{"id":3682,"date":"2021-07-20T14:13:51","date_gmt":"2021-07-20T05:13:51","guid":{"rendered":"https:\/\/cs.kyushu-u.ac.jp\/sicorp-in\/?page_id=3682"},"modified":"2021-07-26T13:20:42","modified_gmt":"2021-07-26T04:20:42","slug":"workshop2021-program","status":"publish","type":"page","link":"https:\/\/cs.kyushu-u.ac.jp\/sicorp-in\/workshop2021-program\/","title":{"rendered":"Program\uff08Secure Society in Future\uff09"},"content":{"rendered":"<a href=\"https:\/\/kyushu-u.webex.com\/kyushu-u\/j.php?MTID=mb336d95c8327a3d4edf2a1bac6c30760\" class=\"su-button su-button-style-default\" style=\"color:#FFFFFF;background-color:#2D89EF;border-color:#246ec0;border-radius:10px;-moz-border-radius:10px;-webkit-border-radius:10px\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"color:#FFFFFF;padding:8px 26px;font-size:20px;line-height:30px;border-color:#6cadf4;border-radius:10px;-moz-border-radius:10px;-webkit-border-radius:10px;text-shadow:none;-moz-text-shadow:none;-webkit-text-shadow:none\"><i class=\"sui sui-angle-double-right\" style=\"font-size:20px;color:#FFFFFF\"><\/i> Click here.\u00a0 Join for Online Workshop <\/span><\/a>\n<p><span style=\"font-family: tahoma, arial, helvetica, sans-serif;\">Meeting number: 170 521 3618<\/span><br \/>\n<span style=\"font-family: tahoma, arial, helvetica, sans-serif;\">Password: CPgYWZes659<\/span><\/p>\n<p style=\"text-align: center;\"><strong><span style=\"font-size: 36pt; font-family: 'times new roman', times, serif;\">Secure Society in Future<br \/>\n<\/span><\/strong><span style=\"font-family: arial, helvetica, sans-serif;\"><span style=\"font-size: 18pt; color: #808080;\">26<sup>th<\/sup>\u00a0July, 2021<br \/>\nOnline Workshop<br \/>\n<\/span><\/span><\/p>\n<p>&nbsp;<\/p>\n<p style=\"text-align: center;\"><strong><a href=\"#program\">[icon name=&#8221;tag&#8221; class=&#8221;&#8221; unprefixed_class=&#8221;&#8221;]Program<\/a>\u00a0 \u00a0 \u00a0 \u00a0<a href=\"#keynote1\">[icon name=&#8221;tag&#8221; class=&#8221;&#8221; unprefixed_class=&#8221;&#8221;]Keynotes\u00a0<\/a>\u00a0 \u00a0 \u00a0 <a href=\"#abstract\">[icon name=&#8221;tag&#8221; class=&#8221;&#8221; unprefixed_class=&#8221;&#8221;]Abstracts<\/a>\u00a0 \u00a0 \u00a0 \u00a0<a href=\"#sponsor\">[icon name=&#8221;tag&#8221; class=&#8221;&#8221; unprefixed_class=&#8221;&#8221;]Sponsors<\/a><\/strong><\/p>\n<p>&nbsp;<\/p>\n<table style=\"width: 100%; border-color: #ffffff;\" cellpadding=\"0px\">\n<tbody>\n<tr style=\"height: 73px;\">\n<td style=\"width: 87.3715%; border-color: #ffffff; text-align: left; vertical-align: bottom;\"><strong><span style=\"font-size: 24pt; font-family: verdana, geneva, sans-serif;\"><a id=\"program\"><\/a>Program<\/span><\/strong><\/td>\n<td style=\"width: 100px; border-color: #ffffff; text-align: center; vertical-align: middle;\"><a href=\"https:\/\/drive.google.com\/file\/d\/1Ctg_djKpOXhMKqflX1vHHCjk7n9TdA7w\/view?usp=sharing\" target=\"_blank\" rel=\"noopener noreferrer\"><img loading=\"lazy\" class=\"aligncenter wp-image-2721\" src=\"https:\/\/cs.kyushu-u.ac.jp\/sicorp-in\/wp-content\/uploads\/sites\/3\/2020\/12\/mark01-300x225.png\" alt=\"\" width=\"65\" height=\"49\" srcset=\"https:\/\/cs.kyushu-u.ac.jp\/sicorp-in\/wp-content\/uploads\/sites\/3\/2020\/12\/mark01-300x225.png 300w, https:\/\/cs.kyushu-u.ac.jp\/sicorp-in\/wp-content\/uploads\/sites\/3\/2020\/12\/mark01-1024x768.png 1024w, https:\/\/cs.kyushu-u.ac.jp\/sicorp-in\/wp-content\/uploads\/sites\/3\/2020\/12\/mark01-768x576.png 768w, https:\/\/cs.kyushu-u.ac.jp\/sicorp-in\/wp-content\/uploads\/sites\/3\/2020\/12\/mark01-1536x1152.png 1536w, https:\/\/cs.kyushu-u.ac.jp\/sicorp-in\/wp-content\/uploads\/sites\/3\/2020\/12\/mark01.png 1600w\" sizes=\"(max-width: 65px) 100vw, 65px\" \/><\/a><a href=\"https:\/\/drive.google.com\/file\/d\/1JAJ-EKc_HBz2_zIOYCAeeKKtVhJ-dLSZ\/view?usp=sharing\" target=\"_blank\" rel=\"noopener\"><span style=\"font-size: 8pt;\"><span style=\"font-family: verdana, geneva, sans-serif;\">PRINT+DOWNLOAD<br \/>\n<\/span><span style=\"font-family: verdana, geneva, sans-serif;\">(for Abstracts only)<\/span><\/span><\/a><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>The program below is in<strong> <a href=\"https:\/\/www.timeanddate.com\/time\/zones\/jst\">JST<\/a> timezone<\/strong>.<\/p>\n<table style=\"width: 100%; border-color: #ababab; height: 987px;\" cellpadding=\"0px\">\n<thead>\n<tr style=\"height: 50px; background-color: #f5f5f5;\">\n<td style=\"width: 10%; border-color: #ababab; height: 50px;\">STARTING<\/td>\n<td style=\"width: 10%; border-color: #ababab; height: 50px;\">ENDING<\/td>\n<td style=\"width: 45%; border-color: #ababab; height: 50px;\">TITLE<\/td>\n<td style=\"width: 35%; border-color: #ababab; height: 50px;\">PRESENTER<\/td>\n<\/tr>\n<\/thead>\n<tbody>\n<tr style=\"height: 50px;\">\n<td style=\"border-color: #ababab; height: 50px; vertical-align: top; width: 10%;\"><span style=\"font-family: tahoma, arial, helvetica, sans-serif;\"><strong>13:30<br \/>\n<\/strong>10:00 IST<br \/>\n14:30 AEST<br \/>\n5:30 BST<\/span><\/td>\n<td style=\"border-color: #ababab; height: 50px; vertical-align: top; width: 10%;\"><\/td>\n<td style=\"border-color: #ababab; height: 50px; vertical-align: top; width: 45%;\"><span style=\"font-family: tahoma, arial, helvetica, sans-serif;\">Workshop Opening<\/span><\/td>\n<td style=\"border-color: #ababab; height: 50px; vertical-align: top; width: 35%;\"><span style=\"font-family: tahoma, arial, helvetica, sans-serif;\">Sanjiva Prasad (Workshop Chair.)