In 2018, I was asked to serve as TPC member for three security conferences that are quite important to me: CCS, Esorics, and Wisec. I’m looking forward to reviewing the interesting submissions! I’m also reviewing for the relevant CPS security workshops co-located with AsiaCCS and CCS.
As a follow-up to last year’s post, a quick personal note on my scholar profile. As of now, second week of January 2018, my publications reached 1001 citations according to Google scholar (vs. 700 at this time last year/ 500 two years ago). Google scholar currently lists 53 publications (vs. 43 last year, most peer-reviewed), and one US patent. Our first GPS paper currently has 203 cites. My h-index has increased to 15 (from 11), my i10-index is currently 18, from ~12 last year.
Semantic scholar stopped listing total citation numbers for profiles. I noted they revised/reduced my citation estimate for 2016 quite a bit, down to 111 (was >200 before). They still indicate how many papers were strongly influenced by my work (54), compared to 7 in previous year.
Scopus lists generally lower numbers (e.g. only 39 publications, ~450 citations), but they provide a number of co-authors: 66.
Other numbers for 2017: Github lists 450 commits to repositories (after 807 in 2016). I received 16,285 mails on my university account (after removal of spam). Per working day, that would make around 64 mails. I sent 4,733 mails (~19 per working day). Both numbers are quite close to my 2016/2015 statistics.
I am on the TPC of the Workshop on Industrial Internet of Things Security, and the CfP was just released.
The Industrial Internet of Things (IIoT) is an emerging paradigm in today’s (control) industry, comprising Internet-enabled cyber-physical devices with the ability to couple to the new interconnection technologies such as cloud/fog computing. Under this perspective, the new industrial cyber-physical “things” can be accessible and available from remote locations, the information of which can be processed and stored in distributed locations, favouring the cooperation, the performance in field, and the achievement of operational tasks working at optimal times. However, the incorporation of the IIoT in the new scenarios of the fourth industrial revolution, also known as Industry 4.0, entails having to consider the new security and privacy issues that can threaten the wellbeing of the new IIoT ecosystem and its coexistence with the existing industrial technologies, with a high risk of impact on the end-users.
Date/Location: Bilbao, Spain, June 4-7, 2018
More info at: http://globaliotsummit.org
Submission due: Feb 16, 2018 (GMT)
Prof. Ralph Holz from Syndey University will visit SUTD on 7 Nov. At 3pm in LT3, he will give a public talk on the following topic.
Title: Consensus, security and the network – measuring Blockchain
Over the last years, blockchains have developed into a mainstream technology that entire industry sectors are talking about.
The latest generation even supports smart contracts – programs that are executed by all participants and that may govern everything from simple transactions to the setup of organisations. Beyond the hype, however, we find that there is little deployment beyond the two most prominent examples, Bitcoin and Ethereum.
In this talk, we are going to explore some of the reasons. In particular, we show that the P2P networks that underlie blockchains impact their functionality in decisive ways. We look at dependability and abortion of transactions, both of which are crucial for enterprises, and we inspect the network structure and its influence on transaction execution. We present some early numbers from more than 2,500 scans
of a blockchain network. Finally, we discuss some research directions that could prove fruitful in a number of systems, blockchains or beyond.
We are hosting Prof. Debdeep Mukhopadhyay on Oct 12 at SUTD. He will give a public talk with the title Break one link and the whole chain falls apart!: Embedding Security in Things to Cloud.
With the advent of Internet of Things (IoT) the need and challenges of security have increased manifold. Starting from the miniature devices, which are often resource constrained, to the pervasive omni-present cloud, all avenues for a potential attack need to be mitigated. In this talk, we discuss the research activities in this direction, starting from physical security of the “things” in an IoT framework to developing dedicated cryptographic techniques for delegating data in the cloud. The talk also summarizes the research activities at the Secured Embedded Architecture Laboratory (SEAL), IIT Kharagpur, India.
Debdeep is currently an Associate Professor at the Department of Computer Science and Engineering, IIT-Kharagpur, India and a visiting scientist
at School of Computer Science and Engineering at NTU-Singapore. At IIT Kharagpur he initiated the Secured Embedded Architecture Laboratory (SEAL), with a focus on Embedded Security and Side Channel Attacks. Prior to this he worked as a visiting Associate Professor of NYU-Shanghai, Assistant Professor at IIT-Madras, and as Visiting Researcher at NYU Tandon-School-of-Engineering, USA. He holds a PhD, MS, and B. Tech from IIT-Kharagpur. His research interests are Cryptography, Hardware Security, and VLSI. He is in the Program Committee of several top-tier conferences in his area like CHES, DATE, etc. and is the Associate Editor of Journal of Hardware and Systems Security, Springer.
He is the recipient of the prestigious Swarnajayanti DST Fellowship, Young Scientist award from the Indian National Science Academy, Young Engineer award from the Indian National Academy of Engineers, and is Young Associate of the Indian Academy of Science. He has incubated a start-up, ESP Pvt Ltd at IIT Kharagpur (http://esp-research.com/).
We held our finals for the National Science Experiment Data Challenge 2017 at SUTD on September 13. 11 finalist teams from secondary and post-secondary schools came to present their projects. Our guest of honour, Minister Yaacob Ibrahim, gave out the awards together with our sponsors. I served as on of the 6 Jury members for the selection of the winners. Overall, the event went great and it was amazing to see all the excited students discussing their science projects. Some impressions were shared on the minister’s facebook page, and in local media.
