A one-day Workshop on Cyber Security @ IIT Hyderabad


Global Conference on Cyber Space (GCCS) is a prestigious global event where international leaders, policymakers, industry experts, think tanks, cyber wizards, etc gather to deliberate on issues and challenges for optimally using cyber space. GCCS was launched with a view to establish internationally agreed ‘rules of the road’ for behavior in cyberspace, and create a more focused and inclusive dialogue between all those with a stake in Internet (governments, civil society and industry) on how to implement them. GCCS 2017 will be held in New Delhi during Nov 23-24, 2017. Refer https://gccs2017.in/ for more details.

IIT Hyderabad has partnered with GCCS 2017 to make it grand success. Towards that, IITH is organizing one-day workshop on “Cyber Security” on November 4th, 2017 at IITH campus. This workshop brings in policy makers and eminent researchers from academia and industry who would be delivering talks on different aspects of cyber security and discussing open issues and challenges in the domain. 

Date: November 4th, 2017
Venue: Auditorium, IIT Hyderabad Campus
Registration: Free,​ but participants need to RSVP by filling in the form  by 4PM, November 3rd.
Lunch: Participants can take lunch at the Dining Hall of IIT Hyderabad by paying Rs 50/-.

Directions to Reach  IITH  campus can be seen here
GCCS Workshop on Cyber Security @IITH Snaps

The workshop features expert speakers from Qualcomm, TCS, IISc,  IIT Hyderabad,  Meity, IDRBT, and Sophos for delivering talks on various aspects of cyber security.

Time Slot

Schedule of Events

9:30 -- 10:00 Hrs

Registration (Auditorium)

10:00 -- 10:15 Hrs

Welcome note by Dr. Bheemarjuna Reddy Tamma, IIT Hyderabad

10:15 -- 11:15 Hrs

Invited Talk 1 by Prof. Veni Madhavan, IISc Bangalore

11:15 -- 11:45 Hrs

Invited Talk 2 by Mr. Sitaram Chamarty, TCS

11:45 -- 12:30 Hrs

Invited Talk 3 by Mr. Suresh Reddy Allam, Qualcomm

12:30 -- 14:00 Hrs

Lunch Break 

14:00 -- 14:45 Hrs

Invited Talk 4 by Prof. V N Sastry, IDRBT

14:45 -- 15:30 Hrs

Invited Talk 5 by Mr. Vinod Patel, Sophos

15:30 -- 16:00 Hrs

Talk by Dr. Kotaro Kataoka, IIT Hyderabad

16:00 - 16:10 Hrs

GCCS 2017 Overview by Mr. Bharat Gupta, Meity, GoI

16:10 -- 16:15 Hrs

Vote of Thanks by Dr. Abhinav Kumar

16:15 -- 17:00 Hrs

High Tea 


Prof. Veni Madhavan
IISc Bangalore
Title of the Talk:Blockchains and Cryptocurrencies:Theory and Practice

Blockchains are linked lists of chunks of bytes of digital information maintained as distributed ledgers. The chunks, called blocks are further chained by a system of digests, or integrity checks, produced by cryptographic hash functions. The stipulation of special forms of digest or hash values provides the feature of a proof. The computational work for producing such prescribed forms of strings, from among many random strings, is exponentially larger than the work for verifying the proof. This property called the proof-of-work is the crux of the notion of block chains. Many further properties ensue as a consequence, making the blockchain paradigm suitable for many distributed transaction processing systems calling for public scrutiny.

Cryptocurrencies, in particular the rst and well-known Bitcoin and others such as Ethereum, are canonical exemplars of the blockchain paradigm. Minting or generating new elements or coins of this form of currency relies on the notion of proof-of-work. The many attractive properties of physical at currency, such as privacy, anonymity, transferability, fungibility obtain in such forms of currency. However they are different, from State supported denominational at currency, with respect to the property of store-of-value as a medium-of-exchange, arbitrage within jurisdictional boundaries, and seigniorage in governance. The notion of cryptographic digital cash, the analog of at currency in the form of coins, coupons or tokens, predates the contemporary examples of cryptocurrencies.