<\/span><\/p>\n<p><span style=\"font-family: tahoma, arial, helvetica, sans-serif; font-size: 8pt; color: #999999;\">Indian Institute Technology Delhi, <\/span><\/td>\n<\/tr>\n<tr style=\"height: 50px;\">\n<td style=\"border-color: #f5f5f5; vertical-align: top; height: 10px; width: 10%; background-color: #f4eeff;\"><span style=\"font-family: tahoma, arial, helvetica, sans-serif;\"><strong>13:30<\/strong><br \/>\n<\/span><\/td>\n<td style=\"border-color: #f5f5f5; vertical-align: top; height: 10px; width: 10%; background-color: #f4eeff;\"><span style=\"font-family: tahoma, arial, helvetica, sans-serif;\"><strong>15:00<\/strong><br \/>\n<\/span><\/td>\n<td style=\"border-color: #f5f5f5; vertical-align: top; height: 10px; width: 45%; background-color: #f4eeff;\"><span style=\"font-family: tahoma, arial, helvetica, sans-serif;\"><strong>Session<\/strong><\/span><\/td>\n<td style=\"border-color: #f5f5f5; vertical-align: top; height: 10px; width: 35%; background-color: #f4eeff;\"><span style=\"font-family: tahoma, arial, helvetica, sans-serif;\">Chair:\u00a0 Alaa Allakany, Sandeep Kumar<\/span><\/td>\n<\/tr>\n<tr style=\"height: 50px;\">\n<td style=\"border-color: #ffffff; vertical-align: top; height: 50px; width: 10%;\"><span style=\"font-family: tahoma, arial, helvetica, sans-serif;\">10:00 IST<br \/>\n14:30 AEST<br \/>\n5:30 BST<\/span><\/td>\n<td style=\"border-color: #ffffff; vertical-align: top; height: 50px; width: 10%;\"><span style=\"font-family: tahoma, arial, helvetica, sans-serif;\">11:30 IST<br \/>\n16:00 AEST<br \/>\n7:00 BST<\/span><\/td>\n<td style=\"border-color: #f5f5f5; vertical-align: top; height: 50px; width: 45%;\"><a href=\"#abstract\"><span style=\"font-family: tahoma, arial, helvetica, sans-serif;\">Design of Volunteer Computing-based Neural Network on Ethereum Platform<\/span><\/a><\/td>\n<td style=\"border-color: #f5f5f5; vertical-align: top; height: 50px; width: 35%;\"><span style=\"font-family: tahoma, arial, helvetica, sans-serif;\">Zikun Han<\/span><\/p>\n<p><span style=\"font-family: tahoma, arial, helvetica, sans-serif; font-size: 8pt; color: #999999;\">Kyushu University,\u00a0<\/span><\/td>\n<\/tr>\n<tr style=\"height: 50px;\">\n<td style=\"border-color: #ffffff; vertical-align: top; height: 50px; width: 10%;\"><\/td>\n<td style=\"border-color: #ffffff; vertical-align: top; height: 50px; width: 10%;\"><\/td>\n<td style=\"border-color: #f5f5f5; vertical-align: top; height: 50px; width: 45%;\"><span style=\"font-family: tahoma, arial, helvetica, sans-serif;\"><a href=\"#abstract\">Compilation for a Secure Reactive Language for IoT Systems<\/a><\/span><\/td>\n<td style=\"border-color: #f5f5f5; vertical-align: top; height: 50px; width: 35%;\"><span style=\"font-family: tahoma, arial, helvetica, sans-serif;\">R. Madhukar Yerraguntla<\/span><\/p>\n<p><span style=\"font-family: tahoma, arial, helvetica, sans-serif; font-size: 8pt; color: #999999;\">Indian Institute Technology Delhi,\u00a0<\/span><\/td>\n<\/tr>\n<tr style=\"height: 50px;\">\n<td style=\"border-color: #ffffff; vertical-align: top; height: 50px; width: 10%;\"><\/td>\n<td style=\"border-color: #ffffff; vertical-align: top; height: 50px; width: 10%;\"><\/td>\n<td style=\"border-color: #f5f5f5; vertical-align: top; height: 50px; width: 45%;\"><a href=\"#abstract\"><span style=\"font-family: tahoma, arial, helvetica, sans-serif;\">Software Clone Detection from Security Perspective<\/span><\/a><\/td>\n<td style=\"border-color: #f5f5f5; vertical-align: top; height: 50px; width: 35%;\"><span style=\"font-family: tahoma, arial, helvetica, sans-serif;\">Haibo Zhang<\/span><\/p>\n<p><span style=\"font-family: tahoma, arial, helvetica, sans-serif; font-size: 8pt; color: #999999;\">Kyushu University,\u00a0<\/span><\/td>\n<\/tr>\n<tr style=\"height: 50px;\">\n<td style=\"border-color: #ffffff; vertical-align: top; height: 50px; width: 10%;\"><\/td>\n<td style=\"border-color: #ffffff; vertical-align: top; height: 50px; width: 10%;\"><\/td>\n<td style=\"border-color: #f5f5f5; vertical-align: top; height: 50px; width: 45%;\"><a href=\"#abstract\"><span style=\"font-family: tahoma, arial, helvetica, sans-serif;\">SecureFS: A Secure File System for Intel SGX<\/span><\/a><\/td>\n<td style=\"border-color: #f5f5f5; vertical-align: top; height: 50px; width: 35%;\"><span style=\"font-family: tahoma, arial, helvetica, sans-serif;\">Sandeep Kumar<\/span><\/p>\n<p><span style=\"font-family: tahoma, arial, helvetica, sans-serif; font-size: 8pt; color: #999999;\">Indian Institute Technology Delhi,\u00a0<\/span><\/td>\n<\/tr>\n<tr style=\"height: 50px;\">\n<td style=\"border-color: #ffffff; vertical-align: top; width: 10%; height: 50px;\"><\/td>\n<td style=\"border-color: #ffffff; vertical-align: top; width: 10%; height: 50px;\"><\/td>\n<td style=\"border-color: #f5f5f5; vertical-align: top; width: 45%; height: 50px;\"><a href=\"#abstract\"><span style=\"font-family: tahoma, arial, helvetica, sans-serif;\">Run-time System Call Mapping Randomization<\/span><\/a><\/td>\n<td style=\"border-color: #f5f5f5; vertical-align: top; width: 35%; height: 50px;\"><span style=\"font-family: tahoma, arial, helvetica, sans-serif;\">Takeshi Masumoto<\/span><\/p>\n<p><span style=\"font-family: tahoma, arial, helvetica, sans-serif; font-size: 8pt; color: #999999;\">Kyushu University,\u00a0<\/span><\/td>\n<\/tr>\n<tr style=\"height: 50px;\">\n<td style=\"border-color: #ffffff; vertical-align: top; width: 10%; height: 50px;\"><\/td>\n<td style=\"border-color: #ffffff; vertical-align: top; width: 10%; height: 50px;\"><\/td>\n<td style=\"border-color: #f5f5f5; vertical-align: top; width: 45%; height: 50px;\"><a href=\"#abstract\"><span style=\"font-family: tahoma, arial, helvetica, sans-serif;\">Creation and Evaluation of Specialist Training Course based on Penetration Testing Framework<\/span><\/a><\/td>\n<td style=\"border-color: #f5f5f5; vertical-align: top; width: 35%; height: 50px;\"><span style=\"font-family: tahoma, arial, helvetica, sans-serif;\">Alaa Allakany<\/span><\/p>\n<p><span style=\"font-family: tahoma, arial, helvetica, sans-serif; font-size: 8pt; color: #999999;\">Kyushu University,\u00a0<\/span><\/td>\n<\/tr>\n<tr style=\"height: 50px;\">\n<td style=\"border-color: #ffffff; vertical-align: top; width: 10%; height: 50px;\"><\/td>\n<td style=\"border-color: #ffffff; vertical-align: top; width: 10%; height: 50px;\"><\/td>\n<td style=\"border-color: #f5f5f5; vertical-align: top; width: 45%; height: 50px;\"><a href=\"#abstract\"><span style=\"font-family: tahoma, arial, helvetica, sans-serif;\">Airmed: Efficient Self-Healing Network of Low-End Devices.