Below are the keynote speakers confirmed for ICCWS 2021 conference
Head of System Security Group, Coventry University, UK
Talk Title: Cybersecurity Challenges for Mobility and Transport Infrastructure
Abstract: While cyber-physical systems security poses technical challenges of design and verification, problems of in-life monitoring and risk perception for effective secure operation cannot be ignored. We focus on transport and mobility platforms for the security risks they pose, and examine what the current state of the art to address such risks. The concepts presented here sit at the intersection of computer science, cybersecurity and transport engineering.
Bio: Professor Siraj Ahmed Shaikh is Professor of Systems Security at the Institute of Future Transport and Cities (IFTC) at Coventry University (UK), where he leads the Systems Security Group. He is currently the Director of Research (Interim) at IFTC. He is also Founder and Chief Scientist at CyberOwl, which is a VC-backed venture addressing cyber risk analytics for the maritime and CNI sectors. Over the past 20 years, his research interests have included threat modelling, cyber-physical systems security testing, and security policy-making. His research has been funded by EPSRC, RAEng, MoD, NCSC and Lloyds Register Foundation.
Professor of Electrical and Computer Engineering (ECE) at the University of Michigan – Dearborn
Talk Title: Cyber security for Connected and Autonomous Vehicles: Challenges and Solutions
Abstract: Fully connected autonomous vehicles hold the promise to improve road safety and offer new mobility options to millions of people. As vehicles get smarter, cybersecurity in the automotive industry is becoming an increasing concern. Fully connected autonomous vehicles are more vulnerable than ever to hacking and data theft. This is due to the fact that automotive industry still rely on the legacy controller area network (CAN) protocol for in-vehicle control networks. The CAN protocol lacks basic security features such as message authentication, which makes it vulnerable to a wide array of attack vectors including man-in-the-middle and packet spoofing. In recent years, several researchers have successfully exploited these vulnerabilities. As, vehicle-centric technologies are expected to grow so are the associated attack surfaces. Therefore, there is an urgent need for developing robust and reliable tools and techniques for source identification and integrity verification of CAN packets. Existing solutions for CAN protocol security are limited in their ability and scope as they are unable to link received packet to the source (e.g., transmitting) ECU. This talk will provide an overview of growing attack surfaces for connected autonomous vehicles, emerging security threats, and existing solutions to mitigate them. This talk will present robust, computationally efficient, and practical solutions to message authentication problem for in-vehicle networks (IVN) including CAN. Specifically, this talk will discuss a new method based on physical attributes of CAN signals for linking IVN packets to transmitting ECU. It will also propose a layered-framework for design and development of intrusion detection and prevention system (IDPS) for connected vehicles and evaluate effectiveness of the proposed solutions
Bio: Hafiz Malik is Professor of Electrical and Computer Engineering (ECE) at the University of Michigan –Dearborn. Leading national and international sponsors have funded his research in the areas of automotive cybersecurity, cyber-physical system security, sensor security, deepfake detection, multimedia forensics, steganography/steganalysis, information hiding, pattern recognition, and information fusion. He has published over 100 articles in leading peer-reviewed journals, conferences, and workshops. He is a founding member and chief operating officer (COO) of the Global Foundation for Cyber Studies and Research, a founding member of the Cybersecurity Center for Research, Education, and Outreach at UM-Dearborn and member of leadership circle for the Dearborn Artificial Intelligence Research Center at UM-Dearborn. He is also a member of the Scientific and Industrial Advisory Board (SIAB) of the National Center of Cyber Security Pakistan. He is a member of MCity Working Group on Cybersecurity, since 2015.
Professor of Cyber Security at University of Bristol
Talk Title: Developing a programme of research on privacy, harm reduction and adversarial influence online: The REPHRAIN Centre
Abstract: Digital technologies pervade our daily lives and bring many benefits through delivering of online services to billions of users globally. However, alongside the many positive benefits of such a data-driven digital economy, serious challenges – e.g., privacy violations, micro-targeting of individuals, online abuse/victimisation, fraud, disinformation – have emerged. With innovations such as smart cities, IoT and mobile connectivity leading to further growth in connected digital platforms a nd services, we must consider a holistic programme of research to anticipate and address issues of privacy and online harms. In this talk, I will discuss the programme of research — being undertaken within the REPHRAIN centre — to deliver interdisciplinary research drawing upon social and technical sciences to advance state-of-the-art in privacy enhancing technologies and online harm mitigation approaches.
Bio: Awais Rashid is Professor of Cyber Security at University of Bristol where he heads the Cyber Security Group and is Director of the EPSRC Centre for Doctoral Training in Trust, Identity, Privacy and Security in Large-Scale Infrastructures. He is also Director of the National Research Centre on Privacy, Harm Reduction and Adversarial Influence Online (REPHRAIN). His research interests are in security of cyber-physical systems, software security and human factors. He leads projects as part of the UK Research Institute on Trustworthy Industrial Control Systems (RITICS), UK Research Institute on Sociotechnical Cyber Security (RISCS, National Centre of Excellence in Cyber Security of IoT (PETRAS) and the ESRC Digital Security by Design Hub+ (Discribe). He also leads CyBOK: an international effort on developing a Cyber Security Body of Knowledge to provide interdisciplinary foundations for education and training programmes.
Chief Operating Officer of CyberSecurity under the Ministry of Communications and Multimedia, Malaysia
Talk Title: APT Malware Threat: Case Studies In Malaysia
Abstract: Issues on network security have escalated ever since the Internet was introduced. Many researchers have intensified their efforts to ensure that security threats are discovered and mitigated in a well-timed manner. Today, cyber criminals have introduced sophistication in their attack techniques that makes the traditional way of safeguarding the enterprise networks are not effective. CyberSecurity Malaysia has developed a ‘LebahNET’ project, a computer security device evasive attacks detection based on honeypot distributed computer security mechanism. In addition, CyberSecurity Malaysia has developed a Coordinated Malware Eradication & Remediation Platform project, a system that able to detect and mitigate cyber threat with identifying unknown malware threats, preventing data breaches and preventing wide malware infection. These projects help in understanding and mitigating unknown malware threats.
Bio: Dr. Zahri Yunos is the Chief Operating Officer of CyberSecurity Malaysia, an agency under the Ministry of Communications and Multimedia Malaysia. Dr. Zahri is a central figure in establishment of the OIC Computer Emergency Response Team (OIC-CERT), a collaborative effort of cybersecurity initiatives amongst the OIC countries. Dr. Zahri holds a PhD in Information Security from the University Teknikal Malaysia Melaka, Malaysia. He has been appointed as Adjunct Professor at several local universities in Malaysia. He also has been appointed as industry adviser to several research institutions in Malaysia and abroad. He has contributed to various publications and presentations on topic related to cyber security, business continuity management and cyber terrorism.