International Symposium on Security Engineering for Trusted Cyberspace

 
C-DAC Logo
 

International Symposium on Security Engineering for Trusted Cyberspace (ISSETC-2024)

About ISSETC


The Centre for Development of Advanced Computing (C-DAC) Patna is organizing a two-day “International Symposium on Security Engineering for Trusted Cyberspace” from 29th February, 2024 to 01st March, 2024* at the historical city of Rajgir, Bihar, India under the mentorship of MeitY, Government of India. The Symposium aims to highlight crucial factors and their implementation challenges which can help in realizing a safe and trusted cyberspace for digital transactions. The Symposium expects high quality dissemination of knowledge on important cyber security topics such as cryptographic engineering, disruptive network security implementations, formal verification, trustworthy software systems, strategic cyber security, ransomware, cyber forensics, and similar topics. The Symposium would primarily deliberate on security engineering challenges and their resolution. Many eminent guests, researchers and strategic think tanks will guide the participants on the crucial requirements of trusted cyberspace and their implementation methodologies during their insightful sessions. The Symposium would also include the launch and promotion of two tools as well as a book which has been developed and compiled by the C-DAC Patna team towards making the Indian cyberspace more secure and trusted.

Government Officials, Scientists/Researchers, Academicians, Law Enforcement Agencies, Defence Personnel, Strategic Users, Security Engineers, Startups, Industries, and any other interested agencies or personnel.

  • Shri S. Krishnan, Secretary, MeitY, Government of India
  • Shri Bhuvnesh Kumar, Additional Secretary, MeitY, Government of India
  • Shri Rajesh Singh, Joint Secretary & Financial Adviser, MeitY, Government of India
  • Ms. Tulika Pandey, Sc. ‘G’ & Group Coordinator (R&D in Cyber Security and UIDAI), MeitY, Government of India
  • Prof. Rajat Moona, Director, IIT Gandhinagar
  • Lt. Gen. (Retd.) Raj Shukla, Member, UPSC
  • Shri E. Magesh, Director General, C-DAC
  • Shri Aditya Kumar Sinha, Sr. Director and Centre Head, C-DAC Patna & Kolkata
  • Other dignitaries


  • Dr. Neeraj Kumar Singh, Professor, University of Toulouse, France
  • Dr. Raju Haldar, Associate Professor, IIT Patna
  • Maj. Gen. (Retd.) Ravi Chaudhary, Sc. ‘H’, NTRO
  • Dr. S. Nandi, Sr. Professor, IIT Guwahati
  • Dr. Anupam Chattopadhyay, Associate Professor, NTU Singapore
  • Commander (Retd.) Surender Sharma, Microsoft, Hyderabad
  • Dr. Kunal Abhishek, Joint Director, C-DAC Patna
  • Shri Balaji Venkatesh, Cyber Defence Researcher
  • Dr. P. K. Saxena, PSA Fellow, O/o PSA to GoI & Former Director, SAG, DRDO
  • Commodore (Retd.) S. Vombatkere, Senior Director, SecureThings, Pune
  • Commander (Retd.) Dr. Shashwat Raizada, Director (Cyber Security), Marelli, Gurugram
  • Shri Anand Raje, CTO, India Internet Foundation (IIFON), Kolkata
  • Dr. Somanath Tripathy, Professor, IIT Patna
  • Ms. Lakshmi Eswari, Senior Director & Centre Head, C-DAC Hyderabad
  • Shri Ch A S Murty, Senior Director, C-DAC Hyderabad
  • Ms. Dija S., Associate Director, C-DAC Trivandrum
  • Mr. Rami Tamam, Cyber Legal Forensics Expert, Israel
  • Other speakers


Nearest Airport :
  • Jayprakash Narayan International Airport Patna (110 KMs from RICC, Rajgir)
  • Gaya International Airport, Bodh Gaya (70 KMs from RICC, Rajgir)
  • Nearest Railway Station :
  • Rajgir Railway Station (02 KMs from RICC, Rajgir)
  • Shuttle Services from Patna Railway Station & Jayprakash Narayan International Airport, Patna on 28 & 29 February, 2024.


