Accepted Papers


Full Length Papers

  1. Ostinato: Cross-host Attack Correlation through Attack Activity Similarity Detection
    Sutanu Kumar Ghosh (University of Illinois, USA); Kiavash Satvat (University of Illinois, USA); Rigel Gjomemo (University of Illinois, USA); Venkat.N. Venkatakrishnan (University of Illinois, USA)

  2. DKS-PKI: A Distributed Key Server Architecture for Public Key Infrastructure
    Abu Faisal (Queen’s University, Canada); Mohammad Zulkernine (Queen’s University, Canada)

  3. Generating-Set Evaluation of Bloom Filter Hardening Techniques in Private Record Linkage
    Karin Mortl (University of Denver, USA); Rinku Dewri (University of Denver, USA)

  4. SHIELD: A Multimodal Deep Learning Framework For Android Malware Detection
    Narendra Singh (IIT Patna, India); Somanath Tripathy (IIT Patna, India); Bruhadeshwar Bezawada (IIT Jammu, India)

  5. Samyukta: A Unified Access Control Model using Roles, Labels, and Attributes
    Radhika B S (IIIT Dharwad, India); N V Narendra Kumar (IDRBT, India); R K Shyamasundar (IIT Bombay, India)

  6. Attacks on ML Systems: From Security Risk Analysis to Attack Mitigation
    Qingtian Zou (Pennsylvania State University, USA); Lan Zhang (Pennsylvania State University, USA); Anoop Singhal (National Institute of Standards and Technology, USA); Xiaoyan Sun (California State University, USA); Peng Liu (Pennsylvania State University, USA)

  7. Efficient and Effective Static Android Malware Detection Using Machine Learning
    Vidhi Bansal (Indira Gandhi Delhi Technical University for Women, India); Mohona Ghosh (Indira Gandhi Delhi Technical University for Women, India); Niyati Baliyan (Indira Gandhi Delhi Technical University for Women, India)

  8. MILSA: Model Interpretation based Label Sniffing Attack in Federated Learning
    Debasmita Manna (IIT Patna, India); Harsh Kasyap (IIT Patna, India); Somanath Tripathy (IIT Patna, India)

Short Papers

  1. IoTInDet: Detecting Internet of Things Intrusions with Class Scatter Ratio and Hellinger Distance Statistics
    Bhuvaneswari Amma N G (Vellore Institute of Technology, India); Valarmathi P (Vellore Institute of Technology, India)

  2. Detecting Cloud originated DDoS attacks at the source using Out-cloud attack detection (OCAD)
    Gulshan Kumar Singh (Central University of Rajasthan, India); Gaurav Somani (Central University of Rajasthan, India)

  3. Mining Attribute-Based Access Control Policies
    Maryam Davari (Queen’s University, Canada); Mohammad Zulkernine (Queen’s University, Canada)

  4. Preventing Privacy-Violating Information Flows in JavaScript Applications using Dynamic Labelling
    Sandip Ghosal (Uppsala University, Sweden); R. K. Shyamasundar (IIT Bombay, India)

  5. On the Impact of Model Tolerance in Power Grid Anomaly Detection Systems
    Srinidhi Madabhushi (University of Denver, USA); Rinku Dewri (University of Denver, USA)

Work-In-Progress Papers

  1. WiP: Control Plane Saturation Attack Mitigation in Software Defined Networks
    Neminath Hubballi (IIT Indore, India); Kanishk Patel (IIT Indore, India)

  2. WiP: EventTracker-Event Driven Evidence Collection for Digital Forensics
    Aniket Sangwan (IIT Indore, India); Sarthak Jain (IIT Indore, India); Neminath Hubballi (IIT Indore, India)

  3. WiP: Characterizing the Impact of Multiplexed DoS Attacks on HTTP and Detection
    Shaurya Sood (IIT Indore, India); Pritesh Palod (IIT Indore, India); Neminath Hubballi (IIT Indore, India)