ICICS 2022

The 24th International Conference on Information and Communications Security

5-8 September, 2022, University of Kent, Canterbury, UK (+ Virtual)

Shotcuts

Online Proceedings (free access if visited from this page, even if you don't have a subscription; individual papers' links can be found in the program shown below)

Day 1: Keynote I, Session 1, Session 2, Session 3
Day 2: Session 4, Session 5, Keynote II, Session 6
Day 3: Session 7, Panel Discussion, Session 8, Keynote III, Poster/Demo Session
Day 4: Session 9, Session 10, Session 11, Closing Session

Instructions for participants: for paper presenters | for session chairs | for poster presenters | for demo presenters | for remote participants

Venues

Online platforms: A Zoom Meeting session will be used for all formal sessions except the Poster/Demo session which will take place in an online platform called Gathertown. The Gathertown platform will also be used throughout the Conference for online social networking and accessing other information. Information about how to access both platforms will be sent to all registered participants via email. More about Gathertown with a screenshot can be found here.

Physical venue: All physical sessions of the Conference will be heled in LT2 (Lecture Theatre 2) of the Sibson Building of the University of Kent's Canterbury campus. The reception desk, the Poster/Demo session, coffee/tea breaks and social networking activities will be held in the foyer on the first foor close to LT2 and a seminar room nearby.

Program

The current program of the Conference can be found below. All times are based on UK Summer Time (UTC+1). Underlines authors indicate the presenters. Video recordings of presentations will be added to this page after the corresponding session ends, typically at the end of the day.

Day 1 (Monday 5 September 2022)

08:30-09:00 ICICS 2022 General Co-Chairs' Welcome Address slides
ICICS 2022 PC Co-Chairs's Report slides
09:00-10:00 Keynote I: Future challenges in security engineering slides video recording
Speaker: (Virtual) Ross Anderson, University of Cambridge and University of Edinburgh, UK
Session Chair: (In-person) Shujun Li, University of Kent, UK
10:00-10:30 Coffee/Tea Break
10:30-12:00 Session 1: Crypto I
Session Chair: (In-person) Sanjay Bhattacherjee, University of Kent, UK
10:30-11:00 Calibrating Learning Parity with Noise Authentication for Low-Resource Devices video recording
(Hybrid) Teik Guan Tan, De Wen Soh and Jianying Zhou
11:00-11:30 Conditional Cube Attacks on Full Members of KNOT-AEAD Family video recording
(Virtual) Siwei Chen, Zejun Xiang, Xiangyong Zeng and Shasha Zhang
11:30-12:00 New Results of Breaking the CLS Scheme from ACM-CCS 2014 video recording
(Virtual) Jing Gao, Jun Xu, Tianyu Wang and Lei Hu
12:00-13:30 Lunch Break
13:30-15:00 Session 2: Crypto II
Session Chair: (Virtual) Yunlei Zhao, Fudan University, China
13:30-14:00 A Note on the Security Framework of Two-key DbHtS MACs video recording
(Virtual) Tingting Guo and Peng Wang
14:00-14:30 Best Paper Award Best Paper Award
Maliciously Secure Multi-Party PSI with Lower Bandwidth and Faster Computation video recording
(Virtual) Zhi Qiu, Kang Yang, Yu Yu and Lijing Zhou
14:30-15:00 BS: Blockwise Sieve Algorithm for Finding Short Vectors from Sublattices video recording
(Virtual) Jinzheng Cao, Qingfeng Cheng, Xinghua Li and Yanbin Pan
15:00-15:30 Coffee/Tea Break
15:30-17:00 Session 3: Artificial Intelligence for Detection I
Session Chair: (In-person) Steven Noel, The MITRE Corporation, USA
15:30-16:00 TaPTree: Process-tree based Host Behavior Modeling and Threat Detection Framework via Sequential Pattern Mining
(In-person) Mohammad Mamun and Scott Buffett
16:00-16:30 FN2: Fake News DetectioN Based on Textual and Contextual Features video recording
(Virtual) Mouna Rabhi, Spiridon Bakiras and Roberto Di Pietro
16:30-17:00 Semi-supervised Context Discovery for Peer-Based Anomaly Detection in Multi-layer Networks video recording
(Virtual) Bo Dong, Yuhang Wu, Micheal Yeh, Yusan Lin, Yuzhong Chen, Hao Yang, Fei Wang, Wanxin Bai, Krupa Brahmkstri, Zhang Yimin, Chinna Kummitha and Verma Abhisar
17:00-19:00 Conference Welcome Reception at Sibson Café

Day 2 (Tuesday 6 September 2022)

