-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathkeynotes.php
246 lines (228 loc) · 19.3 KB
/
keynotes.php
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
<!doctype html>
<html lang="en">
<head>
<title>KEYNOTES | SIN 2017</title>
<?php require 'php_includes/imports.php'; ?>
</head>
<body class="profile-page">
<!-- Navbar -->
<?php require 'php_includes/navbar.php'; ?>
<!-- End Navbar -->
<div class="wrapper">
<div class="header header-filter" style="background-image:url(assets/img/background/mujBg.jpg);"></div>
<div class="main main-raised">
<section class="section speaker text-center">
<div class="container">
<h2 class="title">KEYNOTES</h2>
<div style="text-align: left;">
<img width="156" height="175" style="margin: 5px 5px 8px 0px; float: left;" alt="Mauro Conti-206x195-bordered" src="assets/img/committee/bimal.jpg" />
<p><strong><a name="Mauro Conti0"></a>Prof. Bimal Kumar Roy</strong></p>
</div>
<div style="text-align: left;">Head, R C Bose Centre for Cryptology and
Security, Indian Statistical Institute <br>Professor, Applied Statistics
Unit, Indian Statistical Institute, Kolkata <br>Head, Cryptology Research
Group, Indian Statistical Institute, Kolkata <br>Founder and
General-Secretary, Cryptology Research Society of India</div>
<p style="text-align: left;"> </p>
<p style="text-align: left;"><strong>Title</strong></p>
<div style="text-align: left;">
Selected Sharing and Matroids</div>
<div style="text-align: left;"> </div>
<div style="text-align: left;"><strong>Abstract<br></strong></div>
<div style="text-align: left;"> The concept of secret sharing will be
introduced; some schemes will be presented. As a special case, visual secret
schemes will be discussed. Matroids will be introduced with illustrations.
Its link with secret sharing will be explored<br></div>
<div style="text-align: justify;">
<div style="text-align: left;"><strong><br>Bio<br></strong></div>
Prof. Bimal is a renowned academician and
researcher in the field of Statistics Cryptography. He joined the Indian
Statistical Institute (ISI), Kolkata in 1984 and has served as a Professor
since 1997. He has served ISI as Director during 2010 to 2015. His primary
research interest involves all aspects of Statistics and its applications.
Currently, he is working on Combinatorics, and application of Statistics in
Cryptology and Design of Experiments. He has several awards and honors in
his pocket including Padma Shri Award, Government of India in 2015 and
Teacher's Award, Indian National Science Academy in 2014. He is Fellow,
Indian Society for Probability and Statistics since 2014 and Fellow,
National Academy of Sciences, India since 2010. He has published around
forty (40) papers in refereed Journals; around twenty (20) book chapters,
including proceedings for International Conferences; with over twenty (20)
papers in Cryptology and Information Security, in reputed International
Conferences and Journals. He is also serving as associate Editor of three
journal:Journal of Ad Hoc & Sensor Wireless Networks, Journal of Wireless
Sensor Networks, Research & Reviews-Journal of Statistics.
<p class="title"> </p>
<!-- <p style="text-align: justify;"><span style="color: #003366; font-size: 14pt;"><strong>Keynote Talks:</strong></span></p> -->
<p style="text-align: left;"><img width="150" height="250" style="margin: 5px 5px 8px 0px; float: left;" alt="Suraj C. Kothari-150x2250-border" src="assets/img/committee/kothari.gif" /> <a name="Suraj"></a><strong>Prof. Suraj C. Kothari</strong></p>
<div style="text-align: left;"> Richardson Chair Professor, Electrical and Computer Engineering, Iowa State University, USA</div>
<div style="text-align: left;"> President, EnSoft Corp., USA</div>
<div style="text-align: left;">
<p style="text-align: left;"><strong>Title</strong></p>
<div style="text-align: left;"> Software Security Headaches: Analgesic or Hospital?</div>
<div style="text-align: left;"> </div>
<strong>Abstract</strong></div>
<div style="text-align: left;"> </div>
<div style="text-align: justify;">
The talk will be about analysis of complex security problems in large software - the problems where analgesic will not get rid of the headache. The need for automated analysis is clear given the enormous software. More than 100 feet stack of paper is needed to print software like the Android operating system. Researchers are grappling with automation, from machine learning to formal verification, to analyze software. The practitioners are in a quandary what research to believe.
