Online Proceedings (free access if visited from this page, even if you don't have a subscription; individual papers' links can be found in the program shown below)
Day 1: Keynote I, Session 1, Session 2, Session 3
Day 2: Session 4, Session 5, Keynote II, Session 6
Day 3: Session 7, Panel Discussion, Session 8, Keynote III, Poster/Demo Session
Day 4: Session 9, Session 10, Session 11, Closing Session
Online platforms: A Zoom Meeting session will be used for all formal sessions except the Poster/Demo session which will take place in an online platform called Gathertown. The Gathertown platform will also be used throughout the Conference for online social networking and accessing other information. Information about how to access both platforms will be sent to all registered participants via email. More about Gathertown with a screenshot can be found here.
Physical venue: All physical sessions of the Conference will be heled in LT2 (Lecture Theatre 2) of the Sibson Building of the University of Kent's Canterbury campus. The reception desk, the Poster/Demo session, coffee/tea breaks and social networking activities will be held in the foyer on the first foor close to LT2 and a seminar room nearby.
The current program of the Conference can be found below. All times are based on UK Summer Time (UTC+1). Underlines authors indicate the presenters. Video recordings of presentations will be added to this page after the corresponding session ends, typically at the end of the day.
Day 1 (Monday 5 September 2022)
|08:30-09:00||ICICS 2022 General Co-Chairs' Welcome Address
ICICS 2022 PC Co-Chairs's Report
|09:00-10:00||Keynote I: Future challenges in security engineering
Speaker: (Virtual) Ross Anderson, University of Cambridge and University of Edinburgh, UK
Session Chair: (In-person) Shujun Li, University of Kent, UK
|10:30-12:00||Session 1: Crypto I
Session Chair: (In-person) Sanjay Bhattacherjee, University of Kent, UK
|10:30-11:00||Calibrating Learning Parity with Noise Authentication for Low-Resource Devices
(Hybrid) Teik Guan Tan, De Wen Soh and Jianying Zhou
|11:00-11:30||Conditional Cube Attacks on Full Members of KNOT-AEAD Family
(Virtual) Siwei Chen, Zejun Xiang, Xiangyong Zeng and Shasha Zhang
|11:30-12:00||New Results of Breaking the CLS Scheme from ACM-CCS 2014
(Virtual) Jing Gao, Jun Xu, Tianyu Wang and Lei Hu
|13:30-15:00||Session 2: Crypto II
Session Chair: (Virtual) Yunlei Zhao, Fudan University, China
|13:30-14:00||A Note on the Security Framework of Two-key DbHtS MACs
(Virtual) Tingting Guo and Peng Wang
|14:00-14:30||Best Paper Award
Maliciously Secure Multi-Party PSI with Lower Bandwidth and Faster Computation
(Virtual) Zhi Qiu, Kang Yang, Yu Yu and Lijing Zhou
|14:30-15:00||BS: Blockwise Sieve Algorithm for Finding Short Vectors from Sublattices
(Virtual) Jinzheng Cao, Qingfeng Cheng, Xinghua Li and Yanbin Pan
|15:30-17:00||Session 3: Artificial Intelligence for Detection I
Session Chair: (In-person) Steven Noel, The MITRE Corporation, USA
|15:30-16:00||TaPTree: Process-tree based Host Behavior Modeling and Threat Detection Framework via Sequential Pattern Mining
(In-person) Mohammad Mamun and Scott Buffett
|16:00-16:30||FN2: Fake News DetectioN Based on Textual and Contextual Features
(Virtual) Mouna Rabhi, Spiridon Bakiras and Roberto Di Pietro
|16:30-17:00||Semi-supervised Context Discovery for Peer-Based Anomaly Detection in Multi-layer Networks
(Virtual) Bo Dong, Yuhang Wu, Micheal Yeh, Yusan Lin, Yuzhong Chen, Hao Yang, Fei Wang, Wanxin Bai, Krupa Brahmkstri, Zhang Yimin, Chinna Kummitha and Verma Abhisar
|17:00-19:00||Conference Welcome Reception at Sibson Café|
Day 2 (Tuesday 6 September 2022)
|09:00-10:30||Session 4: Artificial Intelligence for Detection II
