UAE Security Day – 2015

CCS-AD has been working in the past year to develop a high quality research program that addresses challenges relevant to the UAE and the region.  To address this goal CRISSP-AD in conjunction with KUSTAR are organizing a day long meeting to explore research collaborations among researchers in UAE universities who work in the broad field of cyber security and privacy. The goal of this meeting is to develop ambitious and high impact research projects and to explore how they can be supported to generate research results of highest quality. More specifically, we would like to discuss how to develop joint funding proposals, build testbeds, and gain access to data that could be used for evaluating our research results.
  • Date: Monday, April 20, 2015
  • Location: NYU Abu Dhabi, Saadiyat Island


Participating Institutions





  • Professor Ibrahim Kamel, Professor and Chairman, Department of Electrical and Computer Engineering, University of Sharjah
  • Dr. Yousef Ali Al Hammadi, Assistant Professor, Faculty of Information Technology (FIT), UAE University
  • Dr. Davor Svetinovic, Associate Professor, Institute Center for Smart and Sustainable Systems (iSmar), Department of Electrical Enginnering and Computer Science, Masdar Institute of Science and Technology
  • Zayed University


Guest Speakers

Ahmad copy

Ahmad-Reza Sadeghi

He is the head of the System Security Lab at the Center for Advance Security Research Darmstadt (CASED), Technische Universität Darmstadt.

Since January 2012 he is the Director of Intel Collaborative Research Institute for Secure Computing (ICRI-SC) at TU Darmstadt, Germany. He received his PhD in Computer Science with the focus on privacy protecting cryptographic protocols and systems from the University of Saarland in Saarbrücken, Germany. Prior to academia, he worked in Research and Development of Telecommunications enterprises, amongst others Ericson Telecommunications. He has been leading and involved in a variety of national and international research and development projects on design and implementation of Trustworthy Computing Platforms and Trusted Computing, Security Hardware, Physically Unclonable Functions (PUF), Cryptographic Privacy-Protecting Systems, and Cryptographic Compilers (in particular for secure computation). He has been continuously contributing to the IT security research community and serving as general or program chair as well as program committee member of many conferences and workshops in Information Security and Privacy, Trusted Computing and Applied Cryptography. He served on the editorial boards of the ACM Transactions on Information and System Security (TISSEC). Currently he is on the editorial board of ACM Books and acts as guest editor of the IEEE Transactions on Computer-Aided Design (Special Issue on Hardware Security and Trust).Prof. Sadeghi has been awarded with the renowned German prize “Karl Heinz Beckurts” for his research on Trusted and Trustworthy Computing technology and its transfer to industrial practice. The award honors excellent scientific achievements with high impact on industrial innovations in Germany. Further, his group received the second prize of German IT Security Competition Award 2010.


Pierangela Samarati

She is a Professor at the Computer Science Department of theUniversità degli Studi di Milano.

Her main research interests are in data protection, security, and privacy. She has participated in several projects involving different aspects of information protection. On these topics she has published more than 240 papers appeared in journals, conference proceedings, and books. She is co-author of the book “Database Security,” Addison-Wesley, 1995.

She has been Computer Scientist in the Computer Science Laboratory at SRI, CA (USA). She has been a visiting researcher at the Computer Science Department of Stanford University, CA (USA), and at the Center for Secure Information Systems, George Mason University, VA (USA).

She is the chair of the IEEE Systems Council Technical Committee on Security and Privacy in Complex Information Systems (TCSPCIS), of the ERCIM Security and Trust Management Working Group (STM), and of the Steering Committees of the European Symposium on Research in Computer Security (ESORICS) and of the ACM Workshop on Privacy in the Electronic Society (WPES). She is the Coordinator of the Working Group on Security of the Italian Association for Information Processing (AICA), the Italian representative in the IFIP (International Federation for Information Processing) Technical Committee 11 (TC-11) on “Security and Privacy”. She is a member of the Steering Committee of: International Conference on Information Systems Security (ICISS), and International Conference on Information and Communications Security (ICICS). In 2008, she has received the IFIP TC11 Kristian Beckman Award. In 2009, she has been named ACM Distinguished Scientist. In 2012, she has been named IEEE Fellow. In 2012, she has received the IFIP WG 11.3 Outstanding Research Contributions Award.

She has served on the program committees of various conferences. She has served as Program Chair or co-Chair for: International Conference on Applied Cryptography and Network Security (ACNS’12), International Conference on Security and Cryptography (SECRYPT’10 — SECRYPT’14), International Workshop on Security and Trust Management (STM’12 and STM’06), International Conference on Network and System Security (NSS’10 and NSS’11), Workshop in Information Security Theory and Practices (WISTP’10), Information Security Conference (ISC’09), ACM Symposium on InformAtion, Computer and Communications Security (ASIACCS’07), Annual Computer Security Applications Conference (ACSAC’04 — ACSAC’08), European Symposium on Research in Computer Security (ESORICS’03 and ESORICS’04), ACM Workshop on Privacy in the Electronic Society (WPES’02 and WPES’03), ACM Conference on Computer and Communications Security (CCS’01), IFIP TC-11 International Information Security Conference (SEC’03 and SEC’08), IFIP WG11.3 Working Conference on Database Security (DBSEC’96 and DBSEC’04).


April 20, 2015

Time Agenda
9:00 – 9:30 AM Registration
9:30 – 9:45 AM Opening Ceremony – By Dr. Mohammed Al-Mualla
10:00 -11:00 AM Keynote 1: Securing Legacy Software against RealWorld Code Reuse Exploits: Utopia, Alchemy, or Possible Future?
By Prof. Ahmad Sadeghi
11:00 – 11:15 AM Coffee Break
11:15 AM – 12:15 PM Discussion Session: Mobility and Activity
Panel lead: Dr. Elchouimi – ADEC
12:15 – 1:15 PM Lunch
1:30 – 2:30 PM Keynote 2: A Location Privacy Framework for Mobile Toy Computing
By Prof. Pierangela Samarati
2:30 – 2:45 PM Coffee Break
2:45 – 4:45 PM Research Overview – A series of short informal presentations (20mins each) about research projects being undertaken by participants from various UAE universities.University of Sharjah: Prof. Ibrahim KamelUAEU: Dr. Yousef Ali Al HammadiMASDAR: Dr. Davor SvetinovicZayed University: (TBC)NYUAD: Prof. Ramesh KarriKUSTAR: Prof. Ernesto Damiani
4:45 – 5:00 PM Closing Remarks By Prof. Ernesto Damiani