Proceedings by ACM Press.
All papers will be inserted into the ACM Digital Library and
subsequently indexed by Scopus.
Where
Istanbul, Turkey
When
4-7 November 2020
Registration
Conference Venue
ONLINE
Organized by:
- Istanbul technical University, Istanbul, Turkey
- Hasan kalyoncu University, Gaziantep, Turkey
- The University of Glasgow, Glasgow, UK
- Rutgers University, Newark, USA
- Kennesaw State University, Georgia, USA
- Malaviya National Institute of Technology, Jaipur, India
- Manipal University Jaipur, India
- Macquarie University, Sydney, Australia
- Cardiff University, Wales, UK
- Southern Federal University, Taganrog, Rostov-on-Don, Russia
- Sochi State University, Sochi, Russia
Hosted by:
- Department of Electronics and Communication Engineering, Istanbul Technical University, Istanbul, Turkey
Supported by:
- Kaspersky Academy, View abstract
Important Links
SIN 2020 will feature the following keynote talks:
- Albert Levi, Sabanci University, Turkey. Biography, View abstract
Conference Chair
- Berna Ors Yalcin, Istanbul Technical University, Turkey
Conference Co-Chairs
- Atilla Elçi, Hasan Kalyoncu University, Turkey
- Ron Poet, University of Glasgow, Scotland
- Jaideep Vaidya, Rutgers University, USA
- Manoj S. Gaur, MNIT, India
- Rajveer S. Shekhawat, MUJ, India
- Mehmet Orgun, Macquarie University, Australia
- Pete Burnap, Cardiff University, Wales
- Oleg Makarevich, Ludmila Babenko, Southern Federal University, Russia
Program Chair
- Berna Ors Yalcin, Istanbul Technical University, Turkey
Program Co-Chairs
- Alexander Chefranov, Eastern Mediterranean University, TRNC
- Maxim Anikeev, Fraunhofer Institute for Secure Information Technology, Germany
- Philipp Reinecke, Cardiff University, United Kingdom
- Hossain Shahriar, Kennesaw State University, USA
- Vijay Laxmi, MNIT, India
- Naghmeh Moradpoor Sheykhkanloo, Edinburgh Napier University, United Kingdom
- Behnam Rahnama, Medis Inc., Iran
- Josef Pieprzyk,CSIRO, Australia, and Polish Academy of Sceiences, Poland
Promotion Chair
- Şerif Bahtiyar, Istanbul Technical University
Promotion Co-Chairs
- Tahir Sandıkkaya, Istanbul Technical University, Turkey
- Rajan Shankaran, Macquarie University, Australia
- Manoj Kumar Bohra, Manipal University Jaipur, India
- Xavier Bellekens, Strathclyde University, Scotland
Local Publicity Co-Chair
- Xavier Bellekens, University of Strathclyde, Scotland
Local Committee
- Latif AKÇAY Istanbul Technical University
- Mehmet Onur DEMİRTÜRK Istanbul Technical University
- Yasin Fırat KULA Istanbul Technical University
- Mustafa TANIŞ Istanbul Technical University
- Serdar Duran Istanbul Technical University
Logo, certificates, covers designs, and website
- Efe Cem Elçi, Turkey
- Sepideh Sadeghpour, Medis Inc., Iran
Volunteers Team
- Students of Istanbul Technical University, Turkey
Advisory Committee Members
- Bart Preneel, Katholieke Universiteit Leuven, Belgium
- Bülent Örencik, Beykent University, Turkey
- Cetin Kaya Koc, University of California Santa Barbara, USA
- Edward Dawson, Queensland University of Technology, Australia
- Elisa Bertino, Purdue University, USA
- N. Balakrishnan, IISc Bangalore, India
- Willy Susilo, University of Wollongong, Australia
- Alexander Shelupanov, Tomsk State University for Control Systems and Radio Electronics, Russia
International Program Committee
- Stelvio Cimato, University of Milan
- Luigi Logrippo, Université du Québec en Outaouais
- Utsav Upadhyay, Dr. B R Ambedkar National Institute of Technology, Jalandhar, Punjab, India
- Natalia Miloslavskaya, National Research Nuclear University MEPhI (Moscow Engineering Physics Institute)
- Bulent Orencik, Beykent University
- Alexander Tselykh, SFEDU
- Ercan Buluş, Namık Kemal Üniversitesi
- Jan Jurjens, TU Dortmund
- Bernardi Pranggono, Sheffield Hallam University
- Ekaterina Maro, Southern Federal University
