Conference Agenda
Note:
-
All
times in the program are in British Summer Time (BST) time zone.
-
Participants
are on their own for breakfast.
-
For remote attendees, please follow either way below to join
the WebEx virtual meetings
1.
Access
the WebEx meeting of the day by clicking on the Meeting link that will
be sent to you via an email from the conference organisers on 21 June 2022
Or
2.
Access
the WebEx meeting of the day by entering the Meeting number
1)
Click
on https://signin.webex.com/join
2)
Enter
the Meeting number of the day, which can be found on the conference agenda
below
3)
Submit
the respective Meeting password that will be sent to you via an email
from the conference organisers on 21 June 2022
Day 1 – 22nd June 2022 (WebEx Meeting number: 2670 966 2144)
8:30 – 9:30 |
Registration |
9:30 - 10:00 |
Grant Opening |
10:00- 11:00 |
Keynote Speech 1 Chair: Pooneh Bagheri Zadeh Title: Deep Learning-based Side-channel Analysis: Lessons
Learned and Challenges to be Addressed Associate Prof. Stjepan Picek (Radboud University) |
11:00 – 11:30 |
Coffee Break & SICSA Poster
Exhibition |
11:30
– 12:30 |
Session 1 - SICSA Regular Papers Session Chair: Naghmeh Moradpoor |
A
Digital Forensics Live Suspicious Activity Toolkit to assist investigators
with Sexual Harm Prevention Order monitoring Andrew Scholey and Pooneh Bagheri Zadeh (Leeds Beckett
University) |
|
A
Novel Chaos-based Light-weight Image Encryption Scheme for Multi-modal
Hearing Aids Awais Aziz Shah (Edinburgh Napier University), Ahsan Adeel
(University of Wolverhampton), Jawad Ahmad (Edinburgh Napier University),
Ahmed Al-Dubai (Edinburgh Napier University), Mandar Gogate (Edinburgh Napier
University), Abhijeet Bishnu, Muhammad Diyan (Edinburgh Napier University),
Tassadaq Hussain (Edinburgh Napier University), Kia Dashtipour (Edinburgh
Napier University), Tharm Ratnarajah (University of Edinburgh) and Amir
Hussain (Edinburgh Napier University) |
|
A
Generative Neural Network for Enhancing Android Metamorphic Malware Detection
based on Behaviour Profiling Leigh Turnbull, Zhiyuan Tan and Kehinde Babaagba (Edinburgh
Napier University) |
|
12:30 – 13:30 |
Lunch & SICSA Poster Exhibition |
13:30
– 15:30 |
Session 2 - PASS4IoT 2022 Session Chair: Belinda Onyeashie |
LAEG:
Leak-based AEG using Dynamic Binary Analysis to Defeat ASLR Wei-Loon Mow (National Taiwan University), Shih-Kun Huang
(National Yang Ming Chiao Tung University) and Hsu-Chun Hsiao (National
Taiwan University) |
|
Shodan
Indicators used to Detect Standard Conpot Implementations and their
Improvement through Sophisticated Customisation Warren Cabral, Leslie Sikos and Craig Valli (Edith Cowan
University) |
|
Optimising
user security recommendations for AI-powered smart-homes Emma Scott, Sakshyam Panda, George Loukas and Emmanouil
Panaousis (University of Greenwich) |
|
Enabling
Device Trustworthiness for SDN-Enabled Internet-of-Battlefield Things Abel Osvaldo Gomez Rivera (University of Texas at El Paso),
Evan White (University of Texas at El Paso), Jaime Acosta (CCDC Army Research
Laboratory) and Deepak Tosh (University of Texas at El Paso) |
|
Cache
Locking and Encryption to Prevent Memory Snooping in Embedded Systems Jason Dejesus and John Chandy (University of Connecticut) |
|
An
Engineering Process Framework for Cybersecurity Incident Response Assessment Robert L. Freas (Texas A&M University - Commerce/RELLIS),
Heather F. Adair (Sam Houston State University) and Eman Hammad (Texas
A&M University - Commerce/RELLIS) |
|
15:30 – 16:00 |
Coffee Break & SICSA Poster
Exhibition |
16:00
– 17:00 |
Session 3 -SECSOC-2022 Session Chair: Kehinde Oluwatoyin
Babaagba |
A
