Annual Computer Security Applications Conference (ACSAC) 2022

Monday, 5 December 2022
07:30-08:30
(Break Area)
08:30-12:00
Classroom 104Classroom 115Classroom 116

Two-Day Training

Instructors: SeanMichael Galvin, Shadron Gudmunson, and James Gallagher, Sandia National Labs

One-Day Workshop

General Chair: James Aman, Rice University

Program Chairs : Yupeng Zhang, Texas A&M University; and Hans Behrens, Arizona State University

One-Day Workshop

Program Committee Co-Chairs: Dr. William Claycomb, CERT National Insider Threat Center, Carnegie Mellon University, USA; and Dr. Christina Winters, Tilburg Law School, Tilburg Univ., Netherlands

12:00-13:30
(Tejas)
13:30-17:00
Classroom 104Classroom 115Classroom 116

(Training Continues)

(Workshop Continues)

(Workshop Continues)

Tuesday, 6 December 2022
07:30-08:30
(Break Area)
08:30-12:00
Classroom 104Classroom 108Classroom 115Classroom 116

(Training Continues)

One-Day Workshop

General Co-Chairs: Harvey Rubinovitz, The MITRE Corporation; and Stacy Prowell, Oak Ridge National Laboratory

Program Co-Chairs: Irfan Ahmed, Virginia Commonwealth University; and Constantinos Kolias, University of Idaho

ICSS-Industrial Control System Security -

General Co-Chairs: Harvey Rubinovitz (The MITRE Corporation), Stacy Prowell (Oak Ridge National Laboratory)

Program Co-Chair: Irfan Ahmed (Virginia Commonwealth University), Constantinos Kolias (University of Idaho)

One-Day Workshop

Organizers: Huafeng Zhang, TBTL, Oxford, UK; Muhammad Usama Sardar, TU Dresden, Germany; and Pedro Antonino, TBTL Oxford, UK

PC Chair: Bill Roscoe, University of Oxford and TBTL Oxford, UK

One-Day Workshop

Organizers: David Balenson, USC Information Sciences Institute; and Laura Tinnel, SRI International

12:00-13:30
(Tejas)
13:30-17:00
Classroom 104Classroom 108Classroom 115Classroom 116

(Training Continues)

(Workshop Continues)

(Workshop Continues)

(Workshop Continues)

18:00-20:00
(Interior Courtyard)
Wednesday, 7 December 2022
07:30-08:30
(Tejas)
08:30-09:00
(Amphitheater 204)

ACSAC Conference Welcome: Guofei Gu, Conference Chair     SLIDES
PC Chair Opening Remarks and Distinguished Paper Awards: Gabriela Ciocarlie and Roberto Perdisci, Program Co-Chairs     SLIDES
SWSIS Scholarship Program, Jeremy Epstein, Program Manager     SLIDES

09:00-10:00
(Amphitheater 204)Session Chair: Guofei Gu, Texas A&M University

Dr. Suman Jana, Associate Professor, Department of Computer Science, Columbia University     SLIDES

10:00-10:30
(Tejas)
10:30-12:00
Classroom 203Classroom 202Classroom 201

Moderator: Tomas Vagoun, NITRD

Panelists:
Dan Cosley, Program Director, National Science Foundation
Brian Kettler, Program Manager, DARPA
Jacob Shapiro, Special Advisor, Office of the Director of National Intelligence; Professor of Politics and International Affairs, Princeton University