Session Chair: (Virtual) Chuadhry Mujeeb Ahmed, University of Strathclyde, UK
|09:00-09:30||Peekaboo: Hide and Seek with Malware Through Lightweight Multi-Feature Based Lenient Hybrid Approach
(Virtual) Mingchang Liu, Vinay Sachidananda, Hongyi Peng, Rajendra Patil, Sivaanandh Muneeswaran and Mohan Gurusamy
|09:30-10:00||SimCGE: Simple Contrastive Learning of Graph Embeddings for Cross-Version Binary Code Similarity Detection
(Virtual) Fengliang Xia, Guixing Wu, Guochao Zhao and Xiangyu Li
|10:00-10:30||Malware Detection with Limited Supervised Information via Contrastive Learning on API Call Sequences
(Virtual) Mohan Gao, Peng Wu and Li Pan
|11:00-12:30||Session 5: Privacy and Anonymity
Session Chair: (Virtual) Zhe Xia, Wuhan University of Technology, China
|11:00-11:30||Best Student Paper Award
Lightweight and Practical Privacy-Preserving Image Masking in Smart Community
(Virtual) Zhen Liu, Yining Liu and Weizhi Meng
|11:30-12:00||Using Blockchains for Censorship-Resistant Bootstrapping in Anonymity Networks
(Virtual) Yang Han, Dawei Xu, Jiaqi Gao and Liehuang Zhu
|12:00-12:30||Repetitive, Oblivious, and Unlinkable SkNN over Encrypted-and-Updated Data on Cloud
(Virtual) Meng Li, Mingwei Zhang, Jianbo Gao, Chhagan Lal, Mauro Conti and Mamoun Alazab
|14:00-15:00||Keynote II: Underspecified Foundation Models Considered Harmful
Speaker: (Virtual) Nicholas Carlini, Google, USA
Session Chair: (In-person) Cristina Alcaraz, University of Malaga, Spain
|15:30-17:00||Session 6: Attack and Vulnerability Analysis I
Session Chair: (In-person) Vineet Rajani, University of Kent, UK
|15:30-16:00||Best Artifact Award
DeepC2: AI-powered Covert Command and Control on OSNs
(Virtual) Zhi Wang, Chaoge Liu, Xiang Cui, Jie Yin, Jiaxi Liu, Di Wu and Qixu Liu
|16:00-16:30||Secure Boolean Masking of Gimli: Optimization and Evaluation on the Cortex-M4
(In-person) Tzu-Hsien Chang, Yen-Ting Kuo, Jiun-Peng Chen and Bo-Yin Yang
|16:30-17:00||FUZZBOOST: Reinforcement Compiler Fuzzing
(Virtual) Xiaoting Li, Xiao Liu, Lingwei Chen, Rupesh Prajapati and Dinghao Wu
|18:00-21:00||Conference Dinner at Dolche Vita|
Day 3 (Wednesday 7 September 2022)
|09:00-10:30||Session 7: Crypto III
Session Chair: (Virtual) José María de Fuentes, Universidad Carlos III de Madrid, Spain
|09:00-09:30||Fast Fourier Orthogonalization over NTRU Lattices
(Virtual) Shuo Sun, Yongbin Zhou, Rui Zhang, Yang Tao, Zehua Qiao and Jingdian Ming
|09:30-10:00||Secure Sketch and Fuzzy Extractor with Imperfect Randomness: An Information-theoretic Study
(Virtual) Kaini Chen, Peisong Shen, Kewei Lv and Chi Chen
|10:00-10:30||Tight Analysis of Decryption Failure Probability of Kyber in Reality
(Virtual) Boyue Fang, Weize Wang and Yunlei Zhao
|11:00-12:30||Panel Discussion: Security in Autonomous Driving Networks
Facilitator: (In-person) Gareth Howells, University of Kent, UK
(In-person) Peter Davies, Thales e-Security, UK
(Virtual) Weisi Guo, Cranfield University, UK
(In-person) Rogério de Lemos, University of Kent, UK
(In-person) Sandra Scott-Hayward, Queen's University Belfast, UK
(In-person) Zonghua Zhang, Huawei Paris Research Center, France
|Abstract: Autonomous Driving Networks (ADN), which is also called Zero-Touch Network and Services (ZSM) or self-driving networks, aims at tackling the challenges resulting from the increasing O&M complexity and cost of today’s telecom networks, ultimately achieving fully intelligent and automated O&M by leveraging AI techniques and new networking and communication technologies. It is well recognized that on a journey towards ADN, resilience and trust should be always put in the center, without which the value of ADN, as well as the confidence of operators, ISPs, and customers, will be significantly undermined. Therefore, this panel aims to bring together a number of leading experts with different expertise (e.g., networking, security, machine learning) to extensively discuss this topic, share their views and lessons learned, and provide their insights and perspectives.|