    Rajgir International Convention Centre (RICC), Rajgir, Bihar

    Dr. Kunal Abhishek, Joint Director, C-DAC Patna
    Email akunal@cdac.in
    Contact Number +91-9791006182

    For any queries related to the registration and/or accommodation, please write/contact to :

    Shri Saket Kumar Jha, Principal Technical Officer, C-DAC Patna
    Email register.issetc2024@cdac.in
    Contact Number +91-8860099189

    List of Speakers

    Speaker Image

    Speaker 01 (1415 – 1435 Hrs) Day 1

    Maj. Gen. (Retd.) Ravi Chaudhary

    Scientist ‘H’, NTRO

    Biography

    Major General (Retd.) Ravi Chaudhary is an exceptional officer, boasting an impressive 37 years of experience in the Indian Army with remarkable expertise in Signals. He graduated with an M.Tech. degree from IIT Kharagpur and also holds an M.Phil. from Madras University. He had served as the Chief Signals Officer, Northern Command and as Additional Director General, Information Systems in the army. He currently holds the position of Scientist 'H' at NTRO, New Delhi, effectively employing his invaluable expertise in Communication and Data Science Technologies.

    Title of the Talk

    Strategic Cyber Security

    Abstract

    To be uploaded..

    Speaker Image

    Speaker 02 ( 1435 – 1455 Hrs ) Day 1

    Dr. Somanath Tripathy

    Professor, IIT Patna

    Biography

    Dr. Somanath Tripathy is a Professor in the Department of Computer Science and Engineering at the Indian Institute of Technology, Patna. He began his tenure as a faculty member in December 2008. Notably, he served as the Associate Dean of Academics from January 2016 to March 2017 and subsequently as the Associate Dean of Administration from July 2021 to November 2023 at IIT Patna. His research interests encompass lightweight cryptography, security issues in resource-constrained devices, blockchain, malware detection, and secure machine learning. His scholarly contributions include the publication of more than 100 research papers in various reputable journals and conferences. Moreover, he has assumed the role of Principal Investigator for several projects related to security. Additionally, he currently serves as an Associate Editor for Multimedia Tools and Applications, an International Journal, and as an editor for IETE Technical Review.

    Title of the Talk

    Malware Detection

    Abstract

    Malware refers to malicious software that aims to compromise the basic security services, such as the CIA (Confidentiality, Integrity, and Availability), of a user's device without the user's knowledge. Alternatively, it may annoy the user by pushing unwanted messages, such as advertisements. Malware constitutes one of the most serious cyber threats, capable of propagating autonomously or exploiting the innocence of users. With over 5 million new malware instances detected each day, approximately four companies fall victim to ransomware attacks every minute. This underscores the crucial need for automatic malware detection techniques to alert users. In this discussion, I will delve into various types of malware detection techniques and emphasize the significance of early-stage ransomware detection in Android systems.

    Speaker Image

    Speaker 03 ( 1510 – 1530 Hrs ) Day 1

    Shri Anand Raje

    CTO, IIFON, Kolkata

    Biography

    Shri Anand Raje, an entrepreneur, solution architect and mentor, has over 16 years of experience in computing and internet technology design, development, and research. Currently, he serves as the Co-Founder (Trustee) and CTO at the India Internet Foundation as well as the Co-Founder and Director of BASIS Technologies Pvt. Ltd. In his previous roles, he worked as a Senior Consultant on E-Governance Projects, and as a Security and Academic Consultant at organizations like VeHere Interactive, NIIT, and Cyber Peace Foundation. He is actively associated with professional organizations and communities such as Internet Society, ICANN, IETF, Hyperledger Kolkata and has contributed to large-scale e-governance projects. He has organized multiple International Technology forums, workshops and conferences and has earned fellowships from ICANN, ISOC, APRICOT, APSIG and IETF. His notable contributions include implementing India's first L-Root anycast instance and fostering community initiatives like the Internet Exchange Kolkata IX.

    Title of the Talk

    Fostering Collaboration through Disruptive Network Security Implementations, towards Building a Robust Research and Standards Ecosystem in India.

