Proceedings by ACM International Conference Proceeding Series. ICPS All papers will be inserted into the ACM Digital Library.
SIN 2019 will feature the following keynote papers and talks:
Assoc. Prof. Dr. Sıddıka Berna Örs Yalçın.
Istanbul technical University
System on Chip Design for Secure Internet of Things
The Internet of Things is a world-wide network of millions of objects
addressable by connecting to the Internet.Nowadays, IoT applications are encountered
fields such as industrial automation, health, smart building, city and traffic
concept is becoming more common and developing every day.
Firstly the general structure, features and needs of the Internet of things will be explained. This network of millions of objects is in a heterogeneous structure. In this heterogeneous network, IoT devices are divided into high-end and low-end devices. Low-end devices has very limited resources such as energy, processor and memory capacity. Things with limited resources are expected to serve applications without changing the battery for many years. This leads to the need for energy efficient implementation in the IoT.
Secondly, the design of a sensor node with low power consumption will be discussed. In order to design this sensor node easily and to reduce the engineering costs, hardware-software co-design methodology was used. According to this, FPGA (Field Programmable Array) was used to implement this hardware design. Design model for a IoT application includes four layers. These layers are processor and peripheral layer, hardware abstraction, operating system and service layers. According to the application to be selected within the scope of the IoT, the needs of the system should be determined from the top-down and the design should be carried out from the bottom to the top.
Istanbul technical University, Electrical and Electronics Faculty, Maslak, Istanbul
Sıddıka Berna Örs Yalçın received the Electronics and Communication Engineering degree and the MSc degree in 1995 and 1998, respectively, both from the İstanbul Technical University (ITU), Turkey. She received the Electrical Engineering degree in applied sciences from the Katholieke Universiteit Leuven, Belgium, in 2005. She is currently an associative professor at ITU. Her main research interests include cryptography, embedded systems, and side-channel attacks.
Prof. Dr. Igor V. Kotenko
St. Petersburg Institute for Informatics and Automation of the Russian Academy of Sciences (SPIIRAS)
Situational Awareness for Cyber Defense: security analysis, attack modeling and selection of countermeasures
Main aspects of cyber situation awareness are analyzed. They include situation perception, impact assessment, situation tracking, attack trend and intent analysis, causality analysis, evaluation of quality and trustworthiness of the collected information and decisions, projecting future possible actions, understanding of adversary intent, opportunity, and capability, and understanding own vulnerabilities and possible countermeasures. Models, techniques, methods and tools for advanced cyber situation awareness are presented. They are based on big data analytics, machine learning, artificial intelligence, user and application behavior analytics, interactive visualization of security data. Examples of developed components of security monitoring and incident management systems are demonstrated.
St. Petersburg Institute for Informatics and Automation of the Russian Academy of Sciences, SPIIRAS, Laboratory of Computer Security Problems, St. Petersburg
Igor V. Kotenko is a Chief Scientist and Head of Research Laboratory of
Computer Security Problems of the St. Petersburg Institute
for Informatics and Automation of the Russian Academy of Science. He is also Co-Head
of the International Laboratory
"Information security of cyber-physical systems", ITMO University, St. Petersburg,
He graduated with honors from St.Petersburg Academy of Space Engineering and St.Petersburg Signal Academy, obtained the Ph.D. degree and the National degree of Doctor of Engineering Science. He is the author of more than 400 refereed publications, including several books and monographs.
Main research results are in network intrusion detection, modelling and simulation of network attacks, vulnerability assessment, security information and event management, verification and validation of security policy, etc.
To be announced