Conference Agenda

– All times in the program are US EST time zone.
– Participants are on their own for breakfast.
– All sessions will be hosted in USF Marshall Student Center (MSC) 2100A Royal Palm Ballroom.

* The agenda is subject to minor changes.
Day 1 – 7th November 2023
8:30 – 9:30 Registration
9:30 – 10:00 Conference Opening
10:00 – 11:00 Keynote Speech 1
Chair: Morris Chang
Title: Assured Autonomy through Combinatorial Methods
D. Richard (Rick) Kuhn (National Institute of Standards & Technology)
11:00 – 11:30 Coffee Break
11:30 – 12:30 Session 1 – Mobile and Cloud Computing
Session Chair: Yasin Yilmaz
Secure Outsourcing of Boolean Formulas Truth Assignment Problem
Albert Guan
A Study on the Forensic Analysis of Airlines Applications on Android Operating System
Urva Maryam and Mehdi Hussain
12:30 – 13:30 Lunch
13:30 – 15:00 Session 2 – Cyber attacks, Botnet and Intrusion Detection, and Advanced Persistent Threat (APT)
Session Chair: Albert Guan
CoDex: Cross-Tactic Correlation System for Data Exfiltration Detection
Shanhsin Lee, Yung-Shiu Chen and Shiuhpyng Shieh
Empirical Evaluation of Autoencoder Models for Anomaly Detection in Packet-based NIDS
Soumyadeep Hore, Quoc Nguyen, Yulun Xu, Ankit Shah, Nathaniel Bastian and Trung Le
APTer: Towards the Investigation of APT Attribution
Vinay Sachidananda, Akshay Sachdeva, Rajendra Patil, Kwok-Yan Lam and Yang Liu
15:10 – 15:30 Coffee Break
15:30 – 18:00 Session 3 – Security and Privacy for AI, Software vulnerabilities, Database Security and Privacy
Session Chair: Pei-Yuan Wu
Privacy-Preserving Video Understanding via Transformer-based Federated Learning
Keval Doshi and Yasin Yilmaz
SepMM : A General Matrix Multiplication Optimization Approach for Privacy-Preserving Machine Learning
Tung-Lin Tsai and Pei-Yuan Wu
AI for software vulnerability detection and mitigation
Heba Khater, Mohamad Khayat, Saed Alrabaee, Mohamed Adel Serhani, Ezedin Baraka and Farag Sallabi
Decentralized and Incentivized Voting System with Web3 Technology Ensuring Anonymity and Preventing Double Voting
Lo-Yao Yeh, Jun-Qian Jian and Jen-Wei Hu
Automatic Conversion of ABAC Policies for RBAC Systems
Maryam Davari and Mohammad Zulkernine
Day 2 – 8th November 2023 (Workshop Day)
8:30 – 9:30 Registration
9:30 – 10:00 Keynote Speech 2
Title: Cyber Florida and its Impact towards a Cybersecure Florida
Prof. Sriram Chellappan (Professor, Computer Science and Engineering at USF and Academic Director of Cybersecurity Research at Cyber Florida)
10:00 – 10:30 Coffee Break
10:30 – 11:45 Session 4 – Workshop on AI/ML for Cybersecurity
Session Chair: Ankit Shah
RIDE: Real-time Intrusion Detection via Explainable Machine Learning Implemented in a Memristor Hardware Architecture
Jingdi Chen, Lei Zhang, Joseph Riem, Gina Adam, Nathaniel D. Bastian and Tian Lan
Detecting Web Application DAST Attacks with Machine Learning
Pojan Shahrivar, Stuart Millar and Ezzeldin Shereen
Preprocessing Network Traffic using Topological Data Analysis for Data Poisoning Detection
Galamo Monkam, Michael De Lucia and Nathaniel Bastian
11:45 – 12:45 Lunch & Poster Session
12:45 – 14:00 Session 5 – Workshop on AI/ML for Cybersecurity
Session Chair: Nathaniel Bastian
Towards Robust Learning using Diametrical Risk Minimization for Network Intrusion Detection
