Conference Schedule
-
Day 01
Fri, 16 Jan 2026 -
Day 02
Sat, 17 Jan 2026 -
Day 03
Sun, 18 Jan 2026
- 11:30 AM – 12:30 PM
- KEYNOTE
Talk 1: AI and Cyber Security
Prof. Sandeep K. Shukla
- 11:30 AM – 4:30 PM
- POSTER PRESENTATION
- 12:30 PM – 1:30 PM
- PANEL DISCUSSION
Topic: Cybersecurity Education
Session Chair: Ms. Tulika Pandey
- 2:30 PM – 4:30 PM
- PAPER PRESENTATION (7)
- 2:30 PM – 4:30 PM
- CTF HACKATHON
Capture The Flag
- 5:00 PM – 6:00 PM
- TUTORIAL 1
By Prof. Satyajit Das (IIT Guwahati)
- 5:00 PM – 6:00 PM
- POSTER PRESENTATION
At a Glance
- WORKSHOPS
8 × 2h
- PAPER PRESENTATIONS
- PANEL DISCUSSION
- POSTER PRESENTATIONS
- KEYNOTE LECTURES
8
- CTF HACKATHON
- TUTORIALS
Panel Topic: Cybersecurity Education
| Name | Session Role | Designation | Institution |
|---|---|---|---|
| Tulika Pandey | Session Chair | Senior Director | MeitY |
| Vinayak Godse | Panelist | CEO | DSCI |
| Shankar Raman | Panelist | CEO | IITM Pravartak |
| Sandeep Shukla | Panelist | Director | IIIT Hyderabad |
| Shweta Agrawal | Panelist | Professor | IIT Madras |
| Urbi Chatterjee | Panelist | Assistant Professor | IIT Kanpur |
Paper Presentations: Day 01
| S. No. | Paper Title | Authors |
|---|---|---|
| 1 | An efficient decentralized and verifiable stake voting system | Amalan Antony, Pavithra Gurushankar |
| 2 | Breaking Boundaries: A Security Analysis of Android’s IPC Vulnerabilities | Anirudh Suri, Anil Saini and Manoj Singh Gaur |
| 3 | Dissecting ValleyRAT: From Analysis to Memory-Centric Detection | Kartik Iyer, Parag Rughani and Shaurya Shaurya |
| 4 | Federated Malware Detection across PE and non-PE File Formats | Niharika Pagare and Dr. Mukti Padhya |
| 5 | An Efficient Blockchain-based E-voting Protocol with Improved Voter Anonymity | Bhakti Dhorajiya, Arti Dhiman and Souradyuti Paul |
| 6 | Privacy Technologies: Sectoral Deployments and Quantum Risks | Veniamin Boiarkin and Muttukrishnan Rajarajan |
| 7 | Post-Quantum Security Readiness Across Digital Supply Chains | Tooba Qasim, Veniamin Boiarkin, and Muttukrishnan Rajarajan |
- 9:00 AM – 10:00 AM
- KEYNOTE
Prof. Avi Mendelson
Session Chair: Sukumar Nandi
- 9:00 AM – 11:00 AM
- CTF HACKATHON
Capture The Flag
- 10:00 AM – 11:00 AM
- KEYNOTE
Talk 3: AI and Forensics: Where We Are and the Shape of What’s Next
Prof. Dr. Frank Breitinger
Session Chair: Dr. Parag Rughani
- 11:30 AM – 12:30 PM
- KEYNOTE
Talk 4: Translating Cybersecurity Security Research & Innovation to Commercialisation – Ideas-to-Market
Prof. Muttukrishnan Rajarajan
- 11:00 AM – 4:30 PM
- POSTER PRESENTATION
- 12:30 PM – 1:30 PM
- PANEL DISCUSSION
- 2:30 PM – 3:30 PM
- KEYNOTE
Dr. Surya Nepal
- 3:30 PM – 4:30 PM
- PAPER PRESENTATION (3)
- 2:30 PM – 4:30 PM
- WORKSHOP 2
Crypto Standards, Certification, and User expectation
By Dr. Abey Jacob, M.R Muralidharan