- Edgar Weippl, University of Vienna
- Gerardo Pelosi, Politecnico di Milano
- Igor Kotenko, St. Petersburg Institute for Informatics and Automation of the Russian Academy of Sciences (SPIIRAS)
- Albert Levi, Sabanci University
- Alexey Tselykh, Southern Federal University
- Cihangir Tezcan, Middle East Technical University
- Evgeny Abramov, Southern Federal University
- Evgenia Ishchukova
- Gaurav Somani, Central University of Rajasthan
- Maxim Kalinin, Peter the Great St. Petersburg Polytechnic University
- Manoj Gaur, Department of Computer Engineering, Malaviya National Instotute of Technology, Jaipur, India
- Josef Pieprzyk, CSIRO/Data61
- Gaurav Prasad, National Institute of Technology karnataka
- Christophe Feltus, Luxembourg Institute of Science and Technology
- Behnam Rahnama, Dept. of Computer Engineering, Okan University
- Ankit Mundra, Manipal University Jaipur
- Sunita Singhal, Manipal University Jaipur
- Rajveer Singh Shekhawat, Manipal University Jaipur
- Shweta Saharan, Malaviya National Institute of Technology Jaipur
- Vasileios Vlachos, University of Thessaly
- Naghmeh Moradpoor, Edinburgh Napier University
- Tugkan Tuglular, Izmir Institute of Technology, Turkey
- Olga Peskova
- Wojciech Mazurczyk, Warsaw University of Technology, Faculty of Electronics and Information Technology, Institute of Computer Science
- Mohammad Rahman, Florida International University
PAPER SUBMISSION INSTRUCTIONS
Paper Submission Link
All papers should be written according to (https://www.acm.org/publications/proceedings-template).
All proposals for organizing workshops, tutorials, demos, and special sessions are expected at the conference e-mail sinconf@sinconf.org.
CALL FOR PAPERS
Papers, special sessions, tutorials, and workshops addressing all aspects of security in information and networks are being sought. Researchers and industrial practitioners working on the following and related subjects are especially encouraged: development and realization of cryptographic solutions, security schemes, new algorithms; critical analysis of existing approaches; secure information systems, security, privacy, and trust of blockchain and distributed ledger technologies, secure smart contracts, consensus mechanisms, especially distributed control and processing applications, and security in networks; interoperability, service levels and quality issues in such systems; information assurance, security, and public policy; detection and prevention of cybercrimes such as fraud and phishing; next generation network architectures, protocols, systems and applications; industrial experiences and challenges of the above. Doctoral students are encouraged to propose papers on ongoing research. Original papers will be considered; submissions must not substantially duplicate work that any of the authors has published elsewhere or has submitted in parallel to any other conference or workshop that has proceedings. All submitted papers will be reviewed by at least three members of the program committee judging its originality, significance, correctness, presentation and relevance. Authors are also encouraged to propose position papers on practical studies and experiments, critique of existing work, emerging issues, and novel ideas under development. Enterprises and research centers developing, implementing, or using security tools and frameworks are encouraged to propose application / tool demo. Proposals of half-day tutorials on fundamental to advanced subjects covering practical implementation aspects of security are welcome. Proposals of special session(s) to be held in the main conference are welcome. Proposals of workshops to be held in conjunction with the conference are welcome. The theme of a workshop proposal should be closely related to a specific area of the conference topics.
