Cyber Security & Assurance Technologies

Digital information is revolutionizing all fields of technology with electronic infrastructure serving as the communication backbone. With the development in this technological area, the dependence of economy and other public and private affairs on internet and digital infrastructure is on the rise. This reliance demands reliability and security of cyber space and information flow. Today, attacks from cyber space, show a direct threat to banking institutions, energy, infrastructure, state agencies and even social affairs. In the online world, it is important to be familiar with the sophistication of cyber security threats-including targeting phishing scams, denial of service attacks, malwares, data theft, social network attacks and other related attacks. Thousands of infected web pages are being exposed every day and hundreds of millions of records have been breached. With information flowing seamlessly through boundaries of countries and systems connected to networks around the globe, there is a growing need to protect our national assets and information by accentuating on national cyber security. There is a need to focus on the problems of design and analysis of security, privacy, and data protection algorithms in various emerging IT systems and concepts such as Internet of Things, Edge Computing, Fog Computing, Software Defined Networks, Blockchian, Cryptocurrency, etc. Aim of this track is to bring together researchers working on different aspects of cyber security, for advancing in this particular body of knowledge.

Computer software require specialized quality assurance and testing techniques like formal verification to confirm absence of bugs. Formal verification exposes the boundary conditions and worst case scenarios which are not possible using merely computer simulations. This part of the activity also invites new researches in the fields like Software Quality, Automata, logic, and Formal Verification, etc.

Topics of interest include, but are not limited to:-

  • Cyber Threats and Defence
  • Network Security
  • Computer/System Security
  • Vulnerability Assessment
  • Cryptography/Cryptanalysis
  • Forensics Investigation
  • Data availability, protection and Key Management Systems
  • Privacy, trust metrics, and risk management
  • Malware Analysis
  • HW Trojans Detection and Prevention
  • Anonymity and Identity Management
  • Software Quality Assurance
  • Formal Methods and Theory of Automata