Low Cost Blockchain-Based Framework for Preserving Critical Data in
Health-Care IoT Systems Using Classification Kareem Abu Raad, Heba Takruri Tamemi, Manar Rabayah, Mai
Kanaan and Ahmed Awad (An-Najah National University) |
|
Network
Intrusion Detection in Encrypted Traffic Eva Papadogiannaki (FORTH-ICS), Giorgos Tsirantonakis
(FORTH-ICS) and Sotiris Ioannidis (Technical University of Crete) |
|
Defending
OC-SVM based IDS from poisoning attacks Lu Zhang, Reginald Cushing and Paola Grosso (University of
Amsterdam) |
|
19:30 – 21:30 |
Conference Reception |
Day 1 – 22nd June 2022 – SICSA Poster
Exhibition
SICSA Posters (11:00 –
11:30, 12:30 – 13:30, 15:30 – 16:00) Session
Chair: Naghmeh Moradpoor |
ELSA:
Edge Lightweight Searchable Attribute-based encryption Multi-keyword
Scalability Jawhara Aljabri, Anna Lito Michala and Jeremy Singer
(University of Glasgow) |
Automated
Anomaly Detection Tool for Industrial Control System Mariam Varkey (Abertay University), Jacob John (Grofers India
Pvt Ltd) and Umadevi K. S. (Vellore Institute of Technology) |
Facilitating
Deep Learning for Edge Computing: A Case Study on Data Classification Abdullah Alsalemi (De Montfort University), Abbes Amira
(University of Sharjah), Hossein Malekmohamadi (De Montfort University), and
Kegong Diao (De Montfort University) |
Day 2 – 23rd June 2022 (WebEx Meeting number: 2672 336 6572)
8:30 – 9:00 |
Registration |
9:00 - 10:00 |
Keynote Speech 2 Chair: Zhiyuan Tan Title: Deep Learning Platform for B5G Mobile Network Prof. Han-Chieh Chao (National Dong Hwa University) |
10:00
- 11:00 |
Session 4 - IEEE DSC 2022 –
Cryptographic Methods and Toolkits Session Chair: Shufan Yang |
Symbolon:
Enabling Flexible Multi-device-based User Authentication Thalia Laing (HP Labs), Eduard Marin (Telefonica Research),
Mark Ryan (University of Birmingham), Joshua Schiffman (HP Labs) and Gaëtan
Wattiau (Decentriq) |
|
Securing
Password Authentication for Web-based Applications Teik Guan Tan (Singapore University of Technology and Design),
Pawel Szalachowski (Singapore University of Technology and Design) and
Jianying Zhou (Singapore University of Technology and Design) |
|
FREED:
An Efficient Privacy-Preserving Solution for Person Re-Identification Bowen Zhao (Singapore Management University), Yingjiu Li
(University of Oregon), Ximeng Liu (Fuzhou University), Hwee Hwa Pang
(Singapore Management University) and Robert Deng (Singapore Management
University) |
|
11:00 – 11:30 |
Coffee Break |
11:30 – 12:30 |
Keynote Speech 3 Chair: Zhiyuan Tan Title: The Promise of Decentralization – Cyber-Security Myth or
Revolution? Prof. KIAYIAS Aggelos (University of Edinburgh) |
12:30 – 13:30 |
Lunch |
13:30
- 14:30 |
Session 5 - IEEE DSC 2022 -
Cryptographic Methods and Fault-Tolerant Designs Session Chair: Spyridon Mastorakis |
Protecting
White-Box Block Ciphers with Galois/Counter Mode Nanjiang Xie (South China Normal University), Zheng Gong
(South China Normal University), Yufeng Tang (South China Normal University),
Lei Wang (South China Normal University) and Yamin Wen (Guangdong University
of Finance and Economics) |
|
High
Speed Encrypted Computing: Stochastic Confusion and Lies in a Secret Computer Peter T. Breuer (Hecusys LLC) |
|
Device-to-Device
Task Offloading in a Stochastic Invalid-Device Scenario with Social Awareness Mingchu Li (Dalian University of Technology), Linlin Yang
(Dalian University of Technology), Kun Lu (Dalian University of Technology),
Syed Bilal Hussain Shah (Manchester Metropolitan University) and Xiao Zheng
(Shandong University of Technology) |
|
14:30
– 15:30 |
Session 6 - IEEE DSC 2022 - Botnet and
