OpenConf Peer Review & Conference Management System
Monday, 9 December 2019
7:30-8:30
(Brisas Del Mar)
8:30-12:00
Miramar I
Laguna I
Boardroom I
Boardroom II
Two-Day Workshop
J. Todd McDonald, University of South Alabama, General Chair
Two-Day Workshop
Michael Clifford, Noblis; and Michael Collins, USC-ISI
One-Day Training Worshop
William Joseph Spring, University of Hertfordshire
Two-Day Training Worshop
Kevin Nauer and Nicholas Kantor, Sandia National Laboratories
12:00-13:30
(Brisas Del Mar)
13:30-17:00
Miramar I
Laguna I
Boardroom I
Boardroom II
(Workshop Continues)
(Workshop Continues)
(Training Workshop Continues)
(Training Workshop Continues)
Tuesday, 10 December 2019
7:30-8:30
(Brisas Del Mar)
8:30-12:00
Miramar I
Laguna I
Condado
Boardroom I
Boardroom II
(Workshop Continues)
(Workshop Continues)
One-Day Workshop
Harvey Rubinovitz, The MITRE Corporation; and Adam Hahn, Washington State University, General Co-Chairs
Irfan Ahmed, Virginia Commonwealth University, Program Chair
One-Day Worshop
Daniel Takabi and Robert Podschwadt, Georgia State University
(Training Workshop Continues)
12:00-13:30
(Brisas Del Mar)
13:30-17:00
Miramar I
Laguna I
Condado
Boardroom I
Boardroom II
(Workshop Continues)
(Workshop Continues)
(Workshop Continues)
(Training Workshop Continues)
(Training Workshop Continues)
18:00-20:00
(Lagoon Pool)
Wednesday, 11 December 2019
7:30-8:30
(Brisas Del Mar)
8:30-9:00
(Royal Ballroom)
ACSAC Conference Welcome: David Balenson, Conference Chair SLIDES
PC Chair Opening Remarks and Distinguished Paper Awards: Guofei Gu, Program Chair SLIDES
SWSIS Scholarship Awards: Mary Ellen Zurko and Jeremy Epstein, ACSA SLIDES
9:00-10:00
(Royal Ballroom)Session Chair: David Balenson, SRI International
Can You Get That to Me Soon? Lessons Learned from Life in Industry Research Carrie Gates, Senior Vice President, Global Information Security, Bank of America
10:00-10:30
(Foyer)
10:30-12:00
Laguna I
Royal Ballroom
Miramar I
Panel Moderator: Ulf Lindqvist, SRI International SLIDES
Panelists: Mary Ellen Zurko, MIT Lincoln Laboratory SLIDES Christopher Torres-Lugo, Indiana University Bloomington SLIDES Micah Sherr, Georgetown University
Session Chair: Gabriela Ciocarlie, SRI InternationalProof of AlivenessChenglu Jin, University of Connecticut; Zheng Yang, Singapore University of Technology and Design; Marten van Dijk, University of Connecticut; Jianying Zhou, Singapore University of Technology and DesignCo-Evaluation of Pattern Matching Algorithms on IoT Devices with Embedded GPUsCharalampos Stylianopoulos, Chalmers University of Technology; Simon Kindstrom, Chalmers University of Technology; Magnus Almgren, Chalmers University of Technology; Olaf Landsiedel, University of Kiel; Marina Papatriantafilou, Chalmers University of TechnologyAegis: A Context-aware Security Framework for Smart Home SystemsAmit Kumar Sikder, Florida International University; Leonardo Babun, Florida International University; Hidayet Aksu, Florida International University; A. Selcuk Uluagac, Florida International UniversityDefeating Hidden Audio Channel Attacks on Voice Assistants via Audio-Induced Surface VibrationsChen Wang, WINLAB, Rutgers University; S Abhishek Anand, University of Alabama at Birmingham; Jian Liu, WINLAB, Rutgers University; Payton R. Walker, University of Alabama at Birmingham; Yingying (Jennifer) Chen, WINLAB, Rutgers University; Nitesh Saxena, University of Alabama at Birmingham
Session Chair: Kevin Roundy, NortonLifeLockTF-BIV: Transparent and Fine-grained Binary Integrity Verification in the CloudFangjie Jiang, Institute of Information Engineering, Chinese Academy of Sciences, School of Cyber Security, University of Chinese Academy of Sciences; Quanwei Cai, Institute of Information Engineering, Chinese Academy of Sciences; Jingqiang Lin, Institute of Information Engineering, Chinese Academy of Sciences; Bo Luo, The University of Kansas; Le Guan, University of Georgia; Ziqiang Ma, Institute of Information Engineering, Chinese Academy of Sciences, School of Cyber Security, University of Chinese Academy of SciencesNibbler: Debloating Binary Shared LibrariesIoannis Agadakos, SRI International; Di Jin, Brown University; David Williams-King, Columbia University; Vasileios P. Kemerlis, Brown University; Georgios Portokalidis, Stevens Institute of TechnologyFunction Boundary Detection in Stripped BinariesJim Alves-Foss, University of Idaho; Jia Song, University of IdahoVPS: Excavating High-Level C++ Constructs from Low-Level Binaries to Protect Dynamic DispatchingAndre Pawlowski, Ruhr-Universitat Bochum; Victor van der Veen, Vrije Universiteit Amsterdam; Dennis Andriesse, Vrije Universiteit Amsterdam; Erik van der Kouwe, Leiden University; Thorsten Holz, Ruhr-Universitat Bochum; Cristiano Giuffrida, Vrije Universiteit Amsterdam; Herbert Bos, Vrije Universiteit Amsterdam
Dinner will be held in Brisas Del Mar, overlooking the ocean, and will include a trio playing Latin and tropical music. After dinner, there will be a live Carnival Parade, featuring pleneros, vejigantes, bomba dancers, stilt walkers, and cabezudos - a show not to be missed!
