Programme
Venue: School of Computing
Day - 1 | 22 November 2019 |
---|---|
8:30 - 9:00 AM | Registration |
9:00 - 9:30 AM | Inauguration |
9:30 – 10:30 AM | Keynote Talk 1 Speaker: Prof. V. Kamakoti, Professor, IIT Madras, Chennai, India Topic: Changing Landscapes of Cyber Attacks |
10:30 - 10:45 AM | Tea Break |
10:45 - 12:00 Noon | Session 1 Chair : Prof. Lynn Batten, Deakin University, Australia Presentation :Information Security |
10:45 – 11:00 AM | A Memory-Efficient Multiple String Matching Algorithm Based On Charset Transformation (17) Yuhai Lu, Yanbing Liu, Gongxin Sun, Jianlong Tan Institute of Information Engineering, Chinese Academy of Sciences, China |
11:00 – 11.15 AM | An Image Mathcrypt – A Flawless Security via Flawed Image (19) Anushiadevi R, Venkatesh V, Rengarajan Amirtharajan SASTRA Deemed University, Thanjavur, Tamilnadu, India |
11:15 – 11:30 AM | Secure ATM Device Design by Control Command Verification (21) Hisao Ogata, Tomoyoshi Ishikawa, Norichika Miyamoto, Tsutomu Matsumoto Hitachi-Omron Terminal Solutions, Copr, Japan |
11:30 – 11:45 AM | Erection of Two Dimensional Cubic-Tent-Sine Map for Secure Image Transmission (38) Sujarani Rajendran, Manivannan Doraipandian SASTRA Deemed University, Thanjavur, Tamilnadu, India |
11:45 – 12:00 Noon | Confused memory read attracts synthetic diffusion on the fly – A lightweight image encryption for IoT platform (28) Vinothraj, Siva J, Sundararaman Rajagopalan, Rengarajan Amirtharajan SASTRA Deemed University, Thanjavur, Tamilnadu, India | 12:00 – 2:00 PM | Lunch |
2:00 - 3:00 PM | Keynote Talk 2 Speaker: Dr. Lejla Batina, Professor in Digital Security, Institute for Computing and Information Sciences, Radboud University, The Netherlands Topic: Deep Learning and Physical Attacks on Embedded Systems: How Deep can we go? |
3:00 - 3:15 PM | Tea Break |
3:15 - 5:30 PM | Session 2 Chair : Dr. Gang Li, Deakin University, Australia Presentation: Network Security & Security Centric Applications |
3:15 – 3:30 PM | Insider Attacks on Zigbee based IoT Networks by Exploiting AT Commands (16) Waqas Ahmad Piracha, Morshed Chowdhury, Biplob Ray, Sutharshan Rajasegarar, Robin Doss Deakin University, Australia |
3:30 – 3:45 PM | A survey on various integrity verification schemes on the data outsourced to cloud storage (20) Milton Ganesh, Periasamy Manikandan Anna University University College of Engineering Tindivanam, Tamil Nadu, India |
3:45 – 4:00 PM | Prognostic views on Software Defined Networks based Security for Internet of Things (23) Antony Taurshia, Jaspher W. Kathrine, Shibin David Karunya Institute of Technology and Sciences, Coimbatore, Tamilnadu, India |
4:00 – 4:15 PM | Integrity checking of cloud data with an auditing mechanism using ECC and Merkle hash tree (36) Suriya Praba T, Meena V SASTRA Deemed University, Thanjavur, Tamilnadu, India |
4:15 – 4:30 PM | Chaotic Map Based Key Generation and Realistic Power Allocation Technique for Secure MU-MIMO Wireless System (29) Manikandan C, Rakesh Kumar S, Neelamegam P, Kopparthi Nikhith K SASTRA Deemed University, Thanjavur, Tamilnadu, India |
4:30 – 4:45 PM | A Survey of machine learning techniques to combat against Advanced Persistent Threat (11) Rajalakshmi E, Asik Ibrahim N, Subramaniyaswamy V SASTRA Deemed University, Thanjavur, Tamilnadu, India |
4:45 – 5:00 PM | Tele-transmission of Secured Prefrontal Cortex Information Records for Remote Health Care (42) Monish Ram Kugan, Ananya Sairaj, Ramya Lakshmi Srinivasan, Raajan N R, Girish Ganesan R SASTRA Deemed University, Thanjavur, Tamilnadu, India. |
