Eleventh International Conference on Information Systems Security
(ICISS 2015)
16-20 December 2015, Jadavpur University, Kolkata, India










Proceedings being published as LNCS 9478






















































Programme Schedule

Venue: Dr. T. Sen Auditorium, Jadavpur University, Kolkata, India

Conference Programme   (Regular Paper: 20+5 min; Short Paper: 10+5 min)

December 18, 2015, Friday

8:00 – 9:00





Keynote Talk – I

STEFANO PARABOSCHI, Professor, Department of Industrial Engineering and Management, Information and Production - DIGIP, University of Bergamo, Italy

Title:-  Extending Mandatory Access Control Policies in Android

11:00-11:30 Tea / Coffee Break


Technical Session – I; Crypto-Systems and Protocols-I


•Nishant Sharma, Dr. Somitra Sanadhya and Dr. Donghoon Chang, “New HMAC Message Patches: Secret Patch and CrOw Patch”


• Haruhisa Kosuge, Hidema Tanaka, Keisuke Iwai and Takakazu Kurokawa, “Search Algorithm of Precise Integral Distinguisher of Byte-based Block Cipher”


Dhruti Sharma and Devesh Jinwala, “Functional Encryption In IoT E-Health Care System”


• Y. Sreenivasa Rao, “Privacy Preserving Decentralized Key-Policy Attribute Based Encryption with Fast Decryption” (Short Paper)



Lunch Break


Keynote Talk – II

PIERANGELA SAMARATI, Professor, Department of Computer Science of the Universita' degli Studi di Milano, Crema, Italy

Title:-  Data Security and Privacy in the Cloud

15:30-15:45 Tea / Coffee Break


Technical Session – II; Sensor Networks and Cognitive Radio


• Sarita Agrawal, Manik Lal Das, Anish Mathuria and Sanjay Srivastava, “Program Integrity Verification for Detecting Node Capture Attack in Wireless Sensor Network”

• Suchismita Bhattacharjee and Ningrinla Marchang, “Attack-Resistant Trust-based Weighted Majority Game Rule for Spectrum sensing in Cognitive Radio Networks”


• Satyajit Banerjee, Debapriyay Mukhopadhyay and Suman Roy, “A New Threshold Certification Scheme Based Defense Against Sybil Attack For Sensor Networks” (Short Paper)


• Toshanlal Meenpal and Anup Bhattacharjee, “Watermark Removal Attack extended to Forgery against Correlation-based Watermarking Schemes”



Business meeting


Cultural Programme - "VISTAR" presents a Musical Evening with Sitar, Sarod and Tabla at Dr. T. Sen Auditorium, Jadavpur University, Kolkata, India


December 19, 2015, Saturday

8:30 – 9:30



Keynote Talk – III

VINCENZO PIURI, Professor, Università degli Studi di Milano, Italy

Title:-  Biometric Technologies and Systems for Automated Border Control Gates

10:30-10:55 Tea / Coffee Break


Technical Session – III; Access Control


• Prasuna Sarana, Arindam Roy, Shamik Sural, Jaideep Vaidya and Vijay Atluri, “Role Mining in the Presence of Separation of Duty Constraints”


• Sadhana Jha, Shamik Sural, Vijay Atluri and Jaideep Vaidya, “Enforcing Separation of Duty in Attribute based Access Control Systems”


• Simon Gansel, Stephan Schnitzer, Ahmad Gilbeau-Hammoud, Viktor Friesen, Frank Dürr, Kurt Rothermel, Christian Maihöfer and Ulrich Krämer, “Context-aware Access Control in Novel Automotive HMI Systems”


• Michael Kunz, Ludwig Fuchs, Matthias Hummer and Günther Pernul, “Introducing Dynamic Identity and Access Management in Organizations”


• Phillipa Bennett and Indrakshi Ray, “Modeling of Online Social Network Policies using an Attribute-Based Access Control Framework”



Lunch Break


Keynote Talk – IV

VINOD GANAPATHY, Associate Professor, Rutgers University, USA

Title:-  Reflections on the Self-service Cloud Computing Project

15:30-15:45 Tea / Coffee Break


Technical Session – IV; Attacks and Mitigation


• Tom Deering, Ganesh Ram Santhanam and Suresh Kothari, “FlowMiner: Automatic Summarization of Library Data-Flow for Malware Analysis”

• Punit Mehta, Jigar Sharda and Manik Lal Das, “SQLshield: Preventing SQL injection attacks by modifying user input data”

• Erwan Godefroy, Eric Totel, Michel Hurfin and Frederic Majorczyk, “Assessment of an Automatic Correlation Rules Generator”

• Stefan Prandl, Mihai Lazarescu and Duc-Son Pham, “A Study of Web Application Firewall Solutions” (Short Paper)

• Moumita Das, Bhaskar Sardar and Ansuman Banerjee, “Attacks on Branch Predictors: An Empirical Exploration” (Short Paper)


19:00 onwards

Banquet Dinner at The Gateway Hotel, Ball Room


December 20, 2015, Sunday

8:30 – 9:00



Technical Session – V; Cloud Security


• Anant Pushkar, Nirnay Ghosh and Soumya Ghosh, “A Statistical Approach to Detect Anomalous User Requests in SaaS Cloud-centric Collaborations”


• Gaurav Somani, Abhinav Johri, Mohit Taneja, Utkarsh Pyne, Manoj Gaur and Dheeraj Sanghi, “DARAC: DDoS Mitigation using DDoS Aware Resource Allocation in Cloud”


• Yanhuang Li, Nora Cuppens-Boulahia, Jean-Michel Crom, Frédéric Cuppens, Vincent Frey and Xiaoshu Ji, “Similarity Measure for Security Policies in Service Provider Selection”


10:15-10:30 Tea / Coffee Break


Technical Session – VI; Watermarking and Steganography

• Aniket Roy, Rajat Subhra Chakraborty and Ruchira Naskar, “Reversible Color Image Watermarking in the YCoCg-R Color Space”


• Imon Mukherjee, Biswajita Datta, Reeturaj Banerjee and Srijan Das, “DWT Difference Modulation Based Novel Steganographic Algorithm” (Short Paper)


• Goutam Paul, “Revisiting Democratic Mining in Bitcoins: Its Weakness and Possible Remedies”



Technical Session – VII; Information Flow Control and Biometrics


• Dominik Bollmann, Steffen Lortz, Heiko Mantel and Artem Starostin, “An Automatic Inference of Minimal Security Types”

• Radhey Shyam and Yogendra Narain Singh, “Robustness of Score Normalization in Multibiometric Systems” (Short Paper)


• Susheel S, Naren N and Shyamasundar R.K., “Enforcing Secure Data Sharing in Web Application Development Frameworks like Django Through Information Flow Control” (Short Paper)


12:30-14:00 Lunch Break


Technical Session – VIII; Crypto-Systems and Protocols-II


• Angsuman Das and Avishek Adhikari, “Plaintext Checkable Signcryption”

• Santanu Sarkar, “A New Distinguisher on Grain v1 for 106 rounds”


• Ashish Choudhury, “Asynchronous Error-decodable Secret-sharing and Its Applications”


• Payal Chaudhari, Manik Lal Das and Anish Mathuria, “On Anonymous Attribute Based Encryption”


• Shyamalendu Kandar and Bibhas Chandra Dhara, “A (k,n) Multi Secret sharing scheme using two variables one way function with less public values” (Short Paper)



Farewell Snacks



SRISP © All Rights Reserved