2024 CAE-R CoP Research Symposium

The 2024 CAE-R CoP Research Symposium will be held at Marriott St. Louis Grand, on Thursday, October 10, 2024, as part of the National Cybersecurity Education Colloquium. The goals of the symposium are to (1) further establish the CAE-R as a community of practice, (2) build a community that involves PhD students, and (3) showcase the excellent research done at CAE-R designated institutions. The symposium will be attended by representatives from CAE-R schools as well as invited government employees.

 

Program Co-Chairs

    Roberto Perdisci, University of Georgia
    Gabriela Ciocarlie, University of Texas at San Antonio

Program Committee Members

    Elisa Bertino, Purdue University
    Guofei Gu, Texas A&M University
    Alina Oprea, Northeastern University
    Manuel Egele, Boston University
    Mark Boutwell, National Security Agency


CAE-R Symposium Program Elements

PhD Candidates Presentations. Like last year, we strive for the CAE-R Symposium to be a unique opportunity to both (a) showcase our outstanding PhD students and (b) identify and connect them with potential future faculty hires. A small set of senior PhD students (ideally in their last year) will be selected to give a short oral presentation of their research spanning the last few years. Think of this as an opportunity for them to give a preview of their dissertations to a large audience of faculty from CAE-R institutions and representatives from various government agencies. 

We are seeking up to two nominations from each CAE-R institution. Students will be selected based on diversity of research areas and representation of a variety of CAE-R institutions. We expect that we will be able to offer travel support to some of the students (support will only be available for US citizens and permanent residents).

CAE-R PoCs and faculty members should nominate their PhD students by August 9, 2024, using this Qualtrics Form.

 

Research Highlights Posters. With the goal of fostering awareness and collaboration between CAE-R institutions and showcase the research to government representatives, we will also have a Research Highlights Poster Session to feature papers that have been recently published. The posters will ideally be presented by PhD students, but faculty poster presentations are also welcome. We encourage CAE-R PoCs to nominate up to three research papers in cybersecurity from their institution that have appeared (or will appear) in a 2023 or 2024 cybersecurity research conference.

CAE-R PoCs and faculty members should nominate research highlight posters by August 9, 2024, using this Qualtrics Form.