Thursday, 12 December 2019
7:30-8:30
(Brisas Del Mar)
8:30-9:00
(Royal Ballroom)Session Chair: Kevin Butler, University of Florida
9:00-10:00
(Royal Ballroom)Session Chair: David Balenson, SRI International
Why Your Tech Transition Will Probably Fail (And Why You Should Do It Anyway) Patrick Traynor, Professor, University of Florida SLIDES
10:00-10:30
(Foyer)
10:30-12:00
Laguna I
Royal Ballroom
Miramar I
Moderator: Daniel Faigin, The Aerospace Corporation SLIDES
Panelists:
Michael Ekstrom, NIST/NCCoE - MITRE SLIDES
Peter Wong, The Soter Group José L. Quiñones-Borrero, University of Puerto Rico
Panelists: Yinzhi Cao, JHU. SLIDES Raymond Brown, NSA SLIDES Wei-Shinn Ku, NSF Saurabh Shintre, NortonLifeLock
Session Chair: Fengwei Zhang, SUSTechCUBISMO: Decloaking Server-side Malware via Cubist Program AnalysisAbbas Naderi-Afooshteh, University of Virginia; Yonghwi Kwon, University of Virginia; Anh Nguyen-Tuong, University of Virginia; Mandana Bagheri-Marzijarani, University of Virginia; Jack W. Davidson, University of VirginiaNeurlux: Dynamic Malware Analysis Without Feature EngineeringChani Jindal, UC Santa Barbara; Christopher Salls, UC Santa Barbara; Hojjat Aghakhani, UC Santa Barbara; Keith Long, UC Santa Barbara; Christopher Kruegel, UC Santa Barbara; Giovanni Vigna, UC Santa BarbaraA Game of "Cut and Mouse": Bypassing Antivirus by Simulating User InputsZiya Alper Genç, University of Luxembourg; Gabriele Lenzini, University of Luxembourg; Daniele Sgandurra, Royal Holloway, University of LondonMy Script Engines Know What You Did In The Dark: Converting Engines into Script API TracersToshinori Usui, NTT Secure Platform Laboratories / Institute of Industrial Science, The University of Tokyo; Yuto Otsuki, NTT Secure Platform Laboratories; Yuhei Kawakoya, NTT Secure Platform Laboratories; Makoto Iwamura, NTT Secure Platform Laboratories; Jun Miyoshi, NTT Secure Platform Laboratories; Kanta Matsuura, Institute of Industrial Science, The University of Tokyo
Session Chair: Roberto Perdisci, Univesity of GeorgiaBakingTimer: Privacy Analysis of Server-Side Request Processing TimeIskander Sanchez-Rola, University of Deusto, Symantec Research Labs; Davide Balzarotti, Eurecom; Igor Santos, University of DeustoPDoT: Private DNS-over-TLS with TEE SupportYoshimichi Nakatsuka, UC Irvine; Andrew Paverd, andrew.paverd@ieee.org; Gene Tsudik, UC IrvineCasino Royale: A Deep Exploration of Illegal Online GamblingHao Yang, Tsinghua University; Kun Du, Tsinghua University; Yubao Zhang, University of Delaware; Shuang Hao, University of Texas at Dallas; Zhou Li, University of California, Irvine; Mingxuan Liu, Tsinghua University; Haining Wang, Virginia Tech; Haixin Duan, Tsinghua University, Beijing National Research Center for Information Science and Technology; Yazhou Shi, Baidu Inc.; Xiaodong Su, Baidu Inc.; Guang Liu, Baidu Inc.; Zhifeng Geng, Baidu Inc.; Jianping Wu, Tsinghua UniversityLeveraging Locality of Reference for Certificate RevocationLuke Dickinson, Sandia National Laboratories; Trevor Smith, Brigham Young University; Kent Seamons, Brigham Young University
15:00-15:30
(Foyer)
15:30-17:00
Laguna I
Royal Ballroom
Miramar I
Session Chair: Larry Wagoner, NSA
Hype or hope? Machine learning based security analytics for web applications, Lei Ding, Xiaoyong Yuan, and Malek Ben Salem, Accenture SLIDES
Applying the Guilt By Association Principle to Threat Detection with Sparsely Labeled Data, Kevin Roundy, NortonLifeLock SLIDES
