ACSAC2016 Program

Annual Computer Security Applications Conference (ACSAC) 2016
OpenConf Peer Review & Conference Management System

Monday, 5 December 2016
7:30am-8:30am
(Sierra A)
8:30am-12:00pm
Club Room Hiro Mandarin Salon 5 Salon 6A Salon 6B Salon 8

Two Day

Instructors: Kevin Nauer and SeanMichael Galvin, Sandia National Labs

Two Day

Rance J. DeLong, consultant, LAW General Chair
Gabriela Ciocarlie, SRI International, LAW Program Chair

Two Day

J. Todd McDonald, University of South Alabama, SSPREW General Chair.

Mila Dalla Preda, University of Verona, Italy, SSPREW Program Co-chair.

Natalia Stakhanova, University of New Brunswick, Canada, SSPREW Program Co-chair.

Zinaida Benenson, Univ. of Erlangen-Nurnberg, Program Co-Chair
Carrie Gates, Independent Consultant, Program Co-Chair

Giampaolo Bella, Univ. of Catania, Workshop Organizer
Gabriele Lenzini, Univ. of Luxembourg, Workshop Organizer

Full Day

Giovanni Russello, University of Auckland

Full Day

Paolina Centonze, Iona College

Full Day

Fish (Ruoyu) Wang, Yan Shoshitaishvili, and Chris Salls, UC Santa Barbara

12:00pm-1:30pm
(Sierra A)
1:30pm-5:00pm
Club Room Hiro Mandarin Salon 5 Salon 6A Salon 6B Salon 8

(continues from the morning)

(continues from morning session)

(continues from the morning)

(continues from morning session)

(continues from the morning)

(continues from the morning)

(continues from the morning)

Tuesday, 6 December 2016
7:30am-8:30am
(Sierra A)
8:30am-12:00pm
Club Room Hiro Mandarin Salon 5 Salon 6A Salon 6B Salon 8

(continues from the previous day)

(continues from previous day)

(continues from the previous day)

Half Day

Kurt Rohloff, New Jersey Institute of Technology

Harvey Rubinovitz, The MITRE Corporation, ICSS General Co-chair.
Adam Hahn, Washington State University, ICSS General Co-chair.

Irfan Ahmed, The University of New Orleans, ICSS Program Chair.

Full Day

Craig Smith, Theia Labs and Brendan Harris, US Dept. of Transportation Volpe Center

Full Day

John Ortiz, Harris and UT San Antonio

12:00pm-1:30pm
(Sierra A)
1:30pm-5:00pm
Club Room Hiro Mandarin Salon 5 Salon 6A Salon 6B Salon 8

(continues from the morning)

(continues from morning session)

(continues from the morning)

Half Day

Hassan Takabi, University of North Texas

(continues from the morning session)

(continues from the morning)

(continues from the morning)

6:00pm-8:00pm
(Sierra Courtyard)
Wednesday, 7 December 2016
7:30am-8:30am
(Sierra A)
8:30am-9:00am
(Sierra CD)Session Chair: Stephen Schwab

ACSAC Conference Welcome, Stephen Schwab, Conference Chair

Best Paper Awards, Dr. Wil Robertson, Program Chair and Dr. Davide Balzarotti, Program Co-Chair

SWSIS Scholarship Awards, Jeremy Epstein, ACSA and Linda Chung Maloney, HPE

9:00am-10:00am
(Sierra CD)Session Chair: Stephen Schwab

Scaling Properties of Software and System Security

Dr. Paul Vixie, CEO, Farsight Security

10:00am-10:30am
(Sierra Foyer)
10:30am-12:00pm
Internet of Things Cloud Security
Club Room Sierra B Sierra C
Session Chair: Tomas Vagoun

Moderator: Tomas Vagoun, NITRD Cybersecurity and Privacy R&D Technical Coordinator

Panelists:

