Annual Computer Security Applications Conference (ACSAC) 2014

Monday, 8 December 2014
7:30-8:30
Breakfast (Lafitte AB)
8:30-12:00
Orleans AOrleans BBoardroomDH Holmes CDH Holmes AB
M1. Understanding and Contrasting Android Malware at RuntimeFull Day

Dr Giovanni Russello, University of Auckland
M2. Iron-Clad Software Development : How To Build Secure Web ApplicationsFull Day

Mr. Jim Manico, Independent Consultant
M3. Security Risk Management using the Security Engineering Risk Analysis (SERA) MethodHalf Day

Dr. Carol Woody, Software Engineering Institute
Layered Assurance Workshop (LAW)Two Day

Rance J. DeLong, consultant, LAW General Chair
Gabriela Ciocarlie, SRI International, LAW Program Chair
Peter G. Neumann, SRI International, LAW Panels Chair
Tracer FIRETwo Day

Instructors: Kevin Nauer, Ben Anderson, Theodore Reed, Sandia National Labs
12:00-13:30
Lunch (Lafitte AB)
13:30-17:00
Orleans AOrleans BBoardroomDH Holmes CDH Holmes AB
M1. Understanding and Contrasting Android Malware at Runtime(continues from the morning) M2. Iron-Clad Software Development : How To Build Secure Web Applications(continues from the morning) M4. Introduction to Virtual Machine IntrospectionHalf Day

Dr. Zhiqiang Lin, University of Texas at Dallas
Layered Assurance Workshop (LAW)(continues from the morning) Tracer FIRE(continues from the morning)
Tuesday, 9 December 2014
7:30-8:30
Breakfast (Lafitte AB)
8:30-12:00
Dauphine BBoardroomDauphine ADH Holmes COrleans AOrleans BDH Holmes AB
T5. Advanced Digital ForensicsFull Day

Dr. Vrizlynn Thing, Institute for Infocomm Research
T6. Cloud Security and PrivacyFull Day

Dr. Paolina Centonze, Iona College
Systems Security Engineering: NIST SP 800-160Instructor: Dr. Carol Woody, Software Engineering Institute Layered Assurance Workshop (LAW)(continues from the previous day) Malware Memory Forensics Workshop (MMF)Full Day

Dr. Harvey Rubinovitz, MITRE Corp.
Dr. Golden G. Richard III, Univ. of New Orleans
Program Protection and Reverse Engineering Workshop (PPREW)Full Day

Mila Dalla Preda, University of Verona, Italy
J. Todd McDonald, University of South Alabama, USA
Tracer FIRE(continues from previous day)
12:00-13:30
Lunch (Lafitte AB)
13:30-17:00
Dauphine BBoardroomDauphine ADH Holmes COrleans AOrleans BDH Holmes AB
T5. Advanced Digital Forensics(continues from the morning) T6. Cloud Security and Privacy(continues from the morning) Systems Security Engineering: NIST SP 800-160(continues from the morning) Layered Assurance Workshop (LAW)(continues from the morning) Malware Memory Forensics Workshop (MMF)(continues from the morning) Program Protection and Reverse Engineering Workshop (PPREW)(continues from the morning) Tracer FIRE(continues from the morning)
18:00-20:00
Reception (Atrium Courtyard)
Wednesday, 10 December 2014
7:00-8:00
Breakfast (Lafitte AB)
8:00-8:30
Welcome (DH Holmes AB(C))

Charles Payne, Conference Chair

Jeremy Epstein, ACSA

Dr. Kevin Butler, Program Chair

8:30-10:00
Distinguished Practitioner Keynote Panel (DH Holmes AB(C))

The Multicians

Multics: Before, During, After

With presentations by:

  • W. Olin Sibert: Introduction

  • Professor Roger R. Schell: Before Multics

  • Tom Van Vleck: Multics Development

  • Steven B. Lipner: Influence after Multics

10:00-10:30
Break (Foyer)
10:30-12:00
Orleans AOrleans BDH Holmes ADH Holmes C
Panel: Cybersecurity and Cyber-Physical Systems: A Government PerspectiveModerator: John Launchbury, DARPA

Panelists:
David Corman, NSF CISE
Dan Massey, DHS S&T
Vicky Pillitteri, NIST
Suzanne Schwartz, FDA
Secure Builds and ConfigurationJustin CapposHot-Hardening: Getting More Out of Your Security SettingsSebastian Biedermann, Security Engineering Group, TU Darmstadt; Stefan Katzenbeisser, Security Engineering Group, TU Darmstadt; Jakub Szefer, Computer Architecture and Security Laboratory, Yale UniversityChallenges and Implications of Verifiable Builds for Security-Critical Open-Source SoftwareXavier de Carné de Carnavalet, Concordia University; Mohammad Mannan, Concordia UniversityCloud Radar: Near Real-Time Detection of Security Failures in Dynamic Virtualized InfrastructuresSören Bleikertz, IBM Research - Zurich; Thomas Groß, University of Newcastle upon Tyne; Carsten Vogel, IBM Research - Zurich Mobile Systems Security ILong LuScippa: System-Centric IPC Provenance on AndroidMichael Backes, Saarland University and MPI-SWS; Sven Bugiel, Saarland University, CISPA; Sebastian Gerling, Saarland University, CISPAAndroid Security Framework: Extensible Multi-Layered Access Control on AndroidMichael Backes, Saarland University and MPI-SWS; Sven Bugiel, Saarland University, CISPA; Sebastian Gerling, Saarland University, CISPA; Philipp von Styp-Rekowsky, Saarland University, CISPATowards a Salable Resource-driven Approach for Detecting Repackaged Android ApplicationsYuru Shao, The Hong Kong Polytechnic University; Xiapu Luo, The Hong Kong Polytechnic University; Chenxiong Qian, The Hong Kong Polytechnic University; Pengfei Zhu, The Hong Kong Polytechnic University; Lei Zhang, The Hong Kong Polytechnic University DHS's Continuous Diagnostics and Mitigation Program (CDM)Moderator: George Moore, DHS (invited)
12:00-13:30
Lunch (Lafitte AB)
13:30-15:00
Orleans AOrleans BDH Holmes ADH Holmes C
Panel: CPS: Cybersecurity, Resilience, Safety, and Fault ToleranceModerator: Patricia Muoio, Director of Research and Development, G2 Inc.

Panelists:
William Sanders, UIUC;
Lillian Ratliff, UC Berkeley;
Apurva Mohan, Honeywell
Social Computing and NetworksDaniela OliveiraTROGUARD: Context-Aware Protection Against Web-Based Socially Engineered TrojansRui Han, University of Miami; Saman Zonouz, Rutgers University; Mihai Christodorescu, Qualcomm ResearchSpam ain't as Diverse as It Seems: Throttling OSN Spam with Templates UnderneathHongyu Gao, Northwestern University; Yi Yang, Northwestern University; Kai Bu, Zhejiang University; Yan Chen, Northwestern University; Doug Downey, Northwestern University; Kathy Lee, Northwestern University; Alok Choudhary, Northwestern UniversityA Taste of Tweet: Reverse Engineering Twitter SpammersChao Yang, Texas A&M University; Jialong Zhang, Texas A&M University; Guofei Gu, Texas A&M University Systems SecurityWilliam EnckNew Models of Cache Architectures Characterizing Information Leakage from Cache Side ChannelsTianwei Zhang, Princeton University; Ruby Lee, Princeton UniversityICE: A Passive, High-Speed, State-Continuity Scheme for Intel SGXRaoul Strackx, KU Leuven; Bart Jacobs, KU Leuven; Frank Piessens, KU LeuvenInterrupt-oriented Bugdoor Programming: A minimalist approach to bugdooring embedded systems firmwareSam Tan, Dartmouth; Sergey Bratus, Dartmouth; Travis Goodspeed, Straw Hat NIST Cyber Security FrameworkSpeaker: Victoria Pillitteri, NIST
15:00-15:30
Break (Foyer)
15:30-16:00
Celebrating 30 Years (DH Holmes AB(C))Charles Payne, Conference Chair
16:00-17:00
Invited Essayist Keynote (DH Holmes AB(C))