|13:30-15:00||Session 8: Attack and Vulnerability Analysis II
Session Chair: (Virtual) Guangke Chen, ShanghaiTech University, China
|13:30-14:00||Query-Efficient Black-box Adversarial Attack with Random Pattern Noises
(Virtual) Makoto Yuito, Kenta Suzuki and Kazuki Yoneyama
|14:00-14:30||TZ-IMA: Supporting Integrity Measurement for applications with ARM TrustZone
(Virtual) Liantao Song, Yan Ding, Pan Dong, Yong Guo and Chuang Wang
|14:30-15:00||Autoencoder Assist: An Efficient Profiling Attack on High-dimensional Datasets
(Virtual) Qi Lei, Zijia Yang, Qin Wang, Yaoling Ding, Zhe Ma and An Wang
|15:30-16:30||Keynote III: Toward Practical Privacy Protections for Blockchain Networks
Speaker: (Virtual) Guang Gong, University of Waterloo, Canada
Session Chair: (Virtual) Liqun Chen, University of Surrey, UK
|16:30-17:30||Poster/Demo Session of "Already Published/Accepted Work" (with light refreshment and drink)|
|Where to join in person: the foyer outside of LT2 on the first floor of the Sibson Building
How to join remotely: ICICS 2022 space in Gathertown
(Poster P1, in-person) Behind the Mask: A Computational Study of Anonymous' Presence on Twitter (; Paper 1, Paper 2)
Keenan Jones, Jason Nurse and Shujun Li
(Poster P2, in-person) Cognitive Modeling for Human Performance Evaluation of Cyber Security Systems at Scale (; paper)
Haiyue Yuan, Shujun Li and Patrice Rusconi
(Poster P3, in-person) A Survey of User Perspectives on Security and Privacy in a Home Networking Environment (; paper)
Nandita Pattnaik, Shujun Li and Jason Nurse
(Poster P4, in-person) Ransomware deployment methods and analysis: Views from a predictive model and human responses (; paper)
Gavin Hull, Henna John and Budi Arief
(Poster P5, in-person) Designing ECG Monitoring Healthcare System with Federated Transfer Learning and Explainable AI (; paper)
Ali Raza, Kim Phuc Tran, Ludovic Koehl and Shujun Li
(Poster P6, in-person) You Just Assume It Is In There, I Guess: UK Families' Application And Knowledge Of Smart Home Cyber Security (; paper)
Sarah Turner, Nandita Pattnaik, Jason R.C. Nurse and Shujun Li
(Poster P7, in-person) Challenges in Generating, Transporting, and Verifying High-Entropy Sequences (; paper)
Darren Hurley-Smith and Julio Hernandez-Castro
(Poster P8, in-person) Adapting to Movement Patterns for Face Recognition on Mobile Devices (; paper)
Matthew Boakes, Richard Guest and Farzin Deravi
(Poster P9, in-person) Toad in the Hole or Mapo Tofu? Comparative Analysis of English and Chinese Darknet Markets (; paper)
Yichao Wang, Budi Arief and Julio Hernandez-Castro
(Poster V1, virtual) Cyber Incident Response Practices Across National CSIRTs' Operations: Results from an Online Survey (; paper)
Sharifah Roziah Binti Mohd Kassim, Shujun Li and Budi Arief
(Poster V2, virtual) M2VMapper: Malware-to-Vulnerability mapping for Android using text processing (; paper)
Shivi Garg and Niyati Baliyan
(Poster V3, virtual) Best Poster Award
Image-based Neural Network Models for Malware Traffic Classification using PCAP to Picture Conversion (; paper)
Georgios Agrafiotis, Eftychia Makri, Ioannis Flionis, Antonios Lalas, Konstantinos Votis, Dimitrios Tzovaras and Nikolaos Tsampieris
(Demo P1, in-person) Best Demo Award
VEREFOO: an automated framework for virtual firewall configuration (source code @ GitHub; ; Paper 1, Paper 2)
Daniele Bringhenti, Guido Marchetto, Riccardo Sisto and Fulvio Valenza
