ATIS 2019

International Conference on Applications and Techniques in Information Security
SASTRA Deemed University, Tamil Nadu, India

November 22-24, 2019


Programme

Venue: School of Computing

Day - 1 22 November 2019
8:30 - 9:00 AM Registration
9:00 - 9:30 AM Inauguration
9:30 – 10:30 AM Keynote Talk 1
Speaker
: Prof. V. Kamakoti,  Professor, IIT Madras, Chennai, India
Topic: Changing Landscapes of Cyber Attacks
10:30 - 10:45 AM Tea Break
10:45 - 12:00 Noon Session 1
Chair
: Prof. Lynn Batten, Deakin University, Australia
Presentation :Information Security
10:45 – 11:00 AMA Memory-Efficient Multiple String Matching Algorithm Based On Charset Transformation (17)
Yuhai Lu, Yanbing Liu, Gongxin Sun, Jianlong Tan
Institute of Information Engineering, Chinese Academy of Sciences, China
11:00 – 11.15 AMAn Image Mathcrypt – A Flawless Security via Flawed Image (19)
Anushiadevi R, Venkatesh V, Rengarajan Amirtharajan
SASTRA Deemed University, Thanjavur, Tamilnadu, India
11:15 – 11:30 AMSecure ATM Device Design by Control Command Verification (21)
Hisao Ogata, Tomoyoshi Ishikawa, Norichika Miyamoto, Tsutomu Matsumoto
Hitachi-Omron Terminal Solutions, Copr, Japan
11:30 – 11:45 AMErection of Two Dimensional Cubic-Tent-Sine Map for Secure Image Transmission (38)
Sujarani Rajendran, Manivannan Doraipandian
SASTRA Deemed University, Thanjavur, Tamilnadu, India
11:45 – 12:00 NoonConfused memory read attracts synthetic diffusion on the fly – A lightweight image encryption for IoT platform (28)
Vinothraj, Siva J, Sundararaman Rajagopalan, Rengarajan Amirtharajan
SASTRA Deemed University, Thanjavur, Tamilnadu, India
12:00 – 2:00 PM Lunch
2:00 - 3:00 PM Keynote Talk 2
Speaker:
Dr. Lejla Batina,  Professor in Digital Security, Institute for Computing and Information Sciences, Radboud University, The Netherlands
Topic: Deep Learning and Physical Attacks on Embedded Systems: How Deep can we go?
3:00 - 3:15 PM Tea Break
3:15 - 5:30 PM Session 2
Chair
: Dr. Gang Li, Deakin University, Australia
Presentation: Network Security & Security Centric Applications
3:15 – 3:30 PMInsider Attacks on Zigbee based IoT Networks by Exploiting AT Commands (16)
Waqas Ahmad Piracha, Morshed Chowdhury, Biplob Ray, Sutharshan Rajasegarar, Robin Doss
Deakin University, Australia
3:30 – 3:45 PMA survey on various integrity verification schemes on the data outsourced to cloud storage (20)
Milton Ganesh, Periasamy Manikandan
Anna University University College of Engineering Tindivanam, Tamil Nadu, India
3:45 – 4:00 PMPrognostic views on Software Defined Networks based Security for Internet of Things (23)
Antony Taurshia, Jaspher W. Kathrine, Shibin David
Karunya Institute of Technology and Sciences, Coimbatore, Tamilnadu, India
4:00 – 4:15 PMIntegrity checking of cloud data with an auditing mechanism using ECC and Merkle hash tree (36)
Suriya Praba T, Meena V
SASTRA Deemed University, Thanjavur, Tamilnadu, India
4:15 – 4:30 PMChaotic Map Based Key Generation and Realistic Power Allocation Technique for Secure MU-MIMO Wireless System (29)
Manikandan C, Rakesh Kumar S, Neelamegam P, Kopparthi Nikhith K
SASTRA Deemed University, Thanjavur, Tamilnadu, India
4:30 – 4:45 PMA Survey of machine learning techniques to combat against Advanced Persistent Threat (11)
Rajalakshmi E, Asik Ibrahim N, Subramaniyaswamy V
SASTRA Deemed University, Thanjavur, Tamilnadu, India
4:45 – 5:00 PMTele-transmission of Secured Prefrontal Cortex Information Records for Remote Health Care (42)
Monish Ram Kugan, Ananya Sairaj, Ramya Lakshmi Srinivasan, Raajan N R, Girish Ganesan R
SASTRA Deemed University, Thanjavur, Tamilnadu, India.
5:00 – 5:15 PMEncryption by Heart (EbH) for secured data transmission and CNN based EKG signal classification of Arrhythmia with normal data (41)
Tarun Kumar D, Ramya Lakshmi Srinivasan, Narasimhan Ranga Raajan
SASTRA Deemed University, Thanjavur, Tamilnadu, India.
5:15 – 5:30 PMRipping the Fabric: Attacks and Mitigation on Hyperledger Fabric (49)
Ahaan Dabholkar, Vishal Saraswat
Indian Institute of Technology (IIT) Bhilai, India and Robert Bosch Engineering and Business Solutions Pvt. Ltd. (RBEI/ESY)
6:30 - 8:00 PM Temple Visit
8:15 - 9:00 PM Dinner

