You are on page 1of 4

Institute for Development and Research in Banking Technology

(Established by Reserve Bank of India)

Tenth International Conference on Information Systems Security


ICISS 2014 IDRBT Hyderabad
18 20 December 2014
Venue: IDRBT Auditorium
Conference Day I Thursday Dec 18
0900 1000 hrs

1000 1010 hrs

Registration
INAUGURAL SESSION
Welcome Address
A.S. Ramasastri, Director, IDRBT

1010 1020 hrs

General Chairs
Venu Govindaraju, B M Mehtre

1010 1020 hrs

Programme Chairs
Atul Prakash and R Shyamasundar

Inaugural address

1020 1100 hrs

Chief Guest. Dr. C. Rangarajan

1100 1105 hrs

1105 1130 hrs

1130 1230 hrs

Vote of Thanks
B.M. Mehtre
Tea Break
Plenary Session 1
Session Chair: Venu Govindaraju, SUNY, Buffalo
Key Note 1
Adversarial and Uncertain Reasoning for Adaptive Cyber Defense:
Building the Scientific Foundation
Sushil Jajodia, George Mason University, USA

1230 1330 hrs

1330 1400 hrs

1400 1430 hrs

Lunch Break (Venue: IDRBT Lawns)


Technical Session I
Security Inferences
Session Chair: Ashok K Agarwal, CSI, Hyderabad
Inference-Proof Data Publishing by Minimally Weakening a Database Instance
Joachim Biskup and Marcel Preu
Extending Dolev-Yao with assertions
R. Ramanujam, Vaishnavi Sundararajan and S P Suresh

1430 1500 hrs

Inferring Accountability from Trust Perceptions


Koen Decroix, Denis Butin, Joachim Jansen and Vincent Naessens
Client Side Web Session Integrity as a Non-Interference Property (25+5Min)

1500 1530 hrs

Wilayat Khan, Stefano Calzavara, Michele Bugliesi, Willem De Groef and


Frank Piessens

Technical Session - II
Location based Security Services
Session Chair: S K Udgata, University of Hyderabad
Preserving Privacy in Location-Based Services using Sudoku Structures
Sumitra Biswal, Goutam Paul and Shashwat Raizada

1530 1600 hrs

1600 1615 hrs

: Location Obfuscation Framework for Training-Free Localization System (SHORT PAPER)


Thong M. Doan, Han .N Dinh, Nam T. Nguyen and Phuoc T. Tran

1530 1600 hrs


1600 1630 hrs

PhD Forum Presentations (Venue: IDRBT Conference Hall 205)


Chair: V.N. Sastry, IDRBT
End to End Secure Data Aggregation in Wireless Sensor Networks
:
:

Keyur Parmer, Doctoral Student, NIT, Surat


Automatic Authentication of Printed Security Documents
Biswajit Halder, Doctoral Student, University of Burdwan

1700
15301630
1700
hrs hrs

Intrusion Detection Mechanisms for P2P Networks


Pratik Narang, Doctoral Student, BITS, Hyderabad

1700 1710 hrs

1710 1750 hrs

Business Meeting
Session Chair: Sushil Jajodia
Opening Remarks
Sushil Jajodia
Bid Presentation
MNIT, Jaipur

Conference Day II Friday Dec 19

Von

Plenary Session 2
Session Chair: B.M. Mehtre, IDRBT
0930 1030 hrs

1030 1100 hrs

1100 1130 hrs

1130 1200 hrs

Temporal RBAC Security Analysis using Logic Programming in the Presence of


Administrative Policies
Sadhana Jha, Shamik Sural, Jaideep Vaidya and Vijayalakshmi Atluri

1200 1230 hrs

1230 1300 hrs

A Formal Methodology for Modeling Threats to Enterprise Assets


Jaya Bhattacharjee, Anirban Sengupta and Chandan Mazumdar
A Novel Approach for Searchable CP-ABE with Hidden Ciphertext-Policy
Mukti Padhya and Devesh Jinwala

1300 1400 hrs

1400 1500 hrs

Key Note 2
The Bug that Bites
Herbert Bos, Vrije Universiteit Amsterdam , The Netherlands
Tea Break
Technical Session III
Security Policies
Session Chair: Koduri Srinivas, IEEE, Hyderabad
Impact of Multiple t-t SMER Constraints on Minimum User Requirement in RBAC,
Arindam Roy, Shamik Sural and Arun Kumar Majumdar