Aviel D. Rubin, Johns Hopkins University

Taking Two-Factor to the Next Level: Protecting Online Poker, Banking, Healthcare and Other Applications

18:30-21:30
Conference Dinner with New Orleans Jazz Band (Lafitte AB, Orleans AB, Foyer)
Thursday, 11 December 2014
7:30-8:30
Breakfast (Lafitte AB)
8:30-10:00
Orleans AOrleans BDH Holmes ADH Holmes C
Case Studies ILarry Wagoner

Firewalling: Passwords, Financial Transactions and Human Privileges from CPU Resident Malware, Jim McAlear (Canadian Department of National Defence)

Smart Card support Embedded Within OpenSSL to Secure Virtual Machines, Hassane Aissaoui-Mehrez (Télécom ParisTech)

Red October: Implementing the two-man rule for keeping secrets, Nick Sullivan (CloudFlare)

Cyber Physical Systems IAdam HahnCPS: Through the Eye of the PLC: Semantic Security Monitoring for Industrial ProcessesDina Hadziosmanovic, Delft University of Technology; Robin Sommer, International Computer Science Institute; Emmanuele Zambon, University of Twente; Pieter Hartel, University of TwenteCPS: Market Analysis of Attacks Against Demand Response in the Smart GridCarlos Barreto, University of Texas at Dallas; Alvaro Cardenas, University of Texas at Dallas; Nicanor Quijano, Universidad de los Andes; Eduardo Mojica-Nava, Universidad NacionalCPS: Flying blind - Challenges and Uncertainties for Timing Attacks on Process Control SystemsMarina Krotofil, Hamburg University of Technology; Alvaro Cardenas, University of Texas at Dallas; Bradley Manning, Hamburg University of Technology; Jason Larsen, IOActive, Inc. Secure Distributed SystemsCharles WrightUncovering Network Tarpits with DegreaserLance Alt, Naval Postgraduate School; Robert Beverly, Naval Postgraduate School; Alberto Dainotti, CAIDANetwork Dialog Minimization and Network Dialog Diffing: Two Novel Primitives for Network Security ApplicationsM. Zubair Rafique, iMinds-DistriNet, KU Leuven; Juan Caballero, IMDEA Software Institute; Christophe Huygens, iMinds-DistriNet, KU Leuven; Wouter Joosen, iMinds-DistriNet, KU LeuvenLightweight Authentication of Freshness in Outsourced Key-Value StoresYuzhe Tang, Georgia Tech; Ting Wang, IBM Research, Yorktown Heights; Ling Liu, Georgia Tech; Xin Hu, IBM Research, Yorktown Heights; Jiyong Jang, IBM Research, Yorktown Heights Forum: Systems Security Engineering: An Integrated Approach to Building Trustworthy Resilient Systems, Part 1

Moderators: Ron Ross, NIST; Michael McEvilley, MITRE Corporation

10:00-10:30
Break (Foyer)
10:30-12:00
Orleans AOrleans BDH Holmes ADH Holmes C
Panel: The Attacker Among Us: Insider Threats Within the Energy SectorModerator: Dr. William (Bill) Claycomb, CERT Insider Threat Center- Carnegie Mellon University