We discuss the rich body of theoretical, algorithmic and computational technical ideas from cryptography used in building the many components of these systems. We present a discussion on these exciting new paradigms of the digital world of the modern informational society from various perspectives of science, technology, productization, governance and human-usage factors.


Ms. Tulika Pandey
Director, Meity, Govt of India

Talk: This inaugural talk will cover at least 3 aspects Cyber Security related Govt initiatives on technology, standards, policy and regulation.

Speaker Bio: Ms. Tulika Pandey is an Electronics and Communications Engineer. She has been with the Government of India since 1992 and currently holds the position of Director, National eGovernance Division, Ministry of Electronics & Information Technology, Government of India. She has been involved in implementation strategy and action plan formulations for wider reach of ICT facilitated benefits; Integration of appropriate technology interfaces between human and cyber world; Steering of Research and Development projects for development of contextual ICT technology, tools, applications and content. She has traversed through the path of Microelectronics development, E-Learning, Technology Development for Indian Languages, Digital Libraries, E-Infrastructure, Internet Governance and Convergence, Communications & Broadband Technologies. She has been harnessing the technologies of Internet of Things (IoT), IPv6 and convergence of Cognitive Radio Frequency with Internet for enhancing ubiquitous technology interventions in human life with minimal trespassing of security and privacy in her 26 year stint with the Government of India.

Ms Pandey has co-authored a number of research papers in the area of network engineering and several position papers and strategy papers for national policy formulations on Internet and ICT related areas. She has spearheaded the activities of Internationalization of Internet, Internet Proliferation and its last mile outreach within India. She has been representing the concerns of India and government in particular in the International and National forums of Internet Governance, Internationalization of Internet and Women in ICT.

Ms Pandey is a member of

  • IEEE Women in Engineering Society

  • Standards for Telecom Equipments of the Telecom Engineering Centre (TEC, Dept. of Telecommunications, Govt. of India

  • International Advisory Board of the International Conference on “COMmunication System & NETworkS (COMSNETS)”.

  • United Nation’s ‘Internet Governance Forum’ and was instrumental in establishing the Indian Chapter of Internet Governance Forum (IIGF)

  • Governmental Advisory Committee of ‘Internet Corporation for Assigned Names and Numbers’.

Ms Pandey’s current pursuit is addressing the Security postures of the Digital Payment Ecosystem in India and on global discussions on issues of Cyber4Digital Inclusion, Cyber4Growth, Cyber Security and Cyber Diplomacy. She is a part of the core team engaged in organizing the 5th Global Conference on Cyber Space (GCCS) being hosted by India during Nov 23-24, 2017 in New Delhi.

Prof. V N Sastry
IDRBT Hyderabad
Title of the TalkMobile Governance and Mobile Financial Services : Security Challenges
Abstract:The objective of Mobile Governance is to deliver all services of Government onto the Mobile Phone of every Citizen. It may be through voice, data and multimedia using  long range or short range communication channels such as Tele, IVRS, SMS, USSD, GPRS, NFC, WIFI, BLE etc. Mobile Financial Services such as Mobile Banking, Mobile Payments, Insurance, Loans, Pensions, Investment etc. require higher security measures besides protecting privacy and data of user.  In this talk emerging challenges of security of mobile services and  financial transactions  would be presented and solution approaches with focus on light weight cryptography protocols and formal methods would be discussed.

Suresh Reddy Allam
Director of Engineering and Qualcomm Hyderabad Security Systems Group lead
Title of talk: Security Trends in Mobile and Embedded Devices
Abstract:Mobile devices play Pivotal role in Cyberspace and helps individuals connected to Internet on the Go. Qualcomm thrives to make the mobiles devices Safe and Secure by enabling Secure applications, User Authentication and device attestation as the key pillars of mobile security. Qualcomm Snapdragon Processors offers Secure Execution Environment which provide HW based Security to mobile applications and payment apps. In this environment, the processor goes into a secure mode which nullifies the ability of the malware on the operating system to affect an app or mobile wallet app. Qualcomm Snapdragon processors provide advanced security features like Secure figure print, Secure camera for IRIS scan and safe switch. Qualcomm’s App Protect service provide the apps with capability to check if the phone has been rooted or if there is malware on the phone which roots the phone.