(Demo V1, virtual) DeepC2: AI-Powered Covert Command and Control on OSNs (source code available upon request to the authors; ; ICICS 2022 paper)
Zhi Wang, Chaoge Liu, Xiang Cui, Jie Yin, Jiaxi Liu, Di Wu and Qixu Liu
(Demo V2, virtual) Tight Analysis of Decryption Failure Probability of Kyber in Reality (source code; ; ICICS 2022 paper)
Boyue Fang, Weize Wang and Yunlei Zhao
(Demo V3, virtual) Chuchotage: In-line Software Network Protocol Translation for (D)TLS (ICICS 2022 paper)
Pegah Nikbakht Bideh and Nicolae Paladi
|From 17:30||Social Event (a walking tour of Canterbury) + Self-organised Dinner|
Day 4 (Thursday 8 September 2022)
|09:00-10:30||Session 9: Artificial Intelligence for Detection III
Session Chair: (Virtual) Kim Phuc Tran, ENSAIT & GEMTEX, Université de Lille, France
|09:00-09:30||Best Presentation Award
Privacy-aware Split Learning Based Energy Theft Detection for Smart Grids
(In-person) Arwa Alromih, John A. Clark and Prosanta Gope
|09:30-10:00||ODDITY: An Ensemble Framework Leverages Contrastive Representation Learning for Superior Anomaly Detection
(Virtual) Hongyi Peng, Vinay Sachidananda, Teng Joon Lim, Rajendra Patil, Mingchang Liu, Sivaanandh Muneeswaran and Mohan Gurusamy
|10:00-10:30||Deep Learning Based Webshell Detection Coping with Long Text and Lexical Ambiguity
(Virtual) Tongjian An, Xuefei Shui and Hongkui Gao
|11:00-12:30||Session 10: Authentication
Session Chair: (In-person) Shujun Li, University of Kent, UK
|11:00-11:30||FRACTAL: Single-Channel Multi-Factor Transaction Authentication Through a Compromised Terminal
(Virtual) Savio Sciancalepore, Simone Raponi, Daniele Caldarola and Roberto Di Pietro
|11:30-12:00||Improving Deep Learning Based Password Guessing Models Using Pre-processing
(Virtual) Yuxuan Wu, Ding Wang, Yunkai Zou and Ziyi Huang
|12:00-12:30||Exploring Phone-Based Authentication Vulnerabilities in Single Sign-On Systems
(Virtual) Matthew Tolbert, Elie Hess, Mattheus Nascimento, Yunsen Lei and Craig Shue
|14:00-16:00||Session 11: Network Security and Forensic
Session Chair: (In-person) Virginia Franqueira, University of Kent, UK
|14:00-14:30||Video Forensics for Object Removal Based on Darknet3D (not presented)
(Virtual) Kejun Zhang, Yuhao Wang and Xinying Yu
|14:30-15:00||Dependency-Based Link Prediction For Learning Microsegmentation Policy
(In-person) Steven Noel and Vipin Swarup
|15:00-15:30||Chuchotage: In-line Software Network Protocol Translation for (D)TLS
(Virtual) Pegah Nikbakht Bideh and Nicolae Paladi
|15:30-16:00||Study on the Effect of Face Masks on Forensic Speaker Recognition
(Virtual) Georgiana Bogdanel, Nadia Belghazi Mohamed, Hilario Gómez Moreno and Sergio Lafuente Arroyo
|16:00-17:00||Social Networking (with light refreshment and drink)|
|17:00-17:30||Closing Remarks, Award Announcements and ICICS 2023 Presentation
(In-person) ICICS 2022 PC Chairs' Summary with Announcements for Best Paper Award and Best Student Paper Award
(In-person) ICICS 2022 Local Award Judging Chair's Award Announcements and General Chairs' Closing Remarks
(Virtual) Ding Wang (Nankai University, China), ICICS 2023 PC Co-Chair on behalf of the ICICS 2023 Organizing Committee
For Paper Presenters
Each paper is allocated a 30-min slot. The presentation part should last for 20-25 minutes to leave at least 5 mins for questions and answers.
Pre-recorded videos are required for all paper presentations, and their links will be added after each session is held. In-person participants can choose to present the presentation live, but please make sure the presentation will not last longer than 25 minues. Please follow the instructions here to prepare your video and fill the Pre-Recorded Video Information Form by Friday 2nd September 12pm UK summer time (UTC+1).