    Abstract

    The rapid evolution of the internet landscape brings with it both immense opportunities and unprecedented challenges, particularly in the realm of cybersecurity. As India emerges as a global leader in technology innovation, it is imperative to prioritize the development of a robust research and standards ecosystem to address the evolving network security needs. The talk explores the significance of fostering collaboration among stakeholders through disruptive network security implementations using testbeds like “AIORI-IMN” in shaping the future of Internet innovations through indigenous research and development. By leveraging innovative approaches and promoting cooperation among various entities, the cybersecurity posture can be enhanced and get better equipped to tackle emergin cyber threats.

    Speaker Image

    Speaker 04 ( 1530 – 1550 Hrs ) Day 1

    Shri Krishna Pandey

    Director(Security Engineering), Salesforce

    Biography

    Shri Krishna Pandey is a seasoned cybersecurity professional with over 16 years of diverse experience in security engineering and governance. His career spans across startups like Hortonworks, mid/large-size enterprises including Cloudera, Citrix, Salesforce, and governmental organizations such as MeitY. He has led security engineering teams, ensuring the assurance of various products and services. Additionally, Krishna has actively contributed to the cybersecurity community, serving as the President of the (ISC)² Bangalore chapter. He is passionate about mentoring veterans transitioning into cybersecurity careers and holds several industry certifications in cybersecurity, big data, and process management.

    Title of the Talk

    Safeguarding AI-Powered Businesses in Multi-tenant Cloud Environments

    Abstract

    As businesses increasingly rely on artificial intelligence (AI) technologies to drive innovation and efficiency, the need to safeguard these AI-powered systems in multi-tenant cloud environments becomes paramount. Multi-tenant cloud environments, where multiple Customers/Users share resources and infrastructure, pose unique security & privacy challenges for AI-powered businesses. This talk explores a few tenant isolation strategies and tradeoff considerations to mitigate these risks at both the Customer and the Product/Services side.

    Speaker Image

    Speaker 05 ( 1605 – 1625 Hrs ) Day 1

    Mr. Rami Tamam

    Cyber Legal Forensics Expert, Israel

    Biography

    Adv. Rami Tamam is a seasoned legal professional with a wealth of expertise in Israeli Corporate Law and a nuanced understanding of its Civil, Criminal, and Regulatory dimensions. He received his L.L.B. and M.L.B. degrees respectively from University Of Tel Aviv and Bar Ilan University. He has had profound involvement in initiating regulatory processes in the realm of Internet, illegal black-list accounts and navigating legislative intricacies surrounding privacy, 'Search and Seizure' protocols, evidence production, and database regulations, both in Israel and on a global scale. He is also actively involved with foreign law enforcement agencies such as SFO, FBI, SA Scorpions and BKA. Adv. Tamam has also assumed leadership roles in establishing and enabling new business and adorned the role of an effective negotiator as well. He is the founder of the firm Intact Cyber Crisis Management and partner of investigative law firm, FITCO which is involved in Fraud Regulations, Cyber, Compliance, Anti Money Laundering and Combat in Terror Financing (AML-CTF). Notably he is also heads the Sea Ports Task Force, the Organized Crime Task Force, the Illegal Internet Gambling Task Force, all of which are branches of governmental Standing Committee against Organized and Financial Crime.

    Title of the Talk

    The new challenges in the cybersecurity field

    Abstract

    The challenges in cybersecurity field are shifting from technology to legal battles, and the standard Business Continuity Plan (BCP) is turning into a Legal Business Continuity Plan (LBCP) - with the "L" standing for legal. Cyber crisis management has become a complex 4D game that involves different legal systems, including privacy, torts, and class actions from various jurisdictions. As a team of cyber crisis managers from the most attacked country in the world, we have a solution that we would like to offer.

    Speaker Image

    Speaker 07 ( 1645 – 1705 Hrs ) Day 1

    Shri Pranav Prakash

    Cyber Security Expert

    Biography

    Shri Pranav Prakash is a well known social and political activist from the state of Bihar. He is a technocrat turned activist holding a B.Tech and M.S. degree in Computer Science and having worked in various positions in multiple countries before committing to the cause of rural India. He is passionate about societal change and civic engagement, and is a dedicated socio-political activist committed to advocating for justice, equality, and human rights.

    Title of the Talk

    Cybersecurity in the Rural India.

