Annual Computer Security Applications Conference (ACSAC) 2022

Full Program »

Posters & Works in Progress Reception with Light Refreshments

Thursday, 8 December 2022
18:30 - 20:00

Interior Courtyard

Chair: Yonghwi Kwon, University of Virginia


A White-Box Adversarial Attack Against a Digital Twin
Wilson Patterson (Mississippi State University), Ivan Fernandez (Mississippi State University), Subash Neupane (Mississippi State University), Milan Parmar (Mississippi State University), Sudip Mittal (Mississippi State University), Shahram Rahimi (Mississippi State University)

Policies as Blockchain Smart Contracts for Ensuring Compliance and Provenance-A Healthcare Industry Perspective-Revised
AL "AMIN, MD" (Colorado State University), Indrajit Ray (Colorado State University)

Mutation-Based Adversarial Attack on Neural Text Detectors
Gongbo Liang (Texas A&M University-San Antonio), Jesus Guerrero (Texas A&M University-San Antonio), Izzat Alsmadi (Texas A&M University-San Antonio)

Designing a Provenance Analysis for SGX Enclaves
Flavio Toffalini (EPFL), Mathias Payer (EPFL), Jianying Zhou (SUTD), Lorenzo Cavallaro (UCL)

ObfusEval: Evaluating Reliability of Obfuscating Transformations
Tetsuya Kitaoka (Nara Institute of Science and Technology), Yuichiro Kanzaki (National Institute of Technology, Kumamoto College), Takashi Ishio (Nara Institute of Science and Technology), Kazumasa Shimari (Nara Institute of Science and Technology), Kenichi Matsumoto (Nara Institute of Science and Technology)

Ensemble Learning for Industrial Intrusion Detection
Dominik Kus (RWTH Aachen University), Konrad Wolsing (Fraunhofer FKIE & RWTH Aachen University), Jan Pennekamp (RWTH Aachen University), Eric Wagner (Fraunhofer FKIE & RWTH Aachen University), Martin Henze (Fraunhofer FKIE & RWTH Aachen University), Klaus Wehrle (RWTH Aachen University), Dominik Kus (RWTH Aachen University)

Translating Cybersecurity Descriptions into Interpretable MITRE Tactics using Transfer Learning
Reza Fayyazi (Rochester Institute of Technology), Yiyuan Steve Wufeng (Rochester Institute of Technology), Pradumna Gautam (Madras Institute of Technology), Shanchieh Jay Yang (Rochester Institute of Technology)

A Lightweight Remote NMS for Private Networks
Jeann Hernandez (University of Puerto Rico), José Ortiz-Ubarri (University of Puerto Rico)

Federated Learning for Securing Smart Vehicles
Sadaf MD Halim (The University of Texas at Dallas), Md. Delwar Hossain (Nara Institute of Science and Technology), Latifur Khan (The University of Texas at Dallas), Hideya Ochiai (The University of Tokyo), Hiroyuki Inoue (Kyoto Sangyo University), Kevin W. Hamlen (The University of Texas at Dallas), Anoop Singhal (National Institute of Standards and Technology), Youki Kadobayashi (Nara Institute of Science and Technology)

One Fuzz Doesn’t Fit All: Optimizing Directed Fuzzing via Target-tailored Program State Restriction
Prashast Srivastava (Purdue University), Stefan Nagy (University of Utah), Matthew Hicks (Virginia Tech), Antonio Bianchi (Purdue University), Mathias Payer (EPFL)
* Best Poster Award

The Phishing Master Anti-Phishing Game
Heike Dietmann (Karlsruhe Institute of Technology), Tobias "Länge" (Karlsruhe Institute of Technology), Philipp Matheis (Karlsruhe Institute of Technology), Aleksandra Pawelek (Karlsruhe Institute of Technology), Benjamin Berens (Karlsruhe Institute of Technology), Mattia Mossano (Karlsruhe Institute of Technology), Maxime Veit (Karlsruhe Institute of Technology), Peter Mayer (Karlsruhe Institute of Technology), Melanie Volkamer (Karlsruhe Institute of Technology)

Building Secure Embedded Control Systems
Fatema Islam Meem (University of Idaho), Adidi Pokharel (University of Idaho), Ronisha Shigdel (University of Idaho), Mina Soltani Siapoush (University of Idaho), Sabiha Jannath Tisha (University of Idaho), Jim Alves-Foss (University of Idaho), Jia Song (University of Idaho), Daniel Conte de Leon (University of Idaho)

Exploring Fast and Secure System Calls in Microkernels
Mina Soltani Siapoush (University of Idaho), Jim Alves-Foss (University of Idaho)

Cross-Organizational Continual Learning of Cyber Threat Models
Chanel Cheng (Rochester Institute of Technology), Shanchieh Yang (Rochester Institute of Technology)

Automated WebAssembly Function Purpose Identification
Alan Romano (University of Southern California), Weihang Wang (University of Southern California)
* Best Poster Award

Dazzle-attack: Anti-Forensic Server-side Attack via FDSM
Kyungchan Lim (University of Tennessee), Bora Lee (University of Virginia), JiHo Lee (University of Virginia), Chijung Jung (University of Virginia), Doowon Kim (University of Tennessee), Kyu Hyung Lee (University of Georgia), Haehyun Cho (Soongsil University), Yonghwi Kwon (University of Virginia)

Works in Progress

Where You're Logged In: Analyzing The Usability Of Device Activity Pages
Angel Fernandes (University of Denver), Philipp Markert (Ruhr University Bochum), Sanchari Das (University of Denver)

Phishing Resiliency Across Socio-Cultural Spheres: Cyrillic Orthographic Zone vs. The Five Eyes
William Smeal (Indiana University), Yash Kumar (Indiana University), Alexander Alexeev (Indiana University), Vaibhav Vishwanath (Indiana University), L. Jean Camp (Indiana University)

A Holistic Evaluation of E-Commerce Payment Security Through Automated and Manual Analysis
Urvashi Kishnani (University of Denver), Briana Whalen (University of Denver), Andy Burris (University of Denver), Sanchari Das (University of Denver)


Powered by OpenConf®
Copyright©2002-2023 Zakon Group LLC