NSS 2024: 18th International Conference on Network and System Security
SocialSec 2024: 10th International Symposium on Security and Privacy in Social Networks and Big Data
Zayed University, Abu Dhabi, UAE | November 20-22, 2024
Day 1 (November 20, 2024) Wednesday
08:00-16:00 | Registration |
08:00-08:30 | Registration Open |
08:30-08:45 | Opening Remarks (VP & General Chair) Speaker: Prof. Michael Allen, Acting VP, Zayed University, UAE Speaker: Prof. Omar Alfandi, Dean, College of Technological Innovation, Zayed University, UAE Room: LIB-0-042M - Al Dhowaiher |
08:45-09:00 | Keynote Speaker: H.E. Dr. Mohamed Al Kuwaiti, Head, UAE Cyber Security Council Room: LIB-0-042M - Al Dhowaiher |
09:00-09:15 | Welcome Session Speaker: Dr. Mousa Al-kfairy, Zayed University, UAE (General Co-Chairs' Welcome Address, TPC Co-Chairs' Report) Room: LIB-0-042M - Al Dhowaiher |
09:15 - 10:15 | Breakfast |
10:15-11:15 | Keynote I: Security-Enhanced Radio Access Networks for 5G OpenRAN Speaker: Prof. Lin Zhiqiang, Ohio State University, USA Room: TBA |
Session 1: Malware, Attacks, and Countermeasures - NSS (Session Chair: Noel Khaemba) Room: LIB-0-042M - Al Dhowaiher |
|
11:30-11:50 | Paper #1: You Can't Touch This: Detecting Typosquatting Packages for Enhanced Malware Prevention in Software Supply Chains Authors: Minh Tien Truong, Nils Gruschka and Luigi Lo Iacono |
11:50-12:10 | Paper #2: Towards a malware family classification model using static call graph instruction visualization Authors: Attila Mester, Zalan Bodo, Vinod P. and Mauro Conti |
12:10-12:30 | Paper #3: RKPM: Restricted Kernel Page Mechanism to Mitigate Privilege Escalation Attacks Authors: Hiroki Kuzuno and Toshihiro Yamauchi |
12:30-12:50 | Paper #4: Every Sherlock Needs a Watson: Practical Semi-Realtime Attack Elaboration System Authors: Zeya Umayya, Arpit Nandi, Amartyo Roy and Sambuddho Chakravarty |
12:50-13:10 | Paper #5: Revisiting Authorship Analysis for Binary Code Authors: Saed Alrabaee, Mousa Al-Kfairy, Mohammad Bany Taha, Omar Alfandi and Fatma Taher |
13:10-14:10 | Lunch |
Session 2: Android and Data Breaches - SocialSec (Session Chair: Yazan Nawaf Alahmed) Room: LIB-0-042M - Al Dhowaiher |
|
14:10-14:30 | Paper #1: AndroPROTECT: Hardening the Android API against Fingerprinting Author: Gerald Palfinger |
14:30-14:50 | Paper #2: Auditing and Attributing Behaviours of Suspicious Android Health Applications Authors: Muhammad Salman, I Wayan Budi Sentana, Muhammad Ikram and Mohamed Ali Kaafar |
14:50-15:10 | Paper #3: Decoding Android Malware with a Fraction of Features: An Attention-Enhanced MLP-SVM Approach Authors: Safayat Bin Hakim, Muhammad Adil, Kamal Acharya and Houbing Song |
15:10-15:30 | Paper #4: Credential Issuance Transparency: A Privacy-preserving Audit Log of Credential Issuance Authors: Edona Fasllija, Jakob Heher and Stefan More |
15:30-16:00 | Coffee Break |
Session 3: Security Assessment I (Session Chair: Prof. Somanath Tripathy) Room: LIB-0-042M - Al Dhowaiher |
|
16:00-16:20 | Paper #1: Enhancing Network Security through Vulnerability Monitoring Authors: Ryan Williams, Anthony Gavazzi and Engin Kirda |
16:20-16:40 | Paper #2: VulMatch: Binary-level Vulnerability Detection Through Signature Authors: Zian Liu, Shigang Liu, Lei Pan, Chao Chen, Ejaz Ahmed, Jun Zhang and Dongxi Liu |
16:40-17:00 | Paper #3: Sharing is (S)caring: Security and Privacy Issues in Decentralized Physical Infrastructure Networks (DePIN) Authors: Maurantonio Caprolu, Simone Raponi and Roberto Di Pietro |
17:00-17:20 | Paper #4: VoIP Vanguard: A Practical FrontLine Defense Against VoIP Identification Attacks in Tor Authors: Jithin S, Richa Gupta, Reeshabh Kumar Ranjan, Shreyansh Nagpal, Mukulika Maity and Sambuddho Chakravarty |
Session 4: Security Mechanisms, Social Structure and Community (Session Chair: Indrakshi Ray)
Room: LIB-0-042M - Al Dhowaiher |
|
