Two Day
Instructors: Kevin Nauer and SeanMichael Galvin, Sandia National Labs
Two Day
Rance J. DeLong, consultant, LAW General Chair
Gabriela Ciocarlie, SRI International, LAW Program Chair
Two Day
J. Todd McDonald, University of South Alabama, SSPREW General Chair.
Mila Dalla Preda, University of Verona, Italy, SSPREW Program Co-chair.
Natalia Stakhanova, University of New Brunswick, Canada, SSPREW Program Co-chair.
Zinaida Benenson, Univ. of Erlangen-Nurnberg, Program Co-Chair
Carrie Gates, Independent Consultant, Program Co-Chair
Giampaolo Bella, Univ. of Catania, Workshop Organizer
Gabriele Lenzini, Univ. of Luxembourg, Workshop Organizer
Full Day
Giovanni Russello, University of Auckland
Full Day
Paolina Centonze, Iona College
Full Day
Fish (Ruoyu) Wang, Yan Shoshitaishvili, and Chris Salls, UC Santa Barbara
(continues from the morning)
(continues from morning session)
(continues from the morning)
(continues from morning session)
(continues from the morning)
(continues from the morning)
(continues from the morning)
(continues from the previous day)
(continues from previous day)
(continues from the previous day)
Half Day
Kurt Rohloff, New Jersey Institute of Technology
Harvey Rubinovitz, The MITRE Corporation, ICSS General Co-chair.
Adam Hahn, Washington State University, ICSS General Co-chair.
Irfan Ahmed, The University of New Orleans, ICSS Program Chair.
Full Day
Craig Smith, Theia Labs and Brendan Harris, US Dept. of Transportation Volpe Center
Full Day
John Ortiz, Harris and UT San Antonio
(continues from the morning)
(continues from morning session)
(continues from the morning)
Half Day
Hassan Takabi, University of North Texas
(continues from the morning session)
(continues from the morning)
(continues from the morning)
ACSAC Conference Welcome, Stephen Schwab, Conference Chair
Best Paper Awards, Dr. Wil Robertson, Program Chair and Dr. Davide Balzarotti, Program Co-Chair
SWSIS Scholarship Awards, Jeremy Epstein, ACSA and Linda Chung Maloney, HPE
Scaling Properties of Software and System Security
Dr. Paul Vixie, CEO, Farsight Security
Moderator: Tomas Vagoun, NITRD Cybersecurity and Privacy R&D Technical Coordinator
Panelists:
Sean Brooks, Privacy Engineer, NIST
Deborah Shands, Program Director, NSF
Jeremy Epstein, Program Manager, DARPA
Erin Kenneally, Program Manager, DHS S&T
Phoebe Rouge, Technologist, FTC
Session Chair: Graham BakerIOT: Formal Security Analysis of Smart Embedded Systems Farid Molazem , University of British Columbia; Karthik Pattabiraman, University of British ColumbiaIOT: An Ultra-Lightweight White-Box Encryption Scheme for Securing Resource-Constrained IoT Devices Yang Shi, Tongji University; Wujing Wei, Tongji University; Zongjian He, Tongji University; Hongfei Fan, Tongji UniversityIOT: A Multi-Cloud based Privacy-Preserving Data Publishing Scheme for the Internet of Things Lei Yang, University of Kansas; Abdulmalik Humayed, University of Kansas; Fengjun Li, University of Kansas Session Chair: Thomas MoyerELAR: Extremely Lightweight Auditing and Repairing for Cloud Security Thao Tran Phuong, KDDI R&D Laboratories; Kazumasa Omote, University of TsukubaPileus: Protecting User Resources from Vulnerable Cloud Services Yuqiong Sun, Pennsylvania State University; Giuseppe Petracca, Pennsylvania State University; Xinyang Ge, Pennsylvania State University; Trent Jaeger, Pennsylvania State UniversityBootstrapping and Maintaining Trust in the Cloud Nabil Schear, MIT Lincoln Laboratory; Patrick Cable, MIT Lincoln Laboratory; Thomas Moyer, MIT Lincoln Laboratory; Bryan Richard, MIT Lincoln Laboratory; Robert Rudd, MIT Lincoln LaboratoryModerators: Benjamin Price and Michael Zhivich, MIT Lincoln Laboratory
Panelists:
Tim Vidas, CGC Infrastructure Team
Lok Yan, CGC Infrastructure Team
Chris Eagle, CGC Infrastructure Team
Yan Shoshitaishvili, Shellphish Team (3rd Place)
David Melski, TechX Team (2nd Place)
Brian Knudson, DeepRed Team
