Security and Privacy
Available Speakers on this Topic
Haider Abbas – Islamabad, Pakistan
-
Cyber Security Auditing and Evaluation: A Challenge for Every Organization
The aim of cyber security is to protect the systems, software and networks from malicious activities and attacks launched to gain illegitimate access, steal information or disrupting the services...
-
Cyber Security Threat Landscape in the Context of Industry 4.0
Industry 4.0 is revolutionizing the ways in which industries function. Big data, industrial control systems, supervisory control, and data acquisition systems, smart machines, robotics, internet...
-
Cybersecurity and COVID Pandemic Era
In response to the COVID-19 pandemic, reliance on online and cyberspace alternatives has increased as the individuals have been made to work from remote locations/homes. As a result, many...
-
Cyberwarfare: Who Needs a Gun when you have a Keyboard?
With the increasing reliance of governments on technology, the internet landscape has become a battlefield. Cyber warfare has become a dominant threat to the governments and business industries....
-
Security Assessment of Operating Systems
Security of any computer system largely depends on the security of its operating system (OS). Operating systems are a primary target of the hackers because of the information stored in the OS. A...
Mohiuddin Ahmed – Perth, WN, Australia
-
Blockchain Applications and Security: Current Topics in Computer Science
Blockchain is embraced by a varitety of application domains. In this talk, blockchain is discussed from the cybersecurity perspective. There is a contunuous rise in the number...
- Current Issues in Cyber Security
Cyber security is an undeniable factor in todays era of Internet. Anything connected to the Internet can be hacked and regardless of the secuerity measures, hackers are still unstoppable....Rizwan Ahmed – Nagpur, India
-
Mobile Forensics and Cyber Crime Investigations
This talk will cover various technical aspects related to Mobile Forensics. This talk will cover following specific...
Mohiuddin Ahmed – Perth, WN, Australia
-
Securing Internet of Health Things using Synergistic Blockchain
The latest digital innovations are creating opportunities for reshaping how healthcare organisations deliver patient services, improve outcomes, enhance clinician satisfaction and manage...
- Security of Internet of Medical Things (IoMT)
In this talk, the advances in digitla healthcare is showcased. COnsequently the vulnerabilities arising from the usage of digital healthcre are also explored. A potential solution for these...Mohammed M. Alani – Mississauga, ON, Canada
-
How can we trust AI in Cybersecurity?
With the cybersecurity market exceeding 50USD billion, are organizations doing enough to stops the rapid increase in attacks? The trends and the success rates of the attacks suggest...
- How safe is your AI application?
The rapid growth in adopting artificial intelligence in different aspects of life has made it an interesting target to malicious actors. The growth in investments in artificial intelligence should...Mamoun Alazab – Bayview, ACT, Australia
-
The role of AI in fighting Polymorphic and Metamorphic Malware
Mal-ware is one of the major security threats in computer which have been in existence from the very early days. There is a lack of understanding of such malware threats and what mechanisms can be...
Parameshachari B D – Karnataka, India
-
Introduction Technologies in Cryptography and Network Security
In recent decades, the requirements of information security within an organization have undergone a few major changes. Before the widespread usage of data processing equipment, the...
-
Security in Medical Image Communication
In the medical field, patient’s information plays a crucial role for tele-diagnosis and tele-surgery. Security is the critical problem amid during the transmission of medical images, because...
Federico Cerutti – Brescia, Italy
-
Artificial Intelligence for Cyber Threat Intelligence Analysis
Cyber Threat Intelligence is the cyclic process analysts use to produce knowledge about weaknesses of one or more organisation's assets that can be exploited by one or more threats. Artificial...
-
The Importance of Causality in Cyber Threat Intelligence Analysis
Each cyber attack is a set of chains of events linked together by time and causality: attackers’ and defenders’ actions influence each other in a complex, interconnected web of causal...
Aswani Kumar Cherukuri – Vellore, India
-
Exploring Blockchain Technology
Blockchain is a distributed ledger technology that maintains verifiable records with protection against malicious modifications and with Byzantine fault tolerance. This...