Sean Brooks, Privacy Engineer, NIST

Deborah Shands, Program Director, NSF

Jeremy Epstein, Program Manager, DARPA

Erin Kenneally, Program Manager, DHS S&T

Phoebe Rouge, Technologist, FTC

Session Chair: Graham BakerIOT: Formal Security Analysis of Smart Embedded Systems Farid Molazem , University of British Columbia; Karthik Pattabiraman, University of British ColumbiaIOT: An Ultra-Lightweight White-Box Encryption Scheme for Securing Resource-Constrained IoT Devices Yang Shi, Tongji University; Wujing Wei, Tongji University; Zongjian He, Tongji University; Hongfei Fan, Tongji UniversityIOT: A Multi-Cloud based Privacy-Preserving Data Publishing Scheme for the Internet of Things Lei Yang, University of Kansas; Abdulmalik Humayed, University of Kansas; Fengjun Li, University of Kansas Session Chair: Thomas MoyerELAR: Extremely Lightweight Auditing and Repairing for Cloud Security Thao Tran Phuong, KDDI R&D Laboratories; Kazumasa Omote, University of TsukubaPileus: Protecting User Resources from Vulnerable Cloud Services Yuqiong Sun, Pennsylvania State University; Giuseppe Petracca, Pennsylvania State University; Xinyang Ge, Pennsylvania State University; Trent Jaeger, Pennsylvania State UniversityBootstrapping and Maintaining Trust in the Cloud Nabil Schear, MIT Lincoln Laboratory; Patrick Cable, MIT Lincoln Laboratory; Thomas Moyer, MIT Lincoln Laboratory; Bryan Richard, MIT Lincoln Laboratory; Robert Rudd, MIT Lincoln Laboratory
12:00pm-1:30pm
(Sierra A)
1:30pm-3:00pm
Network Security Access Control
Club Room Sierra B Sierra C Sierra D
Session Chair: Benjamin Price

Moderators: Benjamin Price and Michael Zhivich, MIT Lincoln Laboratory

Panelists:

Tim Vidas, CGC Infrastructure Team

Lok Yan, CGC Infrastructure Team

Chris Eagle, CGC Infrastructure Team

Yan Shoshitaishvili, Shellphish Team (3rd Place)

David Melski, TechX Team (2nd Place)

Brian Knudson, DeepRed Team

Session Chair: Vasileios KemerlisDecomposition of MAC Address Structure for Granular Device Inference Jeremy Martin, US Naval Academy; Erik Rye, US Naval Academy; Robert Beverly, Naval Postgraduate SchoolTiming-based Reconnaissance and Defense in Software-defined Networks John Sonchack, University of Pennsylvania; Anurag Dubey, University of Colorado, Boulder; Adam Aviv, United States Naval Academy; Eric Keller, University of Colorado, Boulder; Jonathan Smith, University of PennsylvaniaRevProbe: Detecting Silent Reverse Proxies in Malicious Server Infrastructures Antonio Nappa, IMDEA Software Institute; Rana Faisal Munir, Universitat Politecnica de Catalonia; Irfan Khan Tanoli, Gran Sasso Science Institute; Christian Kreibich , LastLine & International Computer Science Institute; Juan Caballero, IMDEA Software Institute Session Chair: Brendan Dolan-GavittLife-experience passwords (LEPs) Simon Woo, USC/ISI; Elsi Kaiser, USC; Ron Artstein, USC/ICT; Jelena Mirkovic, USC/ISIUsing Image Saliency and Regions of Interest to Encourage Stronger Graphical Passwords Mohammad Alshehri, Institute of Public Administration; Heather Crawford, Florida Institute of TechnologyCPAC: Securing Critical Infrastructure with Cyber-Physical Access Control sriharsha etigowni, Rutgers University; Dave (Jing) Tian, University of Florida; Grant Hernandez, University of Florida; Saman Zonouz, Rutgers University; Kevin Butler, University of Florida Session Chair: Erin Kenneally

Speakers:

Erin Kenneally, Cyber Security Division, DHS

Paul Royal, George Tech Information Security Center (GTISC)

John Heidemann, USC Information Sciences Institute

3:00pm-3:30pm
(Sierra Foyer)
3:30pm-5:00pm
Software Security Web Security
Club Room Sierra C Sierra D
Session Chair: Charles Payne

Speakers:

Mr. Michael McEvilley, The MITRE Corporation (invited)

Dr. William Young, USAF (invited)