Session Chair: Vasileios KemerlisDecomposition of MAC Address Structure for Granular Device Inference Jeremy Martin, US Naval Academy; Erik Rye, US Naval Academy; Robert Beverly, Naval Postgraduate SchoolTiming-based Reconnaissance and Defense in Software-defined Networks John Sonchack, University of Pennsylvania; Anurag Dubey, University of Colorado, Boulder; Adam Aviv, United States Naval Academy; Eric Keller, University of Colorado, Boulder; Jonathan Smith, University of PennsylvaniaRevProbe: Detecting Silent Reverse Proxies in Malicious Server Infrastructures Antonio Nappa, IMDEA Software Institute; Rana Faisal Munir, Universitat Politecnica de Catalonia; Irfan Khan Tanoli, Gran Sasso Science Institute; Christian Kreibich , LastLine & International Computer Science Institute; Juan Caballero, IMDEA Software Institute Session Chair: Brendan Dolan-GavittLife-experience passwords (LEPs) Simon Woo, USC/ISI; Elsi Kaiser, USC; Ron Artstein, USC/ICT; Jelena Mirkovic, USC/ISIUsing Image Saliency and Regions of Interest to Encourage Stronger Graphical Passwords Mohammad Alshehri, Institute of Public Administration; Heather Crawford, Florida Institute of TechnologyCPAC: Securing Critical Infrastructure with Cyber-Physical Access Control sriharsha etigowni, Rutgers University; Dave (Jing) Tian, University of Florida; Grant Hernandez, University of Florida; Saman Zonouz, Rutgers University; Kevin Butler, University of Florida Session Chair: Erin KenneallySpeakers:
Erin Kenneally, Cyber Security Division, DHS
Paul Royal, George Tech Information Security Center (GTISC)
John Heidemann, USC Information Sciences Institute
Speakers:
Mr. Michael McEvilley, The MITRE Corporation (invited)
Dr. William Young, USAF (invited)
Session Chair: Juan CaballeroCode Obfuscation Against Symbolic Execution Attacks Sebastian Banescu, Technisch Universität München; Christian Collberg, University of Arizona; Vijay Ganesh, University of Waterloo; Zack Newsham, University of Waterloo; Alexander Pretschner, Technisch Universität MünchenVulPecker: An Automated Vulnerability Detection System Based on Code Similarity Analysis Zhen Li, Huazhong University of Science and Technology; Hebei University; Deqing Zou, Huazhong University of Science and Technology; Shouhuai Xu, University of Texas at San Antonio; Hai Jin, Huazhong University of Science and Technology; Hanchao Qi, Huazhong University of Science and Technology; Jie Hu, Huazhong University of Science and TechnologyEvilCoder: Automated Bug Insertion Jannik Pewny, Horst-Görtz Institute, Ruhr-University Bochum; Thorsten Holz, Horst-Görtz Institute, Ruhr-University Bochum Session Chair: Davide BalzarottiCatching Predators at Watering Holes: Finding and Understanding Strategically Compromised Websites Sumayah alrwais, Indiana University at Bloomington; Kan Yuan, Indiana University at Bloomington; Eihal Alowaisheq, Indiana University at Bloomington; Xiaojing Liao, Georgia Institute of Technology; Alina Oprea, RSA Labs; Xiaofeng Wang, Indiana University at Bloomington; Zhou Li, RSA LabsThe Achilles' Heel of OAuth: A Multi-Platform Study of OAuth-based Authentication Hui Wang, Shanghai Jiao Tong University; Yuanyuan Zhang, Shanghai Jiao Tong University; Juanru Li, Shanghai Jiao Tong University; Dawu Gu, Shanghai Jiao Tong UniversityAdaptive Encrypted Traffic Fingerprinting With Bi-Directional Dependence Khaled Al-Naami, The University of Texas at Dallas; Swarup Chandra, The University of Texas at Dallas; Ahmad Mustafa, The University of Texas at Dallas; Latifur Khan, The University of Texas at Dallas; Zhiqiang Lin, The University of Texas at Dallas; Kevin Hamlen, The University of Texas at Dallas; Bhavani Thuraisingham, The University of Texas at DallasSoftware Security in the Real World
Dr. Úlfar Erlingsson, Manager of Security Research, Google
Hackers and Evil Doers – How to Keep Your Digital Experience Safe and Secure on the Cloud, Bob McCandless, Blue Iron Network
Encrypting the Brain of IOT, Ed Yu, Overnest, Inc.
