Keynotes

 

Keynote 1: Beyond the trusted platform: a hybrid approach to the challenge of securing the user.

Presenter: Ben Whitham, Founder, Penten Australia.

Trusted hardware and software designs that behave in a consistent and enforceable manner can often be at odds with user expectations and behaviours. Users need security but they also want flexibility, freedom, connectivity and the ability to share. It is a real challenge to deliver trusted products for the commercial market that are acceptable and usable without compromising robust and sophisticated security models. This talk shares several real-world challenges that we have encountered and some hybrid mitigations, involving cyber deception, that we have explored.

Speaker Bio:

Ben

 

Ben Whitham is a cybersecurity entrepreneur, engineer and the Australian Lead for the Honeynet Project. After a career in the military, Ben worked as a consultant in a number of Australian government and commercial cyber incident response teams. It was during this time he co-founded several companies, including M5 Network Security, where he was co-creator of the Secure Communications Solution, a finalist in the 2012 SC Magazine Mobile Security Product of the Year and winner of the Australian Museum Eureka Award for Outstanding Science in Safeguarding Australia. Now with his new venture, Penten, he continues to consult and design security solutions and has recently completed the work for a Cyber Security Doctorate on implementing a cyber deception system to detect data theft by insiders.

Keynote 7: Smart Sensing using Trusted and Secure Smart Sensors

Presenter: Professor Prasant Mohapatra, University of California, Davis.

With the extreme proliferation of smart and mobile devices, it becomes necessary to exploit the rich of sensing capabilities of the embedded sensing elements prevalent in these Internet of Things. Collectively these sensing capabilities can facilitate new application and enhance popular usage of the mobile devices. In this talk we will explore a few ideas and the underlying approaches related to trusted and secure sensing in mobile devices. We will discuss a new sensor-assisted authentication in mobile devices that exploits the camera, motion, and light sensors for facial authentication in mobile devices. The proposed approach is secure, fast, and reasonably accurate. In other scenarios, we will explore continuous and secure authentication based on proximity and activities detected through wearable devices. Our approach identifies deficiencies in commercial devices and proposes better calibration approaches. One effort related to an unconventional sensing approach reveals such shortcomings. Experimental evaluation and validations will be presented in all the above cases.

Speaker Bio:

Mohatapra

 

 

 

 

 

 

 

 

 

 

Dr. Prasant Mohapatra is a Professor in the Department of Computer Science and serves as the Dean and Vice-Provost of Graduate at the University of California, Davis. He is a former Endowed Chair of the Department of Computer Science. In the past, he has held Visiting Professor positions at AT&T, Intel Corporation, Panasonic Technologies, Institute of Infocomm Research (I2R), Singapore, and National ICT Australia (NICTA), University of Padova, Italy, Korea Advanced Institute of Science and Technology (KAIST), and Yonsei University, South Korea. He was the Editor-in-Chief of the IEEE Transactions on Mobile Computing, and has served on the editorial boards of the IEEE Transactions on Computers, IEEE Transactions on Mobile Computing, IEEE Transaction on Parallel and Distributed Systems, ACM WINET, and Ad Hoc Networks. He has been on the program/organizational committees of several international conferences. 

Dr. Mohapatra is the recipient of an Outstanding Engineering Alumni Award from Penn State University, an Outstanding Research Faculty Award from the College of Engineering at the University of California, and the HP Labs Innovation Research Award winner for three years. He is a Fellow of the IEEE and AAAS. Dr. Mohapatra's research interests are in the areas of wireless networks, mobile communications, sensor networks, and Internet protocols.

Keynote 3: Smart Homes: smaller bills, larger problems

Presenter: Daniel Mosse, University of Pittsburgh, USA

Technology, and in particular the IoT, promises to make our lives better. The same way that computers removed the boring parts from computations and smart phones enable control over devices we never thought to control, IoT and the Smart Home paradigm promise to revolutionize the way we live.  In this talk, we will explore ways and problems of saving energy and managing our homes through the promise of smart devices and interconnected homes.  Figuring out where loads are and how to reduce them using sensors, devices, and intelligence is hard work!!  We are almost delivering a collection of hardware and software, connected through a wireless network, that is unobtrusive and lasts a very long time, but we are still far from doing it in a way that does not give away information the user cares about, in an interoperable way, and in a personalized way.  Will you trust your smart home?