    Abstract

    The goal of our efforts is to identify critical cybersecurity factors in rural India and then to implement preventive measures that may prevent cases of security breach and online fraud. Initiatives to successfully change public perceptions, strengthen information security protocols, and create a resilient society are required. Over time, critical observations regarding the level of information security awareness and attitudes among people in certain rural areas of India have been made. Our study examines these issues from a psychological and cognitive standpoint. An awareness of people's perceptions of danger is necessary. To alter behaviour, more is required than merely informing individuals about the dangers and promoting a reactionary way of thinking. It is important to work with community-driven organisations and local governing authorities to continuously inform and counsel people on making safe decisions. In case of suspicion people may approach to these authorities or institutions to take informed decision. Additionally, the complaint registration mechanism needs to be easier to use. The procedure for registering complaints can be broken down into stages. In initial stage the complaint should be filed with as little detail as possible, so that time is saved in taking quick action.

    Speaker Image

    Speaker 08 ( 1530 – 1550 Hrs ) Day 1

    Shri Balaji Venkatesh

    Cyber Defence Researcher

    Biography

    Shri Balaji Venkateshwar is a cyber risk management expert and a passionate cybersecurity researcher with a vast experience. Currently, he serves as Cyber Defense Researcher and Chief Mentor at Cybervidyapeeth Foundation, Faridabad. He has also served as Chief Information Security Officer at BSE and at IDFC First Bank and as Director of Cyber Defense at Qualcomm. He has also served as Executive Director, Cyber Defense at PwC and worked on India's largest cyber defense project as key architect & designer. Shri Venketeshwar has also filed multiple patents in information security domain. He has also worked as AVP and Head of IT risk and compliance at Wipro, as manager, IT projects and security, at SBI, as VP (Cybersecurity), at Bank of America and in various other notable institutions in diverse roles. He also leads a team of super specialists in cybersecurity to evangelize cybersecurity education in India's engineering institutions and help create a cyber army with a million strength for India in next five years.

    Title of the Talk

    The Future of Cyber Defense Research & Productization - Aatmanirbhar & Cyber Resilient Bharat, An Approach.

    Abstract

    The vision of an "Aatmanirbhar Bharat" in cyber defense goes beyond technological self-sufficiency, emphasizing the creation of a sustainable and secure digital ecosystem resilient to modern cyber warfare challenges. By investing in education, innovation, and international cooperation, India aims to become a cyber-resilient nation, not only protecting its digital infrastructure but also contributing to global cybersecurity. The outlined approach provides a roadmap for India to harness capabilities, foster innovation, and secure a prominent position in global cyber defense. Recognizing the importance of developing indigenous technologies and the strategic advantage of self-reliance, the narrative draws attention to vulnerabilities highlighted by Russia's reliance on external cyber defense technologies. India's pursuit of "Aatmanirbhar" and cyber resilience is framed as essential for national security, sovereignty, and leadership in the digital age.

    Speaker Image

    Speaker 01 ( 0900 – 0920 Hrs ) Day 2

    Dr. Kunal Abhishek

    Scientist ‘E’, C-DAC Patna

    Biography

    Dr. Kunal Abhishek at present Scientist `E' and Head of Department (Cyber Security & Forensics) at C-DAC Patna, has been actively engaged as Principal Investigator of many R&D projects to build next generation Cyber Security solutions for government fraternity including strategic sectors. He also served as a Scientist and Group Head of the Network Security Research Group at Society for Electronic Transactions and Security (SETS), Chennai. He has earlier worked as an R&D Engineer for nearly seven years in the Weapons and Electronic Systems Engineering Establishment (WESEE) where he had been responsible for development of indigenous elliptic curve-based software solutions for the Indian Navy. Dr. Kunal as an Expert Committee Member, was instrumental in amendment of the Information Technology Act, 2000 of India with introduction of "Digital Signature End Entity Rules 2015'' under the Indian Act. His research interests include cryptography, ransomware and its countermeasures, secure kernel development, formal verification of software systems, statistics and software engineering. He is the reviewer of popular IEEE Systems, Springer and Elsevier Journals, IEEE International Conferences etc. He is a Ph.D. in Computer Science from Bharathidasan University, Trichy.

    Title of the Talk

    Security Engineering for Trusted Cyberspace

    Abstract

    Focus will be on the requirements of trusted cyberspace and security engineering practices needed to fulfill this aim. Some case studies will also be discussed to understand how cyber security solutions are being designed and developed keeping security and trust into consideration for Indian applications.

