SINCONF 2020

13th International Conference on Security of Information and Networks

About The Event ONLINE

Proceedings by ACM Press.
All papers will be inserted into the ACM Digital Library and subsequently indexed by Scopus.

Where

Istanbul, Turkey

When

4-7 November 2020

In succession to the successful annual SIN 2007 - SIN 2019, the 13th International Conference on Security of Information and Networks (SIN 2020) provides an international forum for presentation of research and applications of security in information and networks. SIN 2020 conference features contributed as well as invited papers, special sessions, workshops, and tutorials on theory and practice of security of information and networks.

Registration

http://sinconf.monre.online/

Conference Venue

ONLINE

Organized by:

  • Istanbul technical University, Istanbul, Turkey
  • Hasan kalyoncu University, Gaziantep, Turkey
  • The University of Glasgow, Glasgow, UK
  • Rutgers University, Newark, USA
  • Kennesaw State University, Georgia, USA
  • Malaviya National Institute of Technology, Jaipur, India
  • Manipal University Jaipur, India
  • Macquarie University, Sydney, Australia
  • Cardiff University, Wales, UK
  • Southern Federal University, Taganrog, Rostov-on-Don, Russia
  • Sochi State University, Sochi, Russia

Hosted by:

  • Department of Electronics and Communication Engineering, Istanbul Technical University, Istanbul, Turkey

Supported by:



Important Links

SIN 2020 will feature the following keynote talks:

Conference Chair

  • Berna Ors Yalcin, Istanbul Technical University, Turkey

Conference Co-Chairs

  • Atilla Elçi, Hasan Kalyoncu University, Turkey
  • Ron Poet, University of Glasgow, Scotland
  • Jaideep Vaidya, Rutgers University, USA
  • Manoj S. Gaur, MNIT, India
  • Rajveer S. Shekhawat, MUJ, India
  • Mehmet Orgun, Macquarie University, Australia
  • Pete Burnap, Cardiff University, Wales
  • Oleg Makarevich, Ludmila Babenko, Southern Federal University, Russia

Program Chair

  • Berna Ors Yalcin, Istanbul Technical University, Turkey

Program Co-Chairs

  • Alexander Chefranov, Eastern Mediterranean University, TRNC
  • Maxim Anikeev, Fraunhofer Institute for Secure Information Technology, Germany
  • Philipp Reinecke, Cardiff University, United Kingdom
  • Hossain Shahriar, Kennesaw State University, USA
  • Vijay Laxmi, MNIT, India
  • Naghmeh Moradpoor Sheykhkanloo, Edinburgh Napier University, United Kingdom
  • Behnam Rahnama, Medis Inc., Iran
  • Josef Pieprzyk,CSIRO, Australia, and Polish Academy of Sceiences, Poland

Promotion Chair

  • Şerif Bahtiyar, Istanbul Technical University

Promotion Co-Chairs

  • Tahir Sandıkkaya, Istanbul Technical University, Turkey
  • Rajan Shankaran, Macquarie University, Australia
  • Manoj Kumar Bohra, Manipal University Jaipur, India
  • Xavier Bellekens, Strathclyde University, Scotland

Local Publicity Co-Chair

  • Xavier Bellekens, University of Strathclyde, Scotland

Local Committee

  • Latif AKÇAY Istanbul Technical University
  • Mehmet Onur DEMİRTÜRK Istanbul Technical University
  • Yasin Fırat KULA Istanbul Technical University
  • Mustafa TANIŞ Istanbul Technical University
  • Serdar Duran Istanbul Technical University

Logo, certificates, covers designs, and website

  • Efe Cem Elçi, Turkey
  • Sepideh Sadeghpour, Medis Inc., Iran

Volunteers Team

  • Students of Istanbul Technical University, Turkey

Advisory Committee Members

  • Bart Preneel, Katholieke Universiteit Leuven, Belgium
  • Bülent Örencik, Beykent University, Turkey
  • Cetin Kaya Koc, University of California Santa Barbara, USA
  • Edward Dawson, Queensland University of Technology, Australia
  • Elisa Bertino, Purdue University, USA
  • N. Balakrishnan, IISc Bangalore, India
  • Willy Susilo, University of Wollongong, Australia
  • Alexander Shelupanov, Tomsk State University for Control Systems and Radio Electronics, Russia

