All times listed are in Central European Summer Time (CEST).
Monday, 29 June 2020
13:45 - 14:00 – Opening: Opening (Room A)
14:00 - 15:00 – Keynote 1: COVID-19, Cybersecurity, and Epidemiology (Room A)
Speaker: Ninghui Li – Professor of Computer Science at Purdue University
15:10 - 16:10 – S1-A: Cloud and Network Security (Room A)
A Large-scale Analysis of Cloud Service Abuse – Naoki Fukushi, Daiki Chiba and Mitsuaki Akiyama (NTT, Japan); Masato Uchida (Waseda University, Japan)
A Rule Reordering Method via Pairing Dependent Rules – Takashi Harada (Kochi University of Technology, Japan); Ken Tanaka (Kanagawa University, Japan); Ryohei Ogasawara (Information Creative Co., Ltd, Japan); Kenji Mikawa (Niigata University, Japan)
Towards a Believable Decoy System: Replaying Network Activities from Real System – Jianhua Sun (College of William and Mary, USA); Kun Sun (George Mason University, USA); Qi Li (Tsinghua University, China)
15:10 - 16:10 – S1-B: Authentication (Room B)
Eathentication: A Chewing-based Authentication Method – Mattia Carlucci, Stefano Cecconello, Mauro Conti and Piero Romare (University of Padua, Italy)
RUMBA-Mouse: Rapid User Mouse-Behavior Authentication Using a CNN-RNN Approach – Shen Fu, Dong Qin and Daji Qiao (Iowa State University, USA); George T Amariucai (Kansas State University, USA)
OTDA: a Unsupervised Optimal Transport framework with Discriminant Analysis for Keystroke Inference – Kun Jin and Chaoyue Liu (The Ohio State University, USA); Cathy Xia (Ohio-State University, USA)
16:20 - 17:40 – S2-A: Security Vulnerability Detection and Remediation (Room A)
A Machine Learning Approach to Classify Security Patches into Vulnerability Types – Xinda Wang, Shu Wang and Kun Sun (George Mason University, USA); Archer Batcheller (Northrop Grumman, USA); Sushil Jajodia (George Mason University, USA)
A Machine Learning-based Approach for Automated Vulnerability Remediation Analysis – Fengli Zhang (University of Arkansas, Fayetteville, USA); Philip Huff (University of Arkansas at Little Rock, USA); Kylie McClanahan (University of Arkansas at Fayetteville, USA); Qinghua Li (University of Arkansas, USA)
Dynamic Risk-Aware Patch Scheduling – Fengli Zhang (University of Arkansas, Fayetteville, USA); Qinghua Li (University of Arkansas, USA)
Exploring Abstraction Functions in Fuzzing – Christopher Salls and Aravind Machiry (University of California, Santa Barbara); Adam Doupe and Yan Shoshitaishvili (Arizona State University, USA); Christopher Kruegel (University of California, Santa Barbara, USA); Giovanni Vigna (University of California Santa Barbara, USA)
16:20 - 17:40 – S2-B: Attack Detection (Room B)
Towards Data-Driven Characterization of Brute-Force Attackers – Florian Wilkens and Mathias Fischer (Universität Hamburg, Germany)
Learning the Associations of MITRE ATT&CK Adversarial Techniques – Rawan Al-Shaer and Jonathan Spring (Carnegie Mellon University, USA); Eliana Christou (University of North Carolina Charlotte, USA)
Exploring Adversarial Properties of Insider Threat Detection – Duc Le and Nur Zincir-Heywood (Dalhousie University, Canada)
Evolving Advanced Persistent Threat Detection using Provenance Graph and Metric Learning – Gbadebo Ayoade, Khandakar Ashrafi Akbar, Pracheta Sahoo and Yang Gao (The University of Texas at Dallas, USA); Anoop Singhal (NIST, USA); Kangkook Jee (The University of Texas at Dallas, USA); Latifur Khan (University of Texas, USA)
17:50 - 19:10 – S3-A: Cyber-physical Systems Security (Room A)
DeepBLOC: A Framework for Securing CPS through Deep Reinforcement Learning on Stochastic Games – Alireza Tahsini, Noah Dunstatter and Mina Guirguis (Texas State University, USA); Chuadhry Mujeeb Ahmed (Singapore University of Technology and Design, Singapore)
HEKA: A Novel Intrusion Detection System for Attacks to Personal Medical Devices – AKM iqtidar Newaz, Amit Kumar Sikder and Leonardo Babun (Florida International University, USA); Selcuk Uluagac (Florida International University & Electrical and Computer Engineering, USA)
Off is Not Off: On the Security of Parked Vehicles – Kyong-Tak Cho (University of Michigan, Ann Arbor, USA); Kang Shin (University of Michigan, USA); Yu Seung Kim and Byung-Ho Cha (Ford Motor Co., USA)