Patching security holes with reactive automation is not the solution when we face zero-day software defects with deadly power for catastrophic destruction. Not only must automated software security analysis scale to large software but also be proactive and highly accurate.
This talk will reflect on: what should be the automation for software security analysis and why? It will be reflections based on years of experience of analyzing software with millions of lines of code, and leading large research projects to develop automated software analysis tools for cybersecurity.
<div style="text-align: left;"> <strong>Bio</strong></div>
<div style="text-align: justify;"> Suraj(Suresh) Kothari is the Richardson Professor of Electrical and Computer Engineering (ECE) at Iowa State University (ISU). He has pioneered research on machine-enabled reasoning to solve complex problems of software productivity, security and safety. <br>He served as a Principal Investigator (PI) for the US Defense Advanced Research Project Agency (DARPA) Automated Program Analysis for Cybersecurity (APAC) program, and a Co-PI for the DARPA Software Enabled Control (SEC) program. Currently he is a PI for the DARPA Space/Time Analysis for Cybersecurity (STAC) program. </br> EnSoft (http://www.ensoftcorp.com/), the company he founded in 2002, provides software productivity, safety, and security products and services worldwide to more than 330 organizations including all major avionics and automobile companies. He was awarded in 2012 the Iowa State Board of Regents Professor Award for excellence in research, teaching, and service. He has served as a Distinguished ACM Lecturer. He has given more than 100 invited talks worldwide at major conferences, government organizations, universities, and industry.</div>
<div style="text-align: left;"> </div>
<div style="text-align: left;"> </div>
<div style="text-align: left;"><img width="150" height="250" style="margin: 5px 5px 8px 0px; float: left;" alt="Akka Zemmari" src="assets/img/committee/akka_1.jpg" />
<p><strong><a name="Akka"></a>Dr. Akka Zemmari</strong></p>
</div>
<div style="text-align: left;">Associate Professor, LaBRI - University of Bordeaux, France </div>
<p style="text-align: left;"><strong>Title</strong></p>
<div style="text-align: left;">Android Malware: Will machine learning be help in hand?<br></div><br>
<div style="text-align: left;"> <strong>Abstract</strong></div>
<div style="text-align: left;"> </div>
<div style="text-align: justify;">
Android is one of the most widely used mobile operating systems of
smart devices. According to Gartner and IDC statistical report,
Android dominates mobile platform with more than 0.345 million
devices worldwide, 86% market shares in Q3 2016. The growing
popularity has a cost. Android platform has become an attractive
target of cyberattacks. Cyber criminals are employing tailored
malware to target such a vibrant ecosystem by gaining access to
confidential and sensitive user information.
<br>
Machine learning is a branch of artificial intelligence which aims to
construct programs that can learn from and make predictions on data.
There is an arsenal of machine learning methods that can be applied to
learn a separation between malicious and benign applications, but only
a few are capable of producing efficient results.
<br>
This report will present advantages and limitations of machine
learning when used to detect Android malwares. It discusses how
prominent features can be extracted from the components of Android
apps when using static analysis and how the set of features can be
enhanced by additional ones when using dynamic analysis.
Then it shows the performance of some machine learning models
when trained on available data, using the extracted features.