Please arrive at least 10 minutes before the start of your session and check with the session chair / local helpers on A/V if you are presenting live and test your Zoom setup if you are presenting remotely. If you are presenting live, please consider copying your presentation file to a USB stick so that you can present from the computer in the lecture threatre to allow a smoother transition between presentations.
All presentations automatically enter the competition for the Best Presentation Award, and local judges can be attending your presentation to conduct their judging work. The winner of the Best Presentation Award will be announced in the last session on the last day of the Conference.
For Session Chairs
If you are chairing remotely, all presentations in your session will be remote. During the session, the local helpers in the lecture theatre will help you communicate with in-person participants. If you are chairing in person, there may be questions from remote participants. We will have two dedicated local researchers looking after the Zoom platform who will remind you about any questions.
Please arrive at least 10 minutes earlier before the start of your session. Check with all presenters of your session to ensure all are present and have checked A/V and/or Zoom setup before the session start.
Please control the time of any live presentations and remind the presenter at 20 minutes and stop the presentation at 25 minutes to allow the audience to ask questions.
Please also make notes of all presentations and presenters' answers to questions, and share the notes with the Local Award Judging Panel Chair Keenan Jones so the panel can consider your feedback for the selection of the Best Presentation Award.
If possible, please read the papers in your session before hand using the link of the online proceedings at the top of the page. Prepare some questions in case there are no or just a few simple questions from the audience.
For Poster Presenters
The standard poster size is A1 and we recommend you use the portrait orientation. The conference will provide velcro sellotapes for fastening the poster to the poster board, so you don't need to bring your own pins/tacks/sellotapes.
Poster boards will be available throughout the Conference so posters can be displayed from Day 1 and remain until Day 4. If you will attend only Day 3, you can send your poster via post to us using the address below. We can also print the poster for you if you haven't printed it out yet. In this case, please contact the Poster/Demo Co-Chairs to make an arrangement.
Institute of Cyber Security for Society (iCSS)
University of Kent
Canterbury, CT2 7NP, UK
Most posters will be presented in person. For accommodating remote participants and poster presenters who will attend remotely, we are identifying a platform to facilitate the interaction between the presenter and the audience. More details will be released here.
The Poster/Demo session will last for 1 hour. During the session, please stay with your poster as much as possible so that you can interact with other participants visiting your poster. Note that all posters automatically enter the competition for the Best Poster Award, and local judges can visit your poster at time within the 1 hour to conduct their judging work. The winner of the Best Poster Award will be announced in the last session on the last day of the Conference.
Posters that are not removed by the presenter after the last session of the Conference will be kept until Monday 12th September, after which they will be considered unwanted and disposed of.
For Demo Presenters
The Poster/Demo session will last for 1 hour. During the session, please stay with your demo as much as possible so that you can interact with other participants visiting your demo.
You will need to bring a laptop with you for the demo. A desk, a chair and a close power socket will be made available for each demo. We can also provide a computer monitor and an electric extension lead if needed.
If there are more than one demo, a Best Demo Award will be selected. If there are two or more demos for papers accepted to the Conference, a Best Artifact Award will be selected. Winners of the two awards will be announced in the last session on the last day of the Conference.
For Remote Participants
There are two online platforms for supporting remote participation: Zoom and Gathertown.
The Zoom session is used for all formal sessions except the Poster/Demo session. For the dial-in information about the Zoom session, please see the top of the page. When you are in the Zoom session, please keep yourself muted and swich off your camera during the Zoom session to avoid interrupting with the main speaker. Please raise your virtual hand or type in the chat window to ask questions. Local helpers and session chairs will monitor the chat and virtual hands for questions. The local helpers may mute you and switch off your camera without warning if deemed necessary.
The Poster/Demo session will take place in a different online platform called Gathertown. It is chosen to allow parallel sessions of different poster/demo presentations. The Gathertown platform will be open throughout the whole Conference to allow interactions between remote and physical participants and presenters. The Gathertown platform will have different types of information about the Conference, poster and demo "stands", information from sponsors and also the host iCSS. The platform also allows participants to have one-to-one and group video chats. How to visit the Gathertown platform of the Conference is sent to all registered participants via email.
A screenshot of how the Gathertown space looks like is shown below.