{"id":3418,"date":"2022-11-16T14:51:55","date_gmt":"2022-11-16T14:51:55","guid":{"rendered":"https:\/\/blogs.kent.ac.uk\/unikentcomp-news\/?p=3418"},"modified":"2023-01-05T15:41:04","modified_gmt":"2023-01-05T15:41:04","slug":"icss-hosts-the-24th-international-conference-on-information-and-communications-security-icics-2022","status":"publish","type":"post","link":"https:\/\/blogs.kent.ac.uk\/unikentcomp-news\/2022\/11\/16\/icss-hosts-the-24th-international-conference-on-information-and-communications-security-icics-2022\/","title":{"rendered":"iCSS hosts the 24th International Conference on Information and Communications Security (ICICS 2022)"},"content":{"rendered":"<p><span class=\"s5\">This year, iCSS hosted the<\/span><span class=\"s2\"> 24<\/span><span class=\"s6\">th<\/span><span class=\"s2\"> International Conference on Information and Communications Security (ICICS 2022)<\/span> <span class=\"s5\">at the <\/span><span class=\"s5\">main campus of the University of Kent, in Canterbury, Kent, UK.<\/span><span class=\"s5\"> The conference took place over four days, from 5 to 8 September, and hosted a number of presentations and demonstrations, both in-person and online.<\/span><\/p>\n<div><span class=\"s5\"><a href=\"http:\/\/blogs.kent.ac.uk\/unikentcomp-news\/files\/2022\/12\/Ross_Anderson.jpg\"><img loading=\"lazy\" class=\"wp-image-3420 aligncenter\" src=\"http:\/\/blogs.kent.ac.uk\/unikentcomp-news\/files\/2022\/12\/Ross_Anderson.jpg\" alt=\"\" width=\"164\" height=\"192\" \/><\/a>The first keynote<\/span><span class=\"s5\"> of the conference<\/span><span class=\"s5\">, <\/span><span class=\"s5\">\u2018<\/span><span class=\"s8\">Future Challenges in Security Engineering<\/span><span class=\"s5\">\u2019<\/span><span class=\"s5\">, was presented by <\/span><span class=\"s2\">Professor<\/span><span class=\"s2\">Ross Anderson<\/span><span class=\"s5\">, Professor of Security Engineering at <\/span><span class=\"s5\">University of Cambridge and University of Edinburgh, U<\/span><span class=\"s5\">K.<\/span><span class=\"s5\"> In this talk, Professor Anderson discussed <\/span><span class=\"s5\">how the right to software updates for goods with digital elements will <\/span><span class=\"s5\">a<\/span><span class=\"s5\">ffect durable safety-critical goods with software and network connections, like cars and medical devices.<\/span><span class=\"s5\"> If a customer expects software updates for a reasonable time period after purchase, how will teams support security patches and safety for 10+ years, for example?<\/span><span class=\"s5\"> This challenge becomes more complex when taking into account machine learning components, as well as associated costs and practical design limits.<\/span><\/div>\n<div><\/div>\n<div><\/div>\n<div>\n<div><span class=\"s5\"><a href=\"http:\/\/blogs.kent.ac.uk\/unikentcomp-news\/files\/2022\/12\/Nicholas_Carlini.jpeg\"><img loading=\"lazy\" class=\"wp-image-3424 aligncenter\" src=\"http:\/\/blogs.kent.ac.uk\/unikentcomp-news\/files\/2022\/12\/Nicholas_Carlini.jpeg\" alt=\"\" width=\"195\" height=\"195\" \/><\/a><\/span><\/div>\n<div><span class=\"s5\">Our second keynote, \u2018<\/span><span class=\"s8\">Underspecified Foundation Models Considered Harmful<\/span><span class=\"s5\">\u2019<\/span><span class=\"s5\">, was delivered by <\/span><span class=\"s2\">Dr<\/span> <span class=\"s2\">Nicholas<\/span><span class=\"s2\">Carlini<\/span><span class=\"s5\">, <\/span><span class=\"s5\">a research scientist at Google Brain<\/span><span class=\"s5\">. <\/span><span class=\"s5\">Dr <\/span><span class=\"s5\">Carlini<\/span><span class=\"s5\">argued that, while neural networks are commonly trained to behave as a \u201cfoundation\u201d for future models, this comes at a cost to their security.