Broad areas of interest in security theory, technology and applications will include, but are not limited to, the following:
- Access control and intrusion detection
- Security of cyber-physical systems
- Autonomous and adaptive security
- Security tools and development platforms
- Computational intelligence techniques in security
- Security ontology, models, protocols & policies
- Computer network defense
- Standards, guidelines and certification
- Cryptographic techniques and key management
- Security-aware software engineering
- Industrial applications of security
- Trust and privacy
- Information assurance
- Next generation network architectures
- Malware analysis
- Network security and protocols
- Security challenges in Mobile/Embedded Systems
- Cloud security
- Security, privacy, and trust of blockchain and distributed ledger technologies
- Secure smart contracts
- Consensus mechanisms
- Security Awareness and Education
- Post Quantum Cryptography
- IoT Security and Trust
Important Dates
Please consult www.sinconf.org site for the most up-to-date info on the following:
- Paper Submission by: 15 October 2020
- All Author Notification: 27 October 2020
- All Camera Ready and Author Registration: 1 November 2020
- Tutorial Date: 7 November 2020
- Conference Dates: 4-6 November 2020
Awards
One each of the Best Paper and the Best Presentation awards will be given. The awardees will recieve activation keys to Kaspersky products complements of Kaspersky Academy. Kaspersky will provide one activation key to each awardee to Kaspersky Security Cloud for 3 devices. Kaspersky Security Cloud allows to access Kaspersky's entire family of apps for your desktops and mobiles: "From antivirus to privacy and performance tools, pick what you want to stay safe from threats like malware, spyware and hackers."
TOURISM
PAST EVENTS & SPECIAL ISSUES
Previous SIN Conf events and their proceedings (see below for special issues and books):
CONFERENCE PROGRAM
Program of SIN 2020- 13th International Conference on Security of information and Networks
4.11.2020 |
Wednesday |
||
09:00-09:15 |
Welcome Berna Örs Yalçın |
||
09:15-10:45 |
Session 1: Network Security and Protocols1 |
||
Nasser Al-Hadhrami, Matthew Collinson and Nir Oren | A Subjective Network Approach for Cybersecurity Risk Assessment | ||
Karim Lounis and Mohammad Zulkernine | Exploiting Race Condition for Wi-Fi Denial of Service Attacks | ||
Tigran Ovasapyan, Dmitry Moskvin and Artem Tsvetkov | Detection of attacks on the Internet of Things based on intelligent analysis of devices functioning indicators | ||
Farzan Majdani, Lynne Batik, Andrei Petrovski and Sergei Petrovski | Detecting Malicious Signal Manipulation in Smart Grids Using Intelligent Analysis of Contextual Data | ||
Ouissem Ben Fredj, Alaeddine Mihoub, Omar Cheikhrouhou, Moez Krichen and Abdelouahid Derhab | CyberSecurity Attack Prediction: A Deep Learning Approach | ||
Arnab Mukherjee and Raju Halder | PoliceChain: Blockchain-Based Smart Policing System for Smart Cities | ||
10:45-11:15 |
Break |
||
11:15-12:45 |
Session 2: Security of Cyber Physical Systems Session Chair: Tahir Sandikkaya |
||
Sinem Gür, Simge Demir, Şevval Şimsek and Albert Levi | Secure and Privacy Aware Gateway for Home Automation Systems | ||
Giovanni Salzillo, Massimiliano Rak and Felice Moretta | Threat Modeling based Penetration Testing: The Open Energy Monitor Case study | ||
Yuning Jiang and Yacine Atif | An Approach to Discover and Assess Vulnerability Severity Automatically in Cyber-Physical Systems | ||
Hope Eke, Dr Andrei Petrovski and Hatem Ahriz | Detection of False Command and Response Injection Attacks for Cyber Physical Security and Resilience Jessica Fong and Ron Poet | ||
Jessica Fong and Ron Poet | Creating Graphical Passwords on a Mobile Phone | ||
Jiyou Wang and Ron Poet | Permission Management and User Privacy Based On Android | ||
12:45-13:45 |
Break |
||
13:45-15:15 |
Session 3: Network Security and Protocols 2 Session Chair 3: Behnam Rahnama |
||
Richard Beno and Ron Poet | Hacking Passwords that Satisfy Common Password Policies | ||