Session Chair: Juan CaballeroCode Obfuscation Against Symbolic Execution Attacks Sebastian Banescu, Technisch Universität München; Christian Collberg, University of Arizona; Vijay Ganesh, University of Waterloo; Zack Newsham, University of Waterloo; Alexander Pretschner, Technisch Universität MünchenVulPecker: An Automated Vulnerability Detection System Based on Code Similarity Analysis Zhen Li, Huazhong University of Science and Technology; Hebei University; Deqing Zou, Huazhong University of Science and Technology; Shouhuai Xu, University of Texas at San Antonio; Hai Jin, Huazhong University of Science and Technology; Hanchao Qi, Huazhong University of Science and Technology; Jie Hu, Huazhong University of Science and TechnologyEvilCoder: Automated Bug Insertion Jannik Pewny, Horst-Görtz Institute, Ruhr-University Bochum; Thorsten Holz, Horst-Görtz Institute, Ruhr-University Bochum Session Chair: Davide BalzarottiCatching Predators at Watering Holes: Finding and Understanding Strategically Compromised Websites Sumayah alrwais, Indiana University at Bloomington; Kan Yuan, Indiana University at Bloomington; Eihal Alowaisheq, Indiana University at Bloomington; Xiaojing Liao, Georgia Institute of Technology; Alina Oprea, RSA Labs; Xiaofeng Wang, Indiana University at Bloomington; Zhou Li, RSA LabsThe Achilles' Heel of OAuth: A Multi-Platform Study of OAuth-based Authentication Hui Wang, Shanghai Jiao Tong University; Yuanyuan Zhang, Shanghai Jiao Tong University; Juanru Li, Shanghai Jiao Tong University; Dawu Gu, Shanghai Jiao Tong UniversityAdaptive Encrypted Traffic Fingerprinting With Bi-Directional Dependence Khaled Al-Naami, The University of Texas at Dallas; Swarup Chandra, The University of Texas at Dallas; Ahmad Mustafa, The University of Texas at Dallas; Latifur Khan, The University of Texas at Dallas; Zhiqiang Lin, The University of Texas at Dallas; Kevin Hamlen, The University of Texas at Dallas; Bhavani Thuraisingham, The University of Texas at Dallas
6:30pm-9:30pm
(Sierra A)
Thursday, 8 December 2016
7:30am-8:30am
(Sierra A)
9:00am-10:00am
(Sierra CD)Session Chair: Stephen Schwab

Software Security in the Real World

Dr. Úlfar Erlingsson, Manager of Security Research, Google

10:00am-10:30am
(Sierra Foyer)
10:30am-12:00pm
Internet of Things Access Control
Club Room Sierra B Sierra C Sierra D
Session Chair: Cynthia Bauer

Hackers and Evil Doers – How to Keep Your Digital Experience Safe and Secure on the Cloud, Bob McCandless, Blue Iron Network


Encrypting the Brain of IOT, Ed Yu, Overnest, Inc.


Impact of the Physical Web and Beacons in the Classroom and College, Debasis Bhattacharya, University of Maui College

Session Chair: Trent JaegerOn the (in)security of the Latest Generation Implantable Cardiac Defibrillators and How to Secure Them Eduard Marin , KU Leuven, ESAT-COSIC and iMinds; Dave Singelée, KU Leuven, ESAT-COSIC and iMinds; Flavio Garcia , School of Computer Science, University of Birmingham; Tom Chothia, School of Computer Science, University of Birmingham; Rik Willems, KU Leuven, Department of Cardiovascular Sciences; Bart Preneel, KU Leuven, ESAT-COSIC and iMindsMulti-Receiver GPS Spoofing Detection: Error Models and Realization Kai Jansen, Ruhr-University Bochum; Nils Ole Tippenhauer, Singapore University of Technology and Design; Christina Pöpper, New York University Abu DhabiIOT: Location-enhanced Authentication using the IoT Because You Cannot Be in Two Places at Once Ioannis Agadakos, Stevens Institute of Technology; Per Hallgren, Chalmers University of Technology; Dimitrios Damopoulos, Stevens Institute of Technology; Andrei Sabelfeld, Chalmers University of Technology; Georgios Portokalidis, Stevens Institute of Technology Session Chair: Omer TrippTheft-Resilient Mobile Payments: Transparently Authenticating NFC Users with Tapping Gesture Biometrics Babins Shrestha, University of Alabama at Birmingham; Manar Mohamed, University of Alabama at Birmingham; Sandeep Tamrakar, Aalto University; Nitesh Saxena, University of Alabama at BirminghamGametrics: Towards Attack-Resilient Behavioral Authentication with Simple Cognitive Games Manar Mohamed, University of Alabama at Birmingham; Nitesh Saxena, University of Alabama at BirminghamDevice Fingerprinting for Augmenting Web Authentication: Classification and Analysis of Methods Furkan Alaca, Carleton University; Paul Van Oorschot, Carleton University Session Chair: Charles Payne

Speaker:

Deborah Frincke, Director of Research, NSA

12:00pm-1:30pm
(Sierra A)
1:30pm-3:00pm
Applied Crypto Malware
Club Room Sierra B Sierra C Sierra D
Session Chair: Adam Aviv

Moderator:

Adam Aviv, US Naval Academy

Panelists:

