Conference Agenda
Note:
– All times in the program are US EST time zone.
– Participants are on their own for breakfast.
– All sessions will be hosted in USF Marshall Student Center (MSC) 2100A Royal Palm Ballroom.
* The agenda is subject to minor changes.
Day 1 – 7th November 2023 | |
---|---|
8:30 – 9:30 | Registration |
9:30 – 10:00 | Conference Opening |
10:00 – 11:00 | Keynote Speech 1 Chair: Morris Chang Title: Assured Autonomy through Combinatorial Methods D. Richard (Rick) Kuhn (National Institute of Standards & Technology) |
11:00 – 11:30 | Coffee Break |
11:30 – 12:30 | Session 1 – Mobile and Cloud Computing Session Chair: Yasin Yilmaz |
Secure Outsourcing of Boolean Formulas Truth Assignment Problem Albert Guan |
|
A Study on the Forensic Analysis of Airlines Applications on Android Operating System Urva Maryam and Mehdi Hussain |
|
12:30 – 13:30 | Lunch |
13:30 – 15:00 | Session 2 – Cyber attacks, Botnet and Intrusion Detection, and Advanced Persistent Threat (APT) Session Chair: Albert Guan |
CoDex: Cross-Tactic Correlation System for Data Exfiltration Detection Shanhsin Lee, Yung-Shiu Chen and Shiuhpyng Shieh |
|
Empirical Evaluation of Autoencoder Models for Anomaly Detection in Packet-based NIDS Soumyadeep Hore, Quoc Nguyen, Yulun Xu, Ankit Shah, Nathaniel Bastian and Trung Le |
|
APTer: Towards the Investigation of APT Attribution Vinay Sachidananda, Akshay Sachdeva, Rajendra Patil, Kwok-Yan Lam and Yang Liu |
|
15:10 – 15:30 | Coffee Break |
15:30 – 18:00 | Session 3 – Security and Privacy for AI, Software vulnerabilities, Database Security and Privacy Session Chair: Pei-Yuan Wu |
Privacy-Preserving Video Understanding via Transformer-based Federated Learning Keval Doshi and Yasin Yilmaz |
|
SepMM : A General Matrix Multiplication Optimization Approach for Privacy-Preserving Machine Learning Tung-Lin Tsai and Pei-Yuan Wu |
|
AI for software vulnerability detection and mitigation Heba Khater, Mohamad Khayat, Saed Alrabaee, Mohamed Adel Serhani, Ezedin Baraka and Farag Sallabi |
|
Decentralized and Incentivized Voting System with Web3 Technology Ensuring Anonymity and Preventing Double Voting Lo-Yao Yeh, Jun-Qian Jian and Jen-Wei Hu |
|
Automatic Conversion of ABAC Policies for RBAC Systems Maryam Davari and Mohammad Zulkernine |
Day 2 – 8th November 2023 (Workshop Day) | |
---|---|
8:30 – 9:30 | Registration |
9:30 – 10:00 | Keynote Speech 2 Title: Cyber Florida and its Impact towards a Cybersecure Florida Prof. Sriram Chellappan (Professor, Computer Science and Engineering at USF and Academic Director of Cybersecurity Research at Cyber Florida) |
10:00 – 10:30 | Coffee Break |
10:30 – 11:45 | Session 4 – Workshop on AI/ML for Cybersecurity Session Chair: Ankit Shah |
RIDE: Real-time Intrusion Detection via Explainable Machine Learning Implemented in a Memristor Hardware Architecture Jingdi Chen, Lei Zhang, Joseph Riem, Gina Adam, Nathaniel D. Bastian and Tian Lan |
|
Detecting Web Application DAST Attacks with Machine Learning Pojan Shahrivar, Stuart Millar and Ezzeldin Shereen |
|
Preprocessing Network Traffic using Topological Data Analysis for Data Poisoning Detection Galamo Monkam, Michael De Lucia and Nathaniel Bastian |
|
11:45 – 12:45 | Lunch & Poster Session |
12:45 – 14:00 | Session 5 – Workshop on AI/ML for Cybersecurity Session Chair: Nathaniel Bastian |
Towards Robust Learning using Diametrical Risk Minimization for Network Intrusion Detection Kelson McCollum, Nathaniel Bastian and Johannes Royset |
