Full Program »
Posters and Works in Progress Talks
Wednesday, 8 December 2021
15:30 - 16:30
Defense (15:30 ~ 15:45)
- [Poster] Chhoyhopper: A Moving Target Defense with IPv6 (2 min)
- A S M Rizvi (USC/Information Sciences Institute), John Heidemann (USC/Information Sciences Institute)
- [Poster] Towards Automation of Penetration Testing for Web Applications by Deep Reinforcement Learning (2 mins)
- Hajime Kuno and Kanta Matsuura (Institute of Industrial Science, The University of Tokyo)
- [WIP] Integration of NTRU cryptosystems into Modern Developments for 5G Authentication (2 min)
- John Millar (Iona College)
- Questions and Answers (Defense): 9 mins
Attack (15:45 ~ 16:00)
- [Poster] Developing Methods to Infiltrate Samba Servers and Replace Legitimate Data with Malware (2 mins)
- Mukund Ramakrishnan (Rutgers University), Jinpeng Wei (University of North Carolina at Charlotte), Md Rabbi Alam (University of North Carolina at Charlotte)
- [Poster] Towards Trusted Container Networking: Physical Network Segmentation by Hardware-assisted Secure Bridge (2 min)
- Myoungsung You (KAIST), Seungwon Shin (KAIST)
- Myoungsung You (KAIST), Seungwon Shin (KAIST)
- [Poster] Stash your Cache, Cross-Container Linux Page Cache Covert Channel (2 mins)
- Naor Radami (Ben Gurion University), Novak Boškov (Boston University), Trishita Tiwari (Cornell University), Ari Trachtenberg (Boston University)
- Questions and Answers (Attack): 9 mins
Usability and Measurement (16:00 ~ 16:15)
- [Poster] Can you delete a file if you don’t own it? (2 mins)
- Drew Wood (PSU), Anna Squicciarini (PSU), Aiping Xiong (PSU), Erin Flannery (PSU)
- [Poster] Effects of Enhanced Compiler Error Messages in Rust: A Preliminary Study (2 mins)
- Ziyi Zhang (University of Wisconsin-Madison), Aiping Xiong (The Pennsylvania State University)
- [Poster] Sharing Expertise and Artifacts for Reuse through Cybersecurity Community Hub (SEARCCH) (2 mins)
- Terry Benzel (USC-ISI), Jelena Mirkovic (USC-ISI), Laura Tinnel (SRI International), David Balenson (SRI International), Eric Eide (U. Utah), Tim Yardley (U. Illinois Urbana-Champaign)
- Questions and Answers (Usability and Measurement): 9 mins
Privacy and Anonymity (16:15 ~ 16:30)
- [Poster] Detecting Anomalies In IoT Device Communication Based on MUD Profiles With Zeek and Python (2 mins)
- Rohan Nunugonda (Peddie School & CMU CyLab), Dr. Vyas Sekar (CMU CyLab), Matthew McCormack (CMU CyLab)
- [WIP] TagUBig: lessons from a project and a pandemic (2 mins)
- Ana Ferreira (CINTESIS - Center for Health Technologies and Services Research)
- [WIP] Dystone: Program Analysis-Based Privacy Enhancement System for Smart Contracts (2 mins)
- Dahyeon Jeong (Chungnam National University), Jihyeon Kim (Chungnam National University), Jisoo Kim (Chungnam National University), Eun-Sun Cho (Chungnam National University)
- Questions and Answers (Privacy and Anonymity): 9 mins