<\/span><\/a><\/td>\n<td style=\"border-color: #f5f5f5; vertical-align: top; width: 35%; height: 50px;\"><span style=\"font-family: tahoma, arial, helvetica, sans-serif;\">Samuel Wedaj<\/span><\/p>\n<p><span style=\"font-family: tahoma, arial, helvetica, sans-serif; font-size: 8pt; color: #999999;\">Indian Institute Technology Delhi,\u00a0<\/span><\/td>\n<\/tr>\n<tr style=\"height: 50px;\">\n<td style=\"border-color: #ffffff; vertical-align: top; width: 10%; height: 50px;\"><\/td>\n<td style=\"border-color: #ffffff; vertical-align: top; width: 10%; height: 50px;\"><\/td>\n<td style=\"border-color: #f5f5f5; vertical-align: top; width: 45%; height: 50px;\"><a href=\"#abstract\"><span style=\"font-family: tahoma, arial, helvetica, sans-serif;\">Web-Based 3D and 360\u00b0 VR Materials for IoT Security Education and Test Supporting Learning Analytics<\/span><\/a><\/td>\n<td style=\"border-color: #f5f5f5; vertical-align: top; width: 35%; height: 50px;\"><span style=\"font-family: tahoma, arial, helvetica, sans-serif;\">Wei SHI<\/span><\/p>\n<p><span style=\"font-family: tahoma, arial, helvetica, sans-serif; font-size: 8pt; color: #999999;\">Kyushu University, <\/span><\/td>\n<\/tr>\n<tr style=\"height: 50px;\">\n<td style=\"border-color: #ababab; vertical-align: top; height: 50px; width: 10%;\"><\/td>\n<td style=\"border-color: #ababab; vertical-align: top; height: 50px; width: 10%;\"><\/td>\n<td style=\"border-color: #ababab; vertical-align: top; height: 50px; width: 45%;\"><a href=\"#abstract\"><span style=\"font-family: tahoma, arial, helvetica, sans-serif;\">An online program identification technology for a secure processor<\/span><\/a><\/td>\n<td style=\"border-color: #ababab; vertical-align: top; height: 50px; width: 35%;\"><span style=\"font-family: tahoma, arial, helvetica, sans-serif;\">Takatsugu Ono<\/span><\/p>\n<p><span style=\"font-family: tahoma, arial, helvetica, sans-serif; font-size: 8pt; color: #999999;\">Kyushu University,\u00a0<\/span><\/td>\n<\/tr>\n<tr style=\"height: 50px;\">\n<td style=\"border-color: #ababab; vertical-align: top; height: 50px; width: 10%;\"><\/td>\n<td style=\"border-color: #ababab; vertical-align: top; height: 50px; width: 10%;\"><\/td>\n<td style=\"border-color: #ababab; vertical-align: top; height: 50px; width: 45%;\">&#8211; &#8211; Break &#8211; &#8211;<\/td>\n<td style=\"border-color: #ababab; vertical-align: top; height: 50px; width: 35%;\"><\/td>\n<\/tr>\n<tr style=\"height: 71px;\">\n<td style=\"border-color: #ababab; vertical-align: top; height: 71px; width: 10%;\"><span style=\"font-family: tahoma, arial, helvetica, sans-serif;\"><strong>15:30<br \/>\n<\/strong>12:00 IST<br \/>\n16:30 AEST<br \/>\n7:30 BST<\/span><\/td>\n<td style=\"border-color: #ababab; vertical-align: top; height: 71px; width: 10%;\"><span style=\"font-family: tahoma, arial, helvetica, sans-serif;\"><strong>16:30<br \/>\n<\/strong>13:00 IST<br \/>\n17:30 AEST<br \/>\n8:30 BST<br \/>\n<\/span><\/td>\n<td style=\"border-color: #ababab; vertical-align: top; height: 71px; width: 45%;\"><span class=\"su-label su-label-type-success\"><span style=\"font-family: tahoma, arial, helvetica, sans-serif;\">Keynote I<\/span><\/span>\n<p><a href=\"#keynote1\"><span style=\"font-family: tahoma, arial, helvetica, sans-serif;\">Who Are You? New Approaches for Authentication in Smart Spaces\u00a0<\/span><\/a><\/td>\n<td style=\"border-color: #ababab; vertical-align: top; height: 71px; width: 35%;\"><span style=\"font-family: tahoma, arial, helvetica, sans-serif;\">[Chair: Kolin Paul]<\/span><\/p>\n<p><a href=\"#keynote1\"><span style=\"font-family: tahoma, arial, helvetica, sans-serif; font-size: 12pt;\">Salil Kanhere<\/span><\/a><br \/>\n<span style=\"font-family: tahoma, arial, helvetica, sans-serif; color: #999999; font-size: 8pt;\">Professor, The University of New South Wales, Sydney, AU<br \/>\n<\/span><a href=\"#keynote1\"><span class=\"su-label su-label-type-info\">Abstract<\/span><\/a><span style=\"font-family: tahoma, arial, helvetica, sans-serif; color: #999999; font-size: 8pt;\"><br \/>\n<\/span><\/td>\n<\/tr>\n<tr style=\"height: 50px;\">\n<td style=\"border-color: #ababab; vertical-align: top; height: 50px; width: 10%;\"><\/td>\n<td style=\"border-color: #ababab; vertical-align: top; height: 50px; width: 10%;\"><\/td>\n<td style=\"border-color: #ababab; vertical-align: top; height: 50px; width: 45%;\">&#8211; &#8211; Break &#8211; &#8211;<\/td>\n<td style=\"border-color: #ababab; vertical-align: top; height: 50px; width: 35%;\"><\/td>\n<\/tr>\n<tr style=\"height: 50px;\">\n<td style=\"border-color: #ababab; vertical-align: top; width: 10%; height: 156px;\"><span style=\"font-family: tahoma, arial, helvetica, sans-serif;\"><strong>17:00<br \/>\n<\/strong>13:30 IST<br \/>\n18:00 AEST<br \/>\n9:00 BST<\/span><\/td>\n<td style=\"border-color: #ababab; vertical-align: top; width: 10%; height: 156px;\"><span style=\"font-family: tahoma, arial, helvetica, sans-serif;\"><strong>18:00<br \/>\n<\/strong>14:30 IST<br \/>\n19:00 AEST<br \/>\n10:00 BST<br \/>\n<\/span><\/td>\n<td style=\"border-color: #ababab; vertical-align: top; width: 45%; height: 156px;\"><span style=\"font-family: tahoma, arial, helvetica, sans-serif;\"><span class=\"su-label su-label-type-success\">Keynote II<\/span><\/span><\/p>\n<p><a href=\"#keynote2\"><span style=\"font-family: tahoma, arial, helvetica, sans-serif;\">The educational games for cybersecurity based on customisable learning contents<\/span><\/a><\/td>\n<td style=\"border-color: #ababab; vertical-align: top; width: 35%; height: 156px;\"><span style=\"font-family: tahoma, arial, helvetica, sans-serif;\">[Chair: Yoshihiro Okada]<\/span><\/p>\n<p><span style=\"font-family: tahoma, arial, helvetica, sans-serif; font-size: 12pt;\"><a href=\"#keynote2\">Jingyun Wang<\/a><\/span><br \/>\n<span style=\"font-family: tahoma, arial, helvetica, sans-serif; color: #999999; font-size: 8pt;\">Assistant Professor, Durham University, UK<br \/>\n<\/span><a href=\"#keynote2\"><span class=\"su-label su-label-type-info\">Abstract<\/span><\/a><span style=\"font-family: tahoma, arial, helvetica, sans-serif; color: #999999; font-size: 8pt;\"><br \/>\n<\/span><\/td>\n<\/tr>\n<tr style=\"height: 50px;\">\n<td style=\"border-color: #ababab; vertical-align: top; height: 50px; width: 10%;\"><span style=\"font-family: tahoma, arial, helvetica, sans-serif;\"><strong>18:30<br \/>\n<\/strong>15:00 IST<br \/>\n19:30 AEST<br \/>\n10:30 BST<\/span><\/td>\n<td style=\"border-color: #ababab; vertical-align: top; height: 50px; width: 10%;\"><\/td>\n<td style=\"border-color: #ababab; vertical-align: top; height: 50px; width: 45%;\"><span style=\"font-family: tahoma, arial, helvetica, sans-serif;\">Workshop Closing<\/span><\/td>\n<td style=\"border-color: #ababab; vertical-align: top; height: 50px; width: 35%;\"><span style=\"font-family: tahoma, arial, helvetica, sans-serif;\">Koji Okamura (Workshop Chair.)