Speaker Bio:

mosse

 

 

 

Daniel Mosse is Professor and former Chair of Pitt CS. The current major thrusts of his research are real-time, power and energy management, IoT, and how to make science really reproducible. He has published approximately 200 papers worldwide in these topics. Typically funded by the US government, his projects combine theoretical results and actual implementations.   Dr. Mosse is also really into education: he received a Provost's Innovation in Education Grant/Award in 2007, the Tina and David Bellet Teaching Excellence Award in 2006 (one of two among over 500 faculty members in the School of Arts and Sciences), and participated in several other initiatives at Pitt.  Lastly, he's a big advocate for diversity, especially women in computing and latinas / latinos in computing.
 

Keynote 5: Enhancing Privacy in Location-Based Services

Presenter: Professor Wanlei Zhou, Deakin University

In this talk we first systematically present the current research status of the location privacy issue, including the location privacy definition, the attacks and adversaries, the location privacy preserving mechanisms, the location privacy metrics, and the current status of location based applications. Then we will present two application cases related to location privacy. The first application case is to enhance privacy of location-based services (LBS) in wireless vehicular networks, where we develop an LBS privacy-enhancing scheme that is dedicated to the vehicular environment by exploring the unique features of queries from in-vehicle users. The second application case is to deal with the trajectory privacy preserving in mobile crowd sensing (MCS), where we develop a location privacy preserving framework based on economic models for MCS applications. The presentation will be mainly based the following two published papers:

1. Bo Liu, Wanlei Zhou, Tianqing Zhu, Longxiang Gao, Tom H. Luan, and Haibo Zhou, "Silence is Golden: Enhancing Privacy of Location-Based Services by Content Broadcasting and Active Caching in Wireless Vehicular Networks", IEEE Transactions on Vehicular Technology. VOL. 65, NO. 12, pp. 9942-9953, December 2016. 
2. Bo Liu, Wanlei Zhou, Tianqing Zhu, Haibo Zhou, Xiaodong Lin, "Invisible Hand: Economic Model based Trajectory Privacy Preserving Schemes in Mobile Crowd Sensing Applications". IEEE Transactions on Vehicular Technology. VOL. 66, NO. 5, pp.4410-4423, MAY 2017.
 

Speaker Bio:

Wanlei

 

 

 

 

 

 

 

 

 

Professor Wanlei Zhou received the B.Eng and M.Eng degrees from Harbin Institute of Technology, Harbin, China in 1982 and 1984, respectively, and the PhD degree from The Australian National University, Canberra, Australia, in 1991, all in Computer Science and Engineering. He also received a higher Doctorate degree, the DSc degree, from Deakin University in 2002. He is currently the Alfred Deakin Professor (the highest honour the University can bestow on a member of academic staff), Chair of Information Technology, and Associate Dean (International Research Engagement) of Faculty of Science, Engineering and Built Environment, Deakin University. Professor Zhou has been the Head of School of Information Technology twice (Jan 2002-Apr 2006 and Jan 2009-Jan 2015) and Associate Dean of Faculty of Science and Technology in Deakin University (May 2006-Dec 2008). Before joining Deakin University, Professor Zhou served as a lecturer in University of Electronic Science and Technology of China, a system programmer in HP at Massachusetts, USA; a lecturer in Monash University, Melbourne, Australia; and a lecturer in National University of Singapore, Singapore. His research interests include distributed systems, network security, bioinformatics, and e-learning. Professor Zhou has published more than 300 papers in refereed international journals and refereed international conferences proceedings. He has also chaired many international conferences. Prof Zhou is a Senior Member of the IEEE.

Keynote 2: Network Attack and Defence: State-of-Art, Challenges, and Opportunities

Presenter: Shui Yu, Deakin University

Cyberspace is now a critical battle ground for attacks and defences at personal and national level. However, cybersecurity is a mainly uncharted territory, and we have far more questions than answers from applications all the way to theories. In this talk, we firstly review the state-of-art of the field from different perspectives: detection, mitigation, traceback, and malware propagation. Moreover, we will also browse the emerging research of privacy protection in the age of big data. Finally, we present the problems and challenges that we are facing, and discuss the possible and promising directions.

