Workshop Program (August 13, 2024 - all times EDT / UTC-4)

TimeSchedule
8:00-8:25Registration
8:25-8:30Opening remarks
Terry Benzel, USC-ISI and Deniz Gurkan, Kent State University
8:30-9:30Keynote: “Well, It Worked on My Computer”: On Reproducibility in Security Research (Slides)
Daniel Olszewski, University of Florida
9:30-9:45Coffee break
9:45-11:45Paper Session 1 - Security Tools and Approaches (Session Chair: Deniz Gurkan, Kent State University)
Hardening the Internet of Things: Toward Designing Access Control For Resource Constrained IoT Devices (Slides)
Manuel Bessler (Xylem), Paul Sangster (Xylem), Radhika Upadrashta (Xylem), TJ OConnor (Florida Tech)
Accelerating Ransomware Defenses with Computational Storage Drive-Based API Call Sequence Classification (Slides)
Kurt Friday (Louisiana State University), Elias Bou-Harb (Louisiana State University)
Measuring Cyber Essentials Security Policies (Slides)
Sándor Bartha (University of Edinburgh), Russell Ballantine (TEK Systems Global Services), David Aspinall (University of Edinburgh)
Design and Implementation of a Coverage-Guided Ruby Fuzzer (Slides)
Matt Schwager (Trail of Bits), Dominik Klemba (Trail of Bits), Josiah Dykstra (Trail of Bits)
11:45-1:15Lunch break (on your own)
1:15-3:15Paper Session 2 - Dataset (Session Chair: Josiah Dykstra, Trail of Bits)
Introducing a Comprehensive, Continuous, and Collaborative Survey of Intrusion Detection Datasets (Slides)
Philipp Bönninghausen (Fraunhofer FKIE), Rafael Uetz (Fraunhofer FKIE), Martin Henze (RWTH Aachen University & Fraunhofer FKIE)
Introducing a New Alert Data Set for Multi-Step Attack Analysis (Slides)
Max Landauer (AIT Austrian Institute of Technology), Florian Skopik (AIT Austrian Institute of Technology), Markus Wurzenberger (AIT Austrian Institute of Technology)
The attacks aren’t alright: Large-Scale Simulation of Fake Base Station Attacks and Detections (Slides)
Thijs Heijligenberg (Radboud University), David Rupprecht (Radix Security), Katharina Kohls (Ruhr University Bochum)
GothX: a generator of customizable, legitimate and malicious IoT network traffic (Slides)
Manuel Poisson (CentraleSupélec, Amossys, Univ. Rennes, Inria), Rodrigo Carnier (National Institute of Informatics), Kensuke Fukuda (National Institute of Informatics / Sokendai)
3:15-3:30Coffee break
3:30-5:30Paper Session 3 - Testbeds and Experimental Environments (Session Chair: Mohit Singhal, Northeastern University)
NERDS: A Non-invasive Environment for Remote Developer Studies (Slides)
Joseph Lewis (University of Maryland), Kelsey R. Fulton (Colorado School of Mines)
A Testbed for Operations in the Information Environment (Slides)
Mary Ellen Zurko (MIT Lincoln Laboratory), Adam Tse (MIT Lincoln Laboratory), Swaroop Vattam (MIT Lincoln Laboratory), Vince Ercolani (MIT Lincoln Laboratory), Doug Stetson (MIT Lincoln Laboratory)
Towards a High Fidelity Training Environment for Autonomous Cyber Defense Agents (Slides)
Sean Oesch (Oak Ridge National Laboratory), Amul Chaulagain (Oak Ridge National Laboratory), Brian Weber (Oak Ridge National Laboratory), Matthew Dixson (Oak Ridge National Laboratory), Amir Sadovnik (Oak Ridge National Laboratory), Benjamin Roberson (Oak Ridge National Laboratory), Cory Watson (Oak Ridge National Laboratory), Phillipe Austria (Oak Ridge National Laboratory)
COMEX: Deeply Observing Application Behavior on Real Android Devices (Slides)
Zeya Umayya (IIITD), Dhruv Malik (IIITD), Arpit Nandi (IIITD), Akshat Kumar (IIITD), Sareena Karapoola (IIT Madras, Chennai, India), Sambuddho (IIITD)
6:00No-Host Dinner at Maggiano's Little Italy (1201 Filbert St - across the street from the hotel)
Sponsored byIn cooperation with

CSET'24

Designed by BootstrapMade