Conference Agenda

Note:

-         All times in the program are in British Summer Time (BST) time zone.

-         Participants are on their own for breakfast.

-         For remote attendees, please follow either way below to join the WebEx virtual meetings

1.     Access the WebEx meeting of the day by clicking on the Meeting link that will be sent to you via an email from the conference organisers on 21 June 2022

Or

2.     Access the WebEx meeting of the day by entering the Meeting number

1)     Click on https://signin.webex.com/join

2)     Enter the Meeting number of the day, which can be found on the conference agenda below

3)     Submit the respective Meeting password that will be sent to you via an email from the conference organisers on 21 June 2022

 

 

Day 1 – 22nd June 2022 (WebEx Meeting number: 2670 966 2144)

8:30 – 9:30

Registration

9:30 - 10:00

Grant Opening

10:00- 11:00

Keynote Speech 1

Chair: Pooneh Bagheri Zadeh

Title: Deep Learning-based Side-channel Analysis: Lessons Learned and Challenges to be Addressed

Associate Prof. Stjepan Picek (Radboud University)

11:00 – 11:30

Coffee Break & SICSA Poster Exhibition

11:30 – 12:30

 

 

Session 1 - SICSA Regular Papers

Session Chair: Naghmeh Moradpoor

A Digital Forensics Live Suspicious Activity Toolkit to assist investigators with Sexual Harm Prevention Order monitoring

Andrew Scholey and Pooneh Bagheri Zadeh (Leeds Beckett University)

A Novel Chaos-based Light-weight Image Encryption Scheme for Multi-modal Hearing Aids

Awais Aziz Shah (Edinburgh Napier University), Ahsan Adeel (University of Wolverhampton), Jawad Ahmad (Edinburgh Napier University), Ahmed Al-Dubai (Edinburgh Napier University), Mandar Gogate (Edinburgh Napier University), Abhijeet Bishnu, Muhammad Diyan (Edinburgh Napier University), Tassadaq Hussain (Edinburgh Napier University), Kia Dashtipour (Edinburgh Napier University), Tharm Ratnarajah (University of Edinburgh) and Amir Hussain (Edinburgh Napier University)

A Generative Neural Network for Enhancing Android Metamorphic Malware Detection based on Behaviour Profiling

Leigh Turnbull, Zhiyuan Tan and Kehinde Babaagba (Edinburgh Napier University)

12:30 – 13:30

Lunch & SICSA Poster Exhibition

13:30 – 15:30

Session 2 - PASS4IoT 2022

Session Chair: Belinda Onyeashie

LAEG: Leak-based AEG using Dynamic Binary Analysis to Defeat ASLR

Wei-Loon Mow (National Taiwan University), Shih-Kun Huang (National Yang Ming Chiao Tung University) and Hsu-Chun Hsiao (National Taiwan University)

Shodan Indicators used to Detect Standard Conpot Implementations and their Improvement through Sophisticated Customisation

Warren Cabral, Leslie Sikos and Craig Valli (Edith Cowan University)

Optimising user security recommendations for AI-powered smart-homes

Emma Scott, Sakshyam Panda, George Loukas and Emmanouil Panaousis (University of Greenwich)

Enabling Device Trustworthiness for SDN-Enabled Internet-of-Battlefield Things

Abel Osvaldo Gomez Rivera (University of Texas at El Paso), Evan White (University of Texas at El Paso), Jaime Acosta (CCDC Army Research Laboratory) and Deepak Tosh (University of Texas at El Paso)

Cache Locking and Encryption to Prevent Memory Snooping in Embedded Systems

Jason Dejesus and John Chandy (University of Connecticut)

An Engineering Process Framework for Cybersecurity Incident Response Assessment

Robert L. Freas (Texas A&M University - Commerce/RELLIS), Heather F. Adair (Sam Houston State University) and Eman Hammad (Texas A&M University - Commerce/RELLIS)

15:30 – 16:00

Coffee Break & SICSA Poster Exhibition

16:00 – 17:00

Session 3 -SECSOC-2022

Session Chair: Kehinde Oluwatoyin Babaagba

A Low Cost Blockchain-Based Framework for Preserving Critical Data in Health-Care IoT Systems Using Classification