 

Speaker Bio:

Shui

 

 

 

 

 

 

 

 

 

Shui Yu is currently a Senior Lecturer of School of Information Technology, Deakin University. He is a member of Deakin University Academic Board (2015-2016), a Senior Member of IEEE, and a member of AAAS and ACM, the Vice Chair of Technical Committee on Big Data Processing, Analytics, and Networking of IEEE Communication Society, and a member of IEEE Big Data Standardization Committee. 
Dr Yu’s research interest includes Security and Privacy in Networking, Big Data, and Cyberspace, and mathematical modelling. He has published two monographs and edited two books, more than 150 technical papers, including top journals and top conferences, such as IEEE TPDS, IEEE TC, IEEE TIFS, IEEE TMC, IEEE TKDE, IEEE TETC, and IEEE INFOCOM. Dr Yu initiated the research field of networking for big data in 2013. His h-index is 25. 
Dr Yu actively serves his research communities in various roles. He is currently serving the editorial boards of IEEE Communications Surveys and Tutorials, IEEE Access, IEEE Journal of Internet of Things, IEEE Communications Magazine, and a number of other international journals. He has served more than 70 international conferences as a member of organizing committee , such as publication chair for IEEE Globecom 2015 and 2017, IEEE INFOCOM 2016 and 2017, TPC co-chair for IEEE BigDataService 2015, IEEE ATNAC 2014, IEEE ITNAC 2015; Executive general chair for ACSW2017.

Keynote 4: Learning to Share: Open, Reusable, and Accountable Experiments for Embedded Systems

Presenter: Professor Bruce Childers, University of Pittsburgh

Embedded systems rely on a remarkably rich and diverse set of software and data to implement and evaluate new ideas on critical measures such as performance, power, and reliability. Unfortunately, ever-increasing competitiveness and pressure to produce more and more results pose an impediment to accountability, which is a critical part of the scientific method. Further, experiments, along with their constituent software and data, may not be disseminated in a way to achieve the repeatability and/or reproducibility needed for trust, fairness and building on and comparing with previous research. In this talk, I will advocate for a solution to this "reproducibility crisis" that requires culture change and technology advancement. The embedded systems community needs to dramatically realign its perception of the value and reward of producing and openly sharing high-quality software and data. Artifact Evaluation is one way to incentivize the community to bring about this change. Technological advances are also needed to seamlessly connect artifacts to all steps of the research lifecycle for easier and more transparent sharing. I will describe a new platform, OCCAM, that enables this type of sharing by directly linking experiments to the scholarly record as interactive, modifiable and executable content.

 

Speaker Bio:

childers

 

 

 

 

 

Bruce Childers is a Professor of Computer Science at the University of Pittsburgh. His research spans the software-hardware boundary for improved energy consumption, performance and reliability.  He has developed techniques at both the software layer (dynamic binary translation, compiler optimization, debugging and software testing) and the hardware layer (speed scaling, reliable cache design, storage class memory, and GPUs). It was during research in computer architecture that he grew frustrated with re-implementing published work, which was often underspecified and incomplete, for comparison. This frustration turned into positive action through the OCCAM and EASE projects to develop new approaches for reproducible science and to show the computer systems community why accountable research is important. Childers is the past steering committee chair and program chair of the ACM SIGPLAN and SIGBED Conference on Languages, Compilers, and Tools for Embedded Systems, participates on an ACM task force for scientific reproducibility, led a pilot to connect active curation platforms with the ACM Digital Library, and has given many talks on OCCAM and FAIR science

Keynote 6: Managing the Internet of Things: Experiences and Directions

Presenter: Professor Michael Sheng, Macquarie University

The Internet of Things (IoT) is widely regarded as a leading technology to change the world in next decade. IoT will play a critical role to i) improve productivity, operational effectiveness, decision making, and to ii) identify new business models for social and economic opportunities. While IoT-based digital strategies and innovations provide industries across the spectrum with exciting capabilities to create a competitive edge and build more value into their services, there are still significant gaps in making IoT a reality, specially on effectively managing large volume of IoT devices and information generated from them. In this talk, I will overview my 10-year research activities on IoT, and also discuss some future research directions.

 

Speaker Bio:

sheng

 

 

Dr Michael Sheng is a full professor and Head of Department of Computing, Macquarie University. Prof. Sheng's research interests include Internet of Things, Big Data Analytics, Smart Cities, Service-Oriented Computing, and Pervasive Computing. Prof. Michael Sheng has published close to 300 publications in premier journals and conferences such as ACM Computing Surveys, VLDB Journal, TSC, ACM TOIT, TIST, TKDD, IEEE TPDS, TKDE, Communication of the ACM, IEEE Computer, IEEE Internet Computing, VLDB, WWW, ICDE, CIKM, ICSE, ICWS, and ICSOC.

Prof. Sheng is the recipient of several major awards including ARC Future Fellowship in 2014, the Chris Wallace Award for Outstanding Research Contribution in 2012, and Microsoft Research Fellowship in 2003.