Regional Security Day – 2015

The goal of this roundtable was to explore cyber security research, focusing on problems most relevant to the region.  How can we develop relevant and impactful research collaborations engaging to the MENA region?  What are the roadblocks we face to effectively collaborate, how do we problem solve and discover ways to overcome them?  In addition, related topics such as data sharing, test-bed development, and the recruitment of cyber security talent will also… Read More

Secure Consensus-based Time Synchronization in WSNs

Abstract Time synchronization is a fundamental service for various applications in wireless sensor networks. The recent consensus-based time synchronization protocols have provided fast convergence rate and high synchronization precision, but are still vulnerable to different malicious attacks. In this talk, we focus on how to defend the consensus-based time synchronization in wireless sensor networks under message manipulation attacks. We propose novel defense mechanisms to achieve secure distributed time synchronization. Furthermore, we prove… Read More

Indian Institutes of Technology (IIT) Guest Lectures

Part I: Cyber Security of Critical Infrastructures, A Case for a Schizoid Design Approach Abstract Sandeep K. Shukla Faculty, Department of Computer Science and Engineering, Indian Institute of Technology, Kanpur In the past, the design of cyber physical systems required a model based engineering approach, where as a first step of the design process — a physics based mathematical model of the physical system, and a control theoretic model of the control… Read More

Big Data: Threat Landscape and Protection Gap Analysis


  Abstract The advent of IoT and cloud services has resulted in collecting and sharing massive amounts of data. From a security perspective, these data represents a valuable target for attackers. As data-driven processes become integrated in the fabric of business, the entire society is becoming increasingly vulnerable to threats to data reliability and availability. Finally, the increase in redundancy of data available for collection, analysis and dissemination have strained traditional rules… Read More

Regional Security Day – 2015

The goal of this roundtable is to explore cyber security research, focusing on problems most relevant to the region.  How can we develop relevant and impactful research collaborations engaging to the MENA region?  What are the roadblocks we face to effectively collaborate, how do we problem solve and discover ways to overcome them?  In addition, related topics such as data sharing, test-bed development, and the recruitment of cyber security talent will also… Read More

CSAW’15 – High School Forensics Challenge

Finalist Announcement! Congratulations to UAE Finalist Teams! Bletchley Park from GEMS Academy in Abu Dhabi and LIGHT from Delhi Private School in Dubai were our top finalists.  The two teams receive dan expense-paid trip to New York City and competed in the 2015 CSAW @ NYU HSF competition in November of 2015. We thank all the students and their mentor teachers for participating in the High School Forensics challenge. This year’s HSF… Read More

Fault Tolerant Implementations of Cryptosystems: Threats and Defenses

Abstract In today’s world security requirements of various information disciplines, e.g., networking, telecommunications, database systems, and mobile applications, has caused applied cryptography to gain immense importance. In order to satisfy the high throughput requirements of such applications, the cryptographic systems are implemented either as cryptographic accelerators (ASIC and FPGA implementations), or as cryptographic libraries (optimized software routines). The complex hardware and software implementations are raising concerns regarding their security and reliability. In… Read More

Intrusion Detection Systems: Faster Pattern Matching & Beyond

Guest Speaker Biography Monther Aldwairi is an associate professor at the College of Technological Innovation at Zayed University since the fall of 2014. He received his B.S. in electrical engineering from Jordan University of Science and University (JUST) in 1998, and his M.S. and PhD in computer engineering from North Carolina State University (NCSU), Raleigh, NC, in 2001 and 2006, respectively. Prior to joining ZU, he was an Assistant and then Associate… Read More

UAE Security Day – 2015

CCS-AD has been working in the past year to develop a high quality research program that addresses challenges relevant to the UAE and the region.  To address this goal CRISSP-AD in conjunction with KUSTAR are organizing a day long meeting to explore research collaborations among researchers in UAE universities who work in the broad field of cyber security and privacy. The goal of this meeting is to develop ambitious and high impact research… Read More