Paul Royal, George Tech Information Security Center (GTISC)
John Heidemann, USC Information Sciences Institute
3:00pm-3:30pm
(Sierra Foyer)
3:30pm-5:00pm
Software Security
Web Security
Club Room
Sierra C
Sierra D
Session Chair: Charles Payne
Speakers:
Mr. Michael McEvilley, The MITRE Corporation (invited)
Dr. William Young, USAF (invited)
Session Chair: Juan CaballeroCode Obfuscation Against Symbolic Execution AttacksSebastian Banescu, Technisch Universität München; Christian Collberg, University of Arizona; Vijay Ganesh, University of Waterloo; Zack Newsham, University of Waterloo; Alexander Pretschner, Technisch Universität MünchenVulPecker: An Automated Vulnerability Detection System Based on Code Similarity AnalysisZhen Li, Huazhong University of Science and Technology; Hebei University; Deqing Zou, Huazhong University of Science and Technology; Shouhuai Xu, University of Texas at San Antonio; Hai Jin, Huazhong University of Science and Technology; Hanchao Qi, Huazhong University of Science and Technology; Jie Hu, Huazhong University of Science and TechnologyEvilCoder: Automated Bug InsertionJannik Pewny, Horst-Görtz Institute, Ruhr-University Bochum; Thorsten Holz, Horst-Görtz Institute, Ruhr-University Bochum
Session Chair: Davide BalzarottiCatching Predators at Watering Holes: Finding and Understanding Strategically Compromised WebsitesSumayah alrwais, Indiana University at Bloomington; Kan Yuan, Indiana University at Bloomington; Eihal Alowaisheq, Indiana University at Bloomington; Xiaojing Liao, Georgia Institute of Technology; Alina Oprea, RSA Labs; Xiaofeng Wang, Indiana University at Bloomington; Zhou Li, RSA LabsThe Achilles' Heel of OAuth: A Multi-Platform Study of OAuth-based AuthenticationHui Wang, Shanghai Jiao Tong University; Yuanyuan Zhang, Shanghai Jiao Tong University; Juanru Li, Shanghai Jiao Tong University; Dawu Gu, Shanghai Jiao Tong UniversityAdaptive Encrypted Traffic Fingerprinting With Bi-Directional DependenceKhaled Al-Naami, The University of Texas at Dallas; Swarup Chandra, The University of Texas at Dallas; Ahmad Mustafa, The University of Texas at Dallas; Latifur Khan, The University of Texas at Dallas; Zhiqiang Lin, The University of Texas at Dallas; Kevin Hamlen, The University of Texas at Dallas; Bhavani Thuraisingham, The University of Texas at Dallas
6:30pm-9:30pm
(Sierra A)
Thursday, 8 December 2016
7:30am-8:30am
(Sierra A)
9:00am-10:00am
(Sierra CD)Session Chair: Stephen Schwab
Software Security in the Real World
Dr. Úlfar Erlingsson, Manager of Security Research, Google
10:00am-10:30am
(Sierra Foyer)
10:30am-12:00pm
Internet of Things
Access Control
Club Room
Sierra B
Sierra C
Sierra D
Session Chair: Cynthia Bauer
Hackers and Evil Doers – How to Keep Your Digital Experience Safe and Secure on the Cloud, Bob McCandless, Blue Iron Network
Encrypting the Brain of IOT, Ed Yu, Overnest, Inc.
Impact of the Physical Web and Beacons in the Classroom and College, Debasis Bhattacharya, University of Maui College
Session Chair: Dongyan XuShieldFS: A Self-healing, Ransomware-aware FilesystemAndrea Continella, Politecnico di Milano; Alessandro Guagnelli, Politecnico di Milano; Giovanni Zingaro, Politecnico di Milano; Giulio De Pasquale, Politecnico di Milano; Alessandro Barenghi, Politecnico di Milano; Stefano Zanero, Politecnico di Milano; Federico Maggi, Politecnico di MilanoCypider: Building Community-Based Cyber-Defense Infrastructure for Android Malware DetectionElMouatez Billah KARBAB, Concordia University; Mourad Debbabi, Concordia University; Abdelouahid Derhab, King Saud University; Djedjiga Mouheb, Concordia UniversityIntelligent, Automated Red Team EmulationAndy Applebaum, The MITRE Corporation; Doug Miller, The MITRE Corporation; Blake Strom, The MITRE Corporation; Chris Korban, The MITRE Corporation; Ross Wolf, The MITRE Corporation
Session Chair: Kevin Greene
Speakers:
Kevin Greene, Cyber Security Division, DHS
Dr Robert McGraw, CTO, RAM Laboratories, Inc.
Joshua Garcia, Associate Project Scientist, Institute for Software Research, UC Irvine
3:00pm-3:30pm
(Sierra Foyer)
Chocoholic Extravaganza
"Las cosas claras y el chocolate espeso." (Ideas should be clear and chocolate thick.) Spanish proverb
CPSSEC ProgramOverview, Dan Massey, Cyber Security Division, DHS
The Intrinsically Secure, Open, and Safe Cyber-physically Enabled, Life-critical Essential Services (ISOSCELES),Todd Carpenter, Adventium Labs
Side-Channel Causal Analysis for Design of Cyber-Physical Security, David Payton, HRL Laboratories
5:15pm-6:00pm
(Sierra C)Session Chair: Thomas Moyer
6:15pm-9:00pm
(Sierra A)Session Chair: Thomas Moyer
Friday, 9 December 2016
7:30am-8:30am
(Sierra A)
8:30am-10:00am
Software Security
Privacy & Data Protection
Club Room
Sierra B
Sierra C
Session Chair: Amir Houmansadr
Moderator: Amir Houmansadr, University of Massachusetts Amherst
Panelists:
Adam Fisk, Lantern
Eric Wustrow, Univ. of Colorado Boulder
Daniel Ellard, Raytheon BBN Technologies
Ben Schwartz, Google
Session Chair: Christophe HauserVTPin: Practical VTable Hijacking Protection for BinariesPawel Sarbinowski, Vrije Universiteit Amsterdam; Vasileios P. Kemerlis, Brown University; Cristiano Giuffrida, Vrije Universiteit Amsterdam; Elias Athanasopoulos, Vrije Universiteit AmsterdamLMP: Light-Weighted Memory Protection with Hardware AssistanceWei Huang, University of Toronto; Zhen Huang, University of Toronto; Dhaval Miyani, University of Toronto; David Lie, University of TorontoFASE: Functionality-Aware Security EnforcementPetar Tsankov, ETH Zurich; Marco Pistoia, IBM T. J. Watson Research Center; Omer Tripp, Google; Martin Vechev, ETH Zurich; Pietro Ferrara, Julia