International Program Committee

  • Stelvio Cimato, University of Milan
  • Luigi Logrippo, Université du Québec en Outaouais
  • Utsav Upadhyay, Dr. B R Ambedkar National Institute of Technology, Jalandhar, Punjab, India
  • Natalia Miloslavskaya, National Research Nuclear University MEPhI (Moscow Engineering Physics Institute)
  • Bulent Orencik, Beykent University
  • Alexander Tselykh, SFEDU
  • Ercan Buluş, Namık Kemal Üniversitesi
  • Jan Jurjens, TU Dortmund
  • Bernardi Pranggono, Sheffield Hallam University
  • Ekaterina Maro, Southern Federal University
  • Edgar Weippl, University of Vienna
  • Gerardo Pelosi, Politecnico di Milano
  • Igor Kotenko, St. Petersburg Institute for Informatics and Automation of the Russian Academy of Sciences (SPIIRAS)
  • Albert Levi, Sabanci University
  • Alexey Tselykh, Southern Federal University
  • Cihangir Tezcan, Middle East Technical University
  • Evgeny Abramov, Southern Federal University
  • Evgenia Ishchukova
  • Gaurav Somani, Central University of Rajasthan
  • Maxim Kalinin, Peter the Great St. Petersburg Polytechnic University
  • Manoj Gaur, Department of Computer Engineering, Malaviya National Instotute of Technology, Jaipur, India
  • Josef Pieprzyk, CSIRO/Data61
  • Gaurav Prasad, National Institute of Technology karnataka
  • Christophe Feltus, Luxembourg Institute of Science and Technology
  • Behnam Rahnama, Dept. of Computer Engineering, Okan University
  • Ankit Mundra, Manipal University Jaipur
  • Sunita Singhal, Manipal University Jaipur
  • Rajveer Singh Shekhawat, Manipal University Jaipur
  • Shweta Saharan, Malaviya National Institute of Technology Jaipur
  • Vasileios Vlachos, University of Thessaly
  • Naghmeh Moradpoor, Edinburgh Napier University
  • Tugkan Tuglular, Izmir Institute of Technology, Turkey
  • Olga Peskova
  • Wojciech Mazurczyk, Warsaw University of Technology, Faculty of Electronics and Information Technology, Institute of Computer Science
  • Mohammad Rahman, Florida International University

PAPER SUBMISSION INSTRUCTIONS

Papers must be submitted electronically via the SIN 2020 Submission Site at the link bellow:

Paper Submission Link


Title, author's name(s), affiliation, mailing address, telephone, fax and email of the principal author should be included. Maximum length for the proceedings is 8 pages for full paper, 4 pages for short paper, 2 pages for fast abstract and position statement, and 2 pages for demo and tutorial proposals. Extra page charges apply for full and short papers.
All papers should be written according to (https://www.acm.org/publications/proceedings-template).
All proposals for organizing workshops, tutorials, demos, and special sessions are expected at the conference e-mail sinconf@sinconf.org.

All accepted papers will be published by ACM Press in a conference proceedings and uploaded into ACM Digital Library. Extended versions of selected papers will be invited for possible publication in a special issue. Each accepted paper must be registered to be included in the proceedings. Papers not presented during the conference may be removed from the online proceedings.


CALL FOR PAPERS


Papers, special sessions, tutorials, and workshops addressing all aspects of security in information and networks are being sought. Researchers and industrial practitioners working on the following and related subjects are especially encouraged: development and realization of cryptographic solutions, security schemes, new algorithms; critical analysis of existing approaches; secure information systems, security, privacy, and trust of blockchain and distributed ledger technologies, secure smart contracts, consensus mechanisms, especially distributed control and processing applications, and security in networks; interoperability, service levels and quality issues in such systems; information assurance, security, and public policy; detection and prevention of cybercrimes such as fraud and phishing; next generation network architectures, protocols, systems and applications; industrial experiences and challenges of the above. Doctoral students are encouraged to propose papers on ongoing research. Original papers will be considered; submissions must not substantially duplicate work that any of the authors has published elsewhere or has submitted in parallel to any other conference or workshop that has proceedings. All submitted papers will be reviewed by at least three members of the program committee judging its originality, significance, correctness, presentation and relevance. Authors are also encouraged to propose position papers on practical studies and experiments, critique of existing work, emerging issues, and novel ideas under development. Enterprises and research centers developing, implementing, or using security tools and frameworks are encouraged to propose application / tool demo. Proposals of half-day tutorials on fundamental to advanced subjects covering practical implementation aspects of security are welcome. Proposals of special session(s) to be held in the main conference are welcome. Proposals of workshops to be held in conjunction with the conference are welcome. The theme of a workshop proposal should be closely related to a specific area of the conference topics.