Mark Gondree, Sonoma State University

Colleen Lewis, Harvey Mudd College

Jelena Mirkovic, University of Southern California Information Sciences Institute

Session Chair: William RobertsonPractical and Secure Dynamic Searchable Encryption via Oblivious Access on Distributed Data Structure Thang Hoang, Oregon State University; Attila Yavuz, Oregon State University; Jorge Guajardo, Robert Bosch Research and Technology CenterCoKey: Fast Token-Based Cooperative Cryptography Julian Horsch, Fraunhofer AISEC; Sascha Wessel, Fraunhofer AISEC; Claudia Eckert, Technische Universität MünchenThe Cloudier Side of Cryptographic End-to-end Verifiable Voting: A Security Analysis of Helios Aleksander Essex, Western University; Nicholas Chang-Fong, Western University Session Chair: Dongyan XuShieldFS: A Self-healing, Ransomware-aware Filesystem Andrea Continella, Politecnico di Milano; Alessandro Guagnelli, Politecnico di Milano; Giovanni Zingaro, Politecnico di Milano; Giulio De Pasquale, Politecnico di Milano; Alessandro Barenghi, Politecnico di Milano; Stefano Zanero, Politecnico di Milano; Federico Maggi, Politecnico di MilanoCypider: Building Community-Based Cyber-Defense Infrastructure for Android Malware Detection ElMouatez Billah KARBAB, Concordia University; Mourad Debbabi, Concordia University; Abdelouahid Derhab, King Saud University; Djedjiga Mouheb, Concordia UniversityIntelligent, Automated Red Team Emulation Andy Applebaum, The MITRE Corporation; Doug Miller, The MITRE Corporation; Blake Strom, The MITRE Corporation; Chris Korban, The MITRE Corporation; Ross Wolf, The MITRE Corporation Session Chair: Kevin Greene

Speakers:

Kevin Greene, Cyber Security Division, DHS

Dr Robert McGraw, CTO, RAM Laboratories, Inc.

Joshua Garcia, Associate Project Scientist, Institute for Software Research, UC Irvine

3:00pm-3:30pm
(Sierra Foyer)

Chocoholic Extravaganza

"Las cosas claras y el chocolate espeso." (Ideas should be clear and chocolate thick.) Spanish proverb

3:30pm-5:00pm
Mobile Security Privacy & Data Protection
Sierra B Sierra C Sierra D
Session Chair: Georgios PortokalidisYou Can Promote, But You Can't Hide: Large-Scale Abused App Detection in Mobile App Stores Zhen Xie, The Pennsylvania State University; Sencun Zhu, The Pennsylvania State University; Wenjing Wang, Bluecoat Inc.; Qing Li, Bluecoat Inc.Swords and Shields - A Study of Mobile Game Hacks and Existing Defenses Yuan Tian, Carnegie Mellon University; Eric Chen, Gridspace; Xiaojun Ma, Google; Shuo Chen, Microsoft Research; Xiao Wang, Carnegie Mellon University; Patrick Tague, Carnegie Mellon UniversityUnderstanding and Defending the Binder Attack Surface In Android Huan Feng, The University of Michigan, Ann Arbor; Kang Shin, The University of Michigan, Ann Arbor Session Chair: Stephen SchwabInferring Browser Activity and Status Through Remote Monitoring of Storage Usage Hyungsub Kim, Pohang University of Science and Technology & Agency for Defense Development; Sangho Lee, Georgia Institute of Technology; Jong Kim, Pohang University of Science and TechnologyAmplifying Side Channels Through Performance Degradation Thomas Allan, The University of Adelaide and Data61; Billy Bob Brumley, Tampere University of Technology; Katrina Falkner, The University of Adelaide; Joop Van de Pol, University of Bristol; Yuval Yarom, The University of Adelaide and Data61Efficient, Adversarial Neighbor Discovery using Logical Channels on Microsoft Azure Mehmet Sinan INCI, Worcester Polytechnic Institute; Gorka Irazoqui, Worcester Polytechnic Institute; Thomas Eisenbarth, Worcester Polytechnic Institute; Berk Sunar, Worcester Polytechnic Institute Session Chair: Dan Massey

Speakers:

CPSSEC Program Overview, Dan Massey, Cyber Security Division, DHS

The Intrinsically Secure, Open, and Safe Cyber-physically Enabled, Life-critical Essential Services (ISOSCELES),Todd Carpenter, Adventium Labs

Side-Channel Causal Analysis for Design of Cyber-Physical Security, David Payton, HRL Laboratories