Research Highlights Posters and Authors

Poster TitlePoster Authors (Presenters in Bolded)
A Cybersecurity Summer Camp for High School Students Using Autonomous R/C CarsMyounggyu Won, Luke Rivers Carrington, Douglas Manuel Espinoza, Mohd Hasan Ali, Dipankar Dasgupta (University of Memphis).
*A Survey of ROV++: We May Need Another NapkinNathan Ferrell, Bryan Chan, Henry Schmidt, Arrianna Szymczak, Berk Gulmezoglu (Iowa State University). Government Problem Mentor Neal Ziring (National Security Agency).
*Ain’t How You Deploy: An Analysis of BGP Security Policies Performance Against Various Attack Scenarios with Differing Deployment StrategiesSeth Barrett, Calvin Idom, German Zavala Villafuerte, Andrew Byers, Berk Gulmezoglu (Iowa State University). Government Problem Mentor Neal Ziring (National Security Agency).
Bridging the Protection Gap: Innovative Approaches to Shield Older Adults from AI-Enhanced ScamsLD Herrera, London Van Sickle, Ashley Podhradsky (Dakota State University).
CAV-AD: A Robust Framework for Detection of Anomalous Data and Malicious Sensors in CAV NetworksMd Sazedur Rahman, Mohamed Abdelsamee Elmahallawy, Sanjay Madria, Samuel Frimpong (Missouri University of Science and Technology).
Classifying Malware Traffic Using Images and Deep Convolutional Neural NetworkRoger Davis, Kaushik Roy, Jingsheng Xu (North Carolina Agricultural and Technical State University).
Comparison of LSTM and MLP Trained Under Differential Privacy For Intrusion DetectionDaniel Machooka, Xiaohong Yuan, Kaushik Roy (North Carolina Agricultural and Technical State University), Guenvere Chen (University of Texas, San Antonio).
DefWeb: Defending User Privacy against Cache-based Website Fingerprinting Attacks with Intelligent Noise InjectionSeonghun Son, Debopriya Roy Dipta, Berk Gulmezoglu (Iowa State University).
**Detecting, Explaining, and Managing Anomalies in Industrial Control Systems Clement Fung, Eric Zeng, Lujo Bauer (Carnegie Mellon University).
Digital Forensics of Additive Manufacturing SystemsDaniel Bradford Miller, Jacob Gatlin (University of South Alabama), William Bradley Glisson (Sam Houston State University), Mark Yampolskiy, Jeffrey Todd McDonald (University of South Alabama).
DISC: A Dataset for Information Security Classification Elijah Bass, Massimiliano Albanese, Marcos Zampieri (George Mason University).
**Dynamic Frequency-Based Fingerprinting Attacks against Modern Sandbox EnvironmentsDebopriya Roy Dipta (Iowa State University), Thore Tiemann (University of Luebeck), Berk Gulmezoglu (Iowa State University), Eduard Marin (Telefonica Research), Thomas Eisenbarth (University of Luebeck).
**End-to-End Encryption for Cyber-Physical Systems Using Fully Homomorphic EncryptionRobert Lois (University of Pittsburgh).
**Enhancing IoT Security: Anomaly Detection using Deep Support Vector Data Description and Contractive AutoencoderSharmin Aktar, Abdullah Yasin Nur (University of New Orleans).
*Estimating Intrinsic Dimension to Architect Compact Neural Networks James Bonacci, Peyton Lutchkus, Reese Martin, Rob Pava, Ping Wang (Robert Morris University). Government Problem Mentor Bradford Kline (National Security Agency).
From 5G Sniffing to Harvesting Leakages of Privacy-Preserving Messengers Norbert Ludant (Northeastern University), Pieter Robyns (Hasselt University), Guevara Noubir (Northeastern University).
FSPDE: A Full Stack Plausibly Deniable Encryption System for Mobile Devices Jinghui Liao (Wayne State University), Niusen Chen (Michigan Technological University), Lichen Xia (University of Delaware), Bo Chen (Michigan Technological University), Weisong Shi (University of Delaware).
Harnessing AI for Advanced Network Security: From Attacks on Privacy to Defensive InnovationsNate Mathews (Rochester Institute of Technology), James K. Holland, Nicholas Hopper (University of Minnesota), Matthew Wright (Rochester Institute of Technology).
Moderating Illicit Online Image Promotion for Unsafe User-Generated Content Games Using Large Vision-Language ModelsKeyan Guo, Ayush Utkarsh, Wenbo Ding, Isabelle Ondracek (University at Buffalo), Ziming Zhao (Northeastern University), Guo Freeman (Clemnson University), Nishant Vishwamitra (University of Texas at San Antonio), Hongxin Hu (University at Buffalo).
Overview of Intelligent Inverters and Associated Cybersecurity Issues for Grid-Connected Solar Photovoltaic SystemSai Nikhil Vodapally, Mohd Hasan Ali (University of Memphis).
SMET: Semantic Mapping of CVE to ATT&CK and Its Application to CybersecurityBasel Abdeen (University of Texas at Dallas), Ehab Al-Shaer (Carnegie Mellon University), Anoop Singhal (National Institute of Standards and Technology), Latifur Khan, Kevin Hamlen (University of Texas at Dallas).
UntrustIDE: Exploiting Weaknesses in VS Code Extensions Elizabeth Lin, Igibek Koishybayev, Trevor Dunlap, William Enck, Alexandros Kapravelos (North Carolina State University).
Unveiling IoT Security in Reality: A Firmware-Centric Journey Nicolas Nino (University of Georgia), Ruibo Lu, Wei Zhou (Huazhong University of Science), Kyu Hyung Lee (University of Georgia), Ziming Zha (Northeastern University), Le Guan (University of Georgia).
**VOGUES: Validation of Object Guise Using Estimated Components Raymond Muller (Purdue University), Yanmao Man, Ming Li (University of Arizona), Ryan Gerdes (Virginia Tech), Johnathan Petit (Qualcomm), Z. Berkay Celik (Purdue University).
**Who Comes Up with this Stuff? Interviewing Authors to Understand How They
Produce Security Advice
Lorenzo Neil (North Carolina State University), Harshini Sri Ramulu (The George Washington University), Yasemin Acar (Paderborn University & The George Washington University), Bradley Reaves (North Carolina State University).
ZCube: A Zero-Trust, Zero-Knowledge, and Zero-Memory Platform for Privacy and yet Secured AccessVinh Quach, Ram Dantu, Sirisha Talapuru, Shakila Zaman, Apurba Pokharel (University of North Texas).

*The poster covers work carried out in the context of the INSuRE program.
**The PhD student has also presented this work during the PhD panels.