Kim-Kwang Raymond Choo – San Antonio, TX, United States
-
An interdisciplinary STEAM approach to cyber security research
Culturally and economically open nations, such as the United States (US), have thrived on the wealth that cyberspace and technologies have enabled. However, just as cyberspace and technologies...
-
Internet of Things (IoT) Forensics: Challenges and Opportunities
Internet of Things (IoT) devices are becoming commonplace in our society, due to their widespread applications (e.g., environmental monitoring, smart cities, healthcare, surveillance, and...
-
Internet of Things (IoT) cyber security and threat intelligence: What are the research challenges and opportunities?
Internet of Things (IoT) devices are becoming commonplace in our society, due to their widespread applications (e.g., environmental monitoring, smart cities, healthcare, surveillance, and...
Ashutosh Dutta – Laurel, MD, United States
-
Security in 5G Networks - Challenges and Opportunities
Software Defined Networking (SDN) and Network Function Virtualization (NFV) are the key pillars of future networks, including 5G and beyond that promise to support emerging applications such as...
Josiah Dykstra – Severn, MD, United States
-
American Self-Defense in Cyberspace
The United States is a major consumer, contributor, and target in cyberspace. This talk will describe cyber threats, roles and responsibilities, technology, and policy considerations for achieving...
-
Getting Started with Cybersecurity Science
This talk offers an introduction for students and practitioners to the application of the scientific method to cybersecurity tools and systems. Creating, using, and evaluating cybersecurity tools...
Francesco Flammini – Västerås, Sweden
-
Introduction to Industrial Cybersecurity
This seminar addresses the fundamental concepts of cybersecurity providing basic definitions and a taxonomic introduction to most common security threats and technologies. In particular,...
- Risk Modeling and Evaluation for Resilient Cyber-Physical Systems: From Design-Time to Run-Time
The concept of risk is a combination of threat probabilities, vulnerabilities and expected consequences. In traditional risk modeling and evaluation approaches, analyses are performed at...Swaroop Ghosh – State College, PA, United States
-
Comprehensive treatment of security of persistent memories
Conventional volatile memories e.g., Static RAM (SRAM) suffer from significant leakage power whereas conventional storage class Non-Volatile Memories (NVMs) e.g., Flash suffer from higher...
- Exploiting Emerging Memory Technologies for Hardware Security
CMOS switches, although universal, fail to meet energy-efficiency, scalability and emerging constraints such as, security. Recent experimental studies have revealed that emerging...- Obfuscation of analog IPs
Analog Integrated Circuits (ICs) are one of the top targets for counterfeiting. However, the security of analog Intellectual Property (IP) is not well investigated as its digital counterpart....Gernot Heiser – Sydney, NSW, Australia
-
Making Trusted Systems Trustworthy
We trust computer systems all the time: with our money, our sensitive private data, our critical infrastructure and, in the age of autonomous vehicles, increasingly with our lives. Yet...
Rasheed Hussain – Bristol, United Kingdom
-
Artificial Intelligence and Cybersecurity: Opportunities and Outlook
This lecture covers the role of Artificial Intelligence (AI) in Cybersecurity. With the emergence of new technologies, increase in the volume, velocity, veracity, and variety of data calls for new...
-
Artificial Intelligence in API security: A case for automotives
Application Programming Interface (API) is a mechanism that has enabled the rapid development and availability of services, scalability, and sharing of services and value among different...
-
Future Internet Architecture: Content vs. Source of the Content
Over the last few decades, the use of Internet has been dominated by the interest in content in different forms such as audio, video, images, and so on. It is worth mentioning that the original...
-
On the Role of APIs in Connected and Autonomous Cars: A Case for Critical Applications
Application Programming Interface (API) is a mechanism that has enabled the rapid development and availability of services, scalability, and sharing of services and value among different...
-
Role of Artificial Intelligence and Machine Learning in API security
Application Programming Interface (API) is a mechanism that has enabled the rapid development and availability of services, scalability, and sharing of services and value among different...