(Centre for Development of Advanced Computing
(C-DAC), Standardization Testing and Quality
Certification (STQC))
- 5:00 PM – 6:00 PM
- TUTORIAL 2
Design and Analysis of User Authentication Protocols
By Dr. Awaneesh & Prof. Manoj Mishra (IIT Roorkee)
- 5:00 PM – 6:00 PM
- TUTORIAL 3
Observing and Analyzing Microarchitectural Timing Behavior Using eBPF for System Security
Session Chair: Prof. Gnanambikai
Krishnakumar
- 6:00 PM – 6:30 PM
- Poster & Hackathon Prize Distribution Ceremony
- 6:30 PM – 8:00 PM
- Cultural Events
- 8:00 PM – 9:30 PM
- Gala Dinner
At a Glance
- WORKSHOPS
8 × 2h
- PAPER PRESENTATIONS
- PANEL DISCUSSION
- POSTER PRESENTATIONS
- KEYNOTE LECTURES
8
- CTF HACKATHON
- TUTORIALS
Panel Topic: Emerging trends in Cybersecurity
| Name | Session Role | Designation | Institution |
|---|---|---|---|
| N. Subramanian | Session Chair | Executive Director | SETS |
| Avi Mendelson | Panelist | Professor | Technion |
| Surya Nepal | Panelist | Senior Principal Research Scientist | CSIRO Data61 |
| Frank Breitinger | Panelist | Professor | University of Augsburg |
| Muttukrishnan Rajarajan | Panelist | Director Institute for Cyber Security | City, University of London |
| Manoj Singh Gaur | Panelist | Director | IIT Jammu |
Paper Presentations: Day 02
| S. No. | Paper Title | Authors |
|---|---|---|
| 1 | Security in the Era of Perceptive Networks: A Comprehensive Taxonomic Framework for Integrated Sensing and Communication Security | Chandra Thapa and Surya Nepal |
| 2 | Hidden Hybrid Symmetric Key Cipher | Rajeeva Laxman Karandikar |
| 3 | Challenges in Detecting Cryptographic Backdoor Attacks on Neural Networks | Subhadeep Dalui, Shubhi Shukla, and Debdeep Mukhopadhyay |
- 9:00 AM – 10:00 AM
- KEYNOTE
Prof. Debdeep Mukhopadhyay
- 9:00 AM – 11:00 AM
- WORKSHOP
Kaspersky Interactive Protection Simulation (KIPS)
- 10:00 AM – 11:00 AM
- KEYNOTE
- 11:30 AM – 1:30 PM
- WORKSHOP 1
Session Chair: Rashmi P Sarode
- 11:30 AM – 1:30 PM
- WORKSHOP 3
AI Assisted Security Operations & Threat Hunting
By Dr. Prabaharan Poornachandran, Bishal Kumar Prasad and Manu R Krishnan (Amrita Vishwa Vidyapeetham)
- 11:30 AM – 1:30 PM
- WORKSHOP 4
By Prof. Sugata Gangopadhyay, Ali Raya (IIT Roorkee)
Session Chair: Prof. Santanu Sarkar
- 2:30 PM – 4:30 PM
- WORKSHOP 5
- 2:30 PM – 4:30 PM
- WORKSHOP 6
Formal Verification of DigiLocker with Tamarin Prover
- 2:30 PM – 4:30 PM
- WORKSHOP 7
Session Chair: Dr. Noor Mahammad SK
- 2:30 PM – 4:30 PM
- WORKSHOP 8
- 5:00 PM – 6:00 PM
- TUTORIAL 4
Tutorial on Hardware Security Standards
By Smt. A. Suganya (Society for Electronic Transactions and Security (SETS))
- 5:00 PM – 6:00 PM
- TUTORIAL 5
At a Glance
- WORKSHOPS
8 × 2h
- PAPER PRESENTATIONS
- PANEL DISCUSSION
- POSTER PRESENTATIONS
- KEYNOTE LECTURES
8
- CTF HACKATHON
- TUTORIALS