5:15pm-6:00pm
(Sierra C)Session Chair: Thomas Moyer
6:15pm-9:00pm
(Sierra A)Session Chair: Thomas Moyer
Friday, 9 December 2016
7:30am-8:30am
(Sierra A)
8:30am-10:00am
Software Security Privacy & Data Protection
Club Room Sierra B Sierra C
Session Chair: Amir Houmansadr

Moderator: Amir Houmansadr, University of Massachusetts Amherst

Panelists:

Adam Fisk, Lantern

Eric Wustrow, Univ. of Colorado Boulder

Daniel Ellard, Raytheon BBN Technologies

Ben Schwartz, Google

Session Chair: Christophe HauserVTPin: Practical VTable Hijacking Protection for Binaries Pawel Sarbinowski, Vrije Universiteit Amsterdam; Vasileios P. Kemerlis, Brown University; Cristiano Giuffrida, Vrije Universiteit Amsterdam; Elias Athanasopoulos, Vrije Universiteit AmsterdamLMP: Light-Weighted Memory Protection with Hardware Assistance Wei Huang, University of Toronto; Zhen Huang, University of Toronto; Dhaval Miyani, University of Toronto; David Lie, University of TorontoFASE: Functionality-Aware Security Enforcement Petar Tsankov, ETH Zurich; Marco Pistoia, IBM T. J. Watson Research Center; Omer Tripp, Google; Martin Vechev, ETH Zurich; Pietro Ferrara, Julia Session Chair: Hassan TakabiReliably Determining Data Leakage in the Presence of Strong Attackers Riccardo Bortolameotti, University of Twente; Andreas Peter, University of Twente; Maarten H. Everts, TNO; University of Twente; Willem Jonker, University of Twente and EIT Digital; Pieter Hartel, University of TwenteSanitizing Data is Not Enough! Towards Sanitizing Structural Artifacts in Flash Media Bo Chen, University of Memphis; Shijie Jia, Chinese Academy of Sciences; Luning Xia, Chinese Academy of Sciences; Peng Liu, Pennsylvania State UniversityAUROR: Defending Against Poisoning Attacks in Collaborative Deep Learning Systems Shiqi Shen, National University of Singapore; Shruti Tople, National University of Singapore; Prateek Saxena, National University of Singapore
10:00am-10:30am
(Sierra Foyer)
10:30am-12:00pm
Trust Management Forensics and Incident Response
Sierra B Sierra C
Session Chair: David BalensonA security analysis of automated Chinese Turing Tests Abdalnaser Algwil, Lancaster University; Dan Ciresan, IDSIA (SUPSI-USI); Beibei Liu, South China University of Technology; Jeff Yan, Lancaster UniversityThe Cross Domain Desktop Compositor: Using hardware-based video compositing for a multi-level secure user interface Mark Beaumont, DST Group, Department of Defence; Jim McCarthy, DST Group, Department of Defence; Toby Murray, University of Melbourne / Data61 CSIROCASTLE: CA Signing in a Touch-Less Environment Stephanos Matsumoto, Carnegie Mellon University/ETH Zurich; Samuel Steffen, ETH Zurich; Adrian Perrig, ETH Zurich Session Chair: Thomas MoyerSpicy: A Unified Deep Packet Inspection Framework for Safely Dissecting All Your Data Robin Sommer, International Computer Science Institute / Lawrence Berkeley National Laboratory; Johanna Amann, International Computer Science Institute; Seth Hall, International Computer Science InstituteTrace-Free Memory Data Structure Forensics via Past Inference and Future Speculations Pengfei Sun, Rutgers University; Rui Han, University of Miami; Mingbo Zhang, Rutgers University; Saman Zonouz, Rutgers UniversityHERCULE: Attack Story Reconstruction via Community Discovery on Correlated Log Graph Kexin Pei, Columbia University; Zhongshu Gu, IBM T.J. Watson Research Center; Brendan Saltaformaggio, Purdue University; Shiqing Ma, Purdue University; Fei Wang, Purdue University; Zhiwei Zhang, Purdue University; Luo Si, Purdue University; Xiangyu Zhang, Purdue University; Dongyan Xu, Purdue University
12:00pm-12:15pm
(Sierra C)

Attend our giveaway at the closing plenary! So don't leave early!

12:45pm-5:00pm
(Sierra Foyer)

Outing to LACMA/Peterson Museum

Powered by OpenConf ®
Copyright©2002-2016 Zakon Group LLC

AltStyle によって変換されたページ (->オリジナル) /