Tutorials & Call for Tutorials

Bookmark and Share

Unfortunately there is not enough demand to run these tutorials.

CGS: Cryptographically Good S-boxes - Cihangir Tezcan: Middle East Technical University, Institute of Applied Mathematics, Department of

Abstract:  Substitution layer of cryptographic algorithms mostly consists of substitution boxes (S-boxes) and in order to provide better security against known attacks, S-boxes are selected
depending on their cryptographic properties like differential probability, linear bias, algebraic
degree, branch number, and threshold implementation. For instance, differential attacks highly use
the differential probabilities of the S-boxes. Recently we proposed two more evaluation criteria of S-boxes, called undisturbed bits and differential factors. In this tutorial we will discuss all these
cryptographic properties and their usage in differential, linear, algebraic, side-channel, differential-linear, truncated differential, impossible differential, and improbable differential cryptanalysis.

1.  Introduction to block ciphers and S-boxes
2.  Differential and Linear Approximation Probabilities of S-boxes and how they can be used in differential and linear cryptanalysis
3.  Branch Number and Threshold Implementations of S-boxes
4.  Undisturbed Bits of S-boxes and how they can be used in truncated, impossible and
improbable attacks
5.  Differential Factors of S-boxes and their consequences

CM: Advances In Continuous Monitoring As An Integrated Component Of Cybersecurity Management - Bill Hargenrader: Senior Lead Technologist
Booz | Allen | Hamilton


Continuous monitoring as an integrated component to your organization’s cybersecurity management strategy has numerous benefits such as providing accurate up to the minute risk posture and control compliance, as well as providing security performance metrics via dashboard. A key component is a centralized system that supports activity logging and automated updates with dedicated auditing to ensure the accuracy of the decision making data streams. In order to successfully implement a fully integrated continuous monitoring program, a continuous monitoring strategy needs to be developed that includes consideration of advances in continuous monitoring methods, system development plans, and organizational culture considerations.


Learning objectives:


1. The audience will learn the benefits that continuous monitoring presents the organization, and how to mitigate or overcome the challenges of implementation.
2. The audience will learn how to develop and implement their own continuous monitoring strategy to improve the security and risk posture of their organization.
3. The audience will learn the latest advances in continuous monitoring, as well as what is on the horizon in order to better develop a continuous monitoring strategy.

USER: Conducting Security Related User Studies - Soum Chowdhury and Karen Renaud

8th September 2014




Proposals are invited to organize tutorials in conjunction with SIN 2014. 

Note that the instructor of an accepted tutorial will receive free registration to SIN 2014 Conference and, if a tutorial is actually run, accommodation for one tutorial speaker will be covered by the conference.


Tutorial Topics


Proposals on contemporary topics and recent developments in the field of security in information, networks, and systems in the conference themes are especially welcome; detailed fields of interest are listed in the conference website at http://www.sinconf.org/. 


Submission Details


A proposal should consist of a tutorial outline and background information on the presenter(s). Tutorial outline should be limited to 2 pages and contain the following information:


1. Title of the tutorial: The title will appear in the conference program if the proposal is accepted.

2. Abstract of the tutorial: This abstract will be used to advertise the proposal, for instance, on the conference’s web site prior to the conference. The abstract should be 250-word long at the most.

3. Proposed duration: Half-day tutorials will run for a total of about 3 hours; full day tutorials will run for about 6 hours.

4. Intended audience: to whom is the tutorial of interest.

5. Prerequisite knowledge: what the attendees should already know. 

6. Detailed outline: The topics covered in the tutorial will be listed and briefly discussed in the outline, along with the amount of time planned for each topic.

7. Tutorial goals: This is a one-page discussion of the tutorial’s goals and benefits to prospective participants.


Background information on the presenter(s) should be limited to 1-2 pages and contain:


1. Names, affiliations, homepages and contact details.

2. Short biographies.

3. Information about previous tutorials given by the same presenters (title, location, number of attendees, etc.). 


Tutorial proposals should be submitted to SIN 2014 Submission Site (https://cmt.research.microsoft.com/SIN2014/).


Important Dates


Tutorial submissions:  16th May 2014 (soft date)

Acceptance notices:    30th May 2014 

Camera-ready copy of tutorial handouts: 1st August 2014 

Tutorial Dates:           8th September 2014