Panelists (listed alphabetically):
Dr. Nader Mehravari, Cyber Security Solutions, Software Engineering Institute
Dr. Shawn Taylor, Sandia National Laboratories
Mr. Randy Trzeciak, CERT Insider Threat Center - Carnegie Mellon University
Securing Memory and StorageCristina SerbanSEER: Practical Memory Virus Scanning as a ServiceJason Gionta, North Carolina State University; Ahmed Azab, Samsung Electronics Co., Ltd.; William Enck, North Carolina State University; Peng Ning, North Carolina State University; Xiaolan Zhang, Google Inc.MACE: High-Coverage and Robust Memory Analysis For Commodity Operating SystemsQian Feng, Syracuse University; Aravind Prakash, Syracuse University; Heng Yin, Syracuse University; Zhiqiang Lin, University of Texas at DallasAssisted Deletion of Related ContentHubert Ritzdorf, ETH Zurich; Nikolaos Karapanos, ETH Zurich; Srdjan Capkun, ETH Zurich Mobile Systems Security IIZhiqiang LinMorpheus: Automatically Generating Heuristics to Detect Android EmulatorsYiming Jing, Arizona State University; Ziming Zhao, Arizona State University; Gail-Joon Ahn, Arizona State University; Hongxin Hu, Clemson UniversityDesign and Implementation of an Android Host-based Intrusion Prevention SystemMingshen Sun, The Chinese University of Hong Kong; Min Zheng, The Chinese University of Hong Kong; John C.S. Lui, The Chinese University of Hong Kong; Xuxian Jiang, North Carolina State UniversityMoRePriv: Mobile Os Support For Application Personalization And PrivacyDrew Davidson, University of Wisconsin; Matt Fredrikson, University of Wisconsin; Benjamin Livshits, Microsoft Research Forum: Systems Security Engineering: An Integrated Approach to Building Trustworthy Resilient Systems, Part 2Moderators: Ron Ross (NIST) and Michael McEvilley (MITRE)

(continues from the previous session)
12:00-13:30
Lunch (Lafitte AB)
13:30-15:00
Orleans AOrleans BDH Holmes ADH Holmes C
Panel: Moving Target Defenses: Johnny Can't Secure, So He Moves

Moderator: Dr. Hamed Okhravi, MIT Lincoln Laboratory

Panelists:

Dr. Samuel Weber, Senior Researcher, Software Engineering Institute, Carnegie Mellon University

Prof. Ehab Al-Shaer, Professor and Director of Cyber Defense and Network Assurability Center (CyberDNA), University of North Carolina Charlotte

Dr. Todd R. Andel, Associate Professor, School of Computing, University of South Alabama

Secure CommunicationsHassan TakabiIMSI-Catch Me If You Can: IMSI-Catcher-CatchersAdrian Dabrowski, SBA Research; Nicola Pianta, Università di Cagliari; Thomas Klepp, TU Wien, Austria; Martin Mulazzani, SBA Research; Edgar Weippl, SBA ResearchAdvanced WiFi Attacks Using Commodity HardwareMathy Vanhoef, KU Leuven; Frank Piessens, KU LeuvenWhitewash: Outsourcing Garbled Circuit Generation for Mobile DevicesHenry Carter, Georgia Institute of Technology; Charles Lever, Georgia Institute of Technology; Patrick Traynor, University of Florida Usable SecurityRida BazziIt's the Psychology Stupid: How Heuristics Explain Software Vulnerabilities and How Priming Can Illuminate Developer's Blind SpotsMarissa Rosenthal, Bowdoin College; Nicole Morin, Bowdoin College; Kuo-Chuan Yeh, Pennsylvania State University; Justin Cappos, NYU Poly; Yanyan Zhuang, University of British Columbia; Daniela Oliveira, University of FloridaUnderstanding Visual Perceptions of Usability and Security of Androids' Graphical Password PatternAdam Aviv, United States Naval Academy; Dan Fichter, Swarthmore CollegeUsing Automatic Speech Recognition for Attacking Acoustic CAPTCHAs: The Trade-off between Usability and SecurityHendrik Meutzner, Horst Görtz Institute for IT-Security (HGI), Ruhr-University Bochum; Viet Hung Nguyen, Horst Görtz Institute for IT-Security (HGI), Ruhr-University Bochum; Thorsten Holz, Horst Görtz Institute for IT-Security (HGI), Ruhr-University Bochum; Dorothea Kolossa, Horst Görtz Institute for IT-Security (HGI), Ruhr-University Bochum DHS Programs: Cybersecurity for Government VehiclesPresenters: David Balenson, SRI International; Dan Massey, DHS S&T; Kevin Harnett, US DOT/Volpe Center; Ulf Lindqvist, SRI International
15:00-15:30
Break (Foyer)