    Speaker Image

    Speaker 02 ( 0920 – 0940 Hrs ) Day 2

    Commodore (Retd.) S Vombatkere

    Sr. Director, SecureThings, Pune

    Biography

    Commodore S Vombatkere, an Electrical Engineering graduate from IIT Madras, joined the Indian Navy's Electrical Branch in 1987. With a postgraduate degree in Computer Science from IIT Bombay, he actively contributed to academic and technology initiatives in Software Development & Cybersecurity for over 25 years. Awarded the Naosena Medal in 1998, his 35-year naval career included pivotal roles at WESEE, Delhi, the Software Engineering Group in Mumbai, and the Naval Technical Group in Bangalore. Notably, he was a founding member of the Defence Cyber Agency. Serving on expert committees for Information Security, he also contributed to cyber education at IIT Delhi and holds an Honorary Adjunct Fellowship at the National Maritime Foundation. Post-superannuation in 2022, he worked with Bosch Global Software Technologies for two years before assuming the role of Senior Director Cybersecurity Consulting at SecureThings, Pune, focusing on Automobile System Cybersecurity, Cybersecurity Standards, Process Consulting, and Threat & Risk Assessment.

    Title of the Talk

    Cyber Resilience – Driving the paradigm shift in Security Engineering

    Abstract

    Cybersecurity focuses on preventing and countering cybercrime, while cyber resilience involves minimizing and recovering from threats. It includes proactive measures like robust defense mechanisms and risk assessments, as well as reactive strategies such as incident response plans. In security engineering, cyber resilience is pivotal, shaping the design of systems. The recent EU Cyber Resilience Act enforces stringent regulations, mandating comprehensive risk management and collaborative information-sharing. This triggers a transformation in the cybersecurity industry, increasing demand for resilient technologies and skilled professionals. The paper explores how the necessity for cyber resilience drives the evolution of security engineering, emphasizing adaptive defenses against cyber threats in our digital landscape.

    Speaker Image

    Speaker 03 ( 0940 – 1000 Hrs ) Day 2

    Commander (Retd.) Dr. Shashwat Raizada

    Director (Cyber Security), Marelli, Gurugram

    Biography

    Commander (Retd. ) Dr. Shashwat Raizada is presently the Director, Global Cyber Security at Marelli Ltd. A B.Tech. graduate in electrical engineering, he holds an M.Tech. degree in Computer Science from IIT Kanpur and obtained his Ph.D. in Computer Science focussing on Cryptology from Indian Statistical Institute, Kolkata. Before joining Marelli, Dr. Raizada has worked in setting up the Product Cyber Security Department at Bosch Global Software Technologies Pvt. Ltd. targeting Automotive Cyber Security. He has also built Product Security Engineering fields for Automotive from scratch with capacity & capability building in threat modelling, security concepts, key management, enterprise solutions, security testing, vulnerability management, cloud etc. With cross-domain exposure, he has conceptualized and implemented complex projects working closely with Academia, Industry and Government Organizations. His expertise spans Applied and Theoretical Cryptography, Automotive Cybersecurity Standards, having worked for several international automotive OEMs and is a subject matter expert in the ITS panel of Bureau of Indian Standards.

    Title of the Talk

    Cybersecurity in the Automotive Domain

    Abstract

    As our vehicles transform into highly sophisticated networks with extensive connectivity features, the cybersecurity challenges they face become increasingly complex and multifaceted. From combating potential cyber-attacks on interconnected vehicle systems to addressing vulnerabilities that could arise due to the vast supply chain networks in the automotive industry, the task at hand is monumental. In this talk, we will explore these challenges in depth, dissect the risks associated with modern vehicles, and delve into the rigorous processes and measures that are employed to safeguard them against cyber threats, ensuring the safety and confidentiality of drivers around the world.

