Upload
swasti-bhushan-deb
View
219
Download
3
Tags:
Embed Size (px)
DESCRIPTION
Conference ICISS 2014 agenda
Citation preview
Institute for Development and Research in Banking Technology (Established by Reserve Bank of India)
Tenth International Conference on Information Systems Security
ICISS – 2014 IDRBT Hyderabad
18 – 20 December 2014
Venue: IDRBT Auditorium
Conference Day I – Thursday Dec 18
0900 – 1000 hrs : Registration
INAUGURAL SESSION
1000 – 1010 hrs : Welcome Address
A.S. Ramasastri, Director, IDRBT
1010 – 1020 hrs : General Chairs
Venu Govindaraju, B M Mehtre
1010 – 1020 hrs : Programme Chairs
Atul Prakash and R Shyamasundar
1020 – 1100 hrs : Inaugural address
Chief Guest. Dr. C. Rangarajan
1100 – 1105 hrs : Vote of Thanks
B.M. Mehtre
1105 – 1130 hrs : Tea Break
Plenary Session – 1
Session Chair: Venu Govindaraju, SUNY, Buffalo
1130– 1230 hrs : Key Note 1
Adversarial and Uncertain Reasoning for Adaptive Cyber Defense: Building the Scientific Foundation
Sushil Jajodia, George Mason University, USA
1230 – 1330 hrs : Lunch Break (Venue: IDRBT Lawns)
Technical Session – I
Security Inferences Session Chair: Ashok K Agarwal, CSI, Hyderabad
1330 – 1400 hrs : Inference-Proof Data Publishing by Minimally Weakening a Database Instance
Joachim Biskup and Marcel Preuß
1400 – 1430 hrs : Extending Dolev-Yao with assertions
R. Ramanujam, Vaishnavi Sundararajan and S P Suresh
1430 – 1500 hrs : Inferring Accountability from Trust Perceptions
Koen Decroix, Denis Butin, Joachim Jansen and Vincent Naessens
1500 – 1530 hrs
:
Client Side Web Session Integrity as a Non-Interference Property (25+5Min)
Wilayat Khan, Stefano Calzavara, Michele Bugliesi, Willem De Groef and
Frank Piessens
Technical Session - II
Location based Security Services Session Chair: S K Udgata, University of Hyderabad
1530 – 1600 hrs :
Preserving Privacy in Location-Based Services using Sudoku Structures
Sumitra Biswal, Goutam Paul and Shashwat Raizada
1600 – 1615 hrs : Location Obfuscation Framework for Training-Free Localization System (SHORT PAPER)
Thong M. Doan, Han .N Dinh, Nam T. Nguyen and Phuoc T. Tran
PhD Forum Presentations (Venue: IDRBT Conference Hall – 205)
Chair: V.N. Sastry, IDRBT
1530 – 1600 hrs
1530 – 1700 hrs
:
End to End Secure Data Aggregation in Wireless Sensor Networks
Keyur Parmer, Doctoral Student, NIT, Surat
1600 – 1630 hrs : Automatic Authentication of Printed Security Documents
Biswajit Halder, Doctoral Student, University of Burdwan
1630 – 1700 hrs : Intrusion Detection Mechanisms for P2P Networks
Pratik Narang, Doctoral Student, BITS, Hyderabad
Business Meeting Session Chair: Sushil Jajodia
1700 – 1710 hrs : Opening Remarks
Sushil Jajodia
Von
1710 – 1750 hrs : Bid Presentation
MNIT, Jaipur
Conference Day II – Friday Dec 19 Plenary Session – 2
Session Chair: B.M. Mehtre, IDRBT
0930 – 1030 hrs : Key Note 2 The Bug that Bites
Herbert Bos, Vrije Universiteit Amsterdam , The Netherlands
1030 – 1100 hrs : Tea Break
Technical Session – III
Security Policies Session Chair: Koduri Srinivas, IEEE, Hyderabad
1100 – 1130 hrs : Impact of Multiple t-t SMER Constraints on Minimum User Requirement in RBAC,
Arindam Roy, Shamik Sural and Arun Kumar Majumdar
1130 – 1200 hrs : Temporal RBAC Security Analysis using Logic Programming in the Presence of Administrative Policies
Sadhana Jha, Shamik Sural, Jaideep Vaidya and Vijayalakshmi Atluri
1200 – 1230 hrs : A Formal Methodology for Modeling Threats to Enterprise Assets