09:00-10:30 Session 4: Artificial Intelligence for Detection II
Session Chair: (Virtual) Chuadhry Mujeeb Ahmed, University of Strathclyde, UK
09:00-09:30 Peekaboo: Hide and Seek with Malware Through Lightweight Multi-Feature Based Lenient Hybrid Approach video recording
(Virtual) Mingchang Liu, Vinay Sachidananda, Hongyi Peng, Rajendra Patil, Sivaanandh Muneeswaran and Mohan Gurusamy
09:30-10:00 SimCGE: Simple Contrastive Learning of Graph Embeddings for Cross-Version Binary Code Similarity Detection video recording
(Virtual) Fengliang Xia, Guixing Wu, Guochao Zhao and Xiangyu Li
10:00-10:30 Malware Detection with Limited Supervised Information via Contrastive Learning on API Call Sequences video recording
(Virtual) Mohan Gao, Peng Wu and Li Pan
10:30-11:00 Coffee/Tea Break
11:00-12:30 Session 5: Privacy and Anonymity
Session Chair: (Virtual) Zhe Xia, Wuhan University of Technology, China
11:00-11:30 Best Student Paper Award Best Student Paper Award
Lightweight and Practical Privacy-Preserving Image Masking in Smart Community video recording
(Virtual) Zhen Liu, Yining Liu and Weizhi Meng
11:30-12:00 Using Blockchains for Censorship-Resistant Bootstrapping in Anonymity Networks video recording
(Virtual) Yang Han, Dawei Xu, Jiaqi Gao and Liehuang Zhu
12:00-12:30 Repetitive, Oblivious, and Unlinkable SkNN over Encrypted-and-Updated Data on Cloud video recording
(Virtual) Meng Li, Mingwei Zhang, Jianbo Gao, Chhagan Lal, Mauro Conti and Mamoun Alazab
12:30-14:00 Lunch Break
14:00-15:00 Keynote II: Underspecified Foundation Models Considered Harmful video recording
Speaker: (Virtual) Nicholas Carlini, Google, USA
Session Chair: (In-person) Cristina Alcaraz, University of Malaga, Spain

15:00-15:30 Coffee/Tea Break
15:30-17:00 Session 6: Attack and Vulnerability Analysis I
Session Chair: (In-person) Vineet Rajani, University of Kent, UK
15:30-16:00 Best Artifact Award Best Artifact Award
DeepC2: AI-powered Covert Command and Control on OSNs video recording
(Virtual) Zhi Wang, Chaoge Liu, Xiang Cui, Jie Yin, Jiaxi Liu, Di Wu and Qixu Liu
16:00-16:30 Secure Boolean Masking of Gimli: Optimization and Evaluation on the Cortex-M4 video recording
(In-person) Tzu-Hsien Chang, Yen-Ting Kuo, Jiun-Peng Chen and Bo-Yin Yang
16:30-17:00 FUZZBOOST: Reinforcement Compiler Fuzzing video recording
(Virtual) Xiaoting Li, Xiao Liu, Lingwei Chen, Rupesh Prajapati and Dinghao Wu
17:00-18:00 Break
18:00-21:00 Conference Dinner at Dolche Vita

Day 3 (Wednesday 7 September 2022)

