featured-conference-sg-crc-2016

itrust-logo

supported-by-nrf

Programme

Day I – Thursday, January 14, 2016
0845 – 0900 Arrival and Registration @ SUTD Campus Centre Level 1
0900 – 0915 Opening Ceremony: SUTD Auditorium, Building 2, Level 1
Welcome Address by Prof. Tom Magnanti, SUTD President
0915 – 0930 Opening Remarks by Guest of Honour Mr Lim Chuan Poh, Chairman, Agency for Science, Technology and Research (A*STAR)
0930 – 1030 Next-Generation Security Technologies in a Connected and Intelligent World
Keynote Speaker – Prof. Dawn Song, U C Berkeley
1030 – 1100 Tea break and tour of exhibition area by GOH and VIPs (Campus Centre Level 1)
1100 – 1230
National Cybersecurity (NCR) R&D Project Show-case
Venue: Lecture Theatre 2, Building 1, Level 2
Session Chair: Prof. Thambipillai Srikanthan,
Nanyang Technological University
Secure Mobile Centre – Technologies and Solutions for Securing Mobile Computing
Speaker: Prof. Robert Deng (PI), Singapore Management University (SMU)
Co-PIs: Pang Hwee Hua, Ding Xuhua, Gao Debin, Li Yingjiu
Design of Secure Cyber Physical Systems
Speaker: Prof. Aditya Mathur (PI), Singapore University of Technology and Design (SUTD)
Co-PIs: Costas Courcoubetis, Roland Bouffanais, Lingjie Duan, Stefano Galeli, Sun Jun, Justin Ruths, Nils Tippenhauer, David Yau
A Cyber-Physical Approach to Securing Urban Transportation Systems
Speaker: Dr. Zhou Jianying (PI), Institute for Infocomm Research (I2R)
Co-PIs: Huaqun Guo, Yih-Chun Hu, Douglas L. Jones, Zbigniew T. Kalbarczyk, David M. Nicol, William H. Sanders, Yongdong Wu, David K Yau
Securify: A Compositional Approach of Building Security Verified System
Speaker: Asst. Prof. Liu Yang (Co-PI), Nanyang Technological University (NTU)
PI: Thambipillai Srikanthan
Co-PIs: Alwen Tiu, Dong Jin Song, Chin Wei Ngan, Sun Jun
1230 – 1330 Lunch @ Campus Centre Level 1
1330 Session 1: Mobile and Internet Security
Session Chair: Assoc. Prof. Li Yingjiu, SMU
1330 – 1400 Q-Floid: Android Malware detection with Quantitative Data Flow Graphs,
J. H. Castellanos, T. Wüchner, M. Ochoa and S. Rueda, Universidad de los Andes
1400 – 1430 Cyber and Physical Access Control in Legacy System Using Passwords,
J. Xu, J. Y. Zhou and L. Lu, I2R
1430 – 1445 A Framework for Large-Scale Collection of Information from Smartphone Users based on Juice Filming Attacks,
W. Z. Meng, W. H. Lee and S. P. T. Krishnan, I2R
1445 – 1500 Telephone-based social engineering attacks: An experiment testing the success and time decay of an intervention,
J. Bullee, L. Montoya, M. Junger and P. Hartel, University of Twente
1500 – 1515
Directed Transitive Signature on Directed Tree,
J. Xu, E. Chang and J. Y. Zhou, I2R
1515 – 1530 Privacy-Preserving and Verifiable Data Aggregation,
H. Tran, R. Deng and H. H. Pang, SMU
1530 – 1600 Tea Break @ Campus Centre Level 1
1600 Session 2: Cyber Physical Systems
Session Chair: Dr. Zhou Jianying, I2R
1600 – 1630 Data Driven Physical Modelling For Intrusion Detection In Cyber Physical Systems
K. N. Junejo and D. Yau, SUTD
1630 – 1700 Detecting Multi-Point Attacks in a Water Treatment System Using Intermittent Control Actions
S. Adepu and A. Mathur, SUTD
1700 – 1730 Attacking Fieldbus Communications in ICS: Applications to the SWaT Testbed
D. Urbina, J. Giraldo, N. O. Tippenhauer and A. Cardenas, SUTD