Intrusion Detection Session Chair: Belinda Onyeashie |
IoT
Botnet Detection Based on the Behaviors of DNS Queries Chun-I Fan (National Sun Yat-sen University), Cheng-Han Shie
(National Sun Yat-sen University), Che-Ming Hsu (National Sun Yat-sen
University), Tao Ban (National Institute of Information and Communications
Technology), Tomohiro Morikawa (National Institute of Information and
Communications Technology, Saitama Institute of Technology) and Takeshi
Takahashi (National Institute of Information and Communications Technology) |
|
Clustering-Based
Network Intrusion Detection System Chun-I Fan (National Sun Yat-sen University), Yen-Lin Lai
(National Sun Yat-sen University) and Cheng-Han Shie (National Sun Yat-sen
University) |
|
Curse
of System Complexity and Virtue of Operational Invariants: Machine Learning
based System Modeling and Attack Detection in CPS Muhammad Omer Shahid (CUST), Chuadhry Mujeeb Ahmed (University
of Strathclyde), Venkata Reddy Palleti (IIPE-Visakhapatnam) and Jianying Zhou
(SUTD) |
|
15:30 – 16:00 |
Coffee Break |
16:00
– 17:20 |
Session 7 - Invited Papers Session Chair: Talal Halabi |
Cyber
Security Risks of Net Zero Technologies Haiyue Yuan and Shujun Li (University of Kent) |
|
Capturing
Malware Behaviour with Ontology-based Knowledge Graphs Ipshita Roy Chowdhury and Deepayan Bhowmik (University of
Stirling) |
|
A
Survey on Explainable Anomaly Detection for Industrial Internet of Things Zijie Huang and Yulei Wu (University of Exeter) |
|
Towards
a Secure Multi-agent Deep Reinforcement Learning Computing: Adversarial
Attacks and Countermeasures Changgang Zheng (University of Oxford), Chen Zhen (University
of Science and Technology of China), Yonghai Xie (University of Science and
Technology of China) and Shufan Yang (Edinburgh Napier University) |
|
19:30 – 21:30 |
Conference Banquet |
Day 3 – 24th
June 2022(WebEx Meeting number: 2674 896 5841)
8:40 – 9:40 |
Keynote Speech 4 Chair: Zhiyuan Tan Title: Fault diagnosis model for photovoltaic array using DcCNN Prof. Xiangjian He (Ningbo Nottingham University) |
9:40
- 11:00 |
Session 8 - IEEE DSC 2022 - Malware
Analysis & Invited Paper Session Chair: Kehinde Oluwatoyin
Babaagba |
Graph
Neural Network-based Android Malware Classification with Jumping Knowledge Wai Weng Lo (University of Queensland), Siamak Layeghy
(University of Queensland), Mohanad Sarhan (University of Queensland), Marcus
Gallagher (University of Queensland) and Marius Portmann (University of
Queensland) |
|
A
Co-evolutionary Algorithm-Based Malware Adversarial Sample Generation Method Fangwei Wang (Hebei Normal University), Yuanyuan Lu (Hebei
Normal University), Qingru Li (Hebei Normal University), Changguang Wang
(Hebei Normal University) and Yonglei Bai (Hebei Normal University) |
|
A
Node-Embedding Features Based Machine-Learning Technique for Dynamic Malware
Detection Sudhir Kumar Rai, Ashish Mittal and Sparsh Mittal (IIT
Roorkee) |
|
Invited
Paper: Using Poisson Distribution to Enhance CNN-based NB-IoT LDoS Attack
Detection Jiang-Yi Zeng (National Ilan University), Li-En Chang
(National Ilan University), Hsin-Hung Cho (National Ilan University),
Chi-Yuan Chen (National Ilan University), Han-Chieh Chao (National Dong Hwa
University) and Kuo-Hui Yeh (National Dong Hwa University) |
|
11:00 – 11:30 |
Coffee Break |
11:30
– 12:30 |
Session 9 - IEEE DSC 2022 - Big Data
Analysis and Security & Privacy for AI Session Chair: Sana Ullah Jan |
Multi-task
Learning Model based on Multiple Characteristics and Multiple Interests for
CTR prediction Yufeng Xie (Dalian University of Technology), Mingchu Li
(Dalian University of Technology), Kun Lu (Dalian University of Technology),