-
Security of Digital Twins for Security through Digital Twins
This lecture covers the role of security considerations in digital twin modeling for different environments including networks and cyber-physical systems. The need for security of digital twin is...
Latifur Rahman Khan – Plano, TX, United States
-
Automating Vulnerability Detection and Prevention in Smart Contracts
With the increase in the adoption of blockchain technology in providing decentralized solutions to various problems, smart contracts have been becoming more popular to the point that billions of...
Charalambos Konstantinou – Jeddah, Saudi Arabia
-
Cyber-Physical Infrastructure of Power Systems: Security Threats, Challenges and Countermeasures
Election hacking, power grid cyber-attacks, troll farms, fake news, ransomware, and other terms have entered our daily vocabularies and are here to stay. Cybersecurity touches nearly every part of...
-
Cyber-Physical Systems Security Education through Hands-on Lab Exercises
As information and communication technologies become more embedded into our daily life, cyber-physical systems (CPS) have attracted extensive attention from industry, academia, and the government...
-
Cyber-Physical and Embedded Systems Security: A Hardware Security Perspective
Embedded devices are increasingly integrated in several cyber-physical domains including power grid, home and automation networks, and smart/connected cars. The deployment of embedded systems in...
-
Introduction to Industrial Control Systems Security
This talk introduces basic and advanced topics on industrial control systems (ICS) security. It starts with operational security, providing guidance on recognizing weaknesses in everyday...
-
Trustworthy and Resilient Cyber-Physical Systems
As information and communication technologies become more embedded into our daily life, cyber-physical systems (CPS) have attracted extensive attention from industry, academia, and the government...
Weizhi Meng – Copenhagen, Denmark
-
Towards Trust Management-based Detection in Internet of Things
With the tremendous development of Internet of Things (IoT), many security concerns have been raised. For protection, detection mechanisms like intrusion detection system (IDS) are moving...
Mehdi Mirakhorli – Rochester, NY, United States
-
Secure by Design
Secure by design is an approach to developing secure software systems from the ground up. In such an approach, the alternate security controls and design decisions are first thought;...
Sanjay Misra – Lagos, Nigeria
-
Machine Learning Approach for Android Malware
Android is by far the most widely used mobile phone operating system around. However, Android-based applications are highly vulnerable to various types of malware attacks...
David Mohaisen – Orlando, FL, United States
-
How Secure are Blockchain Systems?
Blockchains are promising many applications in distributed computing systems, ranging from supply chain to critical infrastructure (e.g., cyber-physical systems). For foundations-driven guarantees...
-
Malware Analysis and Classification Using Machine Learning
Malicious software (or malware) is a vehicle for adversaries to launch various types of attacks, and there has been a constant steam of malware samples in the wild over the past few years. Per one...
-
Towards Taming Adversarial Machine Learning: Security Applications Perspectives
The recent rapid advances in machine and deep learning algorithms have found many applications in the security space, targeting various applications including intrusion detection systems, malware...
Nour Moustafa – Canberra, ACT, Australia
-
A New Distributed Architecture for Evaluating AI-based Security Systems at the Edge: Network TON\_IoT Datasets
While there has been a significant interest in understanding the cyber threat landscape of Internet of Things (IoT) networks, and the design of Artificial Intelligence (AI)-based security...
-
A Novel Cognitive Computing Technique using Convolutional Networks for Automating the Criminal Investigation Process in Policing
Criminal Investigation (CI) plays an important role in policing, where police use various traditional techniques to investigate criminal activities such as robbery and assault. However, the...
- Attacking Techniques and Intrusion Detection: Getting insights of Signature vs Anomaly models
In this lecture, we will discuss Intrusion Techniques Viruses and Worms. We will also describe the concepts of signature vs anomaly detection in network systems. We will Learn Signature...- Distributed Anomaly Detection System as a Service using Statistical Learning for Industrial IoT-Edge-Cloud Networks
As Industrial Internet of Things (IIoT) systems have become more commonplace, there are various data management and security monitoring tools deployed at the cloud for logging and inspecting...Zeeshan Pervez – Paisley, United Kingdom
-
Blockchain: paving the way for open and transparent governance in smart cities
In this lecture, I will discuss a hybrid deployment model of blockchain for open and transparent governance in smart cities. The lecture will present participatory application in which inhabitants...
