: Widget class not found. Make sure this widget exists and the class name is correct
Programme
Day I – Thursday, January 14, 2016 |
||||||
0845 – 0900 | Arrival and Registration @ SUTD Campus Centre Level 1 | |||||
0900 – 0915 | Opening Ceremony: SUTD Auditorium, Building 2, Level 1 Welcome Address by Prof. Tom Magnanti, SUTD President |
|||||
0915 – 0930 | Opening Remarks by Guest of Honour Mr Lim Chuan Poh, Chairman, Agency for Science, Technology and Research (A*STAR) | |||||
0930 – 1030 | Next-Generation Security Technologies in a Connected and Intelligent World Keynote Speaker – Prof. Dawn Song, U C Berkeley |
|||||
1030 – 1100 | Tea break and tour of exhibition area by GOH and VIPs (Campus Centre Level 1) | |||||
1100 – 1230 |
|
|||||
1230 – 1330 | Lunch @ Campus Centre Level 1 | |||||
1330 | Session 1: Mobile and Internet Security Session Chair: Assoc. Prof. Li Yingjiu, SMU |
|||||
1330 – 1400 | Q-Floid: Android Malware detection with Quantitative Data Flow Graphs, J. H. Castellanos, T. Wüchner, M. Ochoa and S. Rueda, Universidad de los Andes |
|||||
1400 – 1430 | Cyber and Physical Access Control in Legacy System Using Passwords, J. Xu, J. Y. Zhou and L. Lu, I2R |
|||||
1430 – 1445 | A Framework for Large-Scale Collection of Information from Smartphone Users based on Juice Filming Attacks, W. Z. Meng, W. H. Lee and S. P. T. Krishnan, I2R |
|||||
1445 – 1500 | Telephone-based social engineering attacks: An experiment testing the success and time decay of an intervention, J. Bullee, L. Montoya, M. Junger and P. Hartel, University of Twente |
|||||
1500 – 1515 |
Directed Transitive Signature on Directed Tree, J. Xu, E. Chang and J. Y. Zhou, I2R |
|||||
1515 – 1530 | Privacy-Preserving and Verifiable Data Aggregation, H. Tran, R. Deng and H. H. Pang, SMU |
|||||
1530 – 1600 | Tea Break @ Campus Centre Level 1 | |||||
1600 | Session 2: Cyber Physical Systems Session Chair: Dr. Zhou Jianying, I2R |
|||||
1600 – 1630 | Data Driven Physical Modelling For Intrusion Detection In Cyber Physical Systems K. N. Junejo and D. Yau, SUTD |
|||||
1630 – 1700 | Detecting Multi-Point Attacks in a Water Treatment System Using Intermittent Control Actions S. Adepu and A. Mathur, SUTD |
|||||
1700 – 1730 | Attacking Fieldbus Communications in ICS: Applications to the SWaT Testbed D. Urbina, J. Giraldo, N. O. Tippenhauer and A. Cardenas, SUTD |
Day II– Friday, January 15, 2016 Venue: Lecture Theatre 2, SUTD Building 1 Level 2 |
|
0845 – 0900 | Registration @ SUTD Campus Centre Level 1 |
0900 – 0945 |
Invited talk 1: Developing Security Protocols by Refinement Speaker: Prof David Basin, ETH Zurich |
0945 – 1030 | Invited talk 2: Secure and Resilient Industrial Control Systems: A Behaviour-based Approach Speaker: Dr.Dimitrios Serpanos, QCRI |
1030 – 1100 | Tea Break @ Campus Centre Level 1 |
1100 – 1200 | National Cybersecurity (NCR) R&D Project Show-case Session Chair: Prof. Aditya Mathur, SUTD TSUNAMi: Trustworthy Systems from UN-trusted component Amalgamations Speaker: Prof. Abhik Roychoudhury (PI), National University of Singapore (NUS) Co-PIs: Liang Zhenkai, Prateek Saxena, Dong Jin Song, Chang Ee-chien, Roland H.C. Yap. Cyber Forensics & Intelligence Speaker: Dr. Vrizlynn Thing (PI), Institute for Infocomm Research (I2R) Co-PIs: Chua Tong Wei, Dinil Mon Divakaran Securing data on the cloud storage using information dispersal algorithm to massively disperse data in dynamically configurable storage nodes Speaker: Mr Mar Kheng Kok (PI), Nanyang Polytechnic (NYP) Co-PIs: Law Chee Yong, Hu ZhengQing |
1200 – 1330 | Industry Insights into Security Cyber-Security Starts with the Source Code Speaker: Mr Steve Neo, Business Manager, Parasoft South East Asia Securing Android Speaker: Mr Nader Henein, Regional Director, Advanced Security Division, BlackBerry Cross Platform Intrusion Detection System for SCADA Network Speaker: Mr Ginnwann Teo, Regional Technical Manager, South Asia, Check Point Software Technologies Are the Current ICT & ICS Cybersecurity Technologies Secure Enough? Speaker: Mr Amir Davidi, Research Manager, Custodio |
1330 – 1430 | Lunch @ Campus Centre Level 1 |
1430 – 1600 | Panel Discussion: Cybercrime Moderator: Prof. Abhik Roychoudhury, National University of Singapore . Madan Oberoi (Lead Panellist) Director, Cyber Innovation and Outreach,INTERPOL Global Complex for Innovation . Prof.Adams Kong Associate Professor, School of Computing Engineering , Nanyang Technological University . Mr Vitaly Kamluk Director , Global Research & Analysis Team, APAC, Kaspersky Lab . SUPT Teo Wee Meng Head, Technology Crime Investigation Branch, Criminal Investigation Department , Singapore Police Force . Q&A |
1600 – 1630 | Tea Break @ Campus Centre Level 1 |
1630 | Session 3: Cyber Forensics Session Chair: Dr Dinil Mon Divakaran, I2R |
1630 – 1645 | Accurate in-network file-type classification D. M. Divakaran, Y. S. Liau and V. L. L. Thing, I2R |
1645 – 1700 | Simulation of Cyber-Physical Attacks on Water Distribution Systems with EPANET R. Taormina, S. Galelli, N. O. Tippenhauer, E. Salomons and A. Ostfeld, SUTD |
1700 – 1730 | Image Region Forgery Detection: A Deep Learning Approach Y. Zhang, J. Goh, L. L. Win and V. L. L. Thing, I2R |
1730 – 1745 | Student Paper Presentation – Hardware Identification via Sensor Fingerprinting in a Cyber Physical System C. M. Ahmed, SUTD |
1745 – 1800 | Closing Address by Prof. Aditya Mathur Introduction of next conference by Prof. Abhik Roychoudhury |