Session Chair: Gabriela Ciocarlie, The University of Texas at San AntonioPrivacy-Preserving Trajectory Matching on Autonomous Unmanned Aerial VehiclesSavio Sciancalepore, Eindhoven University of Technology (TU/e); Dominik Roy George, Eindhoven University of Technology (TU/e)DRAGON: Deep Reinforcement Learning for Autonomous Grid Operation and Attack DetectionMatthew Landen, Georgia Institute of Technology; Keywhan Chung, Lawrence Livermore National Laboratory; Moses Ike, Georgia Institute of Technology; Sarah Mackay, Lawrence Livermore National Laboratory; Jean-Paul Watson, Lawrence Livermore National Laboratory; Wenke Lee, Georgia Institute of TechnologyRandezvous: Making Randomization Effective on MCUsZhuojia Shen, University of Rochester; Komail Dharsee, University of Rochester; John Criswell, University of RochesterLocal Power Grids at Risk – An Experimental and Simulation-based Analysis of Attacks on Vehicle-To-Grid CommunicationMaria Zhdanova, Fraunhofer SIT; Julian Urbansky, Fraunhofer UMSICHT; Anne Hagemeier, Fraunhofer UMSICHT; Daniel Zelle, Fraunhofer SIT; Isabelle Herrmann, Fraunhofer UMSICHT; Dorian Höffner, Fraunhofer UMSICHTPlay the Imitation Game: Model Extraction Attack against Autonomous Driving LocalizationQifan Zhang, University of California, Irvine; Junjie Shen, University of California, Irvine; Mingtian Tan, Fudan University; Zhe Zhou, Fudan University; Zhou Li, University of California, Irvine; Qi Alfred Chen, University of California, Irvine; Haipeng Zhang, ShanghaiTech University Session Chair: Adam Aviv, George Washington UniversityTowards Practical Application-level Support for Privilege SeparationNik Sultana, Illinois Institute of Technology; Henry Zhu, UIUC; Ke Zhong, University of Pennsylvania; Zhilei Zheng, University of Pennsylvania; Ruijie Mao, University of Pennsylvania; Digvijaysinh Chauhan, University of Pennsylvania; Stephen Carrasquillo, University of Pennsylvania; Junyong Zhao, University of Arizona; Lei Shi, University of Pennsylvania; Nikos Vasilakis, Brown University and MIT; Boon Thau Loo, University of PennsylvaniaFormal Modeling and Security Analysis for Intra-level Privilege SeparationYinggang Guo, State Key Laboratory for Novel Software Technology, Nanjing University; Zicheng Wang, State Key Laboratory for Novel Software Technology, Nanjing University; Bingnan Zhong, State Key Laboratory for Novel Software Technology, Nanjing University; Qingkai Zeng, State Key Laboratory for Novel Software Technology, Nanjing UniversityDesigning a Provenance Analysis for SGX EnclavesFlavio Toffalini, EPFL; Mathias Payer, EPFL; Jianying Zhou, Singapore University of Technology and Design; Lorenzo Cavallaro, University College LondonCloak: Transitioning States on Legacy Blockchains Using Secure and Publicly Verifiable Off-Chain Multi-Party ComputationQian Ren, SSC Holding Company Ltd., Oxford-Hainan Blockchain Research Institute; Yingjun Wu, SSC Holding Company Ltd., Oxford-Hainan Blockchain Research Institute; Han Liu, Oxford-Hainan Blockchain Research Institute, Tsinghua University; Yue Li, Oxford-Hainan Blockchain Research Institute; Anne Victor, SSC Holding Company Ltd., Oxford-Hainan Blockchain Research Institute; Hong Lei, Hainan University, Oxford-Hainan Blockchain Research Institute; Lei Wang, Shanghai Jiao Tong University; Bangdao Chen, SSC Holding Company Ltd., Oxford-Hainan Blockchain Research InstituteStopping Silent Sneaks: Defending against Malicious Mixes with Topological EngineeringXinshu Ma, University of Edinburgh; Florentin Rochet, University of Namur; Tariq Elahi, University of Edinburgh
12:00-13:30
(Tejas)
13:30-15:00
Classroom 203Classroom 202Classroom 201
Session Chair: Dennis Moreau, Intel

Top-Down Continuous Policy Compliance, Sergio Pozo-Hidalgo, Vmware

Gaining Assurance in Commodities within Trustworthy Systems, Ian Bryant, University of Warwick

