Accepted Tutorials

Real-Time Threat Detection and Blockchain Forensics for Enhanced Security and Privacy of Smart Contracts

Author:

Abhishek Singh || Co-founder and CEO, SecureDApp || Student, Department of Management, Alliance University, Bengaluru

Email: abhishek@securedapp.in

Abstract:

Public blockchains ensure transparency by recording every transaction on immutable ledgers, but this openness conflicts with privacy and addresses, timestamps, and user activity remain permanently visible, raising deanonymization risks and regulatory concerns (e.g., GDPR). At the same time, security threats are escalating: over $2.17 billion was stolen from crypto services in the first half of 2025, surpassing all of 2024. Such incidents expose the limits of traditional defences, which often end with pre-deployment audits while leaving live networks unmonitored. Active exploits—smart contract bugs, phishing, and wallet attacks—demand continuous vigilance.

Forensics is equally vital. By analysing on-chain data, investigators can trace illicit flows and support compliance, yet most agencies lack adequate tools. To bridge this, SecureDApp offers SecureWatch, which uses AI for real-time monitoring of smart contracts, and SecureTrace, which conducts advanced forensic analysis for investigations and regulatory reporting. This tutorial proposes an integrated framework combining live threat detection with forensic analytics, catching attacks as they happen while building traceable records for post-incident response. Such a dual approach strengthens both prevention and accountability, helping safeguard blockchain applications against evolving cyber risks.

Keywords: Blockchain Security, Privacy, Real-Time Threat Detection, Forensics, DeFi, SecureDApp, Smart contract.

Transitioning Towards a Quantum-Resilient Internet: VPN and TLS in Practice

Authors:

Dr. V. Natarajan || Scientist-E & Group Head, Quantum Security Research Group, SETS, Chennai

Dr. Dhivya Ravichandran || Project Scientist, Quantum Security Research Group, SETS, Chennai

Email: natarajan.v86@sets.res.in, dhivya@setsindia.net

Abstract:

Transport Layer Security (TLS) is the most widely deployed security protocol on the Internet, ensuring confidentiality, integrity, and authentication for web traffic, online banking, e-commerce, and cloud services. Virtual Private Networks (VPNs) secure communication across private and public networks, enabling remote access, secure enterprise connectivity, and protection of user privacy. These two critical protocols form the backbone of today’s Internet security. Both protocols rely on public-key cryptography algorithms such as RSA and Elliptic Curve Cryptography (ECC). However, quantum computing poses a significant threat to these primitives. On a large-scale quantum computer, Shor’s algorithm can efficiently compromise them, invalidating today’s encryption standards.

The NIST has standardised Lattice-based schemes such as CRYSTALS-Kyber (FIPS 203) for key exchange and CRYSTALS-Dilithium (FIPS 204) for digital signatures. With PQC integration, TLS and VPN can ensure long-term protection for sensitive information. This tutorial covers both theoretical and practical aspects of Post-Quantum Cryptography (PQC) integration into TLS and VPN, including compatibility challenges and hybrid approaches that combine classical and quantum-safe algorithms for smoother migration.

Keywords: Post-Quantum Cryptography (PQC), Transport Layer Security (TLS), Virtual Private Networks (VPNs), CRYSTALS-Kyber (FIPS 203), CRYSTALS-Dilithium (FIPS 204), NIST PQC Standardization.

Next-Gen Cyber Défense in the Cloud: Leveraging AWS Security Tools

Authors:

Mr. Aman Raj || C3iHub, Indian Institute of Technology Kanpur, U.P.

Dr. Anand Handa || C3iHub, Indian Institute of Technology Kanpur, U.P.

Email: anand@c3ihub.iitk.ac.in, amanr@c3ihub.iitk.ac.in

Abstract:

The rapid adoption of cloud computing has transformed the way organizations design, deploy, and secure their digital infrastructure. With growing reliance on Amazon Web Services (AWS), strong security postures are essential to defend against evolving cyber threats. This tutorial explores next-gen approaches to cloud defense through AWS tools and practices. Topics include the shared responsibility model, Identity and Access Management (IAM), Virtual Private Cloud (VPC) configurations, and data protection in Amazon S3 using encryption and policies.

Additionally, real-time monitoring and threat detection are demonstrated via VPC Flow Logs, alongside an overview of more AWS security services. This tutorial offers a structured approach for deploying a resilient cloud security strategy using AWS.

Keywords: AWS Security, Cloud Defense, IAM, VPC, EC2, S3 Encryption, Threat Detection, C3iHub.