Category Archives: Research


I am co-chairing the ACM Workshop on Cyber-Physical Systems Security & Privacy (CPS-SPC) this year, together with Awais Rashid. CPS-SPC aims to be the premier workshop for research on security of Cyber-Physical Systems (such as medical devices, manufacturing and industrial control, robotics and autonomous vehicles). The workshop will run for the fourth time, co-located with CCS (19 October, Toronto, Canada). We just released the website ( and the full CfP.

Submitted papers can be up to 12 pages including appendices and references. Submissions must use the ACM SIG Proceedings Templates.

Important Dates

  • Paper Submission Deadline: July 1, 2018 (23:59 Anywhere on Earth time)
  • Notification of Acceptance/Rejection: July 30, 2018
  • Camera Ready Papers Due: August 19, 2018

Accepted: CPS-SPC 2018

This year, I will be Co-Chair for the workshop on Cyber-Physical Systems Security and PrivaCy (CPS-SPC), together with Awais Rashid. Our proposal for the workshop is now accepted at CCS, and we will send out the CfP soon. Tentative date of the workshop: 19 October 2018, Toronto, Canada.

TPC Service in 2018

In 2018, I was asked to serve as TPC member for three security conferences that are quite important to me: CCS, Esorics, and Wisec. I’m looking forward to reviewing the interesting submissions! I’m also reviewing for the relevant CPS security workshops co-located with AsiaCCS and CCS.

2017 in numbers

As a follow-up to last year’s post, a quick personal note on my scholar profile. As of now, second week of January 2018, my publications reached 1001 citations according to Google scholar (vs. 700 at this time last year/ 500 two years ago). Google scholar currently lists 53 publications (vs. 43 last year, most peer-reviewed), and one US patent. Our first GPS paper currently has 203 cites. My h-index has increased to 15 (from 11), my i10-index is currently 18, from ~12 last year.

Semantic scholar stopped listing total citation numbers for profiles. I noted they revised/reduced my citation estimate for 2016 quite a bit, down to 111 (was >200 before). They still indicate how many papers were strongly influenced by my work (54), compared to 7 in previous year.

Scopus lists generally lower numbers (e.g. only 39 publications, ~450 citations), but they provide a number of co-authors: 66.

Other numbers for 2017: Github lists 450 commits to repositories (after 807 in 2016). I received 16,285 mails on my university account (after removal of spam). Per working day, that would make around 64 mails. I sent 4,733 mails (~19 per working day). Both numbers are quite close to my 2016/2015 statistics.

CfP: Workshop on Industrial Internet of Things Security (WIIoTS)

I am on the TPC of the Workshop on Industrial Internet of Things Security, and the CfP was just released.

The Industrial Internet of Things (IIoT) is an emerging paradigm in today’s (control) industry, comprising Internet-enabled cyber-physical devices with the ability to couple to the new interconnection technologies such as cloud/fog computing. Under this perspective, the new industrial cyber-physical “things” can be accessible and available from remote locations, the information of which can be processed and stored in distributed locations, favouring the cooperation, the performance in field, and the achievement of operational tasks working at optimal times. However, the incorporation of the IIoT in the new scenarios of the fourth industrial revolution, also known as Industry 4.0, entails having to consider the new security and privacy issues that can threaten the wellbeing of the new IIoT ecosystem and its coexistence with the existing industrial technologies, with a high risk of impact on the end-users.

Date/Location: Bilbao, Spain, June 4-7, 2018

More info at:

Submission due: Feb 16, 2018 (GMT)

Visit by Ralph Holz

Prof. Ralph Holz from Syndey University will visit SUTD on 7 Nov. At 3pm in LT3, he will give a public talk on the following topic.

Title: Consensus, security and the network – measuring Blockchain

Over the last years, blockchains have developed into a mainstream technology that entire industry sectors are talking about.
The latest generation even supports smart contracts – programs that are executed by all participants and that may govern everything from simple transactions to the setup of organisations. Beyond the hype, however, we find that there is little deployment beyond the two most prominent examples, Bitcoin and Ethereum.
In this talk, we are going to explore some of the reasons. In particular, we show that the P2P networks that underlie blockchains impact their functionality in decisive ways. We look at dependability and abortion of transactions, both of which are crucial for enterprises, and we inspect the network structure and its influence on transaction execution. We present some early numbers from more than 2,500 scans
of a blockchain network. Finally, we discuss some research directions that could prove fruitful in a number of systems, blockchains or beyond.

Visit by Debdeep Mukhopadhyay

We are hosting Prof. Debdeep Mukhopadhyay on Oct 12 at SUTD. He will give a public talk with the title Break one link and the whole chain falls apart!: Embedding Security in Things to Cloud.

With the advent of Internet of Things (IoT) the need and challenges of security have increased manifold. Starting from the miniature devices, which are often resource constrained, to the pervasive omni-present cloud, all avenues for a potential attack need to be mitigated. In this talk, we discuss the research activities in this direction, starting from physical security of the “things” in an IoT framework to developing dedicated cryptographic techniques for delegating data in the cloud. The talk also summarizes the research activities at the Secured Embedded Architecture Laboratory (SEAL), IIT Kharagpur, India.