Session Chair: Qi Alfred Chen, University of California, IrvineLearning from Failures: Secure and Fault-Tolerant Aggregation for Federated LearningMohamad Mansouri, Thales SIX GTS / EURECOM; Melek Önen, EURECOM; Wafa Ben Jaballah, Thales SIX GTSCompressed Federated Learning Based on Adaptive Local Differential PrivacyYinbin Miao, Xidian University; Rongpeng Xie, Xidian University; Xinghua Li, Xidian University; Ximeng Liu, Fuzhou University; Zhuo Ma, Xidian University; Robert H. Deng, Singapore Management UniversitySpacePhish: The Evasion-space of Adversarial Attacks against Phishing Website Detectors using Machine LearningGiovanni Apruzzese, University of Liechtenstein; Mauro Conti, University of Padua; Ying Yuan, University of PaduaCuriosity-Driven and Victim-Aware Adversarial PoliciesChen Gong, Institute of Automation, Chinese Academy of Sciences; Zhou Yang, Singapore Management University; Yunpeng Bai, Institute of Automation, Chinese Academy of Sciences; Jieke Shi, Singapore Management University; Arunesh Sinha, Rutgers University; Bowen Xu, Singapore Management University; David Lo, Singapore Management University; Xinwen Hou, Institute of Automation, Chinese Academy of Sciences; Guoliang Fan, Institute of Automation, Chinese Academy of SciencesBetter Together: Attaining the Triad of Byzantine-robust Federated Learning via Local Update AmplificationLiyue Shen, University of Queensland; Yanjun Zhang, Deakin University; Jingwei Wang, University of Queensland; Guangdong Bai, University of Queensland Session Chair: Giorgio Giacinto, University of Cagliari, ItalyMProbe: Make the code probing meaninglessYongGang Li, China University of Mining and Technology; Yeh-Ching Chung, the Chinese University of Hong Kong (CUHK), Shenzhen; Jinbiao Xing, China University of Mining and Technology; Yu Bao, China University of Mining and Technology; GuoYuan LIn, China University of Mining and TechnologyDitDetector: Bimodal Learning based on Deceptive Image and Text for Macro Malware DetectionJia Yan, Institute of Software, Chinese Academy of Sciences / School of Computer Science and Technology, University of Chinese Academy of Sciences; Ming Wan, QIANXIN Group Inc.; Xiangkun Jia, Institute of Software, Chinese Academy of Sciences; Lingyun Ying, QIANXIN Group Inc.; Purui Su, Institute of Software, Chinese Academy of Sciences / School of Cyber Security, University of Chinese Academy of Sciences; Zhanyi Wang, QIANXIN Group Inc.View from Above: Exploring the Malware Ecosystem from the Upper DNS HierarchyAaron Faulkenberry, Georgia Institute of Technology; Athanasios Avgetidis, Georgia Institute of Technology; Zane Ma, Georgia Institute of Technology; Omar Alrawi, Georgia Institute of Technology; Charles Lever, Devo; Panagiotis Kintis, Voreas Laboratories Inc; Fabian Monrose, Georgia Institute of Technology; Angelos D. Keromytis, Georgia Institute of Technology; Manos Antonakakis, Georgia Institute of TechnologyA Recent Year On the Internet: Measuring and Understanding the Threats to Everyday Internet DevicesAfsah Anwar, Northeastern University; Yi Hui Chen, Northeastern University; Roy Hodgman, Rapid 7; Tom Sellers, runZero; Engin Kirda, Northeastern University; Alina Oprea, Northeastern UniversityMake Data Reliable : An Explanation-powered Cleaning on Malware Dataset Against Backdoor Poisoning AttacksXutong Wang, Institute of Information Engineering, Chinese Academy of Sciences; Chaoge Liu, Institute of Information Engineering, Chinese Academy of Sciences; Xiaohui Hu, School of Computer Science, Beijing University of Posts and Telecommunications; Zhi Wang, Institute of Information Engineering, Chinese Academy of Sciences; Jie Yin, Institute of Information Engineering, Chinese Academy of Sciences; Xiang Cui, Zhongguancun Laboratory
15:00-15:30
(Tejas)
15:30-17:00
Classroom 203Classroom 202Classroom 201

Moderator: Elizabeth Scruggs, Associate Director Cyber Engineering and Hiring Manager, The Aerospace Corporation

Panelists:
Antonio Goree, 2022 High School Graduate and Jobseeker
A. Emmanuel, Autistic self-advocate, Voiceover Artist and Writer
Vincine J. Brown, Chief Neuro-Diversity Architect of I Am 10
Charles Lavine, Senior Cybersecurity Engineering Specialist, The Aerospace Corporation