Jaya Bhattacharjee, Anirban Sengupta and Chandan Mazumdar
1230 – 1300 hrs : A Novel Approach for Searchable CP-ABE with Hidden Ciphertext-Policy Mukti Padhya and Devesh Jinwala
1300 – 1400 hrs : Lunch Break (Venue: IDRBT Lawns)
Plenary Session – 3
Session Chair: Atul Prakash, University of Michigan
1400 – 1500 hrs : Key Note 3 SNIPS: A Software-Defined Approach for Scaling Intrusion Prevention
Systems via Offloading
Vyas Sekar, Carnegie Mellon University, USA
1500 – 1530 hrs : Break
Technical Session – IV
Forensics
Session Chair: Chandan Mazumdar, Jadavpur University, Kolkata
1530 – 1600 hrs : Analysis of fluorescent paper pulps for detecting Counterfeit Indian paper money Biswajit Halder, Rajkumar Darbar, Utpal Garain and Abhoy Ch. Mondal
1600 – 1615 hrs : A Vein Biometric based Authentication System (SHORT PAPER)
Puneet Gupta and Phalguni Gupta
1615 – 1630 hrs : Digital Forensic Technique for Double Compression based JPEG Image Forgery
Detection (SHORT PAPER)
Pankaj Malviya and Ruchira Naskar
Technical Session – V (Venue: IDRBT Conference Hall – 205)
Security User Interfaces
Session Chair: Vijay Atluri, Rutgers University, USA
1630 – 1700 hrs : Towards a more democratic mining in Bitcoins
Goutam Paul, Pratik Sarkar and Sarbajit Mukherjee
1700 – 1730 hrs : Basic Research on Graphical Authentication
Peter Mayer, Melanie Volkamer and Michaela Kauer
1730 – 1800 hrs : Security Extension Providing User Anonymity and Relaxed Trust Requirement in Non-3GPP Access to The EPS
Hiten Choudhury, Basav Roychoudhury and Dilip Saikia
1800 – 1815 hrs : A Usage-Pattern Perspective for Privacy Ranking of Android Apps
(SHORT PAPER)
Xiaolei Li, Xinshu Dong and Zhenkai Liang
1815 – 1900 hrs : Break
1900 – 2000 hrs : Cultural Programme
2000 onwards : Conference Dinner (Venue: IDRBT Lawns)
Conference Day III – Saturday Dec 20 Plenary Session – 4
Session Chair: R K Shyamasundar, TIFR
0930 – 1030 hrs : Key Note 4
Application Architectures for Critical Data Isolation
Zhenkai Liang, National University of Singapore
1030 – 1100 hrs : Break
Technical Session – VI
Security Attacks
Session Chair: M B Srinivas, BITS Hyderabad
1100 – 1130 hrs : Privacy Leakage Attacks in Browsers by Colluding Extensions
Anil Saini, Manoj Gaur, Vijay Laxmi, Tushar Singhal and Mauro Conti
1130 – 1200 hrs : CORP: A browser policy to mitigate web inltration attacks
Krishna Telikicherla, Venkatesh Choppella and Bruhadeshwar Bezawada
1200 – 1230 hrs : An Improved Methodology Towards Providing Immunity Against Weak Shoulder
Surfing Attack
Nilesh Chakraborty and Samrat Mondal
1230 – 1300 hrs : Catching Classical and Hijack-based Phishing Attacks
Tanmay Thakur and Rakesh Verma
1300 – 1400 hrs : Lunch Break (Venue: IDRBT Lawns)
Technical Session – VII
Malware Detection
Session Chair: Arun Agarwal, University of Hyderabad
1400 – 1430 hrs : PMDS: Permission-based Malware Detection System
Paolo Rovelli and Ýmir Vigfússon
1430 – 1500 hrs : Efficient Detection of Multi-step Cross-Site Scripting Vulnerabilities
Alexandre Vernotte, Frederic Dadeau, Franck Lebeau, Bruno Legeard, Fabieneureux and François Piat
1500 – 1530 hrs : CliSeAu: Securing Distributed Java Programs by Cooperative Dynamic Enforcement
Richard Gay, Jinwei Hu and Heiko Mantel
1530 – 1545 hrs : Automatic Generation of Compact Alphanumeric Shellcodes for x86 (SHORT PAPER)
Aditya Basu, Anish Mathuria and Nagendra Chowdary
1545 – 1600 hrs : Valedictory Session
Awards Participants Feedback
1600 hrs : Close