OpenConf Peer Review and Submission Management System
Monday, 5 December 2022
07:30-08:30
(Break Area)
08:30-12:00
Classroom 104
Classroom 115
Classroom 116
Two-Day Training
Instructors: SeanMichael Galvin, Shadron Gudmunson, and James Gallagher, Sandia National Labs
One-Day Workshop
General Chair: James Aman, Rice University
Program Chairs : Yupeng Zhang, Texas A&M University; and Hans Behrens, Arizona State University
One-Day Workshop
Program Committee Co-Chairs: Dr. William Claycomb, CERT National Insider Threat Center, Carnegie Mellon University, USA; and Dr. Christina Winters, Tilburg Law School, Tilburg Univ., Netherlands
12:00-13:30
(Tejas)
13:30-17:00
Classroom 104
Classroom 115
Classroom 116
(Training Continues)
(Workshop Continues)
(Workshop Continues)
Tuesday, 6 December 2022
07:30-08:30
(Break Area)
08:30-12:00
Classroom 104
Classroom 108
Classroom 115
Classroom 116
(Training Continues)
One-Day Workshop
General Co-Chairs: Harvey Rubinovitz, The MITRE Corporation; and Stacy Prowell, Oak Ridge National Laboratory
Program Co-Chairs: Irfan Ahmed, Virginia Commonwealth University; and Constantinos Kolias, University of Idaho
ICSS-Industrial Control System Security -
General Co-Chairs: Harvey Rubinovitz (The MITRE Corporation), Stacy Prowell (Oak Ridge National Laboratory)
Program Co-Chair: Irfan Ahmed (Virginia Commonwealth University), Constantinos Kolias (University of Idaho)
One-Day Workshop
Organizers: Huafeng Zhang, TBTL, Oxford, UK; Muhammad Usama Sardar, TU Dresden, Germany; and Pedro Antonino, TBTL Oxford, UK
PC Chair: Bill Roscoe, University of Oxford and TBTL Oxford, UK
One-Day Workshop
Organizers: David Balenson, USC Information Sciences Institute; and Laura Tinnel, SRI International
12:00-13:30
(Tejas)
13:30-17:00
Classroom 104
Classroom 108
Classroom 115
Classroom 116
(Training Continues)
(Workshop Continues)
(Workshop Continues)
(Workshop Continues)
18:00-20:00
(Interior Courtyard)
Wednesday, 7 December 2022
07:30-08:30
(Tejas)
08:30-09:00
(Amphitheater 204)
ACSAC Conference Welcome: Guofei Gu, Conference Chair SLIDES
PC Chair Opening Remarks and Distinguished Paper Awards: Gabriela Ciocarlie and Roberto Perdisci, Program Co-Chairs SLIDES
SWSIS Scholarship Program, Jeremy Epstein, Program Manager SLIDES
09:00-10:00
(Amphitheater 204)Session Chair: Guofei Gu, Texas A&M University
Dr. Suman Jana, Associate Professor, Department of Computer Science, Columbia University SLIDES
10:00-10:30
(Tejas)
10:30-12:00
Classroom 203
Classroom 202
Classroom 201
Moderator: Tomas Vagoun, NITRD
Panelists:
Dan Cosley, Program Director, National Science Foundation
Brian Kettler, Program Manager, DARPA
Jacob Shapiro, Special Advisor, Office of the Director of National Intelligence; Professor of Politics and International Affairs, Princeton University
Session Chair: Adam Aviv, George Washington UniversityTowards Practical Application-level Support for Privilege SeparationNik Sultana, Illinois Institute of Technology; Henry Zhu, UIUC; Ke Zhong, University of Pennsylvania; Zhilei Zheng, University of Pennsylvania; Ruijie Mao, University of Pennsylvania; Digvijaysinh Chauhan, University of Pennsylvania; Stephen Carrasquillo, University of Pennsylvania; Junyong Zhao, University of Arizona; Lei Shi, University of Pennsylvania; Nikos Vasilakis, Brown University and MIT; Boon Thau Loo, University of PennsylvaniaFormal Modeling and Security Analysis for Intra-level Privilege SeparationYinggang Guo, State Key Laboratory for Novel Software Technology, Nanjing University; Zicheng Wang, State Key Laboratory for Novel Software Technology, Nanjing University; Bingnan Zhong, State Key Laboratory for Novel Software Technology, Nanjing University; Qingkai Zeng, State Key Laboratory for Novel Software Technology, Nanjing UniversityDesigning a Provenance Analysis for SGX EnclavesFlavio Toffalini, EPFL; Mathias Payer, EPFL; Jianying