Session Chair: Sanchari Das, University of DenverReconstruction Attack on Differential Private Trajectory Protection MechanismsErik Buchholz, UNSW Sydney; Alsharif Abuadbba, Data61, CSIRO; Shuo Wang, Data61, CSIRO; Surya Nepal, Data61, CSIRO; Salil S. Kanhere, UNSW SydneyDifferentially Private Map Matching for Mobility TrajectoriesAmmar Haydari, University of California, Davis; Chen-Nee Chuah, University of California, Davis; Michael Zhang, University of California, Davis; Jane Macfarlane, University of California, Berkeley; Sean Peisert, Lawrence berkeley national laboratoryParallel Small Polynomial Multiplication for Dilithium: A Faster Design and ImplementationJieyu Zheng, Fudan university; Feng He, Fudan university; Shiyu Shen, Fudan university; Chenxi Xue, Fudan university; Yunlei Zhao, Fudan universityCryptoGo: Automatic Detection of Go Cryptographic API MisusesWenqing Li, The Institute of Information Engineering, Chinese Acadamy of Sciences.; Shijie Jia, The Institute of Information Engineering, Chinese Acadamy of Sciences.; Limin Liu, The Institute of Information Engineering, Chinese Acadamy of Sciences.; Fangyu Zheng, The Institute of Information Engineering, Chinese Acadamy of Sciences.; Yuan Ma, The Institute of Information Engineering, Chinese Acadamy of Sciences.; Jingqiang Lin, School of Cyber Security, University of Science and Technology of China.Closing the Loophole: Rethinking Reconstruction Attacks in Federated Learning from a Privacy StandpointSeung Ho Na, KAIST; Hyeong Gwon Hong, KAIST; Junmo Kim, KAIST; Seungwon Shin, KAIST Session Chair: Fabian Monrose, University of North Carolina at Chapel HillTyPro: Forward CFI for C-Style Indirect Function Calls Using Type PropagationMarkus Bauer, CISPA – Helmholtz Center for Information Security; Ilya Grishchenko, University of California, Santa Barbara; Christian Rossow, CISPA – Helmholtz Center for Information SecurityPractical Binary Code Similarity Detection with BERT-based Transferable Similarity LearningSunwoo Ahn, Seoul National University; Seonggwan Ahn, Seoul National University; Hyungjoon Koo, Sungkyunkwan University; Yunheung Paek, Seoul National UniversitySnappy: Efficient Fuzzing with Adaptive and Mutable SnapshotsElia Geretto, Vrije Universiteit Amsterdam; Cristiano Giuffrida, Vrije Universiteit Amsterdam; Herbert Bos, Vrije Universiteit Amsterdam; Erik van der Kouwe, Vrije Universiteit AmsterdamOne Fuzz Doesn’t Fit All: Optimizing Directed Fuzzing via Target-tailored Program State RestrictionPrashast Srivastava, Purdue University; Stefan Nagy, University of Utah; Matthew Hicks, Virginia Tech; Antonio Bianchi, Purdue University; Mathias Payer, EPFLFrom Hindsight to Foresight: Enhancing Design Artifacts for Business Logic Flaw DiscoveryCarmen Cheh, Advanced Digital Sciences Center, Singapore; Nicholas Tay, Singapore University of Technology and Design; Binbin Chen, Singapore University of Technology and Design
18:30-21:00
(Tejas)
Thursday, 8 December 2022
07:30-08:30
(Tejas)
08:30-09:00
(Amphitheater 204)Session Chair: Guofei Gu & Juan Caballero

ToT Committee Chair Remarks, SLIDES

09:00-10:00
(Amphitheater 204)Session Chair: Guofei Gu & Roberto Perdisci

SLIDES

10:00-10:30
(Tejas)
10:30-12:00
Classroom 203Classroom 202Classroom 201

Moderator: S. Jay Yang, Ph.D., ESL Global Cybersecurity Institute, Rochester Institute of Technology

Panelists:
David Balenson, USC Information Science Institute
Sebastián García, Stratosphere Laboratory, Czech Technical University
Robert Beverly, National Science Foundation
Emma Tosch, Northeastern University
Sagar Samtani, Indiana University