-
Making sense out of IoT data streams
Internet-of-Things (IoT) generates enormous data streams from a sensing and actuating environment. Extracting valuable information from these data streams enables service providers (smart cities,...
Danda B Rawat – Washington, DC, United States
-
Blockchain Technology: Emerging Applications and Use Cases
Blockchain technology stores different transactions/operations in a chain of blocks in a distributed manner without needing a trusted third-party. Furthermore, blockchain is proven to be immutable...
RK Shyamasundar – Mumbai, India
-
A Runtime Monitoring Framework for Correct Execution of Smart Contracts
Smart contracts have been subjected to several attacks that have exploited various vulnerabilities of languages like Solidity, which has resulted in huge financial losses. The...
- A Safety Assessment of ERC20 Standards
Tokens are blockchain-based assets which can be exchanged across users of a blockchain platform. ERC20 defines a standard for the creation of a specific type, called ERC20 token, one of the...- Building Secure Information Systems Using Decentralised Information Flow Control
The ability to control the release and propagation of information lies at the heart of systems security. Lattice model of secure information flow proposed by Dorothy Denning provides...- Data Privacy in Public Data Sets and Statistical Databases
In the context data privacy laws, there is a need to address the general question of protecting privacy when publicly releasing information about a sensitive dataset. With transactional and...- Multi-Level Secure Databases: Security and Privacy
Ever since databases became a ubiquitous part of enterprises or businesses, security and privacy became a requirement. Traditionally, privacy was realized through various methods of...- Smart Contracts, Vulnerability Exploitation in Solidity Smart Contracts and Best Practices
Smart contracts have been subjected to several attacks that have exploited various vulnerabilities of languages like Solidity, which has resulted in huge financial losses. The...- Threat Modelling, and Vulnerability Analysis of Blockchain Systems1
The blockchain platform is a complex system consisting of nodes, network devices, authentication services, dApps, wallets, web interfaces, key storage, miners, etc. It is a network of centralized...Biplab Sikdar – Singapore, Singapore
-
Cyber Security Challenges and Solutions for the Internet of Things
The Internet of Things (IoT) represents a great opportunity to connect people, information, and things, which will in turn cause a paradigm shift in the way we work, interact, and think. The IoT...
-
Cyber Security and Privacy for Smart Cities
As cities strive to maintain their economic growth and provide the civic infrastructure to its residents and businesses, they are increasingly turning to “smart solutions”. The...
Nicolas Sklavos – Patra, Greece
-
Cybersecurity for 5G and 6G Technologies
We are about to witness soon the first incarnation of 5G/6G technologies. It provides many breakthrough capabilities that will enable it as a preferred platform for the digitized business of the...
-
Hardware Security for IoT-Based, Healthcare Applications
This lecture presents an ongoing research on hardware security for healthcare systems that utilize the IoT technology. The main vulnerabilities of these architectures are presented as well as the...
-
In the Era of Cybersecurity: Cryptographic Hardware and Embedded Systems
Cybersecurity is a completely new concept, which has attracted the major interest of both academia and industry. New technologies, such as Internet of Things, have shown special interest for...
Yan Solihin – Orlando, FL, United States
-
Secure Execution Environment: Design Principles and Common Pitfalls
There is an increasing demand for the processor architecture to provide secure execution environment in various compute platforms including the cloud and Internet of Things (IoT) devices. Current...
-
Security Implications of Persistent Memory
Persistent memory allows a new abstraction for persistent data by wrapping data structures into Persistent Memory Objects (PMOs). PMOs offer conveniences but introduces new security...
Gaurav Somani – Ajmer, India
-
Advanced Persistent Threats: Incidents and road ahead
In this talk, we discuss the upcoming cyber security threat, advanced persistent threat (APT) which is very hard to detect due to its zero-day nature. Zero-day vulnerabilities do not get detected...