<\/span><\/p>\n<p><span style=\"font-family: tahoma, arial, helvetica, sans-serif; font-size: 8pt; color: #999999;\">Kyushu University,\u00a0\u00a0<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p><strong><span style=\"font-size: 24pt; font-family: verdana, geneva, sans-serif;\"><a id=\"keynote1\"><\/a>Keynote I<\/span><\/strong><\/p>\n<p><img loading=\"lazy\" class=\"wp-image-3713 size-full alignleft\" src=\"https:\/\/cs.kyushu-u.ac.jp\/sicorp-in\/wp-content\/uploads\/sites\/3\/2021\/07\/Prof_SalilKanhere.jpeg\" alt=\"\" width=\"300\" height=\"235\" \/><\/p>\n<p><span style=\"font-family: tahoma, arial, helvetica, sans-serif;\"><strong>Salil Kanhere<\/strong><\/span>\u00a0received the M.S. and Ph.D. degrees from Drexel University, Philadelphia, USA. He is a Professor in the School of Computer Science and Engineering at UNSW Sydney, Australia. His research interests include the Internet of Things, cyber physical systems, blockchain, pervasive computing, cybersecurity, and applied machine learning. Salil is also affiliated with CISRO\u2019s Data61 and the Cybersecurity Cooperative Research Centre. He is a Senior Member of the IEEE and ACM, an ACM Distinguished Speaker and an IEEE Computer Society Distinguished Visitor. He has received the Friedrich Wilhelm Bessel Research Award (2020) and the Humboldt Research Fellowship (2014), both from the Alexander von Humboldt Foundation in Germany. He has held visiting positions at I2R Singapore, Technical University Darmstadt, University of Zurich and Graz University of Technology. He serves as the Editor in Chief of the Ad Hoc Networks journal and as an Associate Editor of IEEE Transactions On Network and Service Management, Computer Communications, and Pervasive and Mobile Computing. He has been involved in the organisation of many IEEE\/ACM international conferences and is the General Co-Chair for IEEE Blockchain 2021 and Program Chair for IEEE PerCom 2022. He co-authored a book titled Blockchain for Cyberphysical Systems which was published by Artech House in 2020. (<a href=\"https:\/\/salilkanhere.net\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-family: tahoma, arial, helvetica, sans-serif;\">Detail [icon name=&#8221;external-link&#8221; class=&#8221;&#8221; unprefixed_class=&#8221;&#8221;]<\/span><\/a>)<\/p>\n<p><span style=\"font-family: tahoma, arial, helvetica, sans-serif;\">(<a href=\"https:\/\/www.unsw.edu.au\/\" target=\"_blank\" rel=\"noopener\">The University of New South Wales,<\/a> Sydney, AU)<\/span><\/p>\n<div class=\"su-note\" id=\"\" style=\"border-color:#dfdfdf;border-radius:3px;-moz-border-radius:3px;-webkit-border-radius:3px;\"><div class=\"su-note-inner su-u-clearfix su-u-trim\" style=\"background-color:#f9f9f9;border-color:#ffffff;color:#333333;border-radius:3px;-moz-border-radius:3px;-webkit-border-radius:3px;\"><span class=\"\" style=\"font-family: Whitney SSm A, Whitney SSm B;\"><span class=\"\"><b class=\"\">Abstract <\/b><\/span><\/span>Smart environments are increasingly offering a range of personalised services which require knowing the identity of the person currently using the space. Widely used authentication methods including fingerprint and face recognition have been shown to be vulnerable. In the first part of this talk, we present a human identification mechanism called Vein\u2010ID, that uses the vein pattern of an individual&#8217;s hand dorsum recorded using an off\u2010the\u2010shelf depth camera. Vein-ID extracts vein patterns using the depth information and infrared images. Two deep learning models are presented for precisely identifying a target individual from a set of enrolled users. We demonstrate using a comprehensive data set of approximately 17,500 images from 35 subjects that Vein-ID can identify an individual with an average accuracy of over 99%. In the second part of this talk, we show that WiFi signals can be used to uniquely identify people. There is strong evidence that suggests that all humans have a unique gait. An individual\u2019s gait will thus create unique perturbations in the WiFi spectrum. We propose a system called Gate-ID that analyses the channel state information from ambient WiFi signals to extract unique features that are representative of that individual&#8217;s gait. Gate-ID uses a novel attention-based deep learning model that fuses various weighted features and ignores ineffective noise to uniquely identify individuals. We implement Gate-ID on commercial off-the-shelf devices and demonstrate that it can uniquely identify individuals with average accuracy of 90.7% to 75.7% from a group of 6 to 20 people, respectively. Both systems are resilient to attacks. Unlike other physical biometric identifiers, surreptitiously capturing an individual&#8217;s vein pattern is difficult. Furthermore, mimicking an individual&#8217;s walking style is equally hard.