09:00-10:30 Session 7: Crypto III
Session Chair: (Virtual) José María de Fuentes, Universidad Carlos III de Madrid, Spain
09:00-09:30 Fast Fourier Orthogonalization over NTRU Lattices video recording
(Virtual) Shuo Sun, Yongbin Zhou, Rui Zhang, Yang Tao, Zehua Qiao and Jingdian Ming
09:30-10:00 Secure Sketch and Fuzzy Extractor with Imperfect Randomness: An Information-theoretic Study video recording
(Virtual) Kaini Chen, Peisong Shen, Kewei Lv and Chi Chen
10:00-10:30 Tight Analysis of Decryption Failure Probability of Kyber in Reality video recording
(Virtual) Boyue Fang, Weize Wang and Yunlei Zhao
10:30-11:00 Coffee/Tea Break
11:00-12:30 Panel Discussion: Security in Autonomous Driving Networks video recording
Facilitator: (In-person) Gareth Howells, University of Kent, UK
Panelists:
(In-person) Peter Davies, Thales e-Security, UK
(Virtual) Weisi Guo, Cranfield University, UK
(In-person) Rogério de Lemos, University of Kent, UK
(In-person) Sandra Scott-Hayward, Queen's University Belfast, UK
(In-person) Zonghua Zhang, Huawei Paris Research Center, France
Abstract: Autonomous Driving Networks (ADN), which is also called Zero-Touch Network and Services (ZSM) or self-driving networks, aims at tackling the challenges resulting from the increasing O&M complexity and cost of today’s telecom networks, ultimately achieving fully intelligent and automated O&M by leveraging AI techniques and new networking and communication technologies. It is well recognized that on a journey towards ADN, resilience and trust should be always put in the center, without which the value of ADN, as well as the confidence of operators, ISPs, and customers, will be significantly undermined. Therefore, this panel aims to bring together a number of leading experts with different expertise (e.g., networking, security, machine learning) to extensively discuss this topic, share their views and lessons learned, and provide their insights and perspectives.
12:30-13:30 Lunch Break
13:30-15:00 Session 8: Attack and Vulnerability Analysis II
Session Chair: (Virtual) Guangke Chen, ShanghaiTech University, China
13:30-14:00 Query-Efficient Black-box Adversarial Attack with Random Pattern Noises video recording
(Virtual) Makoto Yuito, Kenta Suzuki and Kazuki Yoneyama
14:00-14:30 TZ-IMA: Supporting Integrity Measurement for applications with ARM TrustZone video recording
(Virtual) Liantao Song, Yan Ding, Pan Dong, Yong Guo and Chuang Wang
14:30-15:00 Autoencoder Assist: An Efficient Profiling Attack on High-dimensional Datasets video recording
(Virtual) Qi Lei, Zijia Yang, Qin Wang, Yaoling Ding, Zhe Ma and An Wang
15:00-15:30 Coffee/Tea Break
15:30-16:30 Keynote III: Toward Practical Privacy Protections for Blockchain Networks video recording
Speaker: (Virtual) Guang Gong, University of Waterloo, Canada
Session Chair: (Virtual) Liqun Chen, University of Surrey, UK
16:30-17:30 Poster/Demo Session of "Already Published/Accepted Work" (with light refreshment and drink)
Where to join in person: the foyer outside of LT2 on the first floor of the Sibson Building
How to join remotely: ICICS 2022 space in Gathertown
(Poster P1, in-person) Behind the Mask: A Computational Study of Anonymous' Presence on Twitter (poster; Paper 1, Paper 2)
Keenan Jones, Jason Nurse and Shujun Li

(Poster P2, in-person) Cognitive Modeling for Human Performance Evaluation of Cyber Security Systems at Scale (poster; paper)
Haiyue Yuan, Shujun Li and Patrice Rusconi

(Poster P3, in-person) A Survey of User Perspectives on Security and Privacy in a Home Networking Environment (poster; paper)
Nandita Pattnaik, Shujun Li and Jason Nurse

(Poster P4, in-person) Ransomware deployment methods and analysis: Views from a predictive model and human responses (poster; paper)
Gavin Hull, Henna John and Budi Arief

(Poster P5, in-person) Designing ECG Monitoring Healthcare System with Federated Transfer Learning and Explainable AI (poster; paper)
Ali Raza, Kim Phuc Tran, Ludovic Koehl and Shujun Li

(Poster P6, in-person) You Just Assume It Is In There, I Guess: UK Families' Application And Knowledge Of Smart Home Cyber Security (poster; paper)
Sarah Turner, Nandita Pattnaik, Jason R.C. Nurse and Shujun Li

(Poster P7, in-person) Challenges in Generating, Transporting, and Verifying High-Entropy Sequences (poster; paper)
Darren Hurley-Smith and Julio Hernandez-Castro

(Poster P8, in-person) Adapting to Movement Patterns for Face Recognition on Mobile Devices (poster; paper)
Matthew Boakes, Richard Guest and Farzin Deravi

(Poster P9, in-person) Toad in the Hole or Mapo Tofu? Comparative Analysis of English and Chinese Darknet Markets (poster; paper)
Yichao Wang, Budi Arief and Julio Hernandez-Castro

(Poster V1, virtual) Cyber Incident Response Practices Across National CSIRTs' Operations: Results from an Online Survey (poster; paper)
Sharifah Roziah Binti Mohd Kassim, Shujun Li and Budi Arief

(Poster V2, virtual) M2VMapper: Malware-to-Vulnerability mapping for Android using text processing (poster; paper)
Shivi Garg and Niyati Baliyan