Broad areas of interest in security theory, technology and applications will include, but are not limited to, the following:
  • Access control and intrusion detection
  • Security of cyber-physical systems
  • Autonomous and adaptive security
  • Security tools and development platforms
  • Computational intelligence techniques in security
  • Security ontology, models, protocols & policies
  • Computer network defense
  • Standards, guidelines and certification
  • Cryptographic techniques and key management
  • Security-aware software engineering
  • Industrial applications of security
  • Trust and privacy
  • Information assurance
  • Next generation network architectures
  • Malware analysis
  • Network security and protocols
  • Security challenges in Mobile/Embedded Systems
  • Cloud security
  • Security, privacy, and trust of blockchain and distributed ledger technologies
  • Secure smart contracts
  • Consensus mechanisms
  • Security Awareness and Education
  • Post Quantum Cryptography
  • IoT Security and Trust


Important Dates


Please consult www.sinconf.org site for the most up-to-date info on the following:

  • Paper Submission by: 15 October 2020
  • All Author Notification: 27 October 2020
  • All Camera Ready and Author Registration: 1 November 2020
  • Tutorial Date: 7 November 2020
  • Conference Dates: 4-6 November 2020


Awards


One each of the Best Paper and the Best Presentation awards will be given. The awardees will recieve activation keys to Kaspersky products complements of Kaspersky Academy. Kaspersky will provide one activation key to each awardee to Kaspersky Security Cloud for 3 devices. Kaspersky Security Cloud allows to access Kaspersky's entire family of apps for your desktops and mobiles: "From antivirus to privacy and performance tools, pick what you want to stay safe from threats like malware, spyware and hackers."



PAST EVENTS & SPECIAL ISSUES

Previous SIN Conf events and their proceedings (see below for special issues and books):



CONFERENCE PROGRAM


CONFERENCE PROGRAM: Congratulations to the authors whose papers are accepted for presentation as listed below.

Please note: ACM will notify the authors for camera-ready upload and rights management. The registration page has a form; payment can be made by credit card. Each paper must be registered for oral presentation by one of the authors for inclusion in the program and the proceedings.

-Presentations will be online and live by using zoom -The links for the presentations are sent to the chairs, registered authors and auidance -If you are registered and do not have the links please send an e-mail to siddika.ors@itu.edu.tr"

-You can use the following link to learn more about the usage of zoom https://support.zoom.us/hc/en-us/articles/206618765-Zoom-Video-Tutorials?_ga=2.177840229.1583594840.1604392084-1973550461.1585556129

Best Presentation Nomination: You can nominate one of the presentations below for best presentation award by using this form. https://forms.gle/ynKZ8Bm2TqGvMMmP6