Zhou, Singapore University of Technology and Design; Lorenzo Cavallaro, University College LondonCloak: Transitioning States on Legacy Blockchains Using Secure and Publicly Verifiable Off-Chain Multi-Party ComputationQian Ren, SSC Holding Company Ltd., Oxford-Hainan Blockchain Research Institute; Yingjun Wu, SSC Holding Company Ltd., Oxford-Hainan Blockchain Research Institute; Han Liu, Oxford-Hainan Blockchain Research Institute, Tsinghua University; Yue Li, Oxford-Hainan Blockchain Research Institute; Anne Victor, SSC Holding Company Ltd., Oxford-Hainan Blockchain Research Institute; Hong Lei, Hainan University, Oxford-Hainan Blockchain Research Institute; Lei Wang, Shanghai Jiao Tong University; Bangdao Chen, SSC Holding Company Ltd., Oxford-Hainan Blockchain Research InstituteStopping Silent Sneaks: Defending against Malicious Mixes with Topological EngineeringXinshu Ma, University of Edinburgh; Florentin Rochet, University of Namur; Tariq Elahi, University of Edinburgh
Session Chair: Giorgio Giacinto, University of Cagliari, ItalyMProbe: Make the code probing meaninglessYongGang Li, China University of Mining and Technology; Yeh-Ching Chung, the Chinese University of Hong Kong (CUHK), Shenzhen; Jinbiao Xing, China University of Mining and Technology; Yu Bao, China University of Mining and Technology; GuoYuan LIn, China University of Mining and TechnologyDitDetector: Bimodal Learning based on Deceptive Image and Text for Macro Malware DetectionJia Yan, Institute of Software, Chinese Academy of Sciences / School of Computer Science and Technology, University of Chinese Academy of Sciences; Ming Wan, QIANXIN Group Inc.; Xiangkun Jia, Institute of Software, Chinese Academy of Sciences; Lingyun Ying, QIANXIN Group Inc.; Purui Su, Institute of Software, Chinese Academy of Sciences / School of Cyber Security, University of Chinese Academy of Sciences; Zhanyi Wang, QIANXIN Group Inc.View from Above: Exploring the Malware Ecosystem from the Upper DNS HierarchyAaron Faulkenberry, Georgia Institute of Technology; Athanasios Avgetidis, Georgia Institute of Technology; Zane Ma, Georgia Institute of Technology; Omar Alrawi, Georgia Institute of Technology; Charles Lever, Devo; Panagiotis Kintis, Voreas Laboratories Inc; Fabian Monrose, Georgia Institute of Technology; Angelos D. Keromytis, Georgia Institute of Technology; Manos Antonakakis, Georgia Institute of TechnologyA Recent Year On the Internet: Measuring and Understanding the Threats to Everyday Internet DevicesAfsah Anwar, Northeastern University; Yi Hui Chen, Northeastern University; Roy Hodgman, Rapid 7; Tom Sellers, runZero; Engin Kirda, Northeastern University; Alina Oprea, Northeastern UniversityMake Data Reliable : An Explanation-powered Cleaning on Malware Dataset Against Backdoor Poisoning AttacksXutong Wang, Institute of Information Engineering, Chinese Academy of Sciences; Chaoge Liu, Institute of Information Engineering, Chinese Academy of Sciences; Xiaohui Hu, School of Computer Science, Beijing University of Posts and Telecommunications; Zhi Wang, Institute of Information Engineering, Chinese Academy of Sciences; Jie Yin, Institute of Information Engineering, Chinese Academy of Sciences; Xiang Cui, Zhongguancun Laboratory
15:00-15:30
(Tejas)
15:30-17:00
Classroom 203
Classroom 202
Classroom 201
Moderator: Elizabeth Scruggs, Associate Director Cyber Engineering and Hiring Manager, The Aerospace Corporation
Panelists:
Antonio Goree, 2022 High School Graduate and Jobseeker
A. Emmanuel, Autistic self-advocate, Voiceover Artist and Writer
Vincine J. Brown, Chief Neuro-Diversity Architect of I Am 10
Charles Lavine, Senior Cybersecurity Engineering Specialist, The Aerospace Corporation
Moderator: S. Jay Yang, Ph.D., ESL Global Cybersecurity Institute, Rochester Institute of Technology
Panelists:
David Balenson, USC Information Science Institute