Chocoholic Extravaganza

"Las cosas claras y el chocolate espeso." (Ideas should be clear and
chocolate thick.) Spanish proverb

 

15:30-17:00
Orleans AOrleans BDH Holmes ADH Holmes C
NIST's Cyber-Physical Systems Public Working Group (CPS PWG) Cybersecurity and Privacy SubgroupSpeakers: Victoria Pillitteri, NIST PrivacyFranziska RoesnerExploring and Mitigating Privacy Threats of HTML5 Geolocation APIHyungsub Kim, POSTECH; Sangho Lee, POSTECH; Jong Kim, POSTECHDifferentially Private Data Aggregation with Optimal UtilityFabienne Eigner, Saarland University, CISPA; Aniket Kate, MMCI, Saarland University; Matteo Maffei, Saarland University, CISPA; Francesca Pampaloni, IMT Lucca; Ivan Pryvalov, MMCI, Saarland UniversityOn the Privacy Provisions of Bloom Filters in Lightweight Bitcoin clientsArthur Gervais, ETH Zürich; Ghassan Karame, NEC Laboratories Europe; Damian Gruber, ETH Zürich; Srdjan Capkun, ETH Zürich Network Infrastructure SecurityPatrick TraynorOSPF Vulnerability to Persistent Poisoning Attacks: A Systematic AnalysisGabi Nakibly, Technion; Adi Sosnovich, Technion; Eitan Menahem, Ben Gurion University; Ariel Waizel, Ben Gurion University; Yuval Elovici, Ben Gurion UniversityLess is More: Cipher-Suite Negotiation for DNSSECAmir Herzberg, Bar-Ilan University; Haya Shulman, Technische Universität Darmstadt; Bruno Crispo, University of TrentoDNS Authentication as-a-Service Against Amplification AttacksAmir Herzberg, Bar-Ilan University; Haya Shulman, Technische Universität Darmstadt Readout from the 4th Annual Secure and Resilient Architectures Invitational WorkshopPresenters: Rich Graubart, Deb Bodeau, Rosalie McQuaid, MITRE Corporation
17:15-18:00
Works-in-Progress (DH Holmes BC)Raheem Beyah
18:15-21:00
Poster Reception with light refreshments (Lafitte AB)Raheem Beyah
Friday, 12 December 2014
7:30-8:30
Breakfast (Lafitte AB)
8:30-10:00
Orleans AOrleans BDH Holmes ADH Holmes C
Panel: SCADA System Security: Challenges and Future DirectionsModerator: Irfan Ahmed, University of New Orleans