Impact of the Physical Web and Beacons in the Classroom and College, Debasis Bhattacharya, University of Maui College
Speaker:
Deborah Frincke, Director of Research, NSA
Moderator:
Adam Aviv, US Naval Academy
Panelists:
Mark Gondree, Sonoma State University
Colleen Lewis, Harvey Mudd College
Jelena Mirkovic, University of Southern California Information Sciences Institute
Session Chair: William RobertsonPractical and Secure Dynamic Searchable Encryption via Oblivious Access on Distributed Data Structure Thang Hoang, Oregon State University; Attila Yavuz, Oregon State University; Jorge Guajardo, Robert Bosch Research and Technology CenterCoKey: Fast Token-Based Cooperative Cryptography Julian Horsch, Fraunhofer AISEC; Sascha Wessel, Fraunhofer AISEC; Claudia Eckert, Technische Universität MünchenThe Cloudier Side of Cryptographic End-to-end Verifiable Voting: A Security Analysis of Helios Aleksander Essex, Western University; Nicholas Chang-Fong, Western University Session Chair: Dongyan XuShieldFS: A Self-healing, Ransomware-aware Filesystem Andrea Continella, Politecnico di Milano; Alessandro Guagnelli, Politecnico di Milano; Giovanni Zingaro, Politecnico di Milano; Giulio De Pasquale, Politecnico di Milano; Alessandro Barenghi, Politecnico di Milano; Stefano Zanero, Politecnico di Milano; Federico Maggi, Politecnico di MilanoCypider: Building Community-Based Cyber-Defense Infrastructure for Android Malware Detection ElMouatez Billah KARBAB, Concordia University; Mourad Debbabi, Concordia University; Abdelouahid Derhab, King Saud University; Djedjiga Mouheb, Concordia UniversityIntelligent, Automated Red Team Emulation Andy Applebaum, The MITRE Corporation; Doug Miller, The MITRE Corporation; Blake Strom, The MITRE Corporation; Chris Korban, The MITRE Corporation; Ross Wolf, The MITRE Corporation Session Chair: Kevin GreeneSpeakers:
Kevin Greene, Cyber Security Division, DHS
Dr Robert McGraw, CTO, RAM Laboratories, Inc.
Joshua Garcia, Associate Project Scientist, Institute for Software Research, UC Irvine
Chocoholic Extravaganza
"Las cosas claras y el chocolate espeso." (Ideas should be clear and chocolate thick.) Spanish proverb
Speakers:
CPSSEC Program Overview, Dan Massey, Cyber Security Division, DHS
The Intrinsically Secure, Open, and Safe Cyber-physically Enabled, Life-critical Essential Services (ISOSCELES),Todd Carpenter, Adventium Labs
Side-Channel Causal Analysis for Design of Cyber-Physical Security, David Payton, HRL Laboratories
Moderator: Amir Houmansadr, University of Massachusetts Amherst
Panelists:
Adam Fisk, Lantern
Eric Wustrow, Univ. of Colorado Boulder
Daniel Ellard, Raytheon BBN Technologies
Ben Schwartz, Google
Session Chair: Christophe HauserVTPin: Practical VTable Hijacking Protection for Binaries Pawel Sarbinowski, Vrije Universiteit Amsterdam; Vasileios P. Kemerlis, Brown University; Cristiano Giuffrida, Vrije Universiteit Amsterdam; Elias Athanasopoulos, Vrije Universiteit AmsterdamLMP: Light-Weighted Memory Protection with Hardware Assistance Wei Huang, University of Toronto; Zhen Huang, University of Toronto; Dhaval Miyani, University of Toronto; David Lie, University of TorontoFASE: Functionality-Aware Security Enforcement Petar Tsankov, ETH Zurich; Marco Pistoia, IBM T. J. Watson Research Center; Omer Tripp, Google; Martin Vechev, ETH Zurich; Pietro Ferrara, Julia Session Chair: Hassan TakabiReliably Determining Data Leakage in the Presence of Strong Attackers Riccardo Bortolameotti, University of Twente; Andreas Peter, University of Twente; Maarten H. Everts, TNO; University of Twente; Willem Jonker, University of Twente and EIT Digital; Pieter Hartel, University of TwenteSanitizing Data is Not Enough! Towards Sanitizing Structural Artifacts in Flash Media Bo Chen, University of Memphis; Shijie Jia, Chinese Academy of Sciences; Luning Xia, Chinese Academy of Sciences; Peng Liu, Pennsylvania State UniversityAUROR: Defending Against Poisoning Attacks in Collaborative Deep Learning Systems Shiqi Shen, National University of Singapore; Shruti Tople, National University of Singapore; Prateek Saxena, National University of SingaporeAttend our giveaway at the closing plenary! So don't leave early!
Outing to LACMA/Peterson Museum