Authors, title Decision
Nasser Al-Hadhrami, Matthew Collinson and Nir Oren. A Subjective Network Approach for Cybersecurity Risk Assessment ACCEPT AS FULL PAPER
Sinem Gür, Simge Demir, Şevval Şimsek and Albert Levi. Key Generation for Body Area Networks ACCEPT AS FULL PAPER
Giovanni Di Crescenzo and Glenn Veach. RPM: Additive Stream Ciphers for Lightweight Communication Security ACCEPT AS FULL PAPER
Beyazit Bestami Yuksel, Serif Bahtiyar and Ayse Yilmazer. Credit Card Fraud Detection with NCA Dimensionality Reduction ACCEPT AS FULL PAPER
Maksim Kalameyets, Dmitry Levshun, Sergei Soloviev, Andrey Chechulin and Igor Kotenko. Social networks bot detection using Benford's law ACCEPT AS FULL PAPER
Giovanni Salzillo, Massimiliano Rak and Felice Moretta. Threat Modeling based Penetration Testing: The Open Energy Monitor Case study ACCEPT AS FULL PAPER
Jessica Fong and Ron Poet. Creating Graphical Passwords on a Mobile Phone ACCEPT AS FULL PAPER
Jonathan Francis Roscoe and Max Smith-Creasey. Unconventional Mechanisms for Biometric Data Acquisition via Side-Channels ACCEPT AS FULL PAPER
Muhammet Sahin and Serif Bahtiyar. A Survey on Malware Detection with Deep Learning ACCEPT AS FULL PAPER
Jiyou Wang and Ron Poet. Permission Management and User Privacy Based On Android ACCEPT AS FULL PAPER
Karim Lounis and Mohammad Zulkernine. Exploiting Race Condition for Wi-Fi Denial of Service Attacks ACCEPT AS FULL PAPER
Tigran Ovasapyan, Dmitry Moskvin and Artem Tsvetkov. Detection of attacks on the Internet of Things based on intelligent analysis of devices functioning indicators ACCEPT AS FULL PAPER
Yakov Mironov, Polina Mironova and Konstantin Rumyantsev. Characteristics of a two stage synchronization algorithm in the system of quantum key distribution with dividing a fiber optic line into sections with decreasing length ACCEPT AS FULL PAPER
Yuning Jiang and Yacine Atif. An Approach to Discover and Assess Vulnerability Severity Automatically in Cyber-Physical Systems ACCEPT AS FULL PAPER
Farzan Majdani, Lynne Batik, Andrei Petrovski and Sergei Petrovski. Detecting Malicious Signal Manipulation in Smart Grids Using Intelligent Analysis of Contextual Data ACCEPT AS FULL PAPER
Igor Kotenko, Igor Saenko and Fadey Skorik. Intelligent support for network administrator decisions based on combined neural networks ACCEPT AS FULL PAPER
Valeriy Osipyan and Kirill Litvinov. Development of the mathematic model of disymmetric bigram cryptosystem based on a parametric solution family of multi-degree system of Diophantine equations ACCEPT AS FULL PAPER
Ouissem Ben Fredj, Alaeddine Mihoub, Omar Cheikhrouhou, Moez Krichen and Abdelouahid Derhab. CyberSecurity Attack Prediction: A Deep Learning Approach ACCEPT AS FULL PAPER
Vasiliy Krundyshev. Neural network approach to assessing cybersecurity risks in large-scale dynamic networks ACCEPT AS FULL PAPER
Hope Eke, Dr Andrei Petrovski and Hatem Ahriz. Detection of False Command and Response Injection Attacks for Cyber Physical Security and Resilience ACCEPT AS FULL PAPER
Shreyas Srinivasa, Jens Myrup Pedersen and Emmanouil Vasilomanolakis. Towards systematic honeytoken fingerprinting ACCEPT AS SHORT PAPER
Mark Vella and Christian Colombo. SpotCheck: On-Device Anomaly Detection for Android ACCEPT AS SHORT PAPER
Richard Beno and Ron Poet. Hacking Passwords that Satisfy Common Password Policies ACCEPT AS SHORT PAPER
Mamello Thinyane and Debora Christine. SMART Citizen Cyber Resilience (SC2R) Ontology ACCEPT AS SHORT PAPER
Stanislav Zhdanov and Ekaterina Maro. Power analysis side-channel attacks on symmetric block cipher Magma ACCEPT AS SHORT PAPER
Mark Sokolov, Kehinde Olufowobi and Nic Herndon. Visual spoofing in content-based spam detection ACCEPT AS SHORT PAPER
Arnab Mukherjee and Raju Halder. PoliceChain: Blockchain-Based Smart Policing System for Smart Cities ACCEPT AS SHORT PAPER
Liudmila Babenko and Ilya Pisarev. Modeling Replay And Integrity Violations Attacks For Cryptographic Protocols Source Codes Verification Of E-Voting System Based On Blind Intermediaries ACCEPT AS SHORT PAPER
Zixiang Wang, Jiajia Han, Jiangfeng Zhang and Xin Sun. Privacy-preserving Decentralized Parameter Estimation in Edge Computing Networks ACCEPT AS SHORT PAPER
Vara Vundavalli, Farhat Barsha, Mohammad Masum, Hossain Shahriar and Hisham Haddad. Malicious URL Detection Using Machine Learning Techniques ACCEPT AS SHORT PAPER
Abdulaziz Almehmadi, Oksana Kilik and Khalil El-Khatib. Eye Gaze-Based Human Error Prevention System: Experts vs. Non-Experts ACCEPT AS SHORT PAPER
Markus Hornsteiner, Sebastian Groll and Alexander Puchta. Towards a user-centric IAM entitlement shop - Learnings from the e-commerce ACCEPT AS SHORT PAPER
Kübra Aydİn, Rahime Belen Sağlam, Shujun Li and Abdullah Bulbul. When GDPR Meets CRAs (Credit Reference Agencies): Looking through the Lens of Twitter ACCEPT AS SHORT PAPER
Zeynep Chousein, Hacı Yakup Tetik, Rahime Belen Sağlam, Abdullah Bülbül and Shujun Li. Tension between GDPR and Public Blockchains:A Data-Driven Analysis of Online Discussions ACCEPT AS SHORT PAPER
Maxim Kalinin and Peter Zegzhda. AI-based Security for the Smart Networks ACCEPT AS SHORT PAPER




Contact Us

Email

sinconf sinconf.org