JEX: A Straightforward, Portable and Scalable Framework for Automatic Exploit Generation for Java, Mohammadreza Ashouri, University of Potsdam, Germany SLIDES
Session Chair: Amir Herzberg, University of ConnecticutOpening Pandora's Box through ATFuzzer: Dynamic Analysis of AT Interface for Android SmartphonesImtiaz Karim, Purdue University; Fabrizio Cicala, Purdue University; Syed Rafiul Hussain, Purdue University; Omar Chowdhury, The University of Iowa; Elisa Bertino, Purdue UniversitySRFuzzer: An Automatic Fuzzing Framework for Physical SOHO Router Devices to Discover Multi-Type VulnerabilitiesYu Zhang, Institute of Information Engineering, Chinese Academy of Sciences; Wei Huo, Institute of Information Engineering, Chinese Academy of Sciences; Kunpeng Jian, Institute of Information Engineering, Chinese Academy of Sciences; Ji Shi, Institute of Information Engineering, Chinese Academy of Sciences; Haoliang Lu, Institute of Information Engineering, Chinese Academy of Sciences; Longquan Liu, Institute of Information Engineering, Chinese Academy of Sciences; Chen Wang, Institute of Information Engineering, Chinese Academy of Sciences; Dandan Sun, Institute of Information Engineering, Chinese Academy of Sciences; Chao Zhang, Institute for Network Sciences and Cyberspace of Tsinghua University; Baoxu Liu, Institute of Information Engineering, Chinese Academy of SciencesPremadoma: An Operational Solution for DNS Registries to Prevent Malicious Domain RegistrationsJan Spooren, imec - DistriNet, KU Leuven, Belgium; Thomas Vissers, imec - DistriNet, KU Leuven, Belgium; Peter Janssen, EURid VZW, Belgium; Wouter Joosen, imec - DistriNet, KU Leuven, Belgium; Lieven Desmet, imec - DistriNet, KU Leuven, BelgiumCoordinated Dataflow Protection for Ultra-High Bandwidth Science NetworksVasudevan Nagendra, Stony Brook University; Vinod Yegneswaran, SRI International; Phil Porras, SRI International; Samir Das, Stony Brook University
Session Chair: Kent Seamons, Brigham Young University EIGER: Automated IOC Generation for Accurate and Interpretable Endpoint Malware DetectionYuma Kurogome, NTT Secure Platform Laboratories; Yuto Otsuki, NTT Secure Platform Laboratories; Yuhei Kawakoya, NTT Secure Platform Laboratories; Makoto Iwamura, NTT Secure Platform Laboratories; Syogo Hayashi, NTT Security (Japan) KK; Tatsuya Mori, Waseda University / NICT; Koushik Sen, University of California, BerkeleyYour Hashed IP Address: Ubuntu - Perspectives on Transparency Tools for Online AdvertisingTobias Urban, Institute for Internet Security, Westphalian University of Applied Sciences; Martin Degeling, Ruhr University Bochum; Horst Gortz Institute for IT Security; Thorsten Holz, Ruhr University Bochum; Horst Gortz Institute for IT Security; Norbert Pohlmann, Institute for Internet Security, Westphalian University of Applied SciencesWill You Trust This TLS Certificate? Perceptions of People Working in ITMartin Ukrop, Masaryk University; Lydia Kraus, Masaryk University; Vashek Matyas, Masaryk University; Heider Ahmad Mutleq Wahsheh, Ca' Foscari University of VeniceI Know What You Did Last Login: Inconsistent Messages Tell Existence of a Target's Account to InsidersAyako Akiyama Hasegawa, NTT Secure Platform Laboratories; Takuya Watanabe, NTT Secure Platform Laboratories; Eitaro Shioji, NTT Secure Platform Laboratories; Mitsuaki Akiyama, NTT Secure Platform Laboratories