    Speaker Image

    Speaker 04 ( 1010 – 1035 Hrs ) Day 2

    Dr. Anupam Chattopadhyay

    Associate Professor, NTU Singapore

    Biography

    Dr. Anupam Chattopadhyay, Associate Professor at Nanyang Technological University, began his tenure as a faculty member in September, 2014. He received his B.E. degree from Jadavpur University, India, M.Sc. from ALaRI, Switzerland and Ph.D. from RWTH Aachen, Germany for which he received the Borcher's plaque for outstanding doctoral dissertation. He has worked as a Member of Consulting Staff in CoWare R&D, India and led the MPSoC Architectures Research Group in RWTH Aachen, Germany as a Junior Professor before joining NTU. He held visiting positions at Politecnico di Torino, Italy; EPFL, Switzerland; Technion, Israel and Indian Statistical Institute, Kolkata in the past. Dr. Chattopadhyay currently heads a team of 20+ researchers, overseeing projects in the area of computer architectures, security, design automation and emerging technologies. His research advances has been reported in more than 100 conference/journal papers (ACM/IEEE/Springer), multiple research monographs and edited books (CRC, Springer) and open-access forums. He also regularly serves in the TPCs of top conferences, reviews journal/ conference articles and presented multiple invited seminars/tutorials in prestigious venues.

    Title of the Talk

    Quantum Safe Digital World using Post-Quantum Cryptography

    Abstract

    PQC is growing as an essential technology, necessary for upgrading the security protocols across virtually every stack of digital ecosystem (e.g., e-commerce, messaging, IoT), to confront the imminent threat of an adversary with the power of Quantum Computers. In this talk, we will briefly review the Quantum threat, the role that can be played by PQC, the alternative technologies such as QKD and practical challenges associated with these. The talk will end with a few examples of real-world integration of PQC.

    Speaker Image

    Speaker 05 ( 1035 – 1055 Hrs ) Day 2

    Commander (Retd.) Surendra Sharma

    Microsoft, Hyderabad

    Biography

    Commander Surendra Sharma is a seasoned professional with over 20+ years of experience in the domains of Information technology and Cybersecurity. He is a graduate of the National Defence Academy, Pune, and Naval College of Engineering, Lonavala. Information security has been a key role assigned to him throughout his Naval service career in various staff, instructional and operational appointments onboard warships and Naval establishments. He is also an alumnus of the Indian Institute of Technology (MTech in CSE), Madras and Masaryk University (MS in InfoTech Security), Czech Republic. Prior to his voluntary retirement from the Naval Service in 2021, he headed the Advanced Cybersecurity Engineering Lab at WESEE, New Delhi to design, develop and deploy high-assurance Cybersecurity tools/products across Navy/ services. He is currently heading the team engaged in development of high-assurance Cybersecurity platform at Microsoft, India Development Centre, Hyderabad.

    Title of the Talk

    Generative AI

    Abstract

    Generative AI is a disruptive technology that can create new data from existing data, such as images, text, audio, or video. This talk is aimed at exploring the strategic and technical implications of generative AI for various sectors and aspects of national, economic, and human capital development, with a focus on cybersecurity. The presentation will discuss how generative AI can enhance the defense of digital infrastructure and assets against cyber threats from different actors, as well as the perils and safeguards of generative AI misuse. The talk will also conclude with recommendations and best practices for adopting and regulating generative AI in a responsible and ethical manner.

    Speaker Image

    Speaker 06 ( 1055 – 1115 Hrs ) Day 2

    Dr. P K Saxena

    PSA Fellow, O/o PSA to GoI & Former Director, SAG, DRDO

    Biography

    Dr P K Saxena, a PSA Fellow in the office of the Principal Scientific Advisor (PSA) to Govt of India, has wide experience working in Defence R&D. Having obtained his Doctoral Degree in Algebra (Mathematics) from IIT Kanpur, he served as Mathematics Lecturer in NIT Silchar and NDA, Kharakwasla (PUNE) for brief periods. He joined DRDO in 1981 as a Scientist and became the Director of Scientific Analysis Group (DRDO) in May 2003. He was elevated to the rank of ‘Outstanding Scientist’ in 2009 while holding the Director’s position. He superannuated from DRDO in July 2014 rendering his services for 33 yrs for Defence R&D and joined O/o PSA to GoI thereafter as Scientific Consultant (Cybersecurity). His areas of specialisation include Algebra, Cryptology, Fuzzy Logic, Artificial Neural Networks, Information Security and Speech Technology. He has published 65 research papers while pursuing multidisciplinary R&D activities. He guided various Research and Development projects at DRDO, supervised many Scientists for their Master’s degree and guided four PhDs receiving their degrees from IITD, Delhi Univ. and Jadavpur Univ. He has organised many Conferences/WS/Seminars and delivered many Key Note speeches in National and International Conferences/Workshops/Symposia including INDOCRYPT. He was instrumental in the formation of Cryptology Research Society of India (CRSI) in 2001. The book on Cryptography written by him in Hindi has been awarded the best in category by DRDO.