TRUST.IO: Protecting Physical Interfaces on Cyber-physical Systems – Chad Spensky (University of California, Santa Barbara & Allthenticate, USA); Aravind Machiry (University of California, Santa Barbara, USA); Marcel Busch (University of Erlangen-N\"urnberg, Germany); Kevin Leach (University of Michigan, USA); Rick Housley (United Technologies, USA); Christopher Kruegel (University of California, Santa Barbara, USA); Giovanni Vigna (University of California Santa Barbara, USA)
17:50 - 19:10 – S3-B: Traffic Analysis (Room B)
Attacks on Dynamic Protocol Detection of Open Source Network Security Monitoring Tools – Jan Grashöfer and Christian Titze (Karlsruhe Institute of Technology (KIT), Germany); Hannes Hartenstein (Karlsruhe Institute of Technology, Germany)
Order-Optimal Scaling of Covert Communication over MIMO AWGN Channels – Ahmed Bendary (The Ohio State University, USA & The Military Technical College, Egypt); Can Emre Koksal (The Ohio State University, USA)
NExtSteP: An Extensible Testbed for Network Covert Channels – Olga Chen, Aaron D. Jaggard, Catherine Meadows and Michael C. Shlanta (US Naval Research Laboratory, USA)
Query-Crafting DoS Threats Against Internet DNS – Sang-Yoon Chang (University of Colorado Colorado Springs, USA); Younghee Park and Nikhil Vijayakumar Kengalahalli (San Jose State University, USA); Xiaobo Zhou (University of Colorado, Colorado Springs, USA)
19:20 - 20:00 – Poster Session 1 (Room A)
Fingerprinting Voice Applications on Smart Speakers over Encrypted Traffic – Shriti Naraparaju (USA)
Identifying P2P Communities in Network Traffic Using Measures of Community Connections – Harshvardhan P Joshi and Rudra Dutta (North Carolina State University, USA)
Cyber Security Decision Making Informed by Cyber Threat Intelligence (CYDETI) – Aliyu Aliyu, Ying He and Iryna Yevseyeva (De Montfort University, United Kingdom (Great Britain))
Membership Inference Attacks against MemGuard – Ben Niu (Institute of Information Engineering, Chinese Academy of Sciences, China); Yahong Chen (Institute of Information Engineering, CAS & School of Cyber Security, UCAS, China); Likun Zhang (Central University of Finance and Economics, China); Fenghua Li (Institute of Information Engineerin, CAS & School of Cyber Security, UCAS, P.R. China)
Tuesday, 30 June 2020
14:00 - 15:00 – Keynote 2: Quality of Security: the mandatory service attributes? – Evaluation, exposure, composition, monitoring of QoSec for SecSLA in 5G & beyond developments (Room A)
Speaker: Emmanuel Dotaro – Head of ICT and Security Labs at Thales Secure Communications and Information Systems – France
15:10 - 16:30 – S4-A: Key Agreement and Blockchain (Room A)
SecureAIS - Securing Pairwise Vessels Communications – Ahmed Aziz, Pietro Tedeschi, Savio Sciancalepore and Roberto Di Pietro (Hamad Bin Khalifa University, Qatar)
Augmented Randomness for Secure Key Agreement using Physiological Signals – Beste Seymen and Duygu Karaoğlan Altop (Sabancı University, Turkey); Albert Levi (Sabanci University, Turkey)
Game Theoretic Approach for Secure and Efficient Heavy-Duty Smart Contracts – Pinglan Liu and Wensheng Zhang (Iowa State University, USA)
Efficient Physical Layer Group Key Generation in 5G Wireless Networks – Long Jiao (George Mason University, USA); Pu Wang (Xidian University, China); Ning Wang (George Mason University, USA); Songlin Chen (George Washington University, USA); Amir Alipour-Fanid, Junqing Le and Kai Zeng (George Mason University, USA)
15:10 - 16:30 – S4-B: Data Security (Room B)
PhishZip: A New Compression-based Algorithm for Detecting Phishing Websites – Rizka Widyarini Purwanto (University of New South Wales, Australia); Arindam Pal (CSIRO & Data61, Australia); Alan Blair (University of New South Wales, Australia); Sanjay Jha (University of NSW, Australia)
Mailto: Me Your Secrets. On Bugs and Features in Email End-to-End Encryption – Jens Müller and Marcus Brinkmann (Ruhr University Bochum, Germany); Damian Poddebniak and Sebastian Schinzel (Münster University of Applied Sciences, Germany); Joerg Schwenk (Ruhr University Bochum, Germany)
Fast and Secure kNN Query Processing in Cloud Computing – Xinyu Lei (Michigan State University, USA); Guan-Hua Tu (Michigan State Unversity, USA); Alex X. Liu (Ant Financial Services Group, China); Tian Xie (Michigan State University, USA)
EARS: Enabling Private Feedback Updates in Anonymous Reputation Systems – Vishnu Teja Kilari (Arizona State University, USA); Ruozhou Yu (North Carolina State University, USA); Satyajayant Misra (New Mexico State University, USA); Guoliang Xue (Arizona State University, USA)