(Poster V3, virtual) Best Poster Award Best Poster Award
Image-based Neural Network Models for Malware Traffic Classification using PCAP to Picture Conversion (poster; paper)
Georgios Agrafiotis, Eftychia Makri, Ioannis Flionis, Antonios Lalas, Konstantinos Votis, Dimitrios Tzovaras and Nikolaos Tsampieris
(Demo P1, in-person) Best Demo Award Best Demo Award
VEREFOO: an automated framework for virtual firewall configuration (source code @ GitHub; video; Paper 1, Paper 2)
Daniele Bringhenti, Guido Marchetto, Riccardo Sisto and Fulvio Valenza

(Demo V1, virtual) DeepC2: AI-Powered Covert Command and Control on OSNs (source code available upon request to the authors; 3 videos; ICICS 2022 paper)
Zhi Wang, Chaoge Liu, Xiang Cui, Jie Yin, Jiaxi Liu, Di Wu and Qixu Liu

(Demo V2, virtual) Tight Analysis of Decryption Failure Probability of Kyber in Reality (source code; video; ICICS 2022 paper)
Boyue Fang, Weize Wang and Yunlei Zhao

(Demo V3, virtual) Chuchotage: In-line Software Network Protocol Translation for (D)TLS (ICICS 2022 paper)
Pegah Nikbakht Bideh and Nicolae Paladi
From 17:30 Social Event (a walking tour of Canterbury) + Self-organised Dinner

Day 4 (Thursday 8 September 2022)

09:00-10:30 Session 9: Artificial Intelligence for Detection III
Session Chair: (Virtual) Kim Phuc Tran, ENSAIT & GEMTEX, Université de Lille, France
09:00-09:30 Best Presentation Award Best Presentation Award
Privacy-aware Split Learning Based Energy Theft Detection for Smart Grids video recording
(In-person) Arwa Alromih, John A. Clark and Prosanta Gope
09:30-10:00 ODDITY: An Ensemble Framework Leverages Contrastive Representation Learning for Superior Anomaly Detection video recording
(Virtual) Hongyi Peng, Vinay Sachidananda, Teng Joon Lim, Rajendra Patil, Mingchang Liu, Sivaanandh Muneeswaran and Mohan Gurusamy
10:00-10:30 Deep Learning Based Webshell Detection Coping with Long Text and Lexical Ambiguity video recording
(Virtual) Tongjian An, Xuefei Shui and Hongkui Gao
10:30-11:00 Coffee/Tea Break
11:00-12:30 Session 10: Authentication
Session Chair: (In-person) Shujun Li, University of Kent, UK
11:00-11:30 FRACTAL: Single-Channel Multi-Factor Transaction Authentication Through a Compromised Terminal video recording
(Virtual) Savio Sciancalepore, Simone Raponi, Daniele Caldarola and Roberto Di Pietro
11:30-12:00 Improving Deep Learning Based Password Guessing Models Using Pre-processing video recording
(Virtual) Yuxuan Wu, Ding Wang, Yunkai Zou and Ziyi Huang
12:00-12:30 Exploring Phone-Based Authentication Vulnerabilities in Single Sign-On Systems video recording
(Virtual) Matthew Tolbert, Elie Hess, Mattheus Nascimento, Yunsen Lei and Craig Shue
12:30-14:00 Lunch Break
14:00-16:00 Session 11: Network Security and Forensic
Session Chair: (In-person) Virginia Franqueira, University of Kent, UK
14:00-14:30 Video Forensics for Object Removal Based on Darknet3D (not presented)
(Virtual) Kejun Zhang, Yuhao Wang and Xinying Yu
14:30-15:00 Dependency-Based Link Prediction For Learning Microsegmentation Policy video recording
(In-person) Steven Noel and Vipin Swarup
15:00-15:30 Chuchotage: In-line Software Network Protocol Translation for (D)TLS video recording
(Virtual) Pegah Nikbakht Bideh and Nicolae Paladi
15:30-16:00 Study on the Effect of Face Masks on Forensic Speaker Recognition video recording
(Virtual) Georgiana Bogdanel, Nadia Belghazi Mohamed, Hilario Gómez Moreno and Sergio Lafuente Arroyo
16:00-17:00 Social Networking (with light refreshment and drink)
17:00-17:30 Closing Remarks, Award Announcements and ICICS 2023 Presentation
(In-person) ICICS 2022 PC Chairs' Summary with Announcements for Best Paper Award and Best Student Paper Award slides
(In-person) ICICS 2022 Local Award Judging Chair's Award Announcements and General Chairs' Closing Remarks slides
(Virtual) Ding Wang (Nankai University, China), ICICS 2023 PC Co-Chair on behalf of the ICICS 2023 Organizing Committee slides

Instructions

For Paper Presenters

Each paper is allocated a 30-min slot. The presentation part should last for 20-25 minutes to leave at least 5 mins for questions and answers.