<\/div><\/div>\n<p>&nbsp;<\/p>\n<p><strong><span style=\"font-size: 24pt; font-family: verdana, geneva, sans-serif;\"><a id=\"keynote2\"><\/a>Keynote\u00a0II<\/span><\/strong><\/p>\n<p><img loading=\"lazy\" class=\"wp-image-3722 size-full alignleft\" src=\"https:\/\/cs.kyushu-u.ac.jp\/sicorp-in\/wp-content\/uploads\/sites\/3\/2021\/07\/JingyunWang.jpg\" alt=\"\" width=\"300\" height=\"244\" \/><\/p>\n<p><span style=\"font-family: tahoma, arial, helvetica, sans-serif;\"><strong>Jingyun Wang <\/strong><\/span>is currently an assistant professor at Department of Computer Science in Durham University. Before joining Durham University, Jingyun Wang was an Assistant Professor (2014-2020) at the Research Institute for Information Technology, Kyushu University, Japan. Her current research focuses on ontology, visualization learning support systems, meaningful learning environments, personalized language learning support systems, game-based learning, computational thinking education, data science, and educational big data and learning analytics. She is one of the member of Artificial Intelligence and Human Systems Group in Durham university. (<a href=\"https:\/\/sites.durham.ac.uk\/icg\/dr-jingyun-wang\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-family: tahoma, arial, helvetica, sans-serif;\">Detail [icon name=&#8221;external-link&#8221; class=&#8221;&#8221; unprefixed_class=&#8221;&#8221;]<\/span><\/a>)<\/p>\n<p><span style=\"font-family: tahoma, arial, helvetica, sans-serif;\">(<a href=\"https:\/\/www.durham.ac.uk\/\" target=\"_blank\" rel=\"noopener\">Durham University,<\/a> UK)<\/span><\/p>\n<p>&nbsp;<\/p>\n<div class=\"su-note\" id=\"\" style=\"border-color:#dfdfdf;border-radius:3px;-moz-border-radius:3px;-webkit-border-radius:3px;\"><div class=\"su-note-inner su-u-clearfix su-u-trim\" style=\"background-color:#f9f9f9;border-color:#ffffff;color:#333333;border-radius:3px;-moz-border-radius:3px;-webkit-border-radius:3px;\"><span class=\"\" style=\"font-family: Whitney SSm A, Whitney SSm B;\"><span class=\"\"><b class=\"\">Abstract <\/b><\/span><\/span>A physical card game called \u201ccyber security defender\u201d to support the acquirement of Japanese law related to cybersecurity was designed for the cybersecurity lecture in Kyushu university. By expanding this card game, we further designed and implemented two prototype digital games based on customisable learning contents. These two games allow meaningful learning contents to be placed on game elements and encourages multiple players to take an active role while playing against each other. The demonstration of these two games will be given together with the introduction of existing popular serious games addressing cyber-security learning.<span style=\"font-size: 1rem;\"><\/div><\/div><\/span><\/p>\n<p>&nbsp;<\/p>\n<table style=\"width: 100%; border-color: #ffffff;\" cellpadding=\"0px\">\n<tbody>\n<tr style=\"height: 73px;\">\n<td style=\"width: 87.3715%; border-color: #ffffff; text-align: left; vertical-align: bottom;\"><strong><span style=\"font-size: 24pt; font-family: verdana, geneva, sans-serif;\"><a id=\"abstract\"><\/a>Abstracts<\/span><\/strong><\/td>\n<td style=\"width: 100px; border-color: #ffffff; text-align: center; vertical-align: middle;\"><a href=\"https:\/\/drive.google.com\/file\/d\/1Ctg_djKpOXhMKqflX1vHHCjk7n9TdA7w\/view?usp=sharing\" target=\"_blank\" rel=\"noopener noreferrer\"><img loading=\"lazy\" class=\"aligncenter wp-image-2721\" src=\"https:\/\/cs.kyushu-u.ac.jp\/sicorp-in\/wp-content\/uploads\/sites\/3\/2020\/12\/mark01-300x225.png\" alt=\"\" width=\"65\" height=\"49\" srcset=\"https:\/\/cs.kyushu-u.ac.jp\/sicorp-in\/wp-content\/uploads\/sites\/3\/2020\/12\/mark01-300x225.png 300w, https:\/\/cs.kyushu-u.ac.jp\/sicorp-in\/wp-content\/uploads\/sites\/3\/2020\/12\/mark01-1024x768.png 1024w, https:\/\/cs.kyushu-u.ac.jp\/sicorp-in\/wp-content\/uploads\/sites\/3\/2020\/12\/mark01-768x576.png 768w, https:\/\/cs.kyushu-u.ac.jp\/sicorp-in\/wp-content\/uploads\/sites\/3\/2020\/12\/mark01-1536x1152.png 1536w, https:\/\/cs.kyushu-u.ac.jp\/sicorp-in\/wp-content\/uploads\/sites\/3\/2020\/12\/mark01.png 1600w\" sizes=\"(max-width: 65px) 100vw, 65px\" \/><\/a><a href=\"https:\/\/drive.google.com\/file\/d\/1JAJ-EKc_HBz2_zIOYCAeeKKtVhJ-dLSZ\/view?usp=sharing\" target=\"_blank\" rel=\"noopener\"><span style=\"font-size: 8pt;\"><span style=\"font-family: verdana, geneva, sans-serif;\">PRINT+DOWNLOAD<br \/>\n<\/span><span style=\"font-family: verdana, geneva, sans-serif;\">(for Abstracts only)<\/span><\/span><\/a><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><strong><span style=\"font-family: verdana, geneva, sans-serif; font-size: 18pt;\">Session<\/span><\/strong><\/p>\n<div class=\"su-spoiler su-spoiler-style-fancy su-spoiler-icon-plus-square-2 su-spoiler-closed\" data-scroll-offset=\"0\" data-anchor-in-url=\"no\"><div class=\"su-spoiler-title\" tabindex=\"0\" role=\"button\"><span class=\"su-spoiler-icon\"><\/span>Design of Volunteer Computing-based Neural Network on Ethereum Platform<\/div><div class=\"su-spoiler-content su-u-clearfix su-u-trim\">\n<p><span class=\"\"><b class=\"\">Speaker: <\/b><\/span>Zikun Han<\/p>\n<p><span class=\"\"><b class=\"\">Abstract: <\/b><\/span>In recent years, the application of distributed computing has become more and more widespread. Volunteer Computing defined as a kind of distributed computing infrastructure has gained people&#8217;s favor in terms of only requiring low cost to exchange for a large amount of computing power. However, for volunteer computing, security issues are paramount importance due to the computing source provided by the volunteers. Blockchain is a chain storage structure that has been widely used in recent years, and non-tamperability is one of its most important characteristics. Therefore, this research aims to improve the security and credibility of volunteer computing by using blockchain technology. A novel volunteer network is established on the Ethereum test network named Ropsten, and its feasibility is verified with a neural network used for computing.<\/div><\/div>\n<div class=\"su-spoiler su-spoiler-style-fancy su-spoiler-icon-plus-square-2 su-spoiler-closed\" data-scroll-offset=\"0\" data-anchor-in-url=\"no\"><div class=\"su-spoiler-title\" tabindex=\"0\" role=\"button\"><span class=\"su-spoiler-icon\"><\/span>Compilation for a Secure Reactive Language for IoT Systems<\/div><div class=\"su-spoiler-content su-u-clearfix su-u-trim\">\n<p><span class=\"\"><b class=\"\">Speaker: <\/b><\/span>R. Madhukar Yerraguntla<\/p>\n<p><span class=\"\"><b class=\"\">Abstract: <\/b><\/span>Security in IoT systems is severly compromised due to ill-defined interfaces, lack of secure information flow and low-level programming. Lustre is a high-level reactive dataflow language that can provide a programming model for synchronous IoT systems. In this presentation we describe in brief our framework, based on Denning&#8217;s security lattices, to derive correct and secure-by-construction implementations of Lustre programs. We also present our ongoing work on V\u00e9lus-Lustre compiler to transform secure Lustre programs into secure C programs.