I am happy to announce that my PhD students Hamid and Daniele both won an award each at the FIRST industry workshop, held at SUTD. In particular, they won:
- Daniele Antonioli: ST Electronics Poster Award
- Hamid Reza: Kulicke & Soffa Poster Award
Hamid presented our ongoing work on IDS for ICS, and Daniele presented our Honeypot for ICS. Congratulations to both of them!
As a follow up to the two previous posts on the topic, here is the version with the newly released 2017 metrics data. It provides a ranking of journals and conferences in different fields, and uses the h5 metric, “the number n of papers that were released in the last 5 years, and had at least n citations”. Google also now added a “Classic Papers” category for papers (link) – but there was essentially nothing in that which I recognized.
Based on the h5 metric, the following ranking for security conferences and journals is generated here:
- ACM Symposium on Computer and Communications Security (71)
- IEEE Symposium on Security and Privacy (68, +1 position)
- IEEE Transactions on Information Forensics and Security (67, -1 position)
- USENIX Conference on Security (61)
- Network and Distributed System Security Symposium (NDSS) (56)
- International Conference on Cryptology (CRYPTO) (53)
- Annual International Conference on Theory and Applications of Cryptographic Techniques (EUROCRYPT) (53)
- ArXiv (see discussion)
- Computers & Security (40,+4 positions)
- IEEE Transactions on Dependable and Secure Computing (38)
- International Conference on The Theory and Application of Cryptology and Information Security (ASIACRYPT) (36)
- International Conference on Financial Cryptography and Data Security (35, not in top 15 last year)
- Theory of cryptography (34)
- Workshop on Cryptographic Hardware and Embedded Systems (CHES) (33)
- ACM Symposium on Information, Computer and Communications Security (ASIACCS) (31)
Some other honourable mentions where I published before, am involved, or consider submitting:
- Conference of the IEEE Computer and Communications Societies (INFOCOM) (80)
- Computer Networks (54)
- International Conference on Mobile systems, applications, and services (MOBISYS) (47)
- Annual International Conference on Mobile computing and networking (Mobicom) (45)
- International Conference on Dependable Systems and Networks (DSN) (32)
- ACM Symposium on Applied Computing (SAC) (32, but only small security track)
- Annual Computer Security Applications Conference (ACSAC) (29)
- European Conference on Research in Computer Security (ESORICS) (28)
- ACM conference on Data and Application Security and Privacy (CODASPY) (25)
- International Conference on Cyber-Physical Systems (ICCPS) (23)
- Wireless Network Security (WISEC) (21)
- Symposium on Research in Attacks, Intrusions and Defenses (RAID) (19)
- IFIP TC 11 International Conference on ICT Systems Security and Privacy Protection (IFIP Sec) (18)
- IEEE High Assurance Systems Engineering Symposium, (HASE) (14)
- Network and Systems Security (NSS) (13)
- IEEE International Conferences on Internet of Things, and Cyber, Physical and Social Computing (CPSCom) (13)
- Conference on Cryptology and Network Security (CANS) (13)
- Conference on Formal Engineering Methods (ICFEM) (12)
- Conference on Security and Privacy in Communication Networks (SecureComm) (10)
There are some interesting observations I made from the ranking (updated from last iteration):
- The h5 index of the top venues increased by about 5-9 points, with S&P returning to place 2. For CCS, this is definitely expected, as the number of submissions/accepted papers has increased significantly in the last 5 years.
- Computer & Security joined the other two journals in the top ten list
- Financial Cryptography and Data Security makes its first entry into top 15, probably due to Bitcoin/blockchain/smart contract related content and FinTec
- ArXiv is in the list, but can hardly be counted as “peer reviewed”.
- 5 of the top 14 venues (w/o Arxiv) have a strong crypto focus, further limiting the options for general security papers to be published at.
- Google also publishes a h5-median score, which indicates the median citation count of the publications included in the h5 computation. This somewhat gives a nice indication on how many citations you could expect for your publications in the conference, after five years. For the top 10 venues, this is between 60 and 110, for top 10-20 between 40 and 65
- Clearly, for h5 it helps to accept more papers (see ArXiv and Infocom rank). It would be great to award selectivity somehow, for example by dividing by number of accepted papers. Unfortunately, that information is not directly available (see here).
We just concluded our main event for this year, the Secure Cyber-Physical Systems Week at SUTD. This year, I was leading the organization for the event. We had about 160 registered attendants, 5 panels with total of 15 panelists, a keynote by Neil Hershfield, Deputy Director of ICS-CERT, and 4 invited talks. We also had another S3 event, in which invited teams attack our testbeds to test our detection mechanisms. Overall, the event was quite successful! More info here.
We have finalized our selection of panelists for the 2-day Think-In event at next week’s SCy-Phy Systems week. We were fortunate to find a set of excellent speakers, for in total 5 panels
- Keynote: Neil Hershfield, Deputy Director, ICS-CERT
- Threats Panel: Neil Hershfield, Marina Krotofil, and Soon Chia Lim
- Interconnected Systems Panel: David Nicol, Sahra Sarvestani, and Robert Kooij
- Models Panel: Sjouke Mauw, Alvaro Cardenas, and Dieter Gollmann
- Defences Panel: Mauro Conti, Gerhard Hancke, and Biplab Sikdar
- Translating to Industry Panel: Jorge Cuellar, Matthieu Lec’Hvien, and David Ong
In addition, we will have invited talks by Marina, Dieter, Sjouke, and Sahra on Wednesday and Thursday.
The program sheet can be found here.