Skip to main content

Book your accommodation now!

Hotels near by iitb campus can be booked with iciss 2017 reference!

ICISS 2017 Conference Program:



Updated on: November 11, 2017

Day 1

December 18, 2017
9:15 am – 9:30 am Inauguration of ICISS
9:30 am – 10:30 am Keynote 1 Maintaining level of operational effectiveness of a CSOC under adverse conditions
Sushil Jajodia
BDM International Professor of Information Technology, and Director Center for Secure Information Systems
George Mason University
10:30am – 11:00 am Coffee Break
11:00 am – 1:00 pm Technical Session 1
(Privacy / Crypto)
A Secure Anonymous E-Voting System Using Identity-Based Blind Signature Scheme
Mahender Kumar, C.P. Katti and P.C. Saxena
SEMFS: Secure & Efficient Multi-keyword Fuzzy Search for Cloud Storage
Sanjeet Kumar Nayak and Somanath Tripathy
Towards Generalization of Privacy Policy Specification and Property-based Information Leakage
Dileep Kumar Koshley, Sapana Rani and Raju Halder
Privacy-Preserving Proxy Re-encryption with Fine-grained Access Control
Payal Chaudhari, Manik Lal Das and Dipankar Dasgupta
1:00 pm – 2:00 pm Lunch Break
2:00 pm – 3:00 pm Keynote 2 The protection of space mission: threats and cyberthreats
Stefano Zatti
Head of ESA Security Office
European Space Agency
3:00 pm – 3:30 pm Coffee Break
3:30 pm – 5:20 pm Technical Session 2
(Systems Security)
Hiding Kernel Level Rootkits Using Buffer Overflow and Return Oriented Programming
Amrita Honap and Wonjun Lee
Experimenting similarity-based hijacking attacks detection and response in Android Systems
Anis Bkakria, Mariem Graa, Nora Cuppens-Boulahia, Frédéric Cuppens and Jean-Louis Lanet
Heavy Log Reader: Learning the Context of Cyber Attacks Automatically with Paragraph Vector
Mamoru Mimura and Hidema Tanaka
Secure Random Encryption for Deduplicated Storage
Jay Dave, Shweta Saharan, Parvez Faruki, Vijay Laxmi and Manoj Gaur

Day 2

December 19, 2017
9:30 am – 10:30 am Keynote 3 New trends in cyber malware
Luigi V Mancini
Professor
University of Rome - La Sapienza
10:30am – 11:00 am Coffee Break
11:00 am – 12:50 pm Technical Session 3
(Security Analysis)
On Automated Detection of Multi-Protocol Attacks using AVISPA
Varun Garg and Anish Mathuria
Malicious Application Detection on Android with Enhanced Static-Dynamic Analysis
Sandeep Rai, Rushang Dhanesha, Sreyans Nahata and Bernard Menezes
Human-on-the-loop Automation for Detecting Software Side-Channel Vulnerabilities
Ganesh Ram Santhanam, Benjamin Holland, Suresh Kothari and Nikhil Ranade
MalDetec: A Non-Root Approach for Dynamic Malware Detection in Android
Nachiket Trivedi and Manik Lal Das
1:00 pm – 2:00 pm Lunch Break
2:00 pm – 3:30 pm Technical Session 4
(Security Attacks)
Parallelized Common Factor Attack on RSA
Vineet Kumar, Aneek Roy, Sourya Sengupta and Sourav Sen Gupta
Performance attacks on branch predictors in embedded processors with SMT support
Moumita Das, Ansuman Banerjee, Nitesh Kumar Singh and Bhaskar Sardar
An enhanced blacklist method to detect phishing websites
Srinivasa Rao and Alwyn Pais
Semi Supervised NLP Based Classification of Malware Documents
Mayukh Rath, Shivali Agarwal and Rudrapatna Shyamasundar
3:30 pm – 4:00 pm Coffee Break
4:00 pm – 5:20 pm Technical Session 5
(Identity Management and Access Control)
DIscovery and REgistration Protocol:for Device and Person Identity Management in IoT
Marco Lobe Kome, Mariem Graa, Frederic Cuppens, Nora Cuppens and Vincent Frey
Modelling and Mitigation of Cross-Origin Request Attacks on FIM (Federated Identity Management) Using CORP (Cross Origin Request Policy)
Akash Agrawall, Shubh Maheshwari, Projit Bandyopadhyay and Venkatesh Choppella
The Challenge of Aadhaar
Ajinkya Rajput and K. Gopinath
5:20 pm – 7:30 pm Free time
7:30 pm – 9:30 pm Banquet

Day 3

December 20, 2017
9:30 am – 10:30 am Keynote 4 Cyber Space: Dimensions and Limitations
Gulshan Rai
National Cybersecurity Coordinator
Govt of India
10:30am – 11:00 am Coffee Break
11:00 am – 12:50 pm Technical Session 6
(Network Security)
Leveraging Man-in-the-middle DoS Attack with Internal TCP Retransmissions in Virtual Network
Son Nguyen Duc, Mamoru Mimura and Hidema Tanaka
wIDS a multilayer IDS for Wireless-based SCADA
Lyes Bayou, David Espes, Nora Cuppens-Boulahia and Frédéric Cuppens
On De-synchronization of User Pseudonyms in Mobile Network
Md Mohsin Ali Khan, Kimmo Järvinen, Philip Ginzboorg and Valtteri Niemi
Dark domain name attack: A new threat to Domain Name System
Bold Munkhbaatar, Mamoru Mimura and Hidema Tanaka
1:00 am – 2:00 pm Lunch Break