<\/div><\/div>\n<div class=\"su-spoiler su-spoiler-style-fancy su-spoiler-icon-plus-square-2 su-spoiler-closed\" data-scroll-offset=\"0\" data-anchor-in-url=\"no\"><div class=\"su-spoiler-title\" tabindex=\"0\" role=\"button\"><span class=\"su-spoiler-icon\"><\/span>Software Clone Detection from Security Perspective<\/div><div class=\"su-spoiler-content su-u-clearfix su-u-trim\">\n<p><span class=\"\"><b class=\"\">Speaker: <\/b><\/span>Haibo Zhang<\/p>\n<p><span class=\"\"><b class=\"\">Abstract: <\/b><\/span>In software engineering, if two code fragments are closely similar with minor modifications, or even identical as a result of copy-paste behavior, they are called software\/code clones. Code clones can cause trouble in software maintenance and the debugging process because identifying all copied compromised code fragments in other locations is time-consuming. Researchers have been studying code clone detection issues for a long time, and the discussion mainly focuses on software engineering management and system maintenance. Another considerable issue is that code cloning provides an easy way for attackers to maliciously inject code. A thorough survey of code clone identification\/detection from the security perspective is indispensable for providing a comprehensive review of previous related studies and proposing potential research directions. We review and introduce previous security-related studies following three classifications and various comparison criteria. We then discuss three further research directions: (i) deep learning-based code clone vulnerability detection, (ii) vulnerable code clone detection for 5G-Internet of Things devices, and (iii) real-time detection methods for more efficiently detecting clone attacks. These methods are more advanced and adaptive to technological development and still have sufficient research space for future studies.<\/div><\/div>\n<div class=\"su-spoiler su-spoiler-style-fancy su-spoiler-icon-plus-square-2 su-spoiler-closed\" data-scroll-offset=\"0\" data-anchor-in-url=\"no\"><div class=\"su-spoiler-title\" tabindex=\"0\" role=\"button\"><span class=\"su-spoiler-icon\"><\/span>SecureFS: A Secure File System for Intel SGX<\/div><div class=\"su-spoiler-content su-u-clearfix su-u-trim\">\n<p><span class=\"\"><b class=\"\">Speaker: <\/b><\/span>Sandeep Kumar<\/p>\n<p><span class=\"\"><b class=\"\">Abstract: <\/b><\/span>A trusted execution environment or a TEE facilitates the secure execution of an application on a remote untrusted server. In a TEE, the confidentiality, integrity, and freshness properties for the code and data hold throughout the execution. In a TEE setting, specifically Intel SGX, even the operating system (OS) is not trusted. This results in certain limitations of a secure application&#8217;s functionality, such as no access to the file system and network \u2013 as it requires OS support.<br \/>\nPrior works have focused on alleviating this problem by allowing an application to access the file system securely. However, we show that they are susceptible to replay attacks, where replaying an old encrypted version of a file may remain undetected. Furthermore, they do not consider the impact of Intel SGX operations on the design of the file system.<br \/>\nTo this end, we present SecureFS, a secure, efficient, and scalable file system for Intel SGX that ensures confidentiality, integrity, and freshness of the data stored in it. SecureFS can work with unmodified binaries. SecureFS also considers the impact of Intel SGX to ensure optimal performance. We implement a prototype of SecureFS on a real Intel SGX machine. We incur a minimal overhead (\u22481.8%) over the current state-of-the-art techniques while adding freshness to the list of security guarantees.<\/p>\n<\/div><\/div>\n<div class=\"su-spoiler su-spoiler-style-fancy su-spoiler-icon-plus-square-2 su-spoiler-closed\" data-scroll-offset=\"0\" data-anchor-in-url=\"no\"><div class=\"su-spoiler-title\" tabindex=\"0\" role=\"button\"><span class=\"su-spoiler-icon\"><\/span>Run-time System Call Mapping Randomization<\/div><div class=\"su-spoiler-content su-u-clearfix su-u-trim\">\n<p><span class=\"\"><b class=\"\">Speaker: <\/b><\/span>Takeshi Masumoto<\/p>\n<p><span class=\"\"><b class=\"\">Abstract: <\/b><\/span>The purpose of our research is to provide defense against code injection attacks on the system. Code injection attack is one of the most dangerous attacks to a system, which can even give an attacker a chance to fully compromise the system by executing arbitrary code. Moving Target Defense (MTD) can protect the system from attacks by dynamically changing the target area of attacks including vulnerability as well as reduce the reachability of attacks.<br \/>\nSystem call randomization is an MTD technique that disables code injection attacks by randomizing the mapping between system call numbers and the functions called by them. The purpose of system call randomization is to limit the processing and resources that the injected program can perform and access. As system calls are the only way for user applications to access system resources, randomizing system calls can give attackers more difficulty to achieve their goals, even if they can inject the program. Existing system call randomization techniques once performed randomization before loading the program, however, such methods only once in advance have no effect when information about randomization is disclosed to attackers. In this paper, we propose a method of re-randomizing multiple times at run-time to solve this problem. We implemented a script that directly edits the ELF executable format. In fact, as a result of running the script on a small program, we succeeded in generating a new executable file to which the method is applied. Our experiments show that run-time system call randomization is effective against code injection attacks, and this technique may also be applied to existing compiled programs.