<\/span> <span class=\"s5\">Although this method may benefit accuracy, <\/span><span class=\"s5\">unlabe<\/span><span class=\"s5\">l<\/span><span class=\"s5\">led dataset<\/span><span class=\"s5\">s<\/span><span class=\"s5\"> could, for example, be \u201cpoisoned\u201d to perform various attacks.<\/span> <span class=\"s5\">To address these challenges, new categories of defences would be required, that can sim<\/span><span class=\"s5\">ultaneously allow models to train on large datasets while also being robust to adversarial training data<\/span><span class=\"s5\">.<\/span><\/div>\n<\/div>\n<div><\/div>\n<div><\/div>\n<div>\n<div><span class=\"s5\"><a href=\"http:\/\/blogs.kent.ac.uk\/unikentcomp-news\/files\/2022\/12\/Guang_Gong.jpg\"><img loading=\"lazy\" class=\"wp-image-3426 aligncenter\" src=\"http:\/\/blogs.kent.ac.uk\/unikentcomp-news\/files\/2022\/12\/Guang_Gong.jpg\" alt=\"\" width=\"182\" height=\"273\" \/><\/a>The third keynote, \u2018<\/span><span class=\"s8\">Toward Practical Privacy Protections for Blockchain Networks<\/span><span class=\"s5\">\u2019, was presented by <\/span><span class=\"s2\">Dr<\/span> <span class=\"s2\">Guang<\/span><span class=\"s2\"> Gong<\/span><span class=\"s5\">, <\/span><span class=\"s5\">a <\/span><span class=\"s5\">professor in the Department of Electrical and Computer Engineering at University of Waterloo, Canada<\/span><span class=\"s5\">.<\/span><span class=\"s5\"> In this talk, Dr Gong examined the current research in permissionless and permissioned blockchain systems and their potential for applications where value or data is transferred, stored and processed<\/span><span class=\"s5\">. Dr Gong <\/span><span class=\"s5\">also <\/span><span class=\"s5\">provided an example of <\/span><span class=\"s5\">Zero-Knowledge Succinct Non-Interactive Argument of Knowledge <\/span><span class=\"s5\">(<\/span><span class=\"s5\">zk<\/span><span class=\"s5\">&#8211;<\/span><span class=\"s5\">SNARK<\/span><span class=\"s5\">)<\/span><span class=\"s5\"> schemes.<\/span><\/div>\n<\/div>\n<div><\/div>\n<div>\n<p><span class=\"s5\">In addition to the three keynotes, at the Conference there were<\/span><span class=\"s5\"> a total of 11 <\/span><span class=\"s5\">technical <\/span><span class=\"s5\">sessions, each of which included 3-4 papers.<\/span> <a href=\"https:\/\/icics2022.cyber.kent.ac.uk\/program.php\"><span class=\"s12\">Visit our website<\/span><\/a><span class=\"s5\"> for more information on the programme, or watch the <\/span><a href=\"https:\/\/youtube.com\/playlist?list=PL5awuA2KTl5HEx8VAPpDDLtvSmOcxQQ3_\"><span class=\"s12\">recorded presentations on YouTube<\/span><\/a><span class=\"s5\">.<\/span><\/p>\n<p><span class=\"s5\">This year\u2019s event also saw winners of six awards:<\/span><\/p>\n<div class=\"s16\"><span class=\"s14\">\u2022 <\/span><span class=\"s5\">Best Paper Award<\/span><span class=\"s5\">: \u201c<\/span><a href=\"https:\/\/link.springer.com\/chapter\/10.1007\/978-3-031-15777-6_5\"><span class=\"s15\">Maliciously Secure Multi-Party PSI with Lower Bandwidth and Faster Computation<\/span><\/a><span class=\"s5\">,\u201d<\/span><span class=\"s5\"> authored by Zhi <\/span><span class=\"s5\">Qiu<\/span><span class=\"s5\">, Kang Yang, Yu <\/span><span class=\"s5\">Yu<\/span><span class=\"s5\"> and <\/span><span class=\"s5\">Lijing<\/span><span class=\"s5\">Zhou<\/span><span class=\"s5\">.