16:40 - 17:40 – S5-A: Security in the IoT (Room A)
SCIBORG: Secure Configurations for the IOT Based on Optimization and Reasoning on Graphs – Hamed Soroush (PARC, USA); Massimiliano Albanese (George Mason University, USA); Milad Asgari Mehrabadi (University of California, Irvine, USA); Ibifubara Iganibo (George Mason University, USA); Marc Mosko (Palo Alto Research Center, USA); Jason Gao and David Fritz (Sandia National Laboratories, USA); Shantanu Rane and Eric Bier (Palo Alto Research Center, USA)
Rapid: Robust and Adaptive Detection of Distributed Denial-of-Service Traffic from the Internet of Things – Samuel Mergendahl and Jun Li (University of Oregon, USA)
Cumulative Message Authentication Codes for Resource-Constrained Networks – He Li (Virginia Polytechnic Institute and State University, USA); Vireshwar Kumar (Purdue University, USA); Jung-Min (Jerry) Park and Yaling Yang (Virginia Tech, USA)
16:40 - 17:40 – S5-B: Wireless and Network Security (Room B)
Privacy Protection and Efficient Incumbent Detection in Spectrum Sharing Based on Federated Learning – Ning Wang and Junqing Le (George Mason University, USA); Weiwei Li (Hebei University of Engineering, China & George Mason University, USA); Long Jiao, Zhihao Li and Kai Zeng (George Mason University, USA)
Sweet: Secure Wireless Energy Transfer with Electric Vehicles in Vehicular Energy Networks – Yuntao Wang (Xi'an Jiaotong University, China); Zhou Su (Shanghai University, China); Ning Zhang (Texas A&M University-Corpus Christi, USA); Abderrahim Benslimane (University of Avignon & LIA/CERI, France)
When the Network of a Smart City Is Not So Smart – Ali Tabaja and Reuven Cohen (Technion, Israel)
17:50 - 18:50 – S6-A: Digital Forensics (Room A)
Compact and Resilient Cryptographic Tools for Digital Forensics – Efe Ulas Akay Seyitoglu and Attila Altay Yavuz (University of South Florida, USA); Muslum Ozgur Ozmen (Purdue University, USA)
Forensic Investigation of Industrial Control Systems Using Deterministic Replay – Gregory W Walkup (Sandia National Laboratories, USA); Sriharsha Etigowni and Dongyan Xu (Purdue University, USA); Vincent Urias and Han Lin (Sandia National Laboratories, USA)
Catching Falling Dominoes: Cloud Management-Level Provenance Analysis with Application to OpenStack – Azadeh Tabiban (Concordia University, Canada); Yosr Jarraya and Mengyuan Zhang (Ericsson Canada, Canada); Makan Pourzandi (Ericsson, Canada); Lingyu Wang (Concordia University, Canada); Mourad Debbabi (Concordia University, Montreal, Canada)
17:50 - 19:10 – S6-B: Malware (Room B)
DodgeTron: Towards Autonomous Cyber Deception Using Dynamic Hybrid Analysis of Malware – Md Sajidul Islam Sajid, Jinpeng Wei, Md Rabbi Alam and Ehsan Aghaei (University of North Carolina at Charlotte, USA); Ehab Al-Shaer (University of North Carolina Charlotte, USA)
A Quantitative Framework to Model Reconnaissance by Stealthy Attackers and Support Deception-Based Defenses – Luan Huy Pham and Massimiliano Albanese (George Mason University, USA); Ritu Chadha, Cho-Yu Chiang and Sridhar Venkatesan (Perspecta Labs, USA); Charles A Kamhoua (US Army Research Laboratory & Network Science Division, USA); Nandi Leslie (CCDC Army Research Laboratory & Raytheon, USA)
Hybrid Analysis of Android Apps for Security Vetting using Deep Learning – Dewan Chaulagain, Prabesh Poudel, Prabesh Pathak and Sankardas Roy (Bowling Green State University, USA); Doina Caragea (Kansas State University, USA); Guojun Liu and Xinming Ou (University of South Florida, USA)
SYMBION: Interleaving Symbolic with Concrete Execution – Fabio Gritti, Lorenzo Fontana, Eric Gustafson, Fabio Pagani, Andrea Continella and Christopher Kruegel (University of California, Santa Barbara, USA); Giovanni Vigna (University of California Santa Barbara, USA)
17:50 - 19:10 – Poster Session 2 (Room A)
Platoon Handover Authentication in 5G-V2X – Guanjie Li and Chengzhe Lai (Xi’an University of Posts and Telecommunications, China)
Automated Post-Breach Penetration Testing through Reinforcement Learning – Sujita Chaudhary, Austin O'Brien and Shengjie Xu (Dakota State University, USA)
Website Cryptojacking Detection Using Machine Learning – Venkata Sai Krishna Avinash Nukala (University of Cincinnati, USA)