Time | Schedule |
---|---|
8:00-8:30 | Registration and Continental Breakfast |
8:30-8:40 | Opening remarks (Slides) Terry Benzel, USC-ISI and Gianluca Stringhini, Boston University |
8:40-9:45 | Keynote: Critical Consequences – Rethinking the Cyber Protection of Critical Infrastructure (Slides) Virginia Wright, Idaho National Laboratory |
9:45-10:15 | Coffee break |
10:15-11:45 | Paper session 1 - Malware and vulnerabilities (Session chair: Terry Benzel, USC-ISI) |
Towards Reproducible Ransomware Analysis (Slides) Shozab Hussain (LUMS), Muhammad Musa (LUMS), Turyal Neeshat (LUMS), Rja Batool (LUMS), Omer Ahmed (LUMS), Fareed Zaffar (LUMS), Ashish Gehani (SRI), Andy Poggio (SRI), Maneesh Yadav (SRI) An Attacker's Dream? Exploring the Capabilities of ChatGPT for Developing Malware (Slides) Yin Minn Pa Pa (Yokohama National University), Shunsuke Tanizaki (Yokohama National University), Tetsui Kou (Yokohama National University), Michel van Eeten (Delft University of Technology/ Yokohama National University), Katsunari Yoshioka (Yokohama National University), Tsumomu Matsumoto (Yokohama National University) User Profiling and Vulnerability Introduction Prediction in Social Coding Repositories: A Dynamic Graph Embedding Approach (Slides) Agrim Sachdeva (Indiana University), Ben Lazarine (Indiana University), Hongyi Zhu (The University of Texas at San Antonio), Sagar Samtani (Indiana University) | |
11:45-1:00 | Lunch break |
1:00-2:30 | Paper session 2 - Simulators and security exercises (Session chair: Ariana Mirian, UCSD) |
Cadence: A Simulator for Human Movement-based Communication Protocols (Slides) Harel Berger (Georgetown University), Micah Sherr (Georgetown University), Adam Aviv (George Washington University) Battle Ground: Data Collection and Labeling of CTF Games to Understand Human Cyber Operators (Slides) Geogel M. Savin (United States Naval Academy), Ammar Asseri (United States Naval Academy), Josiah Dykstra (National Security Agency), Jonathan Goohs (Cyber Strike Activity Sixty-Three, USN), Anthony Melaragno (United States Naval Academy), William Casey (United States Naval Academy) BGPy: The BGP Python Security Simulator (Slides) Justin Furuness (University of Connecticut), Cameron Morris (University of Connecticut), Reynaldo Morillo (University of Connecticut), Amir Herzberg (University of Connecticut), Bing Wang (University of Connecticut) | |
2:30-3:00 | Coffee break |
3:00-4:30 | Paper session 3 - Research practices and risks (Session chair: David Balenson, USC-ISI) |
In the Line of Fire: Risks of DPI-triggered Data Collection (Slides) Ariana Mirian (UCSD), Alisha Ukani (UCSD), Ian Foster (DNS Coffee), Gautam Akiwate (Stanford University), Taner Halicioglu (Independent), Cindy Moore (UCSD), Alex C. Snoeren (UCSB), Geoffrey Voelker (UCSD), Stefan Savage (UCSD) Analyzing Cyber Security Research Practices through a Meta-Research Framework (Slides) Victor Le Pochat (imec-DistriNet, KU Leuven), Wouter Joosen (imec-DistriNet, KU Leuven) Designing and Conducting Usability Research on Social Media Misinformation with Low Vision or Blind Users (Slides) Filipo Sharevski (DePaul University), Aziz Zeidieh (University of Illinois Urbana-Champaign) | |
6:00 | No-Host Dinner at Sapori Restaurant |
Sponsored by | In cooperation with |
|
|