<\/div><\/div>\n<div class=\"su-spoiler su-spoiler-style-fancy su-spoiler-icon-plus-square-2 su-spoiler-closed\" data-scroll-offset=\"0\" data-anchor-in-url=\"no\"><div class=\"su-spoiler-title\" tabindex=\"0\" role=\"button\"><span class=\"su-spoiler-icon\"><\/span>Creation and Evaluation of Specialist Training Course based on Penetration Testing Framework<\/div><div class=\"su-spoiler-content su-u-clearfix su-u-trim\">\n<p><span class=\"\"><b class=\"\">Speaker: <\/b><\/span>Alaa Allakany<\/p>\n<p><span class=\"\"><b class=\"\">Abstract: <\/b><\/span>Cyber security education and training is very efficient element for security namely for securing IoT space, by training and increasing cybersecurity knowledge of the organizations\u2019s users we can help organizations and institutes to avoid many attacks. Traditional training such as attending courses at universities, is not enough for training personnel in industry, and they are required to develop their skills in real or simulation scenarios. So, after the college student graduated they are forced to enroll in numerous certification programs in order to develop their skills that are not taught in college. However, the faculties are good at teaching and training, but, they have less resource and facing difficulties when they deploy an education courses by themselves especially for advance training such us education on penetration testing. Thus, in this research we use our pervious penetration testing framework for creating an effective cybersecurity E-learning courses. Our framework will work as a tool that can reflect the most updates threats and attacks scenarios and collects data and introduce it in an easy way for instructors to help them to create the course without any difficulties. We will show and example of a course that created based on our tool and the evolution.<\/div><\/div>\n<div class=\"su-spoiler su-spoiler-style-fancy su-spoiler-icon-plus-square-2 su-spoiler-closed\" data-scroll-offset=\"0\" data-anchor-in-url=\"no\"><div class=\"su-spoiler-title\" tabindex=\"0\" role=\"button\"><span class=\"su-spoiler-icon\"><\/span>Airmed: Efficient Self-Healing Network of Low-End Devices.<\/div><div class=\"su-spoiler-content su-u-clearfix su-u-trim\">\n<p><span class=\"\"><b class=\"\">Speaker: <\/b><\/span>Samuel Wedaj<\/p>\n<p><span class=\"\"><b class=\"\">Abstract: <\/b><\/span>The proliferation of application specific cyber-physical systems coupled with the emergence of a variety of attacks on such systems (malware such as Mirai and Hajime) underlines the need to secure such networks. Most existing security efforts have focused on only detection of the presence of malware. However given the ability of most attacks to spread through the network once they infect a few devices, it is important to contain the spread of a virus and at the same time systematically cleanse the impacted nodes using the communication capabilities of the network. Toward this end, we introduce a method and system to detect the application software\u2019s corruption on an IoT node, and self corrects itself using its neighbors. This decentralized mechanism prevents the spread of self-propagating malware and can also be used as a technique for updating application code on IoT devices. We assess the performance of Airmed using the embedded systems security architecture of TrustLite in the OMNeT++simulator. The results show that our approach scales up to thousands of devices, ensures guaranteedupdate of the entire network, and can recover 95% of the nodes in 10 minutes in both internal and external propagation models. Moreover, we evaluate memory and communication costs and show that this approachis efficient and incurs very low overhead.<\/div><\/div>\n<div class=\"su-spoiler su-spoiler-style-fancy su-spoiler-icon-plus-square-2 su-spoiler-closed\" data-scroll-offset=\"0\" data-anchor-in-url=\"no\"><div class=\"su-spoiler-title\" tabindex=\"0\" role=\"button\"><span class=\"su-spoiler-icon\"><\/span>Web-Based 3D and 360\u00b0 VR Materials for IoT Security Education and Test Supporting Learning Analytics<\/div><div class=\"su-spoiler-content su-u-clearfix su-u-trim\">\n<p><span class=\"\"><b class=\"\">Speaker: <\/b><\/span>Wei SHI<\/p>\n<p><span class=\"\"><b class=\"\">Abstract: <\/b><\/span>Our WP aims to discuss the development of e-learning materials of IoT Security. In the past years, we have already proposed a new framework which supports the automatic generation of e-learning materials and quizzes based on the Linked Data. Our framework supports to include the 3D contents and 360-degree VR contents in the e-learning materials, which can simulate the real situations for obtaining better educational effects. Furthermore, we will discuss how to collect learners\u2019 log data when they are using our e-learning materials for further analyzation. We apply two visually analyzing tools, Time Tunnel and Cubic Gantt Chart, to perform the visual data analyzation. By using these two tools, we hope to obtain the activity patterns of the learners in different score ranges. Based on the analyzation result, we can improve the created e-learning materials, or provide advice to help learners to effectively use our e-learning materials.<\/div><\/div>\n<div class=\"su-spoiler su-spoiler-style-fancy su-spoiler-icon-plus-square-2 su-spoiler-closed\" data-scroll-offset=\"0\" data-anchor-in-url=\"no\"><div class=\"su-spoiler-title\" tabindex=\"0\" role=\"button\"><span class=\"su-spoiler-icon\"><\/span>An online program identification technology for a secure processor<\/div><div class=\"su-spoiler-content su-u-clearfix su-u-trim\">\n<p><span class=\"\"><b class=\"\">Speaker: <\/b><\/span>Takatsugu Ono<\/p>\n<p><span class=\"\"><b class=\"\">Abstract: <\/b><\/span>In this talk, we present an online program identification technique for a secure processor. Increasing the number of IoT devices, the demand for secure processing is growing. To improve the security of IoT devices, we employ an allowed-list approach. The allowed-list approach identifies the executing program is registered on the list or not.