Panel Moderator: Robert H’obbes’ Zakon, Zakon Group LLC
Panelists: Dave Bryson, The MITRE Corporation
Anil John, Department of Homeland Security Science & Technology Directorate
Javier Malavé, Puerto Rico Science, Technology and Research Trust
Moderator: Harvey Rubinovotz, The MITRE Corporation, Workshops Chair
Session Chair: Kevin Roundy, Symantec Research LabsAccurate Malware Detection by Extreme AbstractionFady Copty, IBM Research - Haifa; Matan Danos, IBM Research - Haifa; Orit Edelstein, IBM Research - Haifa; Cindy Eisner, IBM Research - Haifa; Dov Murik, IBM Research - Haifa; Benjamin Zeltser, IBM Research - HaifaUsing Loops For Malware Classification Resilient to Feature-unaware PerturbationsAravind Machiry, UC Santa Barbara; Nilo Redini, UC Santa Barbara; Eric Gustafson, UC Santa Barbara; Yanick Fratantonio, EURECOM; Yung Ryn Choe, Sandia National Laboratories; Christopher Kruegel, UC Santa Barbara; Giovanni Vigna, UC Santa BarbaraMADE: Malicious Activity Detection in EnterprisesAlina Oprea, Northeastern University; Zhou Li, RSA; Robin Norris, EMC CIRC; Kevin Bowers, RSALOBO - Evaluation of Generalization Deficiencies in Twitter Bot ClassifiersJuan Echeverria, University College London; Nicolas Kourtellis, Telefonica I+D; Ilias Leontiadis, Telefonica I+D; Emiliano De Cristofaro, University College London; Gianluca Stringhini, University College London; Shi Zhou, University College LondonSession Chair: Georgios Portokalidis, Stevens Institute of TechnologySide-Channel Analysis of SM2: A Late-Stage Featurization Case StudyNicola Tuveri, Tampere University of Technology; Sohaib ul Hassan, Tampere University of Technology; Cesar Pereida García, Tampere University of Technology; Billy Brumley, Tampere University of TechnologyMicroWalk: A Framework for Finding Side Channels in BinariesJan Wichelmann, Universität zu Lübeck; Ahmad Moghimi, Worcester Polytechnic Institute; Thomas Eisenbarth, Universität zu Lübeck; Berk Sunar, Worcester Polytechnic InstituteAnalyzing Cache Side Channels Using Deep Neural NetworksTianwei Zhang, Amazon Web Services; Yinqian Zhang, The Ohio State University; Ruby Lee, Princeton UniversityMemCloak: Practical Access Obfuscation for Untrusted MemoryWeixin Liang, Zhejiang University; Kai Bu, Zhejiang University; Ke Li, Zhejiang University; Jinhong Li, Zhejiang University; Arya Tavakoli, Simon Fraser University
15:00-15:30
(Foyer)
15:30-17:00
Miramar II Royal Ballroom Miramar I
Moderator: Tomas Vagoun, Federal Networking and IT R&D Program (NITRD)
Jeremy Epstein, National Science Foundation
Tristan Nguyen, Air Force Office of Scientific Research
Sharothi Pikar, Office of the Under Secretary of Defense (Research & Engineering)
Dinner will include a trio performing local music. After dinner, Folkloric Show Guamanique will perform traditional Puerto Rican dances - a show not to be missed!
Dinner will be held outside in the Ocean Garden. In case of inclement weather we will move to the Grand Ballroom.
Thursday, 6 December 2018
7:30-8:30
(Brisas Del Mar)
9:00-10:00
(Royal Ballroom)Session Chair: David Balenson
AI in Cybersecurity: Applications, Open Problems, and Future Directions
Alina Oprea, Professor of Computer Science, Northeastern University
Panel Moderator: Jeremy Epstein, National Science Foundation
Panelists:
Donna Price, Georgians for Verified Voting
Honorable Tom Hicks, Chairman US Election Assistance Commission
Roberto E. Benítez, Puerto Rico State Elections Commission SLIDES
Creating Failure Scenarios for Natural Gas Critical Infrastructure, Michael Locasto, SRI International
Password Sequence (PSQ) - A Novel Approach for Implementing Long Passwords, Joseph D Scrandis, Towson University
Encrypting Configuration Sections in ASP.NET 4.5 Using DPAPI: A Real Life Experience, Sercan Alabay, Uludag University, Turkey TEXT
Session Chair: Stephen Schwab, USC Information Sciences InstituteHiding in the Shadows: Empowering ARM for Stealthy Virtual Machine IntrospectionSergej Proskurin, Technical University of Munich; Tamas Lengyel, The Honeynet Project; Marius Momeu, Technical University of Munich; Claudia Eckert, Technical University of Munich; Apostolis Zarras, Maastricht UniversityA Measurement Study on Linux Container Security: Attacks and CountermeasuresXin Lin, School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China and Institute of Information Engineering, CAS, Beijing, China and Data Assurance and Communication Security Research Center, CAS, Beijing, China; Lingguang Lei, Institute