Mamello Thinyane and Debora Christine | SMART Citizen Cyber Resilience (SC2R) Ontology | ||
Markus Hornsteiner, Sebastian Groll and Alexander Puchta | Towards a user-centric IAM entitlement shop - Learnings from the e-commerce | ||
Kübra Aydin, Rahime Belen Sağlam, Shujun Li and Abdullah Bulbul | When GDPR Meets CRAs (Credit Reference Agencies): Looking through the Lens of Twitter | ||
Zeynep Chousein, Hacı Yakup Tetik, Rahime Belen Sağlam, Abdullah Bülbül and Shujun Li | Tension between GDPR and Public Blockchains:A Data-Driven Analysis of Online Discussions | ||
5.11.2020 |
Thursday |
||
10:00-10:45 |
Keynote Speech: Albert Levi, Key Generation for Body Area Networks Session Chair: Şerif Bahtiyar |
||
10:45-11:15 |
Break |
||
11:15-12:45 |
Session 4: Intrusion Detection Session Chair: Alexander Chefranov |
||
Beyazit Bestami Yuksel, Serif Bahtiyar and Ayse Yilmazer | Credit Card Fraud Detection with NCA Dimensionality Reduction | ||
Maksim Kalameyets, Dmitry Levshun, Sergei Soloviev, Andrey Chechulin and Igor Kotenko | Social networks bot detection using Benford's law | ||
Mark Vella and Christian Colombo | SpotCheck: On-Device Anomaly Detection for Android | ||
Vara Vundavalli, Farhat Barsha, Mohammad Masum, Hossain Shahriar and Hisham Haddad | Malicious URL Detection Using Machine Learning Techniques | ||
Maxim Kalinin and Peter Zegzhda | AI-based Security for the Smart Networks | ||
12:45-13:45 |
Break |
||
13:45-15:15 |
Session 5: Cryptographic Techniques and Key Management Session Chair: Liudmila Babenko |
||
Giovanni Di Crescenzo and Glenn Veach | RPM: Additive Stream Ciphers for Lightweight Communication Security | ||
Yakov Mironov, Polina Mironova and Konstantin Rumyantsev | Characteristics of a two stage synchronization algorithm in the system of quantum key distribution with dividing a fiber optic line into sections with decreasing length | ||
Valeriy Osipyan and Kirill Litvinov | Development of the mathematic model of disymmetric bigram cryptosystem based on a parametric solution family of multi-degree system of Diophantine equations | ||
Liudmila Babenko and Ilya Pisarev | Modeling Replay And Integrity Violations Attacks For Cryptographic Protocols Source Codes Verification Of E-Voting System Based On Blind Intermediaries | ||
Abdulaziz Almehmadi, Oksana Kilik and Khalil El-Khatib | Eye Gaze-Based Human Error Prevention System: Experts vs. Non-Experts | ||
Shreyas Srinivasa, Jens Myrup Pedersen and Emmanouil Vasilomanolakis | Towards systematic honeytoken fingerprinting | ||
6.11.2020 |
Friday |
||
10:00-11:30 |
Session Chair: Şerif Bahtiyar Kaspersky Academy - Denis Barinov |
||
Learning that cannot be postponed: raising security awareness while working from home |
|||
11:30-12:30 |
Break |
||
12:30-14:15 |
Session 6: Computational intelligence techniques in security Session Chair 7: Naghmeh Moradpoor |
||
Jonathan Francis Roscoe and Max Smith-Creasey | Unconventional Mechanisms for Biometric Data Acquisition via Side-Channels | ||
Stanislav Zhdanov and Ekaterina Maro | Power analysis side-channel attacks on symmetric block cipher Magma | ||
Igor Kotenko, Igor Saenko and Fadey Skorik | Intelligent support for network administrator decisions based on combined neural networks | ||
Vasiliy Krundyshev | Neural network approach to assessing cybersecurity risks in large-scale dynamic networks | ||
Zixiang Wang, Jiajia Han, Jiangfeng Zhang and Xin Sun | Privacy-preserving Decentralized Parameter Estimation in Edge Computing Networks | ||
Mark Sokolov, Kehinde Olufowobi and Nic Herndon | Visual spoofing in content-based spam detection | ||
Muhammet Sahin and Serif Bahtiyar | A Survey on Malware Detection with Deep Learning | ||
14:15-14:45 |
Break |
||
14:45-15:15 Best paper award: Nasser Al-Hadhrami, Matthew Collinson and Nir Oren: A Subjective Network Approach for Cybersecurity Risk Assessment |
|||
Best presentation award: Mark Sokolov, Kehinde Olufowobi and Nic Herndon: Visual spoofing in content-based spam detection |
|||
Closing Ceremony: Atilla Elçi |
Contact Us
sinconf sinconf.org