September 19—20, 2017, Innopolis

The 2017 Symposium on Cybersecurity of the Digital Economy

Organized by
Together with IoT World Summit 2017

COMMITTEES

The program committee chairs

Sergei Petrenko - Russia
Chairman of the Organizing Committee En&T 2016, Head of Information security center of Innopolis University, Doctor of Technical Sciences, Professor
Alexey Markov - Russia
Bauman Moscow State Technical University

The program committee

Giancarlo Succi - Italy
Head, Laboratory for improving the production of software
Manuel Mazzara - Italy
Software Development, telemedicine, social networks
Bertrand Meyer - Switzerland
Software engineering, object-oriented programming, software verification
Victor Rivera - Colombia
Software engineering, formal methods of software development
Nestor Catano - Colombia
Software engineering
Eugene Zouev - Russia
Software engineering, imitaional modelling languages and systems, compilers
Jooyong Lee - South Korea
Industrial software development
Alberto Sillitti - Italy
Cyberphysical systems, mobile applications and web-services
Yaroslav Kholodov - Russia
Intelligent transport systems
Joseph Brown - Canada
Genetic algorithms, games development
Jooyoung Lee - South Korea
BigData analysis, confidence-building algorithms, games theory
Nikolay Shilov - Russia
Cyberphysical systems, programming theory and applied logics
Athanasios Vasilakos - Greece
Cybersecurity and networks
Rasheed Hussain - Pakistan
Systems and networks security
Nikolaos Mavridis - Greece
Cognitive robotic systems
Adil Khan - Pakistan
Machine learning and data representation
Ilya Afanasyev - Russia
Intelligent robotic systems
Alexandr Klimchik - Belarus
Intelligent robotic systems
Alexander Lomako - Russia
Russian Federal University
Andrey Kotliar - Russia
27th Central Research Institute, Innopolis branch

The organizing committee

Adil Adelshin
Jakup Asadullin
Marat Vinokurov

AGENDA (19.09)

Opening Remarks

Sergei Petrenko Introduction

Sergei PetrenkoCyberspace as a potential source of threats to critical infrastructure and information infrastructure of the country as a whole

Igor KalyaevNational Cyberattack Early Warning System

Alexander Tormasov"Computer Science and Engineering" (MA program in Design of secure systems and networks)

Alexei PetrenkoProblem of an early warning system for cyber-attacks

Coffee Break

Part 1

S. Petrenko, A. Petrenko, M. Vinokurov, Ya. AsadullinCybersecurity of digital economy of Russian Federation

S. Petrenko, A. Petrenko, M. Vinokurov, Ya. AsadullinThe program of advanced cryptographic solutions development and import substitution

A. Lomako, V. Morgunov, E. Gorbachev, V. AleynikSituational modeling of computer network equipment and computer networks processes

M. Jermeiev, A. Lomako, V. Morgunov, N. Svergun, P. KonovalchikThe rule-oriented knowledge presentation for modeling the network attacks sources

A. Kiselev, E. Rafalsky, P. Mazhnikov, P. Glibovsky, S. MatveevThe software remote identification treat model while scanning computer networks

S. Novikov, V. Zima, D. AndrushkevichInformation security setup in heterogeneous computer networks

A. Dombrovsky, A. Lomako, S. MatveevThe unknown data transfer protocols recovery approach based on the successive sequential processes theory by Ch. Hoare

M. Eremeyev, V. Ovcharov, S. Akulov, V. KorotkovA wireless IEEE 802.11, 802.16 data networks security threat model

A. Lomako, V. Ovcharov, S. Akulov, V. KorotkovTypical wireless network component attacks implementation approaches

V. Ovcharov, S. Akulov, V. KorotkovWireless network transmission environment controlled multi-model access approach

M. Eremeyev, A. Lomako, D. BirukovAn information security treat model for public telephone networks

V. Morgunov, N. SalkoThe model of IP-telephony application execution

A. ShibaevTHE APPLICATION OF SUPER-WIDE BAND RADIOLINE IN ORGANIZATIONAL STRUCTURE OF ROBOTIZED COMPLEX

AGENDA (20.09)

Part 2

A. Semenov, V. Novikov, A. Lomako, A. KostyukHardware cybersecurity threats identifying

V. Novikov, A. Kostyuk, A. SemenovInvestigation of the undeclared capabilities of ultra-large integrated circuits with processor cores

V. NovikovMicrocircuits programming sequences unauthorized modifications detection

V. Novikov, A. Lomako, M. Jeremeyev, P. KonovalchikUndeclared application features identification and neutralization

M. Jeremeyev, G. Poterpeyev, I. ZaharchukMobile personal devices information security treat model

M. Nazarov, A. VaulinNanotechnology equipment research tools in order to restore its functional and logical structure

A. VaulinRSA-cipher component attack

A. VaulinRSA-based cryptosystem vulnerabilities detection

M. Jeremeyev, D. Andrushkevich, P. SergienkoSecure electronic document management organization approach using a collective signature

V. Zima, D. Andrushkevich, V. Sharshakov, V. AleynikHidden threats and attacks neutralization in automated electronic document management systems

S. Pilkevich, Ju. GlobinAlternative modes of data encryption in electronic document management systems

S. PilkevichModels of communication while providing protection against negative information impact

K. Gnidko, S. PilkevichMulti-level user protection system against negative Internet content

A. Markov, V. CirlovIDS and SIEM solutions import substitution

A. ScherbakovaAdvanced technology of physically non-cloned functions

S. Petrenko, D. Stupin, A. Petrenko, Ja. AsadullinPartially correct calculations semantics in terms of similarity

S. Petrenko, D. Stupin, A. Petrenko, Ja. AsadullinComputability invariants schemes in functional forms

S. Petrenko, D. Stupin, A. Petrenko, Ja. AsadullinCalculation semantic correctness criteria for control of computability properties

S. Petrenko, D. Stupin, A. Petrenko, Ja. AsadullinReturn-to-equilibrium scenarios for in-memory computations

Vinokurov M.Machine learning algorithms in terms of hard drive failure prediction problem

A. Shibaev, A. TeplinskiMethods for the Synchronization of ultrashort pulse in a Ultra-Wide Band Receiver

K. SaltanovA modern approaches for information security specialist education

A. Semenov, V. Novikov, A. Lomako, A. KostyukHardware cybersecurity threats identifying

V. Novikov, A. Kostyuk, A. SemenovInvestigation of the undeclared capabilities of ultra-large integrated circuits with processor cores

V. NovikovMicrocircuits programming sequences unauthorized modifications detection

V. Novikov, A. Lomako, M. Jeremeyev, P. KonovalchikUndeclared application features identification and neutraliz ation

M. Jeremeyev, G. Poterpeyev, I. ZaharchukMobile personal devices information security treat model

M. Nazarov, A. VaulinNanotechnology equipment research tools in order to restore its functional and logical structure

A. VaulinRSA-cipher component attack

A. VaulinRSA-based cryptosystem vulnerabilities detection

M. Jeremeyev, D. Andrushkevich, P. SergienkoSecure electronic document management organization approach using a collective signature

V. Zima, D. Andrushkevich, V. Sharshakov, V. AleynikHidden threats and attacks neutralization in automated electronic document management systems

S. Pilkevich, Ju. GlobinAlternative modes of data encryption in electronic document management systems

MEDIA

THE VENUE

Innopolis University
1, Universitetskaya Str.
Innopolis, 420500
Phone: +7 (843) 203 92 53 Ext. 117
Email: pr@innopolis.ru