Session Chair: Michael Clifford , Toyota InfoTech LabsAssessing Model-free Anomaly Detection in Industrial Control Systems Against Generic Concealment AttacksAlessandro Erba, CISPA Helmholtz Center for Information Security; Nils Ole Tippenhauer, CISPA Helmholtz Center for Information SecuritySPACELORD: Private and Secure Smart Space SharingYechan Bae, Georgia Institute of Technology; Sarbartha Banerjee, University of Texas at Austin; Sangho Lee, Microsoft Research; Marcus Peinado, Microsoft ResearchBayesImposter: Bayesian Estimation Based .bss Imposter Attack on Industrial Control SystemsAnomadarshi Barua, University of California, Irvine; Lelin Pan, University of California, Irvine; Mohammad Abdullah Al Faruque, University of California, IrvineRipples in the Pond: Transmitting Information through Grid Frequency ModulationJan Götte, TU Darmstadt; Liran Katzir, Tel Aviv University; Björn Scheuermann, TU DarmstadtStepping out of the MUD: Contextual threat information for IoT devices with manufacturer-provided behavior profilesLuca Morgese Zangrandi, TNO; Thijs van Ede, University of Twente; Tim Booij, TNO; Savio Sciancalepore, Eindhoven University of Technology; Luca Allodi, Eindhoven University of Technology; Andrea Continella, University of Twente Session Chair: Jinpeng Wei, University of North Carolina at CharlotteTransformer-Based Language Models for Software Vulnerability DetectionChandra Thapa, CSIRO Data61; Seung Ick Jang, CSIRO Data61; Muhammad Ejaz Ahmed, CSIRO Data61; Seyit Camtepe, CSIRO Data61; Josef Pieprzyk, CSIRO Data61; Surya Nepal, CSIRO Data61Compact Abstract Graphs for Detecting Code Vulnerability with GNN ModelsYu Luo, University of Missouri - Kansas City; Weifeng Xu, The University of Baltimore; Dianxiang Xu, University of Missouri - Kansas CityBoosting Neural Networks to Decompile Optimized BinariesYing Cao, Institute of Information Engineering, Chinese Academy of Sciences; Ruigang Liang, Institute of Information Engineering, Chinese Academy of Sciences; Kai Chen, Institute of Information Engineering, Chinese Academy of Sciences; Peiwei Hu, Institute of Information Engineering, Chinese Academy of SciencesSLOPT: Bandit Optimization Framework for Mutation-Based FuzzingYuki Koike, Ricerca Security, Inc.; Hiroyuki Katsura, Ricerca Security, Inc.; Hiromu Yakura, University of Tsukuba / National Institute of Advanced Industrial Science and Technology (AIST), Japan; Yuma Kurogome, Ricerca Security, Inc.Alphuzz: Monte Carlo Search on Seed-Mutation Tree for Coverage-Guided FuzzingYiru Zhao, Wuhan university; Xiaoke Wang, Wuhan university; Lei Zhao, Wuhan university; Yueqiang Cheng, NIO Security Research; Heng Yin, UC Riverside
12:00-13:30
(Tejas)

Code Genome - Fingerprinting Code to Help Secure the Software Supply Chain     SLIDES
Jiyong Jang, Principal Research Scientist and Manager of the Cyber Security Intelligence (CSI) team, IBM Thomas J. Watson Research Center 

13:30-15:00
Classroom 203Classroom 202Classroom 201
Session Chair: Dennis Moreau, Intel

Applying MITRE’s System of Trust to the Software Supply Chain, Robert Martin, MITRE

Shifting Left the Right Way with OSCAL (Open Security Controls Assessment Language), Chris Compton, Nikita Wootten, and Alexander Stein, NIST ITL Computer Security Division

Automated Generation of Yara Classifiers for Malware, Arun Lakhotia, University of Louisiana at Lafayette and CTO & Co Founder of Cythereal