<br>
<div style="text-align: left;"><strong><br>Bio</strong></div><br>
<div style="text-align: left;"> Dr. Akka Zemmari has received his Ph.D. degree from the University of Bordeaux, France, in 2000. He is an Associate Professor in Computer Science since 2001 at University of Bordeaux, France. His research interests include distributed algorithms and systems, graphs, randomized algorithms, machine learning and security. He is heading the Distributed algorithms team at the University of Bordeaux. He has participated to national research projects, European research projects, and Europe-India projects. He has about 50 research papers published in international journals and conference proceedings and he is involved in program committees and organization committees of international conferences. </div>
<p style="text-align: justify;"> </p>
<p style="text-align: left;"><img width="150" height="250" style="margin: 5px 5px 8px 0px; float: left;" alt="Mohamed MOSBAH" src="assets/img/committee/mohamed_1.jpg" /> <a name="Mohamed MOSBAH"></a><strong>Prof. Mohamed Mosbah</strong></p>
<div style="text-align: left;"> Professor, Polytechnic Institute of Bordeaux (Bordeaux INP), France</div>
<div style="text-align:left;"> Director of Industrial Partnerships, France</div>
<div style="text-align:left;"> Deputy Director of LaBRI, France</div>
<p style="text-align: left;"><strong> Title</strong></p>
<div style="text-align: left;">Models and Approaches for the Safety and the
Security of Distributed Systems</div>
<div style="text-align: left;">
<p><strong>Abstract</strong></p>
</div>
<div style="text-align: left;"> Problems related to distributed systems are a
major concern of research in computer science. We can particularly mention
design and development of distributed architectures, distributed programming
environments, specification and verification of distributed algorithms, as
well as the study of (wired or wireless) communication networks. For the
success of all those undertakings it is crucial to master the mechanisms and
small-scale phenomena at the foundations of such systems. This talk will
focus of different models that are used to check the safety and the security
these systems. By combining different approaches, it is possible to formally
prove the correction of distributed algorithms. Many examples will be
presented including classical distributed algorithms.</div>
<div style="text-align: left;"><br> <strong>Bio</strong></div>
<div style="text-align: justify;"> Dr. Mohamed Mosbah is a Professor in Computer Science at the Polytechnic Institute of Bordeaux, France. He is currently the Director of Industrial Partnerships and Innovation. He carries his research in LaBRI in computer science common with the University of Bordeaux and CNRS, where he is currently the Deputy Director. His research areas include distributed systems and algorithms, simulation tools, safety and security protocols, and wireless networks. In particular, he is leading a project over the last years to develop a new model together with an integrated methodological framework for distributed algorithms. In addition to capturing classical distributed systems concepts, this framework provides methods and software tools to design, prove and implement distributed algorithms and protocols. This platform is used to teach courses in distributed systems for Graduate computer science students, and also to test and prototype algorithms. He has written more than 60 articles and developed software tools, and he is involved in various technical program committees and organizations of many international conferences. He is also involved in many research projects, mainly with industrial aeronautic companies. He has directed over 52 Master’s theses and over 18 PhD dissertations.</div>
<br> </br>
<div style="text-align: left;"><img width="150" height="250" style="margin: 5px 5px 8px 0px; float: left;" alt="Priyadarsi Nanda-206x195-bordered" src="assets/img/committee/Priyadarsi-Nanda.jpg" />
<p><strong><a name="Priyadarsi Nanda"></a>Dr. Priyadarsi Nanda</strong></p>
</div>
<div style="text-align: left;">Senior Lecturer, University of Technology Sydney, Ausrtalia </div>
<div style="text-align: left;">
Core Member, INEXT - Innovation in IT Services and Applications </div>
<div style="text-align: left;">Core Member, CRIN - Centre for Realtime Information Networks </div>
<p style="text-align: left;"><strong>Title</strong></p>
<div style="text-align: left;"> Software Defined Perimeter : "A new way to protect Network Systems aginst Cyber Threats"</div>
<div style="text-align: left;"> </div>
<div style="text-align: left;"><strong>Abstract</strong></div>
<div style="text-align: left;"> </div>
<div style="text-align: justify;">Due to large variety of devices present in computer network systems, cyber security plays a major role to secure and improve the network and system performances. In recent days, cyber security has been gaining lots of global interest and remains an open research space for future connected technologies. Traditional TCP/IP oriented networks implement security solutions after connections are established across devices in the network. In such scenario, attackers get a chance to enter the data communication stage before authentication process even takes place. To overcome such situation, Cloud Security Alliance recently came up with a novel idea called "Software Defined Perimeter (SDP)" to authenticate first before communication. SDP is designed with three major elements. First, a security model is used to verify identity of the devices or users, and roles for access before granting devices for connection to the protected systems. Second, verification using different advanced crypto schemes are then used to ensure that, the security model is being strictly followed. Finally, any security solution to above two issues are then proven in public domain security controls. In this talk we explore above schemes using various examples and present strategies to combat future threats using SDP.