Pre-recorded videos are required for all paper presentations, and their links will be added after each session is held. In-person participants can choose to present the presentation live, but please make sure the presentation will not last longer than 25 minues. Please follow the instructions here to prepare your video and fill the Pre-Recorded Video Information Form by Friday 2nd September 12pm UK summer time (UTC+1).

Please arrive at least 10 minutes before the start of your session and check with the session chair / local helpers on A/V if you are presenting live and test your Zoom setup if you are presenting remotely. If you are presenting live, please consider copying your presentation file to a USB stick so that you can present from the computer in the lecture threatre to allow a smoother transition between presentations.

All presentations automatically enter the competition for the Best Presentation Award, and local judges can be attending your presentation to conduct their judging work. The winner of the Best Presentation Award will be announced in the last session on the last day of the Conference.

For Session Chairs

If you are chairing remotely, all presentations in your session will be remote. During the session, the local helpers in the lecture theatre will help you communicate with in-person participants. If you are chairing in person, there may be questions from remote participants. We will have two dedicated local researchers looking after the Zoom platform who will remind you about any questions.

Please arrive at least 10 minutes earlier before the start of your session. Check with all presenters of your session to ensure all are present and have checked A/V and/or Zoom setup before the session start.

Please control the time of any live presentations and remind the presenter at 20 minutes and stop the presentation at 25 minutes to allow the audience to ask questions.

Please also make notes of all presentations and presenters' answers to questions, and share the notes with the Local Award Judging Panel Chair Keenan Jones so the panel can consider your feedback for the selection of the Best Presentation Award.

If possible, please read the papers in your session before hand using the link of the online proceedings at the top of the page. Prepare some questions in case there are no or just a few simple questions from the audience.

For Poster Presenters

The standard poster size is A1 and we recommend you use the portrait orientation. The conference will provide velcro sellotapes for fastening the poster to the poster board, so you don't need to bring your own pins/tacks/sellotapes.

Poster boards will be available throughout the Conference so posters can be displayed from Day 1 and remain until Day 4. If you will attend only Day 3, you can send your poster via post to us using the address below. We can also print the poster for you if you haven't printed it out yet. In this case, please contact the Poster/Demo Co-Chairs to make an arrangement.

Laura Medlock
Institute of Cyber Security for Society (iCSS)
Keynes College
University of Kent
Canterbury, CT2 7NP, UK

Most posters will be presented in person. For accommodating remote participants and poster presenters who will attend remotely, we are identifying a platform to facilitate the interaction between the presenter and the audience. More details will be released here.

The Poster/Demo session will last for 1 hour. During the session, please stay with your poster as much as possible so that you can interact with other participants visiting your poster. Note that all posters automatically enter the competition for the Best Poster Award, and local judges can visit your poster at time within the 1 hour to conduct their judging work. The winner of the Best Poster Award will be announced in the last session on the last day of the Conference.

Posters that are not removed by the presenter after the last session of the Conference will be kept until Monday 12th September, after which they will be considered unwanted and disposed of.

For Demo Presenters

The Poster/Demo session will last for 1 hour. During the session, please stay with your demo as much as possible so that you can interact with other participants visiting your demo.

You will need to bring a laptop with you for the demo. A desk, a chair and a close power socket will be made available for each demo. We can also provide a computer monitor and an electric extension lead if needed.

If there are more than one demo, a Best Demo Award will be selected. If there are two or more demos for papers accepted to the Conference, a Best Artifact Award will be selected. Winners of the two awards will be announced in the last session on the last day of the Conference.

For Remote Participants

There are two online platforms for supporting remote participation: Zoom and Gathertown.

The Zoom session is used for all formal sessions except the Poster/Demo session. For the dial-in information about the Zoom session, please see the top of the page. When you are in the Zoom session, please keep yourself muted and swich off your camera during the Zoom session to avoid interrupting with the main speaker. Please raise your virtual hand or type in the chat window to ask questions. Local helpers and session chairs will monitor the chat and virtual hands for questions. The local helpers may mute you and switch off your camera without warning if deemed necessary.

The Poster/Demo session will take place in a different online platform called Gathertown. It is chosen to allow parallel sessions of different poster/demo presentations. The Gathertown platform will be open throughout the whole Conference to allow interactions between remote and physical participants and presenters. The Gathertown platform will have different types of information about the Conference, poster and demo "stands", information from sponsors and also the host iCSS. The platform also allows participants to have one-to-one and group video chats. How to visit the Gathertown platform of the Conference is sent to all registered participants via email.

A screenshot of how the Gathertown space looks like is shown below.

top