Session Chair: David Balenson, USC Information Sciences InstituteOn the Implications of Spoofing and Jamming Aviation Datalink ApplicationsHarshad Sathaye, Northeastern University; Guevara Noubir, Northeastern University; Aanjhan Ranganathan, Northeastern UniversityYou have been warned: Abusing 5G’s Warning and Emergency SystemsEvangelos Bitsikas, New York University Abu Dhabi and Northeastern University; Christina Pöpper, New York University Abu DhabiAnalysis of Payment Service Provider SDKs in AndroidSamin Yaseer Mahmud, North Carolina State University; K. Virgil English, North Carolina State University; Seaver Thorn, North Carolina State University; William Enck, North Carolina State University; Adam Oest, PayPal; Muhammad Saad, PayPal Session Chair: Peter Mayer, Karlsruhe Institute of TechnologyUser Perceptions of the Privacy and Usability of Smart DNSRahel A. Fainchtein, Georgetown University; Adam J. Aviv, The George Washington University; Micah Sherr, Georgetown UniversityUser Perceptions of Five-Word PasswordsXiaoyuan Wu, The George Washington University; Collins W. Munyendo, The George Washington University; Eddie Cosic, The George Washington University; Genevieve A. Flynn, The George Washington University; Olivia Legault, The George Washington University; Adam J. Aviv, The George Washington UniversityA Qualitative Evaluation of Reverse Engineering Tool UsabilityJames Mattei, Tufts University; Madeline McLaughlin, Tufts University; Samantha Katcher, Tufts University; Daniel Votipka, Tufts University
15:00-15:30
(Tejas)
15:30-17:00
Classroom 203Classroom 202Classroom 201

Moderator: Daniel P. Faigin, The Aerospace Corporation

Panelists:
Martin Stanley, U.S. Department of Homeland Security, Cybersecurity and Infrastructure Security Agency
Jeremy Epstein, National Science Foundation
Peter Mell, Senior Computer Scientist, Computer Security Division, National Institute of Standards and Technology
Chester Maciag, U.S. Department of Defense, OUSD(R&E) Director for Cyber Technologies, DCTO (Critical Technology), Integrated Sensing and Cyber (IS&C)
Michael Clifford, Research Scientist, Toyota InfoTech Labs

Session Chair: Tyson Bailey, Sandia National LaboratoriesAFLGuard: Byzantine-robust Asynchronous Federated LearningMinghong Fang, The Ohio State University; Jia Liu, The Ohio State University; Neil Zhenqiang Gong, Duke University; Elizabeth S. Bentley, Air Force Research LaboratorySqueezing More Utility via Adaptive Clipping on Differentially Private Gradients in Federated Meta-LearningNing Wang, Virginia Polytechnic Institute and State University; Yang Xiao, University of Kentucky; Yimin Chen, University of Massachusetts Lowell; Ning Zhang, Washington University in St. Louis; Wenjing Lou, Virginia Polytechnic Institute and State University; Y. Thomas Hou, Virginia Polytechnic Institute and State UniversityDrone Authentication via Acoustic FingerprintYufeng Diao, University of Glasgow; Yichi Zhang, University of Glasgow; Guodong Zhao, University of Glasgow; Mohamed Khamis, University of GlasgowNeuGuard: Lightweight Neuron-Guided Defense against Membership Inference AttacksNuo Xu, Lehigh University; Binghui Wang, Illinois Institute of Technology; Ran Ran, Lehigh University; Wujie Wen, Lehigh University; Parv Venkitasubramaniam, Lehigh UniversityMore is Better (Mostly): On the Backdoor Attacks in Federated Graph Neural NetworksJing Xu, TU Delft; Rui Wang, TU Delft; Stefanos Koffas, TU Delft; Kaitai Liang, TU Delft; Stjepan Picek, Radboud University & TU Delft Session Chair: Guofei Gu, Texas A&M UniversityZeroDNS: Towards Better Zero Trust Security using DNSLevente Csikor, Institute for Infocomm Research, A*STAR; Sriram Ramachandran, Institute for Infocomm Research, A*STAR; Anantharaman Lakshminarayanan, Institute for Infocomm Research, A*STARAre There Wireless Hidden Cameras Spying on Me?Jeongyoon Heo, Samsung Research; Sangwon Gil, Samsung Research; Youngman Jung, Samsung Research; Jinmok Kim, Samsung Research; Donguk Kim, Samsung Research; Woojin Park, Samsung Research; Yongdae Kim, KAIST; Kang G. Shin, The University of Michigan; Choong-Hoon Lee, Samsung ResearchIf You Can’t Beat Them, Pay Them: Bitcoin Protection Racket is ProfitableZheng Yang, Southwest University; Chao Yin, Vrije University Amsterdam, Netherlands; Junming Ke, University of Tartu; Anh Dinh, Singapore University of Technology and Design; Jianying Zhou, Singapore University of Technology and DesignInteraction matters: a comprehensive analysis and a dataset of hybrid IoT/OT honeypotsShreyas Srinivasa, Aalborg University; Jens Myrup Pedersen, Aalborg University; Emmanouil Vasilomanolakis, Technical University of DenmarkStateDiver: Testing Deep Packet Inspection Systems with State-Discrepancy GuidanceZhechang Zhang, Huazhong University of Science and Technology; Bin Yuan, Huazhong University of Science and Technology; Kehan Yang, Huazhong University of Science and Technology; Deqing Zou, Huazhong University of Science and Technology; Hai Jin, Huazhong University of Science and Technology
17:15-18:15
(Amphitheater 204)Session Chair: Daniel Faigin & David Balenson
18:30-20:00
(Interior Courtyard)Session Chair: Yonghwi Kwon, University of Virginia
Friday, 9 December 2022
07:30-08:30
(Tejas)
08:30-10:00
Classroom 203Classroom 202Classroom 201