<\/span><\/div>\n<div class=\"s16\"><span class=\"s14\">\u2022 <\/span><span class=\"s5\">Best Student Paper<\/span><span class=\"s5\">: \u201c<\/span><a href=\"https:\/\/link.springer.com\/chapter\/10.1007\/978-3-031-15777-6_13\"><span class=\"s15\">Lightweight and Practical Privacy-Preserving Image Masking in Smart Community<\/span><\/a><span class=\"s5\">,<\/span><span class=\"s5\">\u201d<\/span><span class=\"s5\"> authored by Zhen Liu, <\/span><span class=\"s5\">Yining<\/span><span class=\"s5\"> Liu and <\/span><span class=\"s5\">Weizhi<\/span><span class=\"s5\">Meng<\/span><span class=\"s5\">.<\/span><\/div>\n<div class=\"s16\"><span class=\"s14\">\u2022 <\/span><span class=\"s5\">Best Presentation Award<\/span><span class=\"s5\">: \u201c<\/span><a href=\"https:\/\/link.springer.com\/chapter\/10.1007\/978-3-031-15777-6_16\"><span class=\"s15\">Privacy-aware Split Learning Based Energy Theft Detection for Smart Grids<\/span><\/a><span class=\"s5\">,<\/span><span class=\"s5\">\u201d<\/span><span class=\"s5\"> authored by Arwa Alromih, John A. Clark and Prosanta Gope, presented by Arwa Alromih<\/span><span class=\"s5\">.<\/span><\/div>\n<div class=\"s16\"><span class=\"s14\">\u2022 <\/span><span class=\"s5\">Best Artifact Award<\/span><span class=\"s5\">: \u201c<\/span><a href=\"https:\/\/link.springer.com\/chapter\/10.1007\/978-3-031-15777-6_22\"><span class=\"s15\">DeepC2: AI-powered Covert Command and Control on OSNs<\/span><\/a><span class=\"s5\">,<\/span><span class=\"s5\">\u201d<\/span><span class=\"s5\"> authored by Zhi Wang, Chaoge Liu, Xiang Cui, <\/span><span class=\"s5\">Jie<\/span><span class=\"s5\"> Yin, <\/span><span class=\"s5\">Jiaxi<\/span><span class=\"s5\"> Liu, Di Wu and <\/span><span class=\"s5\">Qixu<\/span><span class=\"s5\"> Liu, demonstrated by Zhi Wang<\/span><span class=\"s5\">.<\/span><\/div>\n<div class=\"s16\"><span class=\"s14\">\u2022 <\/span><span class=\"s5\">Best Poster Award<\/span><span class=\"s5\">:<\/span><span class=\"s5\"> \u201c<\/span><span class=\"s8\">Image-based Neural Network Models for Malware Traffic Classification using PCAP to Picture Conversion<\/span><span class=\"s5\">,<\/span><span class=\"s5\">\u201d<\/span><span class=\"s5\"> (<\/span><a href=\"https:\/\/doi.org\/10.1145\/3538969.3544473\"><span class=\"s12\">Paper<\/span><\/a><span class=\"s5\">)<\/span><span class=\"s5\"> authored by Georgios <\/span><span class=\"s5\">Agrafiotis<\/span><span class=\"s5\">, <\/span><span class=\"s5\">Eftychia<\/span> <span class=\"s5\">Makri<\/span><span class=\"s5\">, <\/span><span class=\"s5\">Ioannis<\/span> <span class=\"s5\">Flionis<\/span><span class=\"s5\">, Antonios Lalas, Konstantinos <\/span><span class=\"s5\">Votis<\/span><span class=\"s5\">, <\/span><span class=\"s5\">Dimitrios<\/span> <span class=\"s5\">Tzovaras<\/span><span class=\"s5\"> and Nikolaos <\/span><span class=\"s5\">Tsampieris<\/span><span class=\"s5\">, presented by Georgios <\/span><span class=\"s5\">Agrafiotis<\/span><span class=\"s5\"> and Nikolaos <\/span><span class=\"s5\">Tsampieris<\/span><span class=\"s5\">.