<div style="text-align: left;"> </div>
<div style="text-align: left;"><strong>Bio</strong></div>
<div style="text-align: justify;"> Dr. Nanda joined UTS in 2001. His roles have
combinations of research, teaching and administration. Dr. Nanda established
the Network Security Research Group at UTS since 2008 and is currently
leading the group on various cybersecurity projects. He has been constantly
engaged in expanding his research activities through various projects and
research student supervision, collaborating with academics and industry
researchers in the area of Cyber Security, IOT Security, Networks Quality of
Service (QoS), Assisted Health Care using Sensor Networks, and Wireless
Sensor Networks. Dr. Nanda has supervised eight research students in the
past and currently supervising seven PhD students. Dr. Nanda has published
over 80 refereed high quality research publications and many of them appear
in Tier A and Tier A* Journals and Conferences.</div>
<br> </br>
<div style="text-align: left;"><img width="150" height="250" style="margin: 5px 5px 8px 0px; float: left;" alt="Mauro Conti-206x195-bordered" src="assets/img/committee/MauroConti.jpg" />
<p><strong><a name="Mauro Conti"></a>Mauro Conti</strong></p>
</div>
<div style="text-align: left;">Associate Professor, University of Padua, Italy </div>
<div style="text-align: left;">EU Marie Curie Fellow </div>
<p style="text-align: left;"><strong>Title</strong></p>
<div style="text-align: left;">Can't You Hear Me Knocking: Novel Security and
Privacy Threats to Mobile Users</div>
<div style="text-align: left;"><strong>Abstract</strong></div>
<div style="text-align: left;"> </div>
<div style="text-align: left;"> While Smartphone and IoT devices usage become
more and more pervasive, people start also asking to which extent such
devices can be maliciously exploited as "tracking devices". The concern is
not only related to an adversary taking physical or remote control of the
device, but also to what a passive adversary without the above capabilities
can observe from the device communications. Work in this latter direction
aimed, for example, at inferring the apps a user has installed on his
device, or identifying the presence of a specific user within a network.<br>
In this talk, we discuss threats coming from contextual information and to
which extent it is feasible, for example, to identify the specific actions
that a user is doing on mobile apps, by eavesdropping their encrypted
network traffic. We will also discuss the possibility of building covert and
side channels leveraging energy consumption and audio signals.<br></div>
<div style="text-align: left;"><strong>Bio</strong></div>
<div style="text-align: justify;"> Mauro Conti is an Associate Professor at the
University of Padua, Italy. He obtained his Ph.D. from Sapienza University
of Rome, Italy, in 2009. After his Ph.D., he was a Post-Doc Researcher at
Vrije Universiteit Amsterdam, The Netherlands. In 2011 he joined as
Assistant Professor the University of Padua, where he became Associate
Professor in 2015. In 2017, he obtained the national habilitation as Full
Professor for Computer Science and Computer Engineering. He has been
Visiting Researcher at GMU (2008, 2016), UCLA (2010), UCI (2012, 2013,
2014, 2017), TU Darmstadt (2013), UF (2015), and FIU (2015, 2016). He has been
awarded with a Marie Curie Fellowship (2012) by the European Commission, and
with a Fellowship by the German DAAD (2013). His main research interest is
in the area of security and privacy. In this area, he published more than
200 papers in topmost international peer-reviewed journals and conference.
He is Associate Editor for several journals, including IEEE Communications
Surveys & Tutorials and IEEE Transactions on Information Forensics and
Security. He was Program Chair for TRUST 2015, ICISS 2016, WiSec 2017, and
General Chair for SecureComm 2012 and ACM SACMAT 2013. He is Senior Member
of the IEEE.</div>
</br>
</div>
<!-- --------------------------------------------- -->
</section>
<!-- Social Links -->
<?php require 'php_includes/social.php'; ?>
</div>
</div>
<!-- Footer -->
<?php require 'php_includes/footer.php'; ?>
</body>
<!-- Core JS Files -->
<script src="assets/js/jquery.min.js" type="text/javascript"></script>
<script src="assets/js/bootstrap.min.js" type="text/javascript"></script>
<script src="assets/js/material.min.js"></script>
<!-- Plugin for the Sliders, full documentation -->
<script src="assets/js/nouislider.min.js" type="text/javascript"></script>
<!-- Control Center for activating the ripples, parallax effects, scripts from the example pages etc -->
<script src="assets/js/material-kit.js" type="text/javascript"></script>
<script type="text/javascript">
$().ready(function(){
// the body of this function is in assets/material-kit.js
$(window).on('scroll', materialKit.checkScrollForTransparentNavbar);
});
</script>
</html>