Lunch Break (Venue: IDRBT Lawns)


Plenary Session 3
Session Chair: Atul Prakash, University of Michigan
Key Note 3
SNIPS: A Software-Defined Approach for Scaling Intrusion Prevention
Systems via Offloading
Vyas Sekar, Carnegie Mellon University, USA

1500 1530 hrs

Break

Technical Session IV
Forensics
Session Chair: Chandan Mazumdar, Jadavpur University, Kolkata
1530 1600 hrs

Analysis of fluorescent paper pulps for detecting Counterfeit Indian paper money
Biswajit Halder, Rajkumar Darbar, Utpal Garain and Abhoy Ch. Mondal

1600 1615 hrs

1615 1630 hrs

A Vein Biometric based Authentication System (SHORT PAPER)


Puneet Gupta and Phalguni Gupta
Digital Forensic Technique for Double Compression based JPEG Image Forgery
Detection (SHORT PAPER)
Pankaj Malviya and Ruchira Naskar
Technical Session V (Venue: IDRBT Conference Hall 205)
Security User Interfaces
Session Chair: Vijay Atluri, Rutgers University, USA
Towards a more democratic mining in Bitcoins
Goutam Paul, Pratik Sarkar and Sarbajit Mukherjee

1630 1700 hrs

1700 1730 hrs

1730 1800 hrs

1800 1815 hrs

A Usage-Pattern Perspective for Privacy Ranking of Android Apps


(SHORT PAPER)
Xiaolei Li, Xinshu Dong and Zhenkai Liang

1815 1900 hrs

Break

1900 2000 hrs

Cultural Programme

2000 onwards

Conference Dinner (Venue: IDRBT Lawns)

Basic Research on Graphical Authentication


Peter Mayer, Melanie Volkamer and Michaela Kauer
Security Extension Providing User Anonymity and Relaxed Trust Requirement
in Non-3GPP Access to The EPS
Hiten Choudhury, Basav Roychoudhury and Dilip Saikia

Conference Day III Saturday Dec 20


0930 1030 hrs

1030 1100 hrs

1100 1130 hrs

Plenary Session 4
Session Chair: R K Shyamasundar, TIFR
Key Note 4
Application Architectures for Critical Data Isolation
Zhenkai Liang, National University of Singapore
Break
Technical Session VI
Security Attacks
Session Chair: M B Srinivas, BITS Hyderabad
Privacy Leakage Attacks in Browsers by Colluding Extensions
Anil Saini, Manoj Gaur, Vijay Laxmi, Tushar Singhal and Mauro Conti

1130 1200 hrs

CORP: A browser policy to mitigate web inltration attacks


Krishna Telikicherla, Venkatesh Choppella and Bruhadeshwar Bezawada

1200 1230 hrs

An Improved Methodology Towards Providing Immunity Against Weak Shoulder


Surfing Attack
Nilesh Chakraborty and Samrat Mondal

1230 1300 hrs

Catching Classical and Hijack-based Phishing Attacks


Tanmay Thakur and Rakesh Verma

1300 1400 hrs

Lunch Break (Venue: IDRBT Lawns)


Technical Session VII
Malware Detection
Session Chair: Arun Agarwal, University of Hyderabad
PMDS: Permission-based Malware Detection System
Paolo Rovelli and mir Vigfsson

1400 1430 hrs

1430 1500 hrs

Efficient Detection of Multi-step Cross-Site Scripting Vulnerabilities


Alexandre Vernotte, Frederic Dadeau, Franck Lebeau, Bruno
Legeard, Fabieneureux and Franois Piat

1500 1530 hrs

CliSeAu: Securing Distributed Java Programs by Cooperative Dynamic Enforcement


Richard Gay, Jinwei Hu and Heiko Mantel

1530 1545 hrs

Automatic Generation of Compact Alphanumeric Shellcodes for x86


(SHORT PAPER)
Aditya Basu, Anish Mathuria and Nagendra Chowdary

1545 1600 hrs

Valedictory Session

Awards
Participants Feedback
Close

1600 hrs

You might also like