Syed Bilal Hussain Shah (Manchester Metropolitan University) and Xiao Zheng
(Shandong University of Technology) |
|
Reliability
Models and Analysis for Triple-model with Triple-input Machine Learning
Systems Qiang Wen (University of Tsukuba) and Fumio Machida
(University of Tsukuba) |
|
Design
and Analysis of Novel Bit-flip Attacks and Defense Strategies for DNNs Yash Khare (Amrita Vishwa Vidyapeetham), Kumud Lakara (Manipal
Institute of Technology), Maruthi S. Inukonda (IIT Hyderabad), Sparsh Mittal
(IIT Roorkee), Mahesh Chandra (NXP Semiconductors) and Arvind Kaushik (NXP
Semiconductors) |
|
12:30 – 13:30 |
Lunch |
13:30
– 15:30 |
Session 10 - IEEE DSC 2022 – Other
Topics Session Chair: Yanfei Zhu |
E&P
Paper: Linux Kernel Module
Development with Rust (10 mins) Shao-Fu Chen and Yu-Sung Wu (National Yang Ming Chiao Tung
University) |
|
E&P
Paper: How National CSIRTs
Operate: Personal Observations and Opinions from MyCERT (10 mins) Sharifah Roziah Mohd Kassim (CyberSecurity Malaysia,
University of Kent), Solahuddin Shamsuddin (CyberSecurity Malaysia), Shujun
Li (University of Kent) and Budi Arief (University of Kent) |
|
A
Novel Approach for Providing Client-Verifiable and Efficient Access to
Private Smart Contracts Alexander Köberl (Graz University of Technology, Infineon
Technologies AG), Holger Bock (Infineon Technologies AG) and Christian Steger
(Graz University of Technology) |
|
Security
Orchestration, Automation, and Response Engine for Deployment of Behavioural Honeypots Upendra Bartwal (Indian Institute of Technology, Kanpur),
Subhasis Mukhopadhyay (Indian Institute of Technology, Kanpur), Rohit Negi
(Indian Institute of Technology, Kanpur ) and Sandeep Shukla (Indian
Institute of Technology, Kanpur) |
|
Show
Me Your Attach Request and I’ll Tell You Who You Are: Practical
Fingerprinting Attacks in 4G and 5G Mobile Networks Daniel Fraunholz (ZITiS), Richard Schoerghofer-Vrinssen
(ZITiS), Hartmut Koenig (ZITiS) and Richard Zahoransky (University of App.
Sciences Furtwangen) |
|
A
Hybrid Graph Neural Network Approach for Detecting PHP Vulnerabilities Rishi Rabheru (Imperial College London), Hazim Hanif (Imperial
College London, University of Malaya) and Sergio Maffeis (Imperial College
London) |
|
A
Call for a New Privacy and Security Regime for IoT Smart Toys Joshua Streiff (Indiana University Bloomington), Naheem Noah
(University of Denver) and Sanchari Das (University of Denver) |
|
15:30 – 16:00 |
Coffee Break |
16:00
– 17:00 |
Session 11 - IEEE DSC 2022 - Advanced
Persistent Threat & Cyber Attacks Session Chair: Yanfei Zhu |
A
Scary Peek into The Future: Advanced Persistent Threats in Emerging Computing
Environments Talal Halabi (University of Winnipeg), Aawista Chaudhry
(Queen’s University), Sarra Alqahtani (Wake Forest University) and Mohammad
Zulkernine (Queen’s University) |
|
Discovering
Exfiltration Paths Using Reinforcement Learning with Attack Graphs Tyler Cody (National Security Institute, Virginia Tech), Abdul
Rahman (Deloitte & Touche LLP), Christopher Redino (Deloitte & Touche
LLP), Lanxiao Huang (aNational Security Institute, Virginia Tech), Ryan Clark
(Deloitte & Touche LLP), Akshay Kakkar (Deloitte & Touche LLP),
Deepak Kushwaha (Deloitte & Touche LLP), Paul Park (Deloitte Consulting
LLP), Peter Beling (aNational Security Institute, Virginia Tech) and Edward
Bowen (Deloitte & Touche LLP) |
|
Malicious
and Benign URL Dataset Generation Using Character-Level LSTM Models Spencer Vecile (Western University), Kyle Lacroix (Western
University), Katarina Grolinger (Western University) and Jagath Samarabandu
(Western University) |
|
17:00 |
Closing Ceremony |