|
Malicious Cyber Activity Detection using Zigzag Persistence Audun Myers, Alyson Bittner, Sinan Aksoy, Dan Best, Gregory Henselman-Petrusek, Helen Jenne, Cliff Joslyn, Bill Kay, Garret Seppala, Stephen Young and Emilie Purvine |
|
Semantic Video Transformer for Robust Action Recognition Keval Doshi and Yasin Yilmaz |
|
14:00 – 14:30 | Coffee Break & Poster Session |
14:30 – 15:45 | Session 6 – Workshop on Security of Cyber-Physical Systems Session Chair: Arman Sargolzaei |
Impact of Topology Noise on Power Systems State Estimation Using a Temporal GCN Framework Seyed Hamed Haghshenas and Mia Naeini |
|
Cyber Risk Evaluation for Android-based Devices Ocheme Anthony Ekle and Denis Ulybyshev |
|
Designing and Testing A Secure Cooperative Adaptive Cruise Control under False Data Injection Attack Jonas Cunningham-Rush, James Holland, Shirin Noei and Arman Sargolzaei |
|
15:45 – 16:15 | Coffee Break & Poster Session |
16:15 – 17:30 | Session 7 – Workshop on Security of Cyber-Physical Systems Session Chair: Arman Sargolzaei |
An Observer-Based Control for a Networked Control of Permanent Magnet Linear Motors under a False-Data-Injection Attack Parisa Ansari Bonab, James Holland and Arman Sargolzaei |
|
Compiler-Supported Selective Software Fault Tolerance Tuncer Turhan, Hakan Tekgül and Ozcan Ozturk |
|
FLID: Intrusion Attack and Defense Mechanism for Federated Learning-Empowered Connected Autonomous Vehicles Md Zarif Hossain, Ahmed Imteaj, Saika Zaman, Abdur R. Shahid, Sajedul Talukder and M. Hadi Amini |
|
18:30 – 20:30 | Conference Banquet |
Day 3 – 9th November 2023 | |
---|---|
9:00 – 10:30 | Session 8 – Cryptographic Methods and Toolkits Session Chair: Anika Anwar |
Highly optimized Curve448 and Ed448 design in wolfSSL and side-channel evaluation on Cortex-M4 Mila Anastasova, Rabih El Khatib, Aimee Laclaustra, Reza Azarderakhsh and Mehran Mozaffari Kermani |
|
The Substitution-Boxes Incompatibility in JPEG Image Encryption Manuel Alejandro Cardona-López, Juan Carlos Chimal-Eguía, Víctor Manuel Silva-García and Rolando Flores-Carapia |
|
Cyber Security in Blockchain Eric Cooper, Eric Weese, Alex Fortson, Dan Lo and Yong Shi |
|
10:30 – 11:00 | Coffee Break |
11:00 – 12:30 | Session 9 – Embedded Systems and IoT Devices/ Toolkits and Experimentation, Measurement, and Assessment Session Chair: Dan Lo |
Lightweight Digital Signatures for Internet of Things: Current and Post-Quantum Trends and Visions Saif Eddine Nouma and Attila Altay Yavuz |
|
SRAM and Generative Network-based Physical Fingerprinting for Trust Management in the Internet of Things Varun Kohli, Muhammad Naveed Aman and Biplab Sikdar |
|
Detection of Ransomware Attack Using Deep Learning Muna Jemal and Dan Lo |
|
12:30 – 13:30 | Lunch |
13:30 – 15:30 | Session 10 – Embedded Systems and IoT Devices/ Toolkits and Experimentation, Measurement, and Assessment Session Chair: Hadi Zanddizari |
ML based Detection and Mitigation Scheme for DoS attacks on SDN Controllers Tamer Omar, Barret Griffin and Jose Garcia |
|
Privacy-Preserving and Fault-Tolerant Data Aggregation Protocol for Internet of Drones Cong Pu |
|
Data Provenance for IoT Devices by Exploiting Clock Variations Mirza Athar Baig and Muhammad Naveed Aman |
|
Enriching the Semantics of Information Flow Tracking with Source-Level Memory Allocation Event Logging Sanoop Mallissery and Yu-Sung Wu |
|
15:30 – 16:00 | Coffee Break |
17:00 | Closing Ceremony |