    Title of the Talk

    Cybersecurity

    Abstract

    The talk will focus on generic issues and technologies in the field of Cybersecurity and Trusted Cyberspace.

    Speaker Image

    Speaker 07 ( 1115 – 1135 Hrs ) Day 2

    Dr. Raju Haldar

    Associate Professor, IIT Patna

    Biography

    Dr. Raju Halder is currently serving as an Associate Professor in the Department of Computer Science and Engineering at IIT Patna. He obtained his Ph.D. in Computer Science from Ca’ Foscari University of Venice (Italy) and holds B.Sc., B.Tech., and M.Tech. degrees from the University of Calcutta. Before joining IIT Patna, he worked as a postdoctoral researcher at Macquarie University, Australia, and collaborated with the Robotics team at HASLab (University of Minho), Portugal, in 2016. Prior to pursuing his Ph.D., he served as an associate system engineer with IBM India Pvt. Ltd. from 2007 to 2008. Dr. Halder's research interests encompass Formal Methods, Blockchain and Smart Contracts, Program Analysis and Verification, and Information Systems Security.

    Title of the Talk

    Formal Analysis and Verification of Blockchain Smart Contracts

    Abstract

    With a rapid evolution and adoption of blockchain technology to various critical systems, including supply chain, healthcare, smart city services, financial sectors, etc., security attacks targeting backend smart contracts have been on the rise. In the past, there have been several high profile incidents that indicate smart contracts could contain security vulnerabilities, instigating huge financial loss. Therefore, it becomes essential to conduct formal analysis and verification of smart contracts to ensure their correctness before deploying them on the blockchain network. In this talk, we present various safety and security concerns associated with the blockchain smart contracts, and we show how harnessing the power of formal methods can mitigate these risks.

    Speaker Image

    Speaker 08 ( 1135 – 1155 Hrs ) Day 2

    Ms. Dija S

    Scientist ‘F’, C-DAC Trivandrum

    Biography

    Dija S, Scientist F and Associate Director at CDAC Trivandrum is a Cyber Forensics Expert with 23 years of experience in the domain. She holds a B-Tech degree in Computer Science & Engineering and an M-Tech degree in Software Systems with a specialisation in Network Security. Currently, she is leading Cyber Forensics Research and Development(R&D) activities of CDAC, Trivandrum, where she is also the Nodal Information Security Officer. She has prepared the Cyber Forensics R&D roadmap of India which was unveiled by the Ministry of Electronics and Information Technology (MeitY) recently. Her key achievements in the Cyber Forensics Area include the development of more than 10 indigenous Cyber Forensics Tools. More than 3500 copies of these tools have been deployed to various Law Enforcement Agencies across the country including CBI, NIA, IB, State Police etc. Various Investigative Agencies in India have taken her technical support in Cyber Crime investigations of crucial cases reported in India. She has 30 International Research Publications to her credit with 120 commendable citations.

    Title of the Talk

    Cyber Forensics Initiatives of CDAC

    Abstract

    The rapid evolution of new technologies has with it created a new breed of criminal activities in the cyber regime. Investigation and analysis for cyber related crimes do not follow the general principles of Forensic Science. This has led to the evolution of a new discipline 'Digital Forensics'. The scientific principles involved have to be rigorous and foolproof to withstand any court scrutiny. Realizing the importance of this new discipline, MeitY has entrusted CDAC to develop indigenous solutions catering to the requirements of various Law Enforcement Agencies in India. The Resource Centre for Cyber Forensics setup at CDAC, Trivandrum has been acting as a nodal Centre in providing solutions over the past 2 decades. The major development areas include Disk Forensics, Live Forensics, Mobile Forensics and Network Forensics. Cyber Forensics R&D roadmap of India was prepared which has been recently unveiled by MeitY.

    Top