Workshop Program (August 13, 2024 - all times EDT / UTC-4)

TimeSchedule
8:00-8:25Registration
8:25-8:30Opening remarks
Terry Benzel, USC-ISI and Deniz Gurkan, Kent State University
8:30-9:30Keynote: “Well, It Worked on My Computer”: On Reproducibility in Security Research
Daniel Olszewski, University of Florida
9:30-10:30Coffee break
9:45-11:45Paper Session 1 - Security Tools and Approaches (Session Chair: Deniz Gurkan, Kent State University)
Hardening the Internet of Things: Toward Designing Access Control For Resource Constrained IoT Devices
Manuel Bessler (Xylem), Paul Sangster (Xylem), Radhika Upadrashta (Xylem), TJ OConnor (Florida Tech)
Accelerating Ransomware Defenses with Computational Storage Drive-Based API Call Sequence Classification
Kurt Friday (Louisiana State University), Elias Bou-Harb (Louisiana State University)
Measuring Cyber Essentials Security Policies
Sándor Bartha (University of Edinburgh), Russell Ballantine (TEK Systems Global Services), David Aspinall (University of Edinburgh)
Design and Implementation of a Coverage-Guided Ruby Fuzzer
Matt Schwager (Trail of Bits), Dominik Klemba (Trail of Bits), Josiah Dykstra (Trail of Bits)
11:45-1:15Lunch break (on your own)
1:15-3:15Paper Session 2 - Dataset (Session Chair: Josiah Dykstra, Trail of Bits)
Introducing a Comprehensive, Continuous, and Collaborative Survey of Intrusion Detection Datasets
Philipp Bönninghausen (Fraunhofer FKIE), Rafael Uetz (Fraunhofer FKIE), Martin Henze (RWTH Aachen University & Fraunhofer FKIE)
Introducing a New Alert Data Set for Multi-Step Attack Analysis
Max Landauer (AIT Austrian Institute of Technology), Florian Skopik (AIT Austrian Institute of Technology), Markus Wurzenberger (AIT Austrian Institute of Technology)
The attacks aren’t alright: Large-Scale Simulation of Fake Base Station Attacks and Detections
Thijs Heijligenberg (Radboud University), David Rupprecht (Radix Security), Katharina Kohls (Ruhr University Bochum)
GothX: a generator of customizable, legitimate and malicious IoT network traffic
Manuel Poisson (CentraleSupélec, Amossys, Univ. Rennes, Inria), Rodrigo Carnier (National Institute of Informatics), Kensuke Fukuda (National Institute of Informatics / Sokendai)
3:15-3:30Coffee break
3:30-5:30Paper Session 3 - Testbeds and Experimental Environments (Session Chair: Mohit Singhal, Northeastern University)
NERDS: A Non-invasive Environment for Remote Developer Studies
Joseph Lewis (University of Maryland), Kelsey R. Fulton (Colorado School of Mines)
A Testbed for Operations in the Information Environment
Mary Ellen Zurko (MIT Lincoln Laboratory), Adam Tse (MIT Lincoln Laboratory), Swaroop Vattam (MIT Lincoln Laboratory), Vince Ercolani (MIT Lincoln Laboratory), Doug Stetson (MIT Lincoln Laboratory)
Towards a High Fidelity Training Environment for Autonomous Cyber Defense Agents
Sean Oesch (Oak Ridge National Laboratory), Amul Chaulagain (Oak Ridge National Laboratory), Brian Weber (Oak Ridge National Laboratory), Matthew Dixson (Oak Ridge National Laboratory), Amir Sadovnik (Oak Ridge National Laboratory), Benjamin Roberson (Oak Ridge National Laboratory), Cory Watson (Oak Ridge National Laboratory), Phillipe Austria (Oak Ridge National Laboratory)
COMEX: Deeply Observing Application Behavior on Real Android Devices
Zeya Umayya (IIITD), Dhruv Malik (IIITD), Arpit Nandi (IIITD), Akshat Kumar (IIITD), Sareena Karapoola (IIT Madras, Chennai, India), Sambuddho (IIITD)
Sponsored byIn cooperation with

CSET'24

Designed by BootstrapMade