17:40-18:00 | Paper #1: Investigating Influential COVID-19 Perspectives: A Multifaceted Analysis of Twitter Discourse Authors: Shadaab Kawnain Bashir, Hossein Shirazi, Noushin Salek Faramarzi, Thomas Harris, Ashmita Shishodia, Hajar Homayouni and Indrakshi Ray |
18:00-18:20 | Paper #2: Short Paper: Evaluating Cross-Chain Platforms for EV Charging Payment Systems Authors: Bang Le, Trung Phan, Khiem Huynh Gia, Vinh Nguyen Thanh, Kha Nguy?n, Minh Nguyen Van, Le Khanh Tung, Nam Tran Ba and Son Ha Xuan |
18:20-18:40 | Paper #3: Influence Detection in Agetech on Social Platforms using Machine Learning and Classifier Calibration Authors: Noel Khaemba, Issa Traore and Mohammad Mamun |
18:40-19:00 | Paper #4: Secure Aggregation of Smartwatch Health Data with LDP Authors: Andres Hernandez-Matamoros and Hiroaki Kikuchi |
19:00-21:00 | Conference Banquet + Gala Dinner + Best Paper Awards Announcement |
Day 2 (November 21, 2024) Thursday
08:30-09:30 | Breakfast |
09:30-10:30 | Keynote II: Privacy and cybersecurity issues facing the metaverse: An analysis of technological and institutional factors Speaker: Prof. Nir Kshetri, University of North Carolina-Greensboro, USA Room: TBA |
Session 5: Security Assessment II - NSS + SocialSec (Session Chair: Prof. Asad Khattak)
Room: LIB-0-042M - Al Dhowaiher |
|
10:30-10:50 | Paper #1: How to Accomplish Key and Communication Compression Over Authentication Channels: Proxy Re-Authentication and Its Instantiations Authors: Yoshiro Matsuoka, Sohto Chiku, Keisuke Hara and Junji Shikata |
10:50-11:10 | Paper #2: The Link between Bit-oriented and Word-oriented Stream Ciphers from a Cryptanalytic Perspective Authors: Zhengting Li, Lin Ding, Xinhai Wang and Zheng Wu |
11:10-11:30 | Paper #3: Using M5Stack Core 2 ESP32 to Raise Children's Awareness about Cyber Security Authors: Yeslam Al-Saggaf and Alan Ibbett |
11:30-11:50 | Paper #4: ELITE: Efficient and Secure Machine Learning for Intelligent Perception in Smart Road Infrastructure Authors: Swathi Kumar, Trupil Limbasiya and Anupam Chattopadhyay |
11:50-12:10 | Paper #5: Gamma Sampling for Intrusion Detection with Imbalanced Data Authors: Firuz Kamalov, Rohan Mitra and Hana Sulieman |
12:10-13:10 | Lunch |
Session 6: Blockchain and Health Data - NSS + SocialSec (Session Chair: Prof. Ashraf Khalil)
Room: LIB-0-042M - Al Dhowaiher | |
13:10-13:30 | Paper #1: PQS-BC: Comparative Analysis of NIST Post-Quantum Signatures for Blockchain Authors: Wan Kai Wong, Naipeng Dong and Cong Minh Dinh |
13:30-13:50 | Paper #2: SPVPC: Smart Contract based Publicly Verifiable Polynomial Computations Authors: Partha Sarathi Chakraborty and Somanath Tripathy |
13:50-14:10 | Paper #3: Decentralized Data Usage Control with Confidential Data Processing on Trusted Execution Environment and Distributed Ledger Technology Authors: Shota Tokuda, Shohei Kakei, Yoshiaki Shiraishi and Shoichi Saito |
14:10-14:30 | Paper #4: SmartAudit: Smart Contract Vulnerability Detection using Transfer learning Authors: Ankur Jain and Somanath Tripathy |
14:30-15:00 | Coffee Break |
16:15-17:30 | Session 7: Privacy - NSS + SocialSec (Session Chair: Dr. Mohammad Tubishat)
Room: LIB-0-042M - Al Dhowaiher |
15:00-15:20 | Paper #1: Optimizing Privacy-Preserving Continuous Authentication of Mobile Devices Authors: David Monschein and Oliver Waldhorst |
15:20-15:40 | Paper #2: PPDL: Efficient Dropout-Resilient Aggregation for Privacy-Preserving Decentralized Learning Authors: Ali Reza Ghavamipour, Benjamin Zi Hao Zhao and Fatih Turkmen |
15:40-16:00 | Paper #3: Perceived Privacy Conflicts and Monitoring: A Study of Their Effects on Trust and Data Sharing in Social Networks Authors: Yazan Alahmed, Reema Abadla and Mahmoud Khasawneh |
16:00-16:20 | Paper #4: FLAIR: A Federated Learning Approach Against Inference Attacks and Risks Authors: Mouad Bouharoun and Mohammed Erradi |
16:20-17:00 | Wrap Up (NSS-SocialSec 2025 Chairs' report) Room: LIB-0-042M - Al Dhowaiher |
Social Event - TBA |
Day 3 (November 22, 2024) Friday
Enjoy UAE |