Sebastián García, Stratosphere Laboratory, Czech Technical University
Robert Beverly, National Science Foundation
Emma Tosch, Northeastern University
Sagar Samtani, Indiana University
Session Chair: Jinpeng Wei, University of North Carolina at CharlotteTransformer-Based Language Models for Software Vulnerability DetectionChandra Thapa, CSIRO Data61; Seung Ick Jang, CSIRO Data61; Muhammad Ejaz Ahmed, CSIRO Data61; Seyit Camtepe, CSIRO Data61; Josef Pieprzyk, CSIRO Data61; Surya Nepal, CSIRO Data61Compact Abstract Graphs for Detecting Code Vulnerability with GNN ModelsYu Luo, University of Missouri - Kansas City; Weifeng Xu, The University of Baltimore; Dianxiang Xu, University of Missouri - Kansas CityBoosting Neural Networks to Decompile Optimized BinariesYing Cao, Institute of Information Engineering, Chinese Academy of Sciences; Ruigang Liang, Institute of Information Engineering, Chinese Academy of Sciences; Kai Chen, Institute of Information Engineering, Chinese Academy of Sciences; Peiwei Hu, Institute of Information Engineering, Chinese Academy of SciencesSLOPT: Bandit Optimization Framework for Mutation-Based FuzzingYuki Koike, Ricerca Security, Inc.; Hiroyuki Katsura, Ricerca Security, Inc.; Hiromu Yakura, University of Tsukuba / National Institute of Advanced Industrial Science and Technology (AIST), Japan; Yuma Kurogome, Ricerca Security, Inc.Alphuzz: Monte Carlo Search on Seed-Mutation Tree for Coverage-Guided FuzzingYiru Zhao, Wuhan university; Xiaoke Wang, Wuhan university; Lei Zhao, Wuhan university; Yueqiang Cheng, NIO Security Research; Heng Yin, UC Riverside
12:00-13:30
(Tejas)
Code Genome - Fingerprinting Code to Help Secure the Software Supply Chain SLIDES
Jiyong Jang, Principal Research Scientist and Manager of the Cyber Security Intelligence (CSI) team, IBM Thomas J. Watson Research Center
13:30-15:00
Classroom 203
Classroom 202
Classroom 201
Session Chair: Dennis Moreau, Intel
Applying MITRE’s System of Trust to the Software Supply Chain, Robert Martin, MITRE
Shifting Left the Right Way with OSCAL (Open Security Controls Assessment Language), Chris Compton, Nikita Wootten, and Alexander Stein, NIST ITL Computer Security Division
Automated Generation of Yara Classifiers for Malware, Arun Lakhotia, University of Louisiana at Lafayette and CTO & Co Founder of Cythereal
Session Chair: Peter Mayer, Karlsruhe Institute of TechnologyUser Perceptions of the Privacy and Usability of Smart DNSRahel A. Fainchtein, Georgetown University; Adam J. Aviv, The George Washington University; Micah Sherr, Georgetown UniversityUser Perceptions of Five-Word PasswordsXiaoyuan Wu, The George Washington University; Collins W. Munyendo, The George Washington University; Eddie Cosic, The George Washington University; Genevieve A. Flynn, The George Washington University; Olivia Legault, The George Washington University; Adam J. Aviv, The George Washington UniversityA Qualitative Evaluation of Reverse Engineering Tool UsabilityJames Mattei, Tufts University; Madeline McLaughlin, Tufts University; Samantha Katcher, Tufts University; Daniel Votipka, Tufts University
15:00-15:30
(Tejas)
15:30-17:00
Classroom 203
Classroom 202
Classroom 201
Moderator: Daniel P. Faigin, The Aerospace Corporation
Panelists:
Martin Stanley, U.S. Department of Homeland Security, Cybersecurity and Infrastructure Security Agency
Jeremy Epstein, National Science Foundation
Peter Mell, Senior Computer Scientist, Computer Security Division, National Institute of Standards and Technology
Chester Maciag, U.S. Department of Defense, OUSD(R&E) Director for Cyber Technologies, DCTO (Critical Technology), Integrated Sensing and Cyber (IS&C)
Michael Clifford, Research Scientist, Toyota InfoTech Labs