Moderator: Mark W Winstead, Mitre

Panelists:
Albert Tao, Extreme Networks
Brian Viola, USAF Platform One
Justin Fisher, Leidos

Session Chair: S. Jay Yang, Rochester Institute of TechnologyMADDC: Multi-Scale Anomaly Detection, Diagnosis and Correction for Discrete Event Logsxiaolei Wang, College of Computer, National University of Defense Technology; Lin Yang, National Key Laboratory of Science and Technology on Information System Security, Systems Engineering Institute, AMS; Dongyang Li, National Key Laboratory of Science and Technology on Information System Security, Systems Engineering Institute, AMS; Linru Ma, National Key Laboratory of Science and Technology on Information System Security, Systems Engineering Institute, AMS; Yongzhong He, School of Computer and Information Technology,Beijing Jiaotong University; Junchao Xiao, School of Systems Science and Engineering, Sun Yat-Sen University; Jiyuan Liu, College of Computer, National University of Defense Technology; Yuexiang Yang, College of Computer, National University of Defense TechnologyENIDrift: A Fast and Adaptive Ensemble System for Network Intrusion Detection under Real-world DriftXian Wang, The Hong Kong University of Science and TechnologyTowards Enhanced EEG-based Authentication with Motor Imagery Brain-Computer InterfaceBingkun Wu, Technical University of Denmark, Denmark; Weizhi Meng, Technical University of Denmark, Denmark; Wei-Yang Chiu, Technical University of Denmark, DenmarkFAuST: Striking a Bargain between Forensic Auditing’s Security and ThroughputMuhammad Adil Inam, University of Illinois at Urbana-Champaign; Akul Goyal, University of Illinois at Urbana-Champaign; Jason Liu, University of Illinois at Urbana-Champaign; Jaron Mink, University of Illinois at Urbana-Champaign; Noor Michael, University of Illinois at Urbana-Champaign; Sneha Gaur, University of Illinois at Urbana-Champaign; Adam Bates, University of Illinois at Urbana-Champaign; Wajih Ul Hassan, University of VirginiaRAPID: Real-Time Alert Investigation with Context-aware Prioritization for Efficient Threat DiscoveryYushan Liu, Google, Inc.; Xiaokui Shu, IBM Research; Yixin Sun, University of Virginia; Jiyong Jang, IBM Research; Prateek Mittal, Princeton Univ. Session Chair: Mustakimur Rahman Khandaker, University of GeorgiaDF-SCA: Dynamic Frequency Side Channel Attacks are PracticalDebopriya Roy Dipta, Iowa State University; Berk Gulmezoglu, Iowa State UniversityPOPKORN: Popping Windows Kernel Drivers At ScaleRajat Gupta, Georgia Institute of Technology; Lukas Dresel, University of California, Santa Barbara; Noah Spahn, University of California, Santa Barbara; Giovanni Vigna, University of California, Santa Barbara; Christopher Kruegel, University of California, Santa Barbara; Taesoo Kim, Georgia Institute of TechnologyMaking Memory Account Accountable: Analyzing and Detecting Memory Missing-account bugs for Container PlatformsYutian Yang, Zhejiang University; Wenbo Shen, Zhejiang University; Xun Xie, Zhejiang University; Kangjie Lu, Zhejiang University; Mingsen Wang, Zhejiang University; Tianyu Zhou, Zhejiang University; Chenggang Qin, Ant Group; Wang Yu, Ant Group; Kui Ren, Zhejiang University
10:00-10:30
(Tejas)
10:30-11:25