-
Cloud and Virtualization: Inception, Reality and Usage
In this talk, we give a practical overview of cloud computing infrastructures and virtualization technology. This involves, discussion related to server consolidation, formal model of a virtual...
-
DDoS Attack Space in Cloud Computing
In this talk, we will get to understand one of the important security breaches in modern networks, DDoS (distributed denial of service) attack and its impact on emerging cloud computing...
-
Security Engineering: Overview and Directions
In this talk, we discuss an important field of cyber security solution space where we strive to design security solutions by keeping a number of aspects in mind. Security Engineering is a...
Houbing Song – Baltimore, MD, United States
-
Counter-Unmanned Aircraft System(s) (C-UAS): State of the Art, Challenges and Future Trends
There is an increasing need to fly Unmanned Aircraft Systems (UAS, commonly known as drones) in the airspace to perform missions of vital importance to national security and defense, emergency...
Gautam Srivastava – Brandon, MB, Canada
-
Blockchain Technology for the Internet of Medical Things
The healthcare industry has been at the cutting edge of technology since time immemorial. Hardware, software, medication, surgical procedures; the quality of care available to patients in...
- Intrusion Detection Systems in Multi-Core Systems
Multi-core processors have been shown to represent a major evolution in computing hardware technology, and are now common. Multi-cores provide a network security application with more...- The Changing Landscape of Blockchain Technology
In this talk, we will discuss Blockchain technology and how the landscape of applicationswhere Blockchain can be applied is changing and progessing. Blockchain is currently...Shamik Sural – Kharagpur, India
-
Access Control: Foundations and Recent Advancements
Access control is one of the most important pillars of computer security and is a well-researched topic in this field spanning more than four decades. Access control mechanisms, typically...
Daniel Takabi – ATLANTA, GA, United States
-
Secure Privacy preserving Machine Learning
Deep learning with neural networks has become a highly popular machine learning method due to recent breakthroughs in computer vision, speech recognition, and other areas. However, the deep...
Salvador Elias Venegas-Andraca – Mexico City, Mexico
-
Cybersecurity and Quantum Computing
Quantum technology is a multidisciplinary field of science and engineering in which physics, mathematics, computer science, and engineering meet with the goal of understanding how quantum...
Stefano Zanero – Milano, Italy
-
Breaking the Laws of Robotics: Attacking Industrial Robots
Industrial robots are complex cyber-physical systems used for manufacturing, and a critical component of any modern factory. These robots aren't just electromechanical devices but include...
-
Crouching hacker, killer robot? Removing FUD from cyber-physical security
Cyber-physical systems are attracting a lot of attention: attacks on connected cars received a lot of media exposure, as did attacks on industrial control systems, airplanes or medical devices. A...
-
MAKING SENSE OF A MILLION SAMPLES PER DAY: BEHAVIOR-BASED METHODS FOR AUTOMATED, SCALABLE MALWARE ANALYSIS
With the astonishing rate of new and modified malware samples being released daily, automation of analysis is needed to classify and cluster together similar samples, exclude basic and...
-
Breaking the Laws of Robotics: Attacking Industrial Robots
-
Secure Privacy preserving Machine Learning
- Intrusion Detection Systems in Multi-Core Systems
-
Advanced Persistent Threats: Incidents and road ahead
- A Safety Assessment of ERC20 Standards
- Attacking Techniques and Intrusion Detection: Getting insights of Signature vs Anomaly models
-
Secure by Design
-
Artificial Intelligence and Cybersecurity: Opportunities and Outlook
- Exploiting Emerging Memory Technologies for Hardware Security
- Risk Modeling and Evaluation for Resilient Cyber-Physical Systems: From Design-Time to Run-Time
-
An interdisciplinary STEAM approach to cyber security research
- How safe is your AI application?
- Security of Internet of Medical Things (IoMT)
-
Securing Internet of Health Things using Synergistic Blockchain
- Current Issues in Cyber Security