Workshop Program (all times PDT / UTC-7)

8:00-8:30Registration and Continental Breakfast
8:30-8:40Opening remarks (Slides)
Terry Benzel, USC-ISI and Gianluca Stringhini, Boston University
8:40-9:45Keynote: Critical Consequences – Rethinking the Cyber Protection of Critical Infrastructure (Slides)
Virginia Wright, Idaho National Laboratory
9:45-10:15Coffee break
10:15-11:45Paper session 1 - Malware and vulnerabilities (Session chair: Terry Benzel, USC-ISI)
Towards Reproducible Ransomware Analysis (Slides)
Shozab Hussain (LUMS), Muhammad Musa (LUMS), Turyal Neeshat (LUMS), Rja Batool (LUMS), Omer Ahmed (LUMS), Fareed Zaffar (LUMS), Ashish Gehani (SRI), Andy Poggio (SRI), Maneesh Yadav (SRI)
An Attacker's Dream? Exploring the Capabilities of ChatGPT for Developing Malware (Slides)
Yin Minn Pa Pa (Yokohama National University), Shunsuke Tanizaki (Yokohama National University), Tetsui Kou (Yokohama National University), Michel van Eeten (Delft University of Technology/ Yokohama National University), Katsunari Yoshioka (Yokohama National University), Tsumomu Matsumoto (Yokohama National University)
User Profiling and Vulnerability Introduction Prediction in Social Coding Repositories: A Dynamic Graph Embedding Approach (Slides)
Agrim Sachdeva (Indiana University), Ben Lazarine (Indiana University), Hongyi Zhu (The University of Texas at San Antonio), Sagar Samtani (Indiana University)
11:45-1:00Lunch break
1:00-2:30Paper session 2 - Simulators and security exercises (Session chair: Ariana Mirian, UCSD)
Cadence: A Simulator for Human Movement-based Communication Protocols (Slides)
Harel Berger (Georgetown University), Micah Sherr (Georgetown University), Adam Aviv (George Washington University)
Battle Ground: Data Collection and Labeling of CTF Games to Understand Human Cyber Operators (Slides)
Geogel M. Savin (United States Naval Academy), Ammar Asseri (United States Naval Academy), Josiah Dykstra (National Security Agency), Jonathan Goohs (Cyber Strike Activity Sixty-Three, USN), Anthony Melaragno (United States Naval Academy), William Casey (United States Naval Academy)
BGPy: The BGP Python Security Simulator (Slides)
Justin Furuness (University of Connecticut), Cameron Morris (University of Connecticut), Reynaldo Morillo (University of Connecticut), Amir Herzberg (University of Connecticut), Bing Wang (University of Connecticut)
2:30-3:00Coffee break
3:00-4:30Paper session 3 - Research practices and risks (Session chair: David Balenson, USC-ISI)
In the Line of Fire: Risks of DPI-triggered Data Collection (Slides)
Ariana Mirian (UCSD), Alisha Ukani (UCSD), Ian Foster (DNS Coffee), Gautam Akiwate (Stanford University), Taner Halicioglu (Independent), Cindy Moore (UCSD), Alex C. Snoeren (UCSB), Geoffrey Voelker (UCSD), Stefan Savage (UCSD)
Analyzing Cyber Security Research Practices through a Meta-Research Framework (Slides)
Victor Le Pochat (imec-DistriNet, KU Leuven), Wouter Joosen (imec-DistriNet, KU Leuven)
Designing and Conducting Usability Research on Social Media Misinformation with Low Vision or Blind Users (Slides)
Filipo Sharevski (DePaul University), Aziz Zeidieh (University of Illinois Urbana-Champaign)
6:00No-Host Dinner at Sapori Restaurant
Sponsored byIn cooperation with


Designed by BootstrapMade