of Information Engineering, CAS, Beijing, China and Data Assurance and Communication Security Research Center, CAS, Beijing, China; Yuewu Wang, Institute of Information Engineering, CAS, Beijing, China and Data Assurance and Communication Security Research Center, CAS, Beijing, China; Jiwu Jing, Institute of Information Engineering, CAS, Beijing, China and Data Assurance and Communication Security Research Center, CAS, Beijing, China; Kun Sun, George Mason University, Fairfax, USA; Quan Zhou, Institute of Information Engineering, CAS, Beijing, China and Data Assurance and Communication Security Research Center, CAS, Beijing, ChinaSecure Out-of-band Remote Management of Virtual Machines with Transparent PassthroughShota Futagami, Kyushu Institute of Technology; Tomoya Unoki, Kyushu Institute of Technology; Kenichi Kourai, Kyushu Institute of TechnologyPrime+Count: Novel Cross-world Covert Channels on ARM TrustZoneHaehyun Cho, Arizona State University; Penghui Zhang, Arizona State University; Donguk Kim, SAMSUNG Research; Jinbum Park, SAMSUNG Research; Choonghoon Lee, SAMSUNG Research; Ziming Zhao, Arizona State University; Adam Doupé, Arizona State University; Gail-Joon Ahn, Arizona State University and SAMSUNG ResearchSession Chair: Mary Ellen Zurko, MIT-LLComparing Video Based Shoulder Surfing with Live SimulationAdam Aviv, United States Naval Academy; Flynn Wolf, University of Maryland, Baltimore County; Ravi Kuber, University of Maryland, Baltimore CountyDo Social Disorders Facilitate Social Engineering? A Case Study of Autism and Phishing AttacksAjaya Neupane, University of California Riverside; Kiavash Satvat, University of Alabama at Birmingham; Nitesh Saxena, University of Alabama at Birmingham; Despina Stavrinos, University of Alabama at Birmingham; Haley Johnson Bishop, University of Alabama at BirminghamI Need this Back, Later! An Exploration of Practical Secret SharingOliver Wiese, Freie Universität Berlin; Christoph Weinhold, Freie Universität Berlin; Jan-Ole Malchow, Freie Universität Berlin; Volker Roth, Freie Universität BerlinTake It or Leave It: A Survey Study on Operating System Upgrade PracticesSadegh Farhang, Pennsylvania State University; Jake Weidman, Pennsylvania State University; Mohammad Mahdi Kamani, Pennsylvania State University; Jens Grossklags, Technical University of Munich; Peng Liu, Pennsylvania State University
15:00-15:30
(Foyer)
15:30-17:00
Miramar II Royal Ballroom Miramar I
Moderator: Tomas Vagoun, Federal Networking and IT R&D Program (NITRD)
Maya Bernstein, US Department of Health & Human Services
Raymond Brown, NSA
Rene Peralta, NIST
Session Chair: Alexandros Kapravelos, North Carolina State UniversityThere’s a Hole in that Bucket! A Large-scale Analysis of Misconfigured S3 BucketsAndrea Continella, Politecnico di Milano; Mario Polino, Politecnico di Milano; Marcello Pogliani, Politecnico di Milano; Stefano Zanero, Politecnico di MilanoDeDoS: Defusing DoS with Dispersion Oriented SoftwareHenri Maxime Demoulin, University of Pennsylvania; Tavish Vaidya, Georgetown University; Isaac Pedisich, University of Pennsylvania; Bob DiMaiolo, University of Pennsylvania; Jingyu Qian, Georgetown University; Chirag Shah, University of Pennsylvania; Yuankai Zhang, Georgetown University; Ang Chen, Rice University; Andreas Haeberlen, University of Pennsylvania; Boon Thau Loo, University of Pennsylvania; Linh Thi Xuan Phan, University of Pennsylvania; Micah Sherr, Georgetown University; Clay Shields, Georgetown University; Wenchao Zhou, Georgetown UniversitySession Chair: Daniel Zappala, Brigham Young UniversityImproving Security and Usability of Passphrases with Guided Word ChoiceNikola K. Blanchard, Institut de Recherche en Informatique Fondamentale; Clément Malaingre, Teads France; Ted Selker, Selker Design ResearchOn The Systematic Development and Evaluation Of Password Security Awareness-Raising MaterialsPeter Mayer, Karlsruhe Institute of Technology; Melanie Volkamer, Karlsruhe Institute of Technology; Christian Schwartz, usd AG
11:30-12:00
(Royal Ballroom)
Don't leave early -- attend our closing plenary to learn about next year's conference and participate in our prize giveaway!
12:30-17:00
(Lobby)
Excursion to the Arecibo Observatory (Radio Telescope)
16:00-21:00
(Lobby)
Evening Kayaking Adventure – Bioluminescent Bay @ Las Cabezas de San Juan Nature Reserve (First Trip)
18:30-23:30
(Lobby)
Evening Kayaking Adventure – Bioluminescent Bay @ Las Cabezas de San Juan Nature Reserve (Second Trip)