Kelson McCollum, Nathaniel Bastian and Johannes Royset
Malicious Cyber Activity Detection using Zigzag Persistence
Audun Myers, Alyson Bittner, Sinan Aksoy, Dan Best, Gregory Henselman-Petrusek, Helen Jenne, Cliff Joslyn, Bill Kay, Garret Seppala, Stephen Young and Emilie Purvine
Semantic Video Transformer for Robust Action Recognition
Keval Doshi and Yasin Yilmaz
14:00 – 14:30 Coffee Break & Poster Session
14:30 – 15:45 Session 6 – Workshop on Security of Cyber-Physical Systems
Session Chair: Arman Sargolzaei
Impact of Topology Noise on Power Systems State Estimation Using a Temporal GCN Framework
Seyed Hamed Haghshenas and Mia Naeini
Cyber Risk Evaluation for Android-based Devices
Ocheme Anthony Ekle and Denis Ulybyshev
Designing and Testing A Secure Cooperative Adaptive Cruise Control under False Data Injection Attack
Jonas Cunningham-Rush, James Holland, Shirin Noei and Arman Sargolzaei
15:45 – 16:15 Coffee Break & Poster Session
16:15 – 17:30 Session 7 – Workshop on Security of Cyber-Physical Systems
Session Chair: Arman Sargolzaei
An Observer-Based Control for a Networked Control of Permanent Magnet Linear Motors under a False-Data-Injection Attack
Parisa Ansari Bonab, James Holland and Arman Sargolzaei
Compiler-Supported Selective Software Fault Tolerance
Tuncer Turhan, Hakan Tekgül and Ozcan Ozturk
FLID: Intrusion Attack and Defense Mechanism for Federated Learning-Empowered Connected Autonomous Vehicles
Md Zarif Hossain, Ahmed Imteaj, Saika Zaman, Abdur R. Shahid, Sajedul Talukder and M. Hadi Amini
18:30 – 20:30 Conference Banquet
Day 3 – 9th November 2023
9:00 – 10:30 Session 8 – Cryptographic Methods and Toolkits
Session Chair: Anika Anwar
Highly optimized Curve448 and Ed448 design in wolfSSL and side-channel evaluation on Cortex-M4
Mila Anastasova, Rabih El Khatib, Aimee Laclaustra, Reza Azarderakhsh and Mehran Mozaffari Kermani
The Substitution-Boxes Incompatibility in JPEG Image Encryption
Manuel Alejandro Cardona-López, Juan Carlos Chimal-Eguía, Víctor Manuel Silva-García and Rolando Flores-Carapia
Cyber Security in Blockchain
Eric Cooper, Eric Weese, Alex Fortson, Dan Lo and Yong Shi
10:30 – 11:00 Coffee Break
11:00 – 12:30 Session 9 – Embedded Systems and IoT Devices/ Toolkits and Experimentation, Measurement, and Assessment
Session Chair: Dan Lo
Lightweight Digital Signatures for Internet of Things: Current and Post-Quantum Trends and Visions
Saif Eddine Nouma and Attila Altay Yavuz
SRAM and Generative Network-based Physical Fingerprinting for Trust Management in the Internet of Things
Varun Kohli, Muhammad Naveed Aman and Biplab Sikdar
Detection of Ransomware Attack Using Deep Learning
Muna Jemal and Dan Lo
12:30 – 13:30 Lunch
13:30 – 15:30 Session 10 – Embedded Systems and IoT Devices/ Toolkits and Experimentation, Measurement, and Assessment
Session Chair: Hadi Zanddizari
ML based Detection and Mitigation Scheme for DoS attacks on SDN Controllers
Tamer Omar, Barret Griffin and Jose Garcia
Privacy-Preserving and Fault-Tolerant Data Aggregation Protocol for Internet of Drones
Cong Pu
Data Provenance for IoT Devices by Exploiting Clock Variations
Mirza Athar Baig and Muhammad Naveed Aman
Enriching the Semantics of Information Flow Tracking with Source-Level Memory Allocation Event Logging
Sanoop Mallissery and Yu-Sung Wu
15:30 – 16:00 Coffee Break
17:00 Closing Ceremony