Kareem Abu Raad, Heba Takruri Tamemi, Manar Rabayah, Mai Kanaan and Ahmed Awad (An-Najah National University)

Network Intrusion Detection in Encrypted Traffic

Eva Papadogiannaki (FORTH-ICS), Giorgos Tsirantonakis (FORTH-ICS) and Sotiris Ioannidis (Technical University of Crete)

Defending OC-SVM based IDS from poisoning attacks

Lu Zhang, Reginald Cushing and Paola Grosso (University of Amsterdam)

19:30 – 21:30

Conference Reception

 

Day 1 – 22nd June 2022 – SICSA Poster Exhibition

SICSA Posters

(11:00 – 11:30, 12:30 – 13:30, 15:30 – 16:00)

Session Chair: Naghmeh Moradpoor

ELSA: Edge Lightweight Searchable Attribute-based encryption Multi-keyword Scalability

Jawhara Aljabri, Anna Lito Michala and Jeremy Singer (University of Glasgow)

Automated Anomaly Detection Tool for Industrial Control System

Mariam Varkey (Abertay University), Jacob John (Grofers India Pvt Ltd) and Umadevi K. S. (Vellore Institute of Technology)

Facilitating Deep Learning for Edge Computing: A Case Study on Data Classification

Abdullah Alsalemi (De Montfort University), Abbes Amira (University of Sharjah), Hossein Malekmohamadi (De Montfort University), and Kegong Diao (De Montfort University)

 


Day 2 – 23rd June 2022 (WebEx Meeting number: 2672 336 6572)

8:30 – 9:00

Registration

9:00 - 10:00

Keynote Speech 2

Chair: Zhiyuan Tan

Title: Deep Learning Platform for B5G Mobile Network

Prof. Han-Chieh Chao (National Dong Hwa University)

10:00 - 11:00

Session 4 - IEEE DSC 2022 – Cryptographic Methods and Toolkits

Session Chair: Shufan Yang

Symbolon: Enabling Flexible Multi-device-based User Authentication

Thalia Laing (HP Labs), Eduard Marin (Telefonica Research), Mark Ryan (University of Birmingham), Joshua Schiffman (HP Labs) and Gaëtan Wattiau (Decentriq)

Securing Password Authentication for Web-based Applications

Teik Guan Tan (Singapore University of Technology and Design), Pawel Szalachowski (Singapore University of Technology and Design) and Jianying Zhou (Singapore University of Technology and Design)

FREED: An Efficient Privacy-Preserving Solution for Person Re-Identification

Bowen Zhao (Singapore Management University), Yingjiu Li (University of Oregon), Ximeng Liu (Fuzhou University), Hwee Hwa Pang (Singapore Management University) and Robert Deng (Singapore Management University)

11:00 – 11:30

Coffee Break

11:30 – 12:30

Keynote Speech 3

Chair: Zhiyuan Tan

Title: The Promise of Decentralization – Cyber-Security Myth or Revolution?

Prof. KIAYIAS Aggelos (University of Edinburgh)

12:30 – 13:30

Lunch

13:30 - 14:30

Session 5 - IEEE DSC 2022 - Cryptographic Methods and Fault-Tolerant Designs

Session Chair: Spyridon Mastorakis

Protecting White-Box Block Ciphers with Galois/Counter Mode

Nanjiang Xie (South China Normal University), Zheng Gong (South China Normal University), Yufeng Tang (South China Normal University), Lei Wang (South China Normal University) and Yamin Wen (Guangdong University of Finance and Economics)

High Speed Encrypted Computing: Stochastic Confusion and Lies in a Secret Computer

Peter T. Breuer (Hecusys LLC)

Device-to-Device Task Offloading in a Stochastic Invalid-Device Scenario with Social Awareness

Mingchu Li (Dalian University of Technology), Linlin Yang (Dalian University of Technology), Kun Lu (Dalian University of Technology), Syed Bilal Hussain Shah (Manchester Metropolitan University) and Xiao Zheng (Shandong University of Technology)