5:00 – 5:15 PM | Encryption by Heart (EbH) for secured data transmission and CNN based EKG signal classification of Arrhythmia with normal data (41) Tarun Kumar D, Ramya Lakshmi Srinivasan, Narasimhan Ranga Raajan SASTRA Deemed University, Thanjavur, Tamilnadu, India. |
5:15 – 5:30 PM | Ripping the Fabric: Attacks and Mitigation on Hyperledger Fabric (49) Ahaan Dabholkar, Vishal Saraswat Indian Institute of Technology (IIT) Bhilai, India and Robert Bosch Engineering and Business Solutions Pvt. Ltd. (RBEI/ESY) |
6:30 - 8:00 PM | Temple Visit |
8:15 - 9:00 PM | Dinner |
Day - 2 | 23 November 2019 |
---|---|
9:00 – 10:00 AM | Keynote Talk 3 Speaker Prof. Aditya P. Mathur, Professor of Computer Science, Purdue University, West Lafayette, IN, USA Professor and Center Director, iTrust, SUTD, Singapore Topic: Challenges in Designing Defense Mechanisms for Critical Infrastructure |
10:00 - 11:15 AM | Session 3 Chair : Dr. V. Subramaniyaswamy, SASTRA Deemed University, India Presentation: Intrusion Detection System |
10:00 – 10:15 AM | Anomaly Detection in Critical Infrastructure using Probabilistic Neural Network (37) Gauthama Raman M R, Nivethitha Somu, Aditya P Mathur Singapore University of Technology and Design, Singapore and Indian Institute of Technology-Bombay, India |
10:15 – 10:30 AM | Subtree Hypergraph-based Attack Detection Model for Signature Matching over SCADA HMI (25) Sujeet S Jagtap, Shankar Sriram V S SASTRA Deemed University, Thanjavur, Tamilnadu, India |
10:30 – 10:45 AM | Computational CBGSA – SVM model for Network based Intrusion Detection System (27) Tina Manghnani, Thirumaran T Microsoft, India and Infoview Technologies Pvt Ltd, India |
10:45 – 11:00 PM | Attention-based LSTM for Insider Threat Detection (46) Fangfang Yuan, Yanmin Shang, Yanbing Liu, Yanan Cao, Jianlong Tan Institute of Information Engineering, Chinese Academy of Sciences, China |
11:00 – 11:15 PM | Cog-SDN: Mitigation Mechanism for Distributed Denial of Service Attacks in Software Defined Networks (35) Mohana Priya P, Manjula K R SASTRA Deemed University, Thanjavur, Tamilnadu, India |
11:15 - 11:30 AM | Tea Break |
11:30 - 01:00 PM | Session 4 Chair : Dr. N. Sasikaladevi, SASTRA Deemed University, India Presentation: Authentication and Key Management System |
11:30 – 11:45 PM | Password Strength Estimators Trained on the Leaked Password Lists (10) Cameron Schafer, Lei Pan Infosys, Australia and Deakin University, Australia |
11:45 – 12:00 Noon | Cellular Automata Based Key Stream Generator – A Reconfigurable Hardware Approach (18) Sundararaman Rajagopalan, Manikandan V, Nikhil Krishnaa Sriram, Sivaraman R, Sridevi A, Siva Janakiraman, Amirtharajan Rengarajan SASTRA Deemed University, Thanjavur, Tamilnadu, India |
12:00 – 12:15 PM | Hardware Trojan on SIMON architecture for key retrieval (48) Sivappriya Manivannan, K. K. Soundra Pandian Indian Institute of Information Technology, Design and Manufacturing, India |
12:15 – 12:30 PM | Privacy-preserving authentication scheme using Reduced-Advanced Encryption Standard for Vehicular Ad hoc Network (34) Sharon S, Suriya Praba T, Anushiadevi R, Venkatesh V E G S Pillay Polytechnic College, Nagapattinam and SASTRA Deemed University, Thanjavur, Tamilnadu, India |
12:30 – 12:45 PM | On the Security of the Double-Block-Length Hash Function NCASH (26) Tapadyoti Banerjee, Dipanwita Roy Chowdhury Indian Institute of Technology Kharagpur, India |
12:45 – 2:00 PM | Lunch |
2:00 - 3:00 PM | Keynote Talk 4 Speaker Prof. Kasi Periyasamy, Professor and MSE Program Director, University of Wisconsin-La Crosse Wisconsin, USA Topic: Security and Privacy in Healthcare Applications |
3:00 - 3:15 PM | Tea Break |
3:30 - 5:00 PM | Valedictory ceremony & Announcement of Best Paper Award – ATIS 2019 |