Computing. She is currently exploring various aspects of wireless and security to design secure autonomous systems. She pursued Ph.D. in Computer Science from ETH Zurich, Switzerland. The work she did during her Ph.D. is instrumental in enabling secure passive keyless entry and start systems of various car models. She holds an M.Tech degree with a specialization in Mobile and Ubiquitous Computing from IIIT-Delhi. She co-founded Trishulam while pursuing her master's degree. She worked as a research engineer at Xerox Research Center India, where she was involved in smart transportation and healthcare projects.
Moderator
Sachin Lodha
TCS Research, India
Sachin Lodha is part of TCS's Corporate Research and Innovation team and heads its Cybersecurity and Privacy research that is working on diverse problems pertaining to trustworthy AI, de-risking cloud, securing IoT, privacy by design, and human aspects. He has special interest in data privacy and related topics. His efforts on that front have led to multiple research papers, patents, and award-winning innovations that are available as commercial TCS products.
Sachin Lodha is a member of ACM India Council, ACM India’s Cybersecurity Task Force, TCS’s own Cybersecurity Task Force, and the Working Group for drafting the guidelines on “Anonymization of Data” under the project “e-Governance Standards and Guidelines” supported by MeitY, Government of India. Previously he was a member of the Cyber4AI Task Force constituted with due approval of Prof K VijayRaghavan, Principal Scientific Advisor to Government of India, and the Steering Committee for India wide Lightweight Cipher Design Challenge launched by National Centre of Excellence for Cybersecurity Technology Development and Entrepreneurship. He is also an ACM India Eminent Speaker.
Accepted Papers
- A ZK-SNARK based Proof of Assets Protocol for Bitcoin Exchanges
Swaroopa Reddy (IIT Hyderabad, India) - Boolean Similarity Measure for Assessing Temporal Variation in the Network Attack Surface
Ghanshyam Bopche (National Institute of Technology Tiruchirappalli, India) Deepnarayan Tiwari (National Payments Corporation of India (NCPI), India) Gopal N. Rai (Collins Aerospace India (Pvt.) Limited, India) - crossTrustChain: Cross-Chain Interoperability using Multivariate Trust Models
Dhruv Avinash Patel (IIT Jodhpur, India) Harsh Anand (IIT Jodhpur, India) Suchetana Chakraborty (Indian Institute of Technology Jodhpur, India) - Detecting Sensitive Information from Unstructured Text in a Data-Constrained Environment
Saurabh Anand (Tata Consultancy Services, India) Manish Shukla (TCS Innovation Labs - TRDDC, India) Sachin Lodha (Tata Research Development and Design Centre, India) - Health Assessment of 1485 Top Level Domain's Name Servers
Sanjay Adiwal (CDAC Bangalore, India) Balaji Rajendran (Centre for Development of Advanced Computing, India) Pushparaj Shetty D (National Institute of Technology Karnataka Surathkal & NITK Surathkal, India) Sithu D Sudarsan (CDAC Bangalore, India) - Investigating IoT Systems Security Attacks using Network Forensics
Ayushi Mishra (Indian Institute of Technology, Kanpur, India) Priyanka Bagade (IIT KANPUR, India) - Moving-Target-Defense based Security Mechanisms: A System Management Perspective
Kaliappa Ravindran (City University of New York, USA) Michael Iannelli (City University of New York (CUNY - City Colllege), USA) Arun Adiththan (General Motors, USA) - MyoChain: A Blockchain Protocol for Delay Bounded Transaction Confirmation
Aditya Ahuja (Indian Institute of Technology Delhi, India) Vigneswaran R (Tata Consultancy Services, India) Rajan M A (Tata Consultancy Services, India) Sachin Lodha (Tata Research Development and Design Centre, India) - Practical Coded Sharding for Blockchains
Kanchi Gopinath (Indian Institute of Science, India) Nilesh Rathi (IISc, India) - ProFace: A Cancelable Face Template Protection Approach
Surabhi Garg (TATA Consultancy Services, India) Arun Kumar Jindal (TATA Consultancy Services, India) Rajan M A (Tata Consultancy Services, India) Srinivasa Rao Chalamala (TATA Consultancy Services Ltd & IIIT Hyderabad, India) - RcAMA - An Recursive Composition Algebra-based Framework for Detection of Multistage Attacks
Ghanshyam Bopche (National Institute of Technology Tiruchirappalli, India) Gopal N. Rai (Collins Aerospace India (Pvt.) Limited, Hyderabad, India) Deepnarayan Tiwari (National Payments Corporation of India (NPCI), India) - Secure Onboarding and Management of Electronic Shelf Labels in Retail
Giridhar Mandyam (Qualcomm, USA) Mauro Scagnol (Qualcomm Technologies International Ltd, United Kingdom (Great Britain)) Nicolas Graube (Qualcomm Technologies International Ltd, United Kingdom (Great Britain)) - State of Internet Privacy and Tales of ECH-TLS
Manjesh K Hanawal (Indian Institute of Technology Bombay, India) Sameer G Kulkarni (Indian Institute of Technology, Gandhinagar, India) Vinod S Khandkar (Indian Institute of Technology Bombay, India)
Call for Papers
The Cyber Security and Privacy (CSP) Workshop will be held in conjunction with the annual COMSNETS conference on January 4, 2023. This workshop is intended to be a forum where researchers can meet and discuss the latest in cyber security and privacy topics as they apply to communications systems. Security and Privacy researchers and professionals from government, industry and academia are invited to propose and present original work in the following topics (or related areas):
- Authentication, authorization, and accounting
- Information Security protocols and architectures
- Security in wired, mobile and wireless communications
- Security in grid/cloud/pervasive computing
- Network Intrusion Detection and Prevention, firewalls, packet filters
- Public Key Infrastructures, key management, credential management
- Network and internet forensics techniques
- Secure routing and security management
- Malware, botnets, etc.
- Embedded system security
- Security in parallel and distributed systems
- Blockchain and distributed ledger technologies
- Security and privacy policies
- Anonymous communication and censorship resistance
- Security and privacy for e-commerce/m-commerce
- Security and privacy in social networks
- AI security and privacy
- Internet of Things security and privacy
- Mobile devices security and privacy
- Web security and privacy
Researchers are invited to submit papers based on original work in these and other topics related to cyber security and privacy.
Submission Guidelines
- The Cyber Security and Privacy Workshop invites submission of original work, not previously published, or under review at another conference or journal.
- Submissions (including title, author list, abstract, all figures, tables, and references) should not exceed 6 pages in length. A minimum number of 3 pages are required.
- Reviews will be single-blind: authors name and affiliation should be included in the submission.
- Submissions must follow the formatting guidelines as given on IEEE Website; and those that do not meet the size and formatting requirements will not be reviewed.
- All papers must be in Adobe Portable Document Format (PDF) and submitted through the CSP Workshop submission site on EDAS - https://edas.info/N29762 .
- All workshop papers (full papers - both regular and invited) will appear in conference proceedings and submitted to IEEE Xplore as well as other Abstracting and Indexing (A&I) databases.
Program Committee
- Zubair Baig , Deakin University, Australia
- Sitaram Chamarty, TCS Research, India
- Ernest Foo , Griffith University, Australia
- Praveen Gauravaram, TCS Research, Australia
- Kanchi Gopinath , IISc, India
- Vireshwar Kumar, IIT Delhi
- Shantanu Pal, Deakin University, Australia
- Souradyuti Paul, IIT, Bhilai
- Somitra Sanadhya , IIT Jodhpur