14:30 – 15:30

Session 6 - IEEE DSC 2022 - Botnet and Intrusion Detection

Session Chair: Belinda Onyeashie

IoT Botnet Detection Based on the Behaviors of DNS Queries

Chun-I Fan (National Sun Yat-sen University), Cheng-Han Shie (National Sun Yat-sen University), Che-Ming Hsu (National Sun Yat-sen University), Tao Ban (National Institute of Information and Communications Technology), Tomohiro Morikawa (National Institute of Information and Communications Technology, Saitama Institute of Technology) and Takeshi Takahashi (National Institute of Information and Communications Technology)

Clustering-Based Network Intrusion Detection System

Chun-I Fan (National Sun Yat-sen University), Yen-Lin Lai (National Sun Yat-sen University) and Cheng-Han Shie (National Sun Yat-sen University)

Curse of System Complexity and Virtue of Operational Invariants: Machine Learning based System Modeling and Attack Detection in CPS

Muhammad Omer Shahid (CUST), Chuadhry Mujeeb Ahmed (University of Strathclyde), Venkata Reddy Palleti (IIPE-Visakhapatnam) and Jianying Zhou (SUTD)

15:30 – 16:00

Coffee Break

16:00 – 17:20

Session 7 - Invited Papers

Session Chair: Talal Halabi

Cyber Security Risks of Net Zero Technologies

Haiyue Yuan and Shujun Li (University of Kent)

Capturing Malware Behaviour with Ontology-based Knowledge Graphs

Ipshita Roy Chowdhury and Deepayan Bhowmik (University of Stirling)

A Survey on Explainable Anomaly Detection for Industrial Internet of Things

Zijie Huang and Yulei Wu (University of Exeter)

Towards a Secure Multi-agent Deep Reinforcement Learning Computing: Adversarial Attacks and Countermeasures

Changgang Zheng (University of Oxford), Chen Zhen (University of Science and Technology of China), Yonghai Xie (University of Science and Technology of China) and Shufan Yang (Edinburgh Napier University)

19:30 – 21:30

Conference Banquet

 

 

Day 3 – 24th June 2022(WebEx Meeting number: 2674 896 5841)

8:40 – 9:40

Keynote Speech 4

Chair: Zhiyuan Tan

Title: Fault diagnosis model for photovoltaic array using DcCNN

Prof. Xiangjian He (Ningbo Nottingham University)

9:40 - 11:00

Session 8 - IEEE DSC 2022 - Malware Analysis & Invited Paper

Session Chair: Kehinde Oluwatoyin Babaagba

Graph Neural Network-based Android Malware Classification with Jumping Knowledge

Wai Weng Lo (University of Queensland), Siamak Layeghy (University of Queensland), Mohanad Sarhan (University of Queensland), Marcus Gallagher (University of Queensland) and Marius Portmann (University of Queensland)

A Co-evolutionary Algorithm-Based Malware Adversarial Sample Generation Method

Fangwei Wang (Hebei Normal University), Yuanyuan Lu (Hebei Normal University), Qingru Li (Hebei Normal University), Changguang Wang (Hebei Normal University) and Yonglei Bai (Hebei Normal University)

A Node-Embedding Features Based Machine-Learning Technique for Dynamic Malware Detection

Sudhir Kumar Rai, Ashish Mittal and Sparsh Mittal (IIT Roorkee)

Invited Paper: Using Poisson Distribution to Enhance CNN-based NB-IoT LDoS Attack Detection

Jiang-Yi Zeng (National Ilan University), Li-En Chang (National Ilan University), Hsin-Hung Cho (National Ilan University), Chi-Yuan Chen (National Ilan University), Han-Chieh Chao (National Dong Hwa University) and Kuo-Hui Yeh (National Dong Hwa University)

11:00 – 11:30

Coffee Break

11:30 – 12:30

Session 9 - IEEE DSC 2022 - Big Data Analysis and Security & Privacy for AI

Session Chair: Sana Ullah Jan

Multi-task Learning Model based on Multiple Characteristics and Multiple Interests for CTR prediction

Yufeng Xie (Dalian University of Technology), Mingchu Li (Dalian University of Technology), Kun Lu (Dalian University of Technology), Syed Bilal Hussain Shah (Manchester Metropolitan University) and Xiao Zheng (Shandong University of Technology)