Qualcomm has setup processes for product security and helps OEM’s identify venerability’s/Incidents and possible attaches on Qualcomm Technologies post device launches. Qualcomm provides secure patches for incidents to enhance safety and security of Mobile devices.

Speaker Bio:Suresh Reddy has close to 20 years of experience in Wireless and embedded software industry. He is currently working as Director, Engineering for Security Systems Group at Qualcomm Hyderabad. The team is responsible for delivering security SW features across all Tiers of Qualcomm Mobile chipsets. The team also provides Security Solutions to Emerging businesses like IOT and Automotive. Before joining Qualcomm, Suresh worked for Texas Instruments where he led different Engineering teams for OMAP and Modem Chipsets. He has a B.Tech Degree from Nagarjuna University, India.

Sitaram Chamarty
Principal Consultant, Head of eSecurity and Open Source initiatives. TCS, Hyderabad
Title of talk : Blockchain for enterprises - current state and challenges
Abstract:Most academic research appears to focus on permissionless blockchains. Enterprise use of blockchains, however, have a different set of challenges. This talk will describe the current state of enterprise blockchains, and highlight the challenges that still need to be addressed.
Speaker bio: Sitaram is part of TCS's Corporate Technology Office. He and his colleague Dr. Sachin Lodha, together handle the "security and privacy" theme within CTO. Sitaram has a good breadth of knowledge in security and related topics, with a bit more focus on authentication, authorisation, access control methods, and applications of cryptography.

Vinod Patel
Principal Engineer, Sophos, Ahmedabad
Title of talk: The Evolution of Firewalls: A Programmer's Perspective
Abstract: The Internet, like any other society, is plagued with the kind of jerks who enjoy the electronic equivalent of writing on other people's walls with spray-paint, tearing their mailboxes off, or just sitting in the street blowing their car horns. Some people try to get real work done over the Internet, and others have sensitive or proprietary data they must protect. Usually, a firewall's purpose is to keep the jerks out of your network while still letting you get your job done.  All communication between your computer and internet flows through the firewall since it lies between your computer network and the Internet.
In this talk, a programmer will walk you through the journey of a Cyber-Cafe software, which evolved into a Next-Generation Firewall, got acquired and is currently serving 100M users across the globe.

    Key questions this talk will answer :

    1) What is the definition of a Firewall, UTM and NGFW ?

    2) What are the technologies used to build such devices ?

    3) What are the open-source tools used in a firewall ?

    4) What are the research opportunities available in firewall world ?

Speaker Bio: Vinod Patel is a programmer with an inclination towards entrepreneurship. He is passionate about solving real-world problems using computers. He is working as a Principal Engineer at Sophos. He received a B.E. Degree in Computer Engineering from Sardar Patel University, Gujarat. He has been active in the area of developing firewall products for over 14 years. He started his career as a programmer at Elitecore, and since then, has seen the firewalls evolve from first-generation packet-filter to the fourth-generation NGFW. He has helped in shaping two very successful commercial firewall products: Sophos Firewall and Cyberoam, and is well aware of the inner-workings of the industry


Dr. Kotaro Kataoka
IIT Hyderabad
Title of talk: Re-thinking the usage of Software Defined Networking for Cyber Security
Abstract: Software-Defined Networking introduced an opportunity to realize the importance and something beyond “Distributed Networking” and “End-to-End Communication Fundamentalism” in the traditional architecture in the Internet.  On the other hands, SDN is not an emerging concept of networking: the network engineers have always attempted SDN-like approach since a couple of decades ago. Now, what is the difference between SDN and Non-SDN approaches for Cyber Security?  What does make SDN special for Cyber Security?  Which way do we go IF we do something for Cyber Security using SDN?  This talk explores these answers.



Organizing Committee:
Dr. Bheemarjuna Reddy TammaDr. M. V. Panduranga Rao,
Dr. Antony FranklinDr. Subrahmanyam Kalyanasundaram, and Dr. Abhinav Kumar

Contact Us:
Email: office.head@cse.iith.ac.in
Phone: +91(40) 2301 7006