<br \/>\nWe propose a new identification methodology consisting of two parts: a classifier and an identifier. We divide the program execution into small chunks and extract the behavior during execution. Then, we develop a classifier that compares the extracted behavior and the allowed list program&#8217;s behavior. Also, we propose an identification algorithm that can predict the program is registered on the allowed list or not based on the classification results. In our evaluation, we confirmed that our approach achieves about 80% accuracy executing only 30% of the programs.<\/div><\/div>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p><strong><span style=\"font-size: 24pt; font-family: verdana, geneva, sans-serif;\"><a id=\"sponsor\"><\/a>Sponsors<\/span><\/strong><\/p>\n<table style=\"border-color: #ababab; width: 571px;\">\n<tbody>\n<tr style=\"height: 50px;\">\n<td style=\"width: 265px; vertical-align: top;\"><a href=\"https:\/\/www.kyushu-u.ac.jp\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img loading=\"lazy\" class=\"alignleft wp-image-2288 size-full\" style=\"font-size: 16px;\" src=\"https:\/\/cs.kyushu-u.ac.jp\/sicorp-in\/wp-content\/uploads\/sites\/3\/2020\/11\/kyushu-u.png\" alt=\"\" width=\"148\" height=\"176\" \/><\/a><\/td>\n<td style=\"width: 305px; vertical-align: top;\"><a href=\"https:\/\/home.iitd.ac.in\/index.php\" target=\"_blank\" rel=\"noopener noreferrer\"><img loading=\"lazy\" class=\"aligncenter wp-image-2389 size-full\" src=\"https:\/\/cs.kyushu-u.ac.jp\/sicorp-in\/wp-content\/uploads\/sites\/3\/2020\/11\/iitd.png\" alt=\"\" width=\"143\" height=\"144\" \/><\/a><\/p>\n<h6 style=\"text-align: center;\"><a href=\"https:\/\/home.iitd.ac.in\/index.php\" target=\"_blank\" rel=\"noopener noreferrer\"><strong><span style=\"font-family: 'times new roman', times, serif;\">Indian Institute Technology Delhi<\/span><\/strong><\/a><\/h6>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<table>\n<tbody>\n<tr style=\"height: 80px; border-color: #ababab;\">\n<td style=\"width: 200px; vertical-align: top;\">&nbsp;<\/p>\n<p><a href=\"https:\/\/www.jst.go.jp\/inter\/index.html\" target=\"_blank\" rel=\"noopener noreferrer\"><img loading=\"lazy\" class=\"alignnone size-medium wp-image-2611\" src=\"https:\/\/cs.kyushu-u.ac.jp\/sicorp-in\/wp-content\/uploads\/sites\/3\/2020\/11\/sponsor1_jst-300x71.png\" alt=\"\" width=\"300\" height=\"71\" srcset=\"https:\/\/cs.kyushu-u.ac.jp\/sicorp-in\/wp-content\/uploads\/sites\/3\/2020\/11\/sponsor1_jst-300x71.png 300w, https:\/\/cs.kyushu-u.ac.jp\/sicorp-in\/wp-content\/uploads\/sites\/3\/2020\/11\/sponsor1_jst.png 611w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a><\/td>\n<td style=\"width: 200px; vertical-align: top;\">&nbsp;<\/p>\n<p><a href=\"https:\/\/dst.gov.in\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img loading=\"lazy\" class=\"alignnone size-medium wp-image-2627\" src=\"https:\/\/cs.kyushu-u.ac.jp\/sicorp-in\/wp-content\/uploads\/sites\/3\/2020\/11\/sponsor2_dst-300x91.png\" alt=\"\" width=\"300\" height=\"91\" srcset=\"https:\/\/cs.kyushu-u.ac.jp\/sicorp-in\/wp-content\/uploads\/sites\/3\/2020\/11\/sponsor2_dst-300x91.png 300w, https:\/\/cs.kyushu-u.ac.jp\/sicorp-in\/wp-content\/uploads\/sites\/3\/2020\/11\/sponsor2_dst.png 595w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a><\/td>\n<td style=\"width: 300px; vertical-align: top;\">&nbsp;<\/p>\n<p><a href=\"http:\/\/www.ieee-jp.org\/section\/fukuoka\/index.php\" target=\"_blank\" rel=\"noopener noreferrer\"><img loading=\"lazy\" class=\"alignnone size-medium wp-image-2613\" src=\"https:\/\/cs.kyushu-u.ac.jp\/sicorp-in\/wp-content\/uploads\/sites\/3\/2020\/11\/sponsor3_ieee-300x168.png\" alt=\"\" width=\"300\" height=\"168\" srcset=\"https:\/\/cs.kyushu-u.ac.jp\/sicorp-in\/wp-content\/uploads\/sites\/3\/2020\/11\/sponsor3_ieee-300x168.png 300w, https:\/\/cs.kyushu-u.ac.jp\/sicorp-in\/wp-content\/uploads\/sites\/3\/2020\/11\/sponsor3_ieee-320x180.png 320w, https:\/\/cs.kyushu-u.ac.jp\/sicorp-in\/wp-content\/uploads\/sites\/3\/2020\/11\/sponsor3_ieee.png 568w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Meeting number: 170 521 3618 Password: CPgYWZes659 Secure Society in Future 26th\u00a0July, 2021 Online Workshop &nbsp; [icon name=&#8221;tag&#8221; class=&#8221;&#8221; unprefixed_class=&#8221;&#8221;]Program\u00a0 \u00a0 \u00a0 \u00a0[icon name=&#8221;tag&#8221; class=&#8221;&#8221; unprefixed_class=&#8221;&#8221;]Keynotes\u00a0\u00a0 \u00a0 \u00a0 [icon name=&#8221;tag&#8221; class=&#8221;&#8221; unprefixed_class=&#8221;&#8221;]Abstracts\u00a0 \u00a0 \u00a0 \u00a0[icon name=&#8221;tag&#8221; class=&#8221;&#8221; unprefixed_class=&#8221;&#8221;]Sponsors &nbsp; Program PRINT+DOWNLOAD (for Abstracts only) The program below is in JST timezone. STARTING ENDING TITLE PRESENTER [&hellip;]<\/p>\n","protected":false},"author":15,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_locale":"en_US","_original_post":"https:\/\/cs.kyushu-u.ac.jp\/sicorp-in\/?page_id=3641"},"_links":{"self":[{"href":"https:\/\/cs.kyushu-u.ac.jp\/sicorp-in\/wp-json\/wp\/v2\/pages\/3682"}],"collection":[{"href":"https:\/\/cs.kyushu-u.ac.jp\/sicorp-in\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cs.kyushu-u.ac.jp\/sicorp-in\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cs.kyushu-u.ac.jp\/sicorp-in\/wp-json\/wp\/v2\/users\/15"}],"replies":[{"embeddable":true,"href":"https:\/\/cs.kyushu-u.ac.jp\/sicorp-in\/wp-json\/wp\/v2\/comments?post=3682"}],"version-history":[{"count":15,"href":"https:\/\/cs.kyushu-u.ac.jp\/sicorp-in\/wp-json\/wp\/v2\/pages\/3682\/revisions"}],"predecessor-version":[{"id":3780,"href":"https:\/\/cs.kyushu-u.ac.jp\/sicorp-in\/wp-json\/wp\/v2\/pages\/3682\/revisions\/3780"}],"wp:attachment":[{"href":"https:\/\/cs.kyushu-u.ac.jp\/sicorp-in\/wp-json\/wp\/v2\/media?parent=3682"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}