Classroom 203Classroom 202Classroom 201
Session Chair: Roberto Perdisci, University of Georgia and Georgia TechDeView: Confining Progressive Web Applications by Debloating Web APIsChangSeok Oh, Georgia Institute of Technology; Sangho Lee, Microsoft Research; Chenxiong Qian, HKU; Hyungjoon Koo, Sungkyunkwan University; Wenke Lee, Georgia Institute of TechnologyNo Signal Left to Chance: Driving Browser Extension Analysis by Download PatternsPablo Picazo, Chalmers University of Technology; Benjamin Eriksson, Chalmers University of Technology; Andrei Sabelfeld, Chalmers University of TechnologyAccept all Exploits: Exploring the Security Impact of Cookie BannersDavid Klein, Technische Universität Braunschweig; Marius Musch, Technische Universität Braunschweig; Thomas Barber, SAP Security Research; Moritz Kopmann, Technische Universität Braunschweig; Martin Johns, Technische Universität Braunschweig Session Chair: Gabriela Ciocarlie, The University of Texas at San AntonioTrebiz: Byzantine Fault Tolerance with Byzantine MerchantsXiaohai Dai, Huazhong University of Science and Technology; Liping Huang, Huazhong University of Science and Technology; Jiang Xiao, Huazhong University of Science and Technology; Zhaonan Zhang, Huazhong University of Science and Technology; Xia Xie, Hainan University; Hai Jin, Huazhong University of Science and TechnologyArchiveSafe LT: Secure Long-term Archiving SystemMoe Sabry, McMaster University; Reza Samavi, Toronto Metropolitan UniversityHeimdallr: Fingerprinting SD-WAN Control-Plane Architecture via Encrypted Control TrafficMinjae Seo, The Affiliated Institute of ETRI; Jaehan Kim, KAIST; Eduard Marin, Telefonica Research; Myeongsung You, KAIST; Taejune Park, Chonnam National University; Seungsoo Lee, Incheon National University; Seungwon Shin, KAIST; Jinwoo Kim, Kwangwoon University Session Chair: Chia-Che Tsai, Texas A&M UniversityCoCoTPM: Trusted Platform Modules for Virtual Machines in Confidential Computing EnvironmentsJoana Pecholt, Fraunhofer AISEC; Sascha Wessel, Fraunhofer AISECiService: Detecting and Evaluating the Impact of Confused Deputy Problem in AppleOSYizhuo Wang, Shanghai Jiao Tong University; Yikun Hu, Shanghai Jiao Tong University; Xuangan Xiao, Shanghai Jiao Tong University; Dawu Gu, Shanghai Jiao Tong UniversityMoLE: Mitigation of Side-channel Attacks against SGX via Dynamic Data Location EscapeFan Lang, State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences; School of Cyber Security, University; Wei Wang, State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences; Lingjia Meng, State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences; School of Cyber Security, University; Jingqiang Lin, University of Science and Technology of China; Qiongxiao Wang, State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences; Linli Lu, State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences
11:30-12:00
(Amphitheater 204)

Don't leave early -- attend our closing plenary to learn about next year's conference and participate in our prize giveaway!     SLIDES

12:30-17:00
(Lobby)

Interactive and immersive art show (https://austin.wonderspaces.com)

 



Powered by OpenConf®
Copyright©2002-2023 Zakon Group LLC