Panelists:
Chris Sistrunk, Mandiant; 
Tommy Morris, Mississippi State University; 
Eric J. Byres, Tofino Security;
Zach Tudor, SRI International
Access Control and MalwareJohn McDermottRelation Extraction for Inferring Access Control Rules from Natural Language ArtifactsJohn Slankas, North Carolina State University; Xusheng Xiao, North Carolina State University; Laurie Williams, North Carolina State University; Tao Xie, University of Illinois, Urbana-ChampaignCentrality Metrics of Importance in Access Behaviors and Malware DetectionsWeixuan Mao, MOE KLINNS Lab, Xi’an Jiaotong University; Zhongmin Cai, MOE KLINNS Lab, Xi’an Jiaotong University; Xiaohong Guan, MOE KLINNS Lab, Xi’an Jiaotong University; Don Towsley, School of Computer Science, University of MassachusettsScalability, Fidelity and Stealth in the DRAKVUF Dynamic Malware Analysis SystemTamas Lengyel, University of Connecticut; Steve Maresca, Zentific, LLC; Bryan Payne, Nebula, Inc.; George Webster, TUM; Sebastian Vogl, TUM; Aggelos Kiayias, University of Athens Software SecurityThomas MoyerTowards Automated Integrity Protection of C++ Virtual Function Tables in Binary ProgramsRobert Gawlik, Ruhr-University Bochum; Thorsten Holz, Ruhr-University BochumLeveraging Semantic Signatures for Bug Search in Binary ProgramsJannik Pewny, Ruhr-University Bochum; Felix Schuster, Ruhr-University Bochum; Christian Rossow, Ruhr-University Bochum; Lukas Bernhard, Ruhr-University Bochum; Thorsten Holz, Ruhr-University BochumIntFlow: Improving the Accuracy of Arithmetic Error Detection Using Information Flow TrackingMarios Pomonis, Columbia University; Theofilos Petsios, Columbia University; Kangkook Jee, Columbia University; Michalis Polychronakis, Columbia University; Angelos D. Keromytis, Columbia University Cyber Resiliency Table-Top Exercise, Part 1

Leaders: Rich Graubart, Deb Bodeau, Rosalie McQuaid, MITRE Corporation

10:00-10:30
Break (Foyer)
10:30-12:00
Orleans AOrleans BDH Holmes ADH Holmes C
Case Studies IIPaul Black

Aviation Cyber Security R&D: What might be done?, Scott W. Tousley (DHS)

A Process of Security Assurance Properties Unification for Application Logic, Faisal Nabi (Islami Roohani Mission University)

Cyber Physical Systems IIGabriela CiocarlieCPS: Beyond Usability: Applying VSD-Based Methodologies to Investigate Domain Characteristics for Security for Implantable Cardiac DevicesTamara Denning, University of Utah; Batya Friedman, University of Washington; Brian Gill, Seattle Pacific University; Daniel B. Kramer, Beth Israel Deaconess Medical Center; Matthew R. Reynolds, Harvard Clinical Research Institute; Tadayoshi Kohno, University of WashingtonCPS: A Security Evaluation of AIS, Automated Identification SystemMarco Balduzzi, Trend Micro Research; Alessandro Pasta, Independent Researcher; Kyle Wilhoit, Trend Micro Research Web SecurityAdam AvivNodeSentry: Least-Privilege Library Integration for Server-Side JavaScriptWillem De Groef, iMinds-DistriNet, KU Leuven; Fabio Massacci, University of Trento; Frank Piessens, iMinds-DistriNet, KU LeuvenTrueClick: Automatically Distinguishing Trick Banners from Genuine Download LinksSevtap Duman, Northeastern University; Kaan Onarlioglu, Northeastern University; Ali Osman Ulusoy, Brown University; William Robertson, Northeastern University; Engin Kirda, Northeastern UniversityJShield: Towards Real-time and Vulnerability-based Detection of Polluted Drive-by Download AttacksYinzhi Cao, Columbia University; Xiang Pan, Northwestern University; Yan Chen, Northwestern University; Jianwei Zhuge, Tsinghua University Cyber Resiliency Table-Top Exercise, Part 2

Leaders: Rich Graubart, Deb Bodeau, Rosalie McQuaid, MITRE Corporation (continues from the previous session)

12:00-12:30
Closing (Lafitte AB)The Great Giveaway is back! So don't leave early! Click the link for details.
13:00-16:00
Optional Social Event

Mardi Gras World (www.mardigrasworld.com)

 

Powered by OpenConf®
Copyright©2002-2014 Zakon Group LLC