Program Agenda

Visible to the public 

 

TIMES LISTED ARE CDT

PROGRAM AGENDA
 
MONDAY, APRIL 3

0900 - 1000

Networking, log into the platform and chat with other attendees

 
SESSION 1

1000 - 1015

Welcome and Opening Remarks
Adam Tagert (NSA) - General Chair
Nirav Ajmeri (University of Bristol) and Ryan Gabrys (Naval Information Warfare Center) - Program Co-Chairs
Dr. Rita Bush (NSA)

1015 - 1115

KEYNOTE: Sailing the Seas of the Science of Security
Yan Shoshitaishvili (Arizona State University)

1115 - 1130

BREAK

SESSION 2  

1130 - 1230

Best Cybersecurity Paper Competition Invited Talks

Winning Paper: Verifying Hyperproperties with Temporal Logic of Actions (TLA)
Leslie Lamport (Microsoft Research) and Fred B. Schneider (Cornell University)

Honorable Mention: Defensive Technology Use by Political Activists during the Sudanese Revolution
Alaa Daffalla (Cornell University), Lucy Simko (George Washington University), Tadayoshi Kohno (University of Washington), and Alexandru G. Bardas (University of Kansas)

1230 - 1330

 LUNCH & NETWORKING

SESSION 3    

1330 - 1445

Works-Already-Published Session (20 minute talks + 5 minutes Q&A)

Policy Impacts of Statistical Uncertainty and Privacy
Ryan Steed, Terrance Liu, Zhiwei Steven Wu and Alessandro Acquisti

How Does Usable Security (Not) End Up in Software Products? Results From a Qualitative Interview Study
Marco Gutfleisch, Jan H. Klemmer, Niklas Busch, Yasemin Acar, M. Angela Sasse and Sascha Fahl

Robust Deep Reinforcement Learning through Bootstrapped Opportunistic Curriculum
Junlin Wu and Yevgeniy Vorobeychik

1445 - 1530

PANEL: 10 Years of HotSoS / SoS

1530 - 1545

BREAK 

SESSION 4
1545 - 1715 Works-in-Progress Session (45 minute discussions)
WiP titles are not shown in full.


Certifying Safety in Reinforcement Learning under Adversarial Perturbation Attacks
Junlin Wu, Hussein Sibai and Yevgeniy Vorobeychik

Improvement and Evaluation of Resilience of Adaptive Cruise Control Against Spoofing Attacks
Using Intrusion Detection System

Mubark Jedh, Lotfi Ben Othmane and Arun Somani

1715 - 1730

NETWORKING

TUESDAY, APRIL 4

0900 - 1000

Networking, log into the platform and chat with other attendees

 
SESSION 5

1000 - 1115

Works-Already-Published Session (20 minute talks + 5 minutes Q&A)

Sigstore: Software Signing for Everybody
John Speed Meyers, Zack Newman and Santiago Torres-Arias

A Case for Remote Attestation in Programmable Dataplanes
Nik Sultana, Deborah Shands and Vinod Yegneswaran

Towards Practical Application-level Support for Privilege Separation
Nik Sultana, Henry Zhu, Ke Zhong, Zhilei Zheng, Ruijie Mao, Digvijaysinh Chauhan, Stephen Carrasquillo, Junyong Zhao, Lei Shi, Nikos Vasilakis and Boon Thau Loo

1115 - 1200

POSTER SESSION

1200 - 1300

LUNCH
 

SESSION 6  

1300 - 1400

KEYNOTE: Science of Composition is Vital for Science of Security
Neal Ziring (NSA)

1400 - 1445

PANEL: Future of Foundational Research

1445 - 1500

BREAK
 

SESSION 7

1500 - 1630

Works-in-Progress Session (45 minute discussions)
WiP titles are not shown in full.


Towards a Rigorous Approach for Zero Trust in the 5G Core
Marinos Vomvas, Norbert Ludant and Guevara Noubir

Sequential Graph Neural Networks for Source Code Vulnerability Identification
Ammar Ahmed, Anwar Said, Mudassir Shabbir and Xenofon Koutsoukos

1630 - 1645

NETWORKING

 

 

WEDNESDAY, APRIL 5

0900 - 1000

Networking, log into the platform and chat with other attendees

SESSION 8

1000 - 1100

KEYNOTE: The Science of Audio Deepfake Detection
Carrie Gates (Bank of America)

1100 - 1200

Concurrent Panels
Grad Student Panel | Undergraduate Panel

1200 - 1300

.LUNCH

SESSION 9  

1300 - 1415

Works-Already-Published Session (20 minute talks + 5 minutes Q&A)

Resiliency Metrics for Monitoring and Analysis of Cyber-Power Distribution System with IoTs
Partha S. Sarker, Sajan K. Sadanandan and Anurag K. Srivastava

Spatiotemporal G-code modeling for secure FDM-based 3D printing
Muhammad Haris Rais, Ye Li and Irfan Ahmed

Control Logic Forensics Framework using Built-in Decompiler of Engineering Software in Industrial Control Systems
Syed Ali Qasim, Jared Smith and Irfan Ahmed

1415 - 1430

Announcement of Winning Poster | Closing Remarks
 

SYMPOSIUM ADJOURNED