<\/span><\/div>\n<div class=\"s16\"><span class=\"s14\">\u2022 <\/span><span class=\"s5\">Best Demo Award<\/span><span class=\"s5\">: \u201c<\/span><span class=\"s8\">VEREFOO: an automated framework for virtual firewall configuration,<\/span><span class=\"s5\">\u201d <\/span><span class=\"s5\">(<\/span><a href=\"https:\/\/doi.org\/10.1109\/TDSC.2022.3160293\"><span class=\"s12\">Paper 1<\/span><\/a><span class=\"s5\">, <\/span><a href=\"https:\/\/doi.org\/10.1109\/NOMS47738.2020.9110402\"><span class=\"s12\">Paper 2<\/span><\/a><span class=\"s5\">), <\/span><span class=\"s5\">authored by Daniele Bringhenti, Guido <\/span><span class=\"s5\">Marchetto<\/span><span class=\"s5\">, Riccardo <\/span><span class=\"s5\">Sisto<\/span><span class=\"s5\"> and <\/span><span class=\"s5\">Fulvio<\/span> <span class=\"s5\">Valenza<\/span><span class=\"s5\">, presented by Daniele Bringhenti<\/span><span class=\"s5\">.<\/span><\/div>\n<p><span class=\"s5\">Congratulations to all of the <\/span><span class=\"s5\">a<\/span><span class=\"s5\">ward winners!<\/span><\/p>\n<p><span class=\"s5\">iCSS were delighted to welcome so many visitors to Kent and thank the authors<\/span><span class=\"s5\">,<\/span> <span class=\"s5\">the <\/span><span class=\"s5\">presenters<\/span><span class=\"s5\"> and everyone who helped to organise and run the day<\/span><span class=\"s5\">.<\/span><\/p>\n<p class=\"s4\"><a href=\"http:\/\/blogs.kent.ac.uk\/unikentcomp-news\/files\/2022\/12\/IMG_20220908_174139.jpg\"><img loading=\"lazy\" class=\"alignnone size-full wp-image-3433\" src=\"http:\/\/blogs.kent.ac.uk\/unikentcomp-news\/files\/2022\/12\/IMG_20220908_174139.jpg\" alt=\"\" width=\"4480\" height=\"2016\" \/><\/a><\/p>\n<\/div>\n<div>\n<div><\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>This year, iCSS hosted the 24th International Conference on Information and Communications Security (ICICS 2022) at the main campus of the University of Kent, in &hellip; <a href=\"https:\/\/blogs.kent.ac.uk\/unikentcomp-news\/2022\/11\/16\/icss-hosts-the-24th-international-conference-on-information-and-communications-security-icics-2022\/\">Read&nbsp;more<\/a><\/p>\n","protected":false},"author":74034,"featured_media":3419,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[6598,124,70,122,1],"tags":[],"_links":{"self":[{"href":"https:\/\/blogs.kent.ac.uk\/unikentcomp-news\/wp-json\/wp\/v2\/posts\/3418"}],"collection":[{"href":"https:\/\/blogs.kent.ac.uk\/unikentcomp-news\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.kent.ac.uk\/unikentcomp-news\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.kent.ac.uk\/unikentcomp-news\/wp-json\/wp\/v2\/users\/74034"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.kent.ac.uk\/unikentcomp-news\/wp-json\/wp\/v2\/comments?post=3418"}],"version-history":[{"count":12,"href":"https:\/\/blogs.kent.ac.uk\/unikentcomp-news\/wp-json\/wp\/v2\/posts\/3418\/revisions"}],"predecessor-version":[{"id":3435,"href":"https:\/\/blogs.kent.ac.uk\/unikentcomp-news\/wp-json\/wp\/v2\/posts\/3418\/revisions\/3435"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blogs.kent.ac.uk\/unikentcomp-news\/wp-json\/wp\/v2\/media\/3419"}],"wp:attachment":[{"href":"https:\/\/blogs.kent.ac.uk\/unikentcomp-news\/wp-json\/wp\/v2\/media?parent=3418"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.kent.ac.uk\/unikentcomp-news\/wp-json\/wp\/v2\/categories?post=3418"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.kent.ac.uk\/unikentcomp-news\/wp-json\/wp\/v2\/tags?post=3418"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}