Debdeep is currently an Associate Professor at the Department of Computer Science and Engineering, IIT-Kharagpur, India and a visiting scientist
at School of Computer Science and Engineering at NTU-Singapore. At IIT Kharagpur he initiated the Secured Embedded Architecture Laboratory (SEAL), with a focus on Embedded Security and Side Channel Attacks. Prior to this he worked as a visiting Associate Professor of NYU-Shanghai, Assistant Professor at IIT-Madras, and as Visiting Researcher at NYU Tandon-School-of-Engineering, USA. He holds a PhD, MS, and B. Tech from IIT-Kharagpur. His research interests are Cryptography, Hardware Security, and VLSI. He is in the Program Committee of several top-tier conferences in his area like CHES, DATE, etc. and is the Associate Editor of Journal of Hardware and Systems Security, Springer.
He is the recipient of the prestigious Swarnajayanti DST Fellowship, Young Scientist award from the Indian National Science Academy, Young Engineer award from the Indian National Academy of Engineers, and is Young Associate of the Indian Academy of Science. He has incubated a start-up, ESP Pvt Ltd at IIT Kharagpur (

Finals of NSE Data Challenge 2017

We held our finals for the National Science Experiment Data Challenge 2017 at SUTD on September 13. 11 finalist teams from secondary and post-secondary schools came to present their projects. Our guest of honour, Minister Yaacob Ibrahim, gave out the awards together with our sponsors. I served as on of the 6 Jury members for the selection of the winners. Overall, the event went great and it was amazing to see all the excited students discussing their science projects. Some impressions were shared on the minister’s facebook page, and in local media.

SUTD’s FIRST Industry Workshop 2017

I am happy to announce that my PhD students Hamid and Daniele both won an award each at the FIRST industry workshop, held at SUTD. In particular, they won:

  • Daniele Antonioli:  ST Electronics Poster Award
  • Hamid Reza:  Kulicke & Soffa Poster Award

Hamid presented our ongoing work on IDS for ICS, and Daniele presented our Honeypot for ICS. Congratulations to both of them!

Google’s Security Conference/Journal ranking 2017

As a follow up to the two previous posts on the topic, here is the version with the newly released 2017 metrics data. It provides a ranking of journals and conferences in different fields, and uses the h5 metric, “the number n of papers that were released in the last 5 years, and had at least n citations”. Google also now added a “Classic Papers” category for papers (link) – but there was essentially nothing in that which I recognized.

Based on the h5 metric, the following ranking for security conferences and journals is generated here:

  1. ACM Symposium on Computer and Communications Security (71)
  2. IEEE Symposium on Security and Privacy (68, +1 position)
  3. IEEE Transactions on Information Forensics and Security (67, -1 position)
  4. USENIX Conference on Security (61)
  5. Network and Distributed System Security Symposium (NDSS) (56)
  6. International Conference on Cryptology (CRYPTO) (53)
  7. Annual International Conference on Theory and Applications of Cryptographic Techniques (EUROCRYPT) (53)
  8. ArXiv (see discussion)
  9. Computers & Security (40,+4 positions)
  10. IEEE Transactions on Dependable and Secure Computing (38)
  11. International Conference on The Theory and Application of Cryptology and Information Security (ASIACRYPT) (36)
  12. International Conference on Financial Cryptography and Data Security (35, not in top 15 last year)
  13. Theory of cryptography (34)
  14. Workshop on Cryptographic Hardware and Embedded Systems (CHES) (33)
  15. ACM Symposium on Information, Computer and Communications Security (ASIACCS) (31)

Some other honourable mentions where I published before, am involved, or consider submitting:

  1. Conference of the IEEE Computer and Communications Societies (INFOCOM) (80)
  2. Computer Networks (54)
  3. International Conference on Mobile systems, applications, and services (MOBISYS) (47)
  4. Annual International Conference on Mobile computing and networking (Mobicom) (45)
  5. International Conference on Dependable Systems and Networks (DSN) (32)
  6. ACM Symposium on Applied Computing (SAC) (32, but only small security track)
  7. Annual Computer Security Applications Conference (ACSAC) (29)
  8. European Conference on Research in Computer Security (ESORICS) (28)
  9. ACM conference on Data and Application Security and Privacy (CODASPY) (25)
  10. International Conference on Cyber-Physical Systems (ICCPS) (23)
  11. Wireless Network Security (WISEC) (21)
  12. Symposium on Research in Attacks, Intrusions and Defenses (RAID) (19)
  13. IFIP TC 11 International Conference on ICT Systems Security and Privacy Protection (IFIP Sec) (18)
  14. IEEE High Assurance Systems Engineering Symposium, (HASE) (14)
  15. Network and Systems Security (NSS) (13)
  16. IEEE International Conferences on Internet of Things, and Cyber, Physical and Social Computing (CPSCom) (13)
  17. Conference on Cryptology and Network Security (CANS) (13)
  18. Conference on Formal Engineering Methods (ICFEM) (12)
  19. Conference on Security and Privacy in Communication Networks (SecureComm) (10)

There are some interesting observations I made from the ranking (updated from last iteration):

  1. The h5 index of the top venues increased by about 5-9 points, with S&P returning to place 2. For CCS, this is definitely expected, as the number of submissions/accepted papers has increased significantly in the last 5 years.
  2. Computer & Security joined the other two journals in the top ten list
  3. Financial Cryptography and Data Security makes its first entry into top 15, probably due to Bitcoin/blockchain/smart contract related content and FinTec
  4. ArXiv is in the list, but can hardly be counted as “peer reviewed”.
  5. 5 of the top 14 venues (w/o Arxiv) have a strong crypto focus, further limiting the options for general security papers to be published at.
  6. Google also publishes a h5-median score, which indicates the median citation count of the publications included in the h5 computation. This somewhat gives a nice indication on how many citations you could expect for your publications in the conference, after five years. For the top 10 venues, this is between 60 and 110, for top 10-20 between 40 and 65
  7. Clearly, for h5 it helps to accept more papers (see ArXiv and Infocom rank). It would be great to award selectivity somehow, for example by dividing by number of accepted papers. Unfortunately, that information is not directly available (see here).

See also: aminer conference ranking, CORE2014 conference ranking