Moderator: Dan Massey, University of Colorado Boulder
Panelists:
Glenn Atkinson, Geotab
Craig Smith, Rapid7 and Open Garages
Kevin Harnett, US DOT Volpe Center
Scott Tousley, DHS S&T Cyber Security Division
Session Chair: Daniela OliveiraN-auth: Mobile Authentication Done RightRoel Peeters, KU Leuven, COSIC; Jens Hermans, KU Leuven, COSIC; Pieter Maene, KU Leuven, COSIC; Kimmo Halunen, VTT; Katri Grenman, VTT; Juha Häikiö, VTTExploitation And Mitigation Of Authentication Schemes Based On Device-public InformationAntonio Bianchi, University of California, Santa Barbara; Eric Gustafson, University of California, Santa Barbara; Yanick Fratantonio, University of California, Santa Barbara; Christopher Kruegel, University of California, Santa Barbara; Giovanni Vigna, University of California, Santa BarbaraA Secure Mobile Authentication Alternative To BiometricsMozhgan Azimpourkivi, Florida International University; Umut Topkara, Bloomberg LP; Bogdan Carbunar, Florida International University
Session Chair: Wil RobertsonMachine-learning-guided Typestate Analysis For Static Use-after-free DetectionHua Yan, University of New South Wales; Yulei Sui, University of New South Wales; Shiping Chen, Commonwealth Scientific and Industrial Research Organisation (CSIRO); Jingling Xue, University of New South WalesBreaking And Fixing Destructive Code Read DefensesJannik Pewny, HGI, Ruhr-University Bochum; Philipp Koppe, HGI, Ruhr-University Bochum; Lucas Davi, University Duisburg-Essen; Thorsten Holz, HGI, Ruhr-University BochumQuasar: Quantitative Attack Space Analysis And ReasoningRichard Skowyra, MIT Lincoln Laboratory; Steven Gomez, MIT Lincoln Laboratory; David Bigelow, MIT Lincoln Laboratory; James Landry, MIT Lincoln Laboratory; Hamed Okhravi, MIT Lincoln Laboratory
12:00-13:30
(Salon VI-VIII)
13:30-15:00
Salon III
Salon II
Salon I
Moderator: Vincent Sritapan, DHS S&T Cyber Security Division
Panelists:
Robert Clemons, National Information Assurance Partnership (NIAP)
Moderator: Tomas Vagoun, PhD, Cybersecurity and Privacy R&D Technical Coordinator, Federal Networking and IT R&D Program (NITRD)
Panelists:
Dr. Joshua Baron, Program Manager, DARPA
Jeremy Epstein, Deputy Division Director, NSF
Dr. Steven King, Deputy Director, Cyber Technology, Office of the Assistant Secretary of Defense
Scott Tousley, Deputy Director, Cyber Security Division, DHS S&T
Moderator: Jeremy Epstein, National Science Foundation
Panelists:
Amber McReynolds, Director of Elections for the City and County of Denver, Colorado
Dwight Shellman, Manager, County Regulation and Support, State of Colorado
Juan A. Figueroa, Office of Infrastructure Protection, Department of Homeland Security
Session Chair: Kevin ButlerSupporting Transparent Snapshot For Bare-metal Malware Analysis On Mobile DevicesLe Guan, Penn State University; Shijie Jia, Institute of Information Engineering, Chinese Academy of Sciences; Bo Chen, Michigan Technological university; Fengwei Zhang, Wayne State University; Bo Luo, The University of Kansas; Jingqiang Lin, Institute of Information Engineering, Chinese Academy of Sciences; Peng Liu, Penn State University; Xinyu Xing, Penn State University; Luning Xia, Institute of Information Engineering, Chinese Academy of SciencesDroid-antirm: Taming Control Flow Anti-analysis To Support Automated Dynamic Analysis Of Android MalwareXiaolei Wang, College of Computer, National University of Defense Technology; Sencun Zhu, Department of Computer Science and Engineering & College of Information Sciences and Technology, The Pennsylvania State University; Dehua Zhou, Jinan University; Yuexiang Yang, College of Computer,National University of Defense TechnologySecuredroid: Enhancing Security Of Machine Learning-based Detection Against Adversarial Android Malware AttacksLingwei Chen, West Virginia University; Shifu Hou, West Virginia University; Yanfang Ye, West Virginia University
15:00-15:30
(Grand Foyer)
15:30-17:00
Salon III
Salon II
Salon I
Moderator: Sven Dietrich, City University of New York
Panelists:
Jean Camp, Indiana University at Bloomington
Michael Collins, RedJack
David Dittrich, University of Washington
Co-Chairs:
Dr. Thomas Moyer, University of North Carolina at Charlotte
Dr. Paolina Centonze, Iona College
18:30-21:00
(Salon VI-VIII)Session Chair: Thomas Moyer
Co-Chairs:
Dr. Thomas Moyer, University of North Carolina at Charlotte
Dr. Paolina Centonze, Iona College
Friday, 8 December 2017
7:30-8:30
(Salon VI-VIII)
8:30-10:00
Salon III
Salon II
Salon I
Session Chair: Randy Smith
A security researcher, a safety engineer, and a regulator walk into a bar: Lessons learned from 9 months of institutional anthropology at the FDA, Dr. Eugene Vasserman, Kansas State University
Semi-supervised Classification for Dynamic Android Malware Detection, Li Chen, Intel Labs
Impact of the Physical Web and BLE Beacons, Dr. Debasis Bhattacharya, University of Hawaii Maui College
Session Chair: Gianluca StringhiniLean On Me: Mining Internet Service Dependencies From Large-scale Dns DataMatteo Dell'Amico, Symantec Research Labs; Leyla Bilge, Symantec Research Labs; K. Ashwin Kumar, Symantec Research Labs; Petros Efstathopoulos, Symantec Research Labs; Pierre-Antoine Vervier, Symantec Research LabsA Security-mode For Carrier-grade Sdn ControllersChanghoon Yoon, KAIST; Seungwon Shin, KAIST; Phillip Porras, SRI International; Vinod Yegneswaran, SRI International; Heedo Kang, KAIST; Martin Fong, SRI International; Brian O'Connor, Open Networking Laboratory; Thomas Vachuska, Open Networking LaboratoryResect: Self-learning Traffic Filters For Ip Spoofing DefenseJelena Mirkovic, USC; Erik Kline, USC/ISI; Peter Reiher, UCLA
Session Chair: Petros EfstathopoulosCommoner Privacy And A Study On Network TracesXiyue Deng, USC/ISI; Jelena Mirkovic, USC/ISIThe Devil’s In The Details: Placing Decoy Routers In The InternetDevashish Gosain, Indraprastha Institute of Information Technology Delhi; Anshika Aggarwal, Indraprastha Institute of Information Technology Delhi; Sambuddho Chakravarty, Indraprastha Institute of Information Technology Delhi; Hrishikesh Bhattacharya, Rochester Institute of TechnologyEx-ray: Detection Of History-leaking Browser ExtensionsMichael Weissbacher, Northeastern University; Enrico Mariconti, University College London; Guillermo Suarez De Tangil, University College London; Gianluca Stringhini, University College London; William Robertson, Northeastern University; Engin Kirda, Northeastern University
12:00-12:15
(Salon IV)
Don't leave early -- attend our closing plenary to learn about next year's conference and participate in our prize giveaway!