Reliability Models and Analysis for Triple-model with Triple-input Machine Learning Systems

Qiang Wen (University of Tsukuba) and Fumio Machida (University of Tsukuba)

Design and Analysis of Novel Bit-flip Attacks and Defense Strategies for DNNs

Yash Khare (Amrita Vishwa Vidyapeetham), Kumud Lakara (Manipal Institute of Technology), Maruthi S. Inukonda (IIT Hyderabad), Sparsh Mittal (IIT Roorkee), Mahesh Chandra (NXP Semiconductors) and Arvind Kaushik (NXP Semiconductors)

12:30 – 13:30

Lunch

13:30 – 15:30

Session 10 - IEEE DSC 2022 – Other Topics

Session Chair: Yanfei Zhu

E&P Paper: Linux Kernel Module Development with Rust (10 mins)

Shao-Fu Chen and Yu-Sung Wu (National Yang Ming Chiao Tung University)

E&P Paper: How National CSIRTs Operate: Personal Observations and Opinions from MyCERT (10 mins)

Sharifah Roziah Mohd Kassim (CyberSecurity Malaysia, University of Kent), Solahuddin Shamsuddin (CyberSecurity Malaysia), Shujun Li (University of Kent) and Budi Arief (University of Kent)

A Novel Approach for Providing Client-Verifiable and Efficient Access to Private Smart Contracts

Alexander Köberl (Graz University of Technology, Infineon Technologies AG), Holger Bock (Infineon Technologies AG) and Christian Steger (Graz University of Technology)

Security Orchestration, Automation, and Response Engine for Deployment of Behavioural Honeypots

Upendra Bartwal (Indian Institute of Technology, Kanpur), Subhasis Mukhopadhyay (Indian Institute of Technology, Kanpur), Rohit Negi (Indian Institute of Technology, Kanpur ) and Sandeep Shukla (Indian Institute of Technology, Kanpur)

Show Me Your Attach Request and I’ll Tell You Who You Are: Practical Fingerprinting Attacks in 4G and 5G Mobile Networks

Daniel Fraunholz (ZITiS), Richard Schoerghofer-Vrinssen (ZITiS), Hartmut Koenig (ZITiS) and Richard Zahoransky (University of App. Sciences Furtwangen)

A Hybrid Graph Neural Network Approach for Detecting PHP Vulnerabilities

Rishi Rabheru (Imperial College London), Hazim Hanif (Imperial College London, University of Malaya) and Sergio Maffeis (Imperial College London)

A Call for a New Privacy and Security Regime for IoT Smart Toys

Joshua Streiff (Indiana University Bloomington), Naheem Noah (University of Denver) and Sanchari Das (University of Denver)

15:30 – 16:00

Coffee Break

16:00 – 17:00

Session 11 - IEEE DSC 2022 - Advanced Persistent Threat & Cyber Attacks

Session Chair: Yanfei Zhu

A Scary Peek into The Future: Advanced Persistent Threats in Emerging Computing Environments

Talal Halabi (University of Winnipeg), Aawista Chaudhry (Queen’s University), Sarra Alqahtani (Wake Forest University) and Mohammad Zulkernine (Queen’s University)

Discovering Exfiltration Paths Using Reinforcement Learning with Attack Graphs

Tyler Cody (National Security Institute, Virginia Tech), Abdul Rahman (Deloitte & Touche LLP), Christopher Redino (Deloitte & Touche LLP), Lanxiao Huang (aNational Security Institute, Virginia Tech), Ryan Clark (Deloitte & Touche LLP), Akshay Kakkar (Deloitte & Touche LLP), Deepak Kushwaha (Deloitte & Touche LLP), Paul Park (Deloitte Consulting LLP), Peter Beling (aNational Security Institute, Virginia Tech) and Edward Bowen (Deloitte & Touche LLP)

Malicious and Benign URL Dataset Generation Using Character-Level LSTM Models

Spencer Vecile (Western University), Kyle Lacroix (Western University), Katarina Grolinger (Western University) and Jagath Samarabandu (Western University)

17:00

Closing Ceremony