 

Day - 2 23 November 2019
9:00 – 10:00 AM Keynote Talk 3
Speaker

Prof. Aditya P. Mathur, Professor of Computer Science, Purdue University, West Lafayette, IN, USA
Professor and Center Director, iTrust, SUTD, Singapore
Topic: Challenges in Designing Defense Mechanisms for Critical Infrastructure
10:00 - 11:15 AM Session 3
Chair
: Dr. V. Subramaniyaswamy, SASTRA Deemed University, India
Presentation: Intrusion Detection System
10:00 – 10:15 AMAnomaly Detection in Critical Infrastructure using Probabilistic Neural Network (37)
Gauthama Raman M R, Nivethitha Somu, Aditya P Mathur
Singapore University of Technology and Design, Singapore and Indian Institute of Technology-Bombay, India
10:15 – 10:30 AMSubtree Hypergraph-based Attack Detection Model for Signature Matching over SCADA HMI (25)
Sujeet S Jagtap, Shankar Sriram V S
SASTRA Deemed University, Thanjavur, Tamilnadu, India
10:30 – 10:45 AMComputational CBGSA – SVM model for Network based Intrusion Detection System (27)
Tina Manghnani, Thirumaran T
Microsoft, India and Infoview Technologies Pvt Ltd, India
10:45 – 11:00 PMAttention-based LSTM for Insider Threat Detection (46)
Fangfang Yuan, Yanmin Shang, Yanbing Liu, Yanan Cao, Jianlong Tan
Institute of Information Engineering, Chinese Academy of Sciences, China
11:00 – 11:15 PMCog-SDN: Mitigation Mechanism for Distributed Denial of Service Attacks in Software Defined Networks (35)
Mohana Priya P, Manjula K R
SASTRA Deemed University, Thanjavur, Tamilnadu, India
11:15 - 11:30 AM Tea Break
11:30 - 01:00 PM Session 4
Chair
: Dr. N. Sasikaladevi, SASTRA Deemed University, India
Presentation: Authentication and Key Management System
11:30 – 11:45 PMPassword Strength Estimators Trained on the Leaked Password Lists (10) Cameron Schafer, Lei Pan Infosys, Australia and Deakin University, Australia
11:45 – 12:00 NoonCellular Automata Based Key Stream Generator – A Reconfigurable Hardware Approach (18)
Sundararaman Rajagopalan, Manikandan V, Nikhil Krishnaa Sriram, Sivaraman R, Sridevi A, Siva Janakiraman, Amirtharajan Rengarajan
SASTRA Deemed University, Thanjavur, Tamilnadu, India
12:00 – 12:15 PMHardware Trojan on SIMON architecture for key retrieval (48)
Sivappriya Manivannan, K. K. Soundra Pandian
Indian Institute of Information Technology, Design and Manufacturing, India
12:15 – 12:30 PMPrivacy-preserving authentication scheme using Reduced-Advanced Encryption Standard for Vehicular Ad hoc Network (34)
Sharon S, Suriya Praba T, Anushiadevi R, Venkatesh V
E G S Pillay Polytechnic College, Nagapattinam and SASTRA Deemed University, Thanjavur, Tamilnadu, India
12:30 – 12:45 PMOn the Security of the Double-Block-Length Hash Function NCASH (26)
Tapadyoti Banerjee, Dipanwita Roy Chowdhury
Indian Institute of Technology Kharagpur, India
12:45 – 2:00 PM Lunch
2:00 - 3:00 PM Keynote Talk 4
Speaker
Prof. Kasi Periyasamy,  Professor and MSE Program Director, University of Wisconsin-La Crosse Wisconsin, USA
Topic: Security and Privacy in Healthcare Applications
3:00 - 3:15 PM Tea Break
3:30 - 5:00 PM Valedictory ceremony & Announcement of Best Paper Award – ATIS 2019
CFP