Day II– Friday, January 15, 2016
Venue: Lecture Theatre 2, SUTD Building 1 Level 2
0845 – 0900 Registration @ SUTD Campus Centre Level 1
0900 – 0945
Invited talk 1: Developing Security Protocols by Refinement
Speaker: Prof David Basin, ETH Zurich
0945 – 1030 Invited talk 2:
Secure and Resilient Industrial Control Systems: A Behaviour-based Approach
Speaker: Dr.Dimitrios Serpanos, QCRI
1030 – 1100 Tea Break @ Campus Centre Level 1
1100 – 1200                         National Cybersecurity (NCR) R&D Project Show-case
                                      Session Chair: Prof. Aditya Mathur, SUTD
TSUNAMi: Trustworthy Systems from UN-trusted component Amalgamations
Speaker: Prof. Abhik Roychoudhury (PI), National University of Singapore (NUS)
Co-PIs: Liang Zhenkai, Prateek Saxena, Dong Jin Song, Chang Ee-chien, Roland H.C. Yap.
Cyber Forensics & Intelligence
Speaker: Dr. Vrizlynn Thing (PI), Institute for Infocomm Research (I2R)
Co-PIs: Chua Tong Wei, Dinil Mon Divakaran
Securing data on the cloud storage using information dispersal algorithm to massively disperse data in dynamically configurable storage nodes
Speaker: Mr Mar Kheng Kok (PI), Nanyang Polytechnic (NYP)
Co-PIs: Law Chee Yong, Hu ZhengQing
1200 – 1330                                       Industry Insights into Security
Cyber-Security Starts with the Source Code
Speaker: Mr Steve Neo, Business Manager, Parasoft South East Asia
Securing Android
Speaker: Mr Nader Henein, Regional Director, Advanced Security Division, BlackBerry
Cross Platform Intrusion Detection System for SCADA Network
Speaker: Mr Ginnwann Teo, Regional Technical Manager, South Asia, Check Point Software Technologies
Are the Current ICT & ICS Cybersecurity Technologies Secure Enough?
Speaker: Mr Amir Davidi, Research Manager, Custodio
1330 – 1430 Lunch @ Campus Centre Level 1
1430 – 1600                                              Panel Discussion: Cybercrime
                                         Moderator: Prof. Abhik Roychoudhury,
                                                National University of Singapore
. Madan Oberoi (Lead Panellist)
Director, Cyber Innovation and Outreach,INTERPOL Global Complex for Innovation
. Prof.Adams Kong
Associate Professor, School of Computing Engineering , Nanyang Technological University
. Mr Vitaly Kamluk
Director , Global Research & Analysis Team, APAC, Kaspersky Lab
. SUPT Teo Wee Meng
Head, Technology Crime Investigation Branch, Criminal Investigation Department , Singapore Police Force
. Q&A
1600 –  1630 Tea Break @ Campus Centre Level 1
1630 Session 3: Cyber Forensics
Session Chair: Dr Dinil Mon Divakaran, I2R
1630 – 1645 Accurate in-network file-type classification
D. M. Divakaran, Y. S. Liau and V. L. L. Thing, I2R
1645 – 1700 Simulation of Cyber-Physical Attacks on Water Distribution Systems with EPANET
R. Taormina, S. Galelli, N. O. Tippenhauer, E. Salomons and A. Ostfeld, SUTD
1700 – 1730 Image Region Forgery Detection: A Deep Learning Approach
Y. Zhang, J. Goh, L. L. Win and V. L. L. Thing, I2R
1730 – 1745 Student Paper Presentation – Hardware Identification via Sensor Fingerprinting in a Cyber Physical System
C. M. Ahmed, SUTD
1745 – 1800 Closing Address by Prof. Aditya Mathur
Introduction of next conference by Prof. Abhik Roychoudhury