Session Chair: Guofei Gu, Texas A&M UniversityZeroDNS: Towards Better Zero Trust Security using DNSLevente Csikor, Institute for Infocomm Research, A*STAR; Sriram Ramachandran, Institute for Infocomm Research, A*STAR; Anantharaman Lakshminarayanan, Institute for Infocomm Research, A*STARAre There Wireless Hidden Cameras Spying on Me?Jeongyoon Heo, Samsung Research; Sangwon Gil, Samsung Research; Youngman Jung, Samsung Research; Jinmok Kim, Samsung Research; Donguk Kim, Samsung Research; Woojin Park, Samsung Research; Yongdae Kim, KAIST; Kang G. Shin, The University of Michigan; Choong-Hoon Lee, Samsung ResearchIf You Can’t Beat Them, Pay Them: Bitcoin Protection Racket is ProfitableZheng Yang, Southwest University; Chao Yin, Vrije University Amsterdam, Netherlands; Junming Ke, University of Tartu; Anh Dinh, Singapore University of Technology and Design; Jianying Zhou, Singapore University of Technology and DesignInteraction matters: a comprehensive analysis and a dataset of hybrid IoT/OT honeypotsShreyas Srinivasa, Aalborg University; Jens Myrup Pedersen, Aalborg University; Emmanouil Vasilomanolakis, Technical University of DenmarkStateDiver: Testing Deep Packet Inspection Systems with State-Discrepancy GuidanceZhechang Zhang, Huazhong University of Science and Technology; Bin Yuan, Huazhong University of Science and Technology; Kehan Yang, Huazhong University of Science and Technology; Deqing Zou, Huazhong University of Science and Technology; Hai Jin, Huazhong University of Science and Technology
17:15-18:15
(Amphitheater 204)Session Chair: Daniel Faigin & David Balenson
18:30-20:00
(Interior Courtyard)Session Chair: Yonghwi Kwon, University of Virginia
Friday, 9 December 2022
07:30-08:30
(Tejas)
08:30-10:00
Classroom 203
Classroom 202
Classroom 201
Moderator: Mark W Winstead, Mitre
Panelists:
Albert Tao, Extreme Networks
Brian Viola, USAF Platform One
Justin Fisher, Leidos
Session Chair: S. Jay Yang, Rochester Institute of TechnologyMADDC: Multi-Scale Anomaly Detection, Diagnosis and Correction for Discrete Event Logsxiaolei Wang, College of Computer, National University of Defense Technology; Lin Yang, National Key Laboratory of Science and Technology on Information System Security, Systems Engineering Institute, AMS; Dongyang Li, National Key Laboratory of Science and Technology on Information System Security, Systems Engineering Institute, AMS; Linru Ma, National Key Laboratory of Science and Technology on Information System Security, Systems Engineering Institute, AMS; Yongzhong He, School of Computer and Information Technology,Beijing Jiaotong University; Junchao Xiao, School of Systems Science and Engineering, Sun Yat-Sen University; Jiyuan Liu, College of Computer, National University of Defense Technology; Yuexiang Yang, College of Computer, National University of Defense TechnologyENIDrift: A Fast and Adaptive Ensemble System for Network Intrusion Detection under Real-world DriftXian Wang, The Hong Kong University of Science and TechnologyTowards Enhanced EEG-based Authentication with Motor Imagery Brain-Computer InterfaceBingkun Wu, Technical University of Denmark, Denmark; Weizhi Meng, Technical University of Denmark, Denmark; Wei-Yang Chiu, Technical University of Denmark, DenmarkFAuST: Striking a Bargain between Forensic Auditing’s Security and ThroughputMuhammad Adil Inam, University of Illinois at Urbana-Champaign; Akul Goyal, University of Illinois at Urbana-Champaign; Jason Liu, University of Illinois at Urbana-Champaign; Jaron Mink, University of Illinois at Urbana-Champaign; Noor Michael, University of Illinois at Urbana-Champaign; Sneha Gaur, University of Illinois at Urbana-Champaign; Adam Bates, University of Illinois at Urbana-Champaign; Wajih Ul Hassan, University of VirginiaRAPID: Real-Time Alert Investigation with Context-aware Prioritization for Efficient Threat DiscoveryYushan Liu, Google, Inc.; Xiaokui Shu, IBM Research; Yixin Sun, University of Virginia; Jiyong Jang, IBM Research; Prateek Mittal, Princeton Univ.
Session Chair: Mustakimur Rahman Khandaker, University of GeorgiaDF-SCA: Dynamic Frequency Side Channel Attacks are PracticalDebopriya Roy Dipta, Iowa State University; Berk Gulmezoglu, Iowa State UniversityPOPKORN: Popping Windows Kernel Drivers At ScaleRajat Gupta, Georgia Institute of Technology; Lukas Dresel, University of California, Santa Barbara; Noah Spahn, University of California, Santa Barbara; Giovanni Vigna, University of California, Santa Barbara; Christopher Kruegel, University of California, Santa Barbara; Taesoo Kim, Georgia Institute of TechnologyMaking Memory Account Accountable: Analyzing and Detecting Memory Missing-account bugs for Container PlatformsYutian Yang, Zhejiang University; Wenbo Shen, Zhejiang University; Xun Xie, Zhejiang University; Kangjie Lu, Zhejiang University; Mingsen Wang, Zhejiang University; Tianyu Zhou, Zhejiang University; Chenggang Qin, Ant Group; Wang Yu, Ant Group; Kui Ren, Zhejiang University
Session Chair: Gabriela Ciocarlie, The University of Texas at San AntonioTrebiz: Byzantine Fault Tolerance with Byzantine MerchantsXiaohai Dai, Huazhong University of Science and Technology; Liping Huang, Huazhong University of Science and Technology; Jiang Xiao, Huazhong University of Science and Technology; Zhaonan Zhang, Huazhong University of Science and Technology; Xia Xie, Hainan University; Hai Jin, Huazhong University of Science and TechnologyArchiveSafe LT: Secure Long-term Archiving SystemMoe Sabry, McMaster University; Reza Samavi, Toronto Metropolitan UniversityHeimdallr: Fingerprinting SD-WAN Control-Plane Architecture via Encrypted Control TrafficMinjae Seo, The Affiliated Institute of ETRI; Jaehan Kim, KAIST; Eduard Marin, Telefonica Research; Myeongsung You, KAIST; Taejune Park, Chonnam National University; Seungsoo Lee, Incheon National University; Seungwon Shin, KAIST; Jinwoo Kim, Kwangwoon University
Session Chair: Chia-Che Tsai, Texas A&M UniversityCoCoTPM: Trusted Platform Modules for Virtual Machines in Confidential Computing EnvironmentsJoana Pecholt, Fraunhofer AISEC; Sascha Wessel, Fraunhofer AISECiService: Detecting and Evaluating the Impact of Confused Deputy Problem in AppleOSYizhuo Wang, Shanghai Jiao Tong University; Yikun Hu, Shanghai Jiao Tong University; Xuangan Xiao, Shanghai Jiao Tong University; Dawu Gu, Shanghai Jiao Tong UniversityMoLE: Mitigation of Side-channel Attacks against SGX via Dynamic Data Location EscapeFan Lang, State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences; School of Cyber Security, University; Wei Wang, State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences; Lingjia Meng, State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences; School of Cyber Security, University; Jingqiang Lin, University of Science and Technology of China; Qiongxiao Wang, State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences; Linli Lu, State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences
11:30-12:00
(Amphitheater 204)
Don't leave early -- attend our closing plenary to learn about next year's conference and participate in our prize giveaway! SLIDES