The 2024 CAE-R CoP Research Symposium will be held at Marriott St. Louis Grand, on Thursday, October 10, 2024, as part of the National Cybersecurity Education Colloquium. The goals of the symposium are to (1) further establish the CAE-R as a community of practice, (2) build a community that involves PhD students, and (3) showcase the excellent research done at CAE-R designated institutions. The symposium will be attended by representatives from CAE-R schools as well as invited government employees.
Program Co-Chairs
Roberto Perdisci, University of Georgia
Gabriela Ciocarlie, University of Texas at San Antonio
Program Committee Members
Elisa Bertino, Purdue University
Guofei Gu, Texas A&M University
Alina Oprea, Northeastern University
Manuel Egele, Boston University
Mark Boutwell, National Security Agency
CAE-R Symposium Program Elements
PhD Candidates Presentations. Like last year, we strive for the CAE-R Symposium to be a unique opportunity to both (a) showcase our outstanding PhD students and (b) identify and connect them with potential future faculty hires. A small set of senior PhD students (ideally in their last year) will be selected to give a short oral presentation of their research spanning the last few years. Think of this as an opportunity for them to give a preview of their dissertations to a large audience of faculty from CAE-R institutions and representatives from various government agencies.
We are seeking up to two nominations from each CAE-R institution. Students will be selected based on diversity of research areas and representation of a variety of CAE-R institutions. We expect that we will be able to offer travel support to some of the students (support will only be available for US citizens and permanent residents).
CAE-R PoCs and faculty members should nominate their PhD students by August 9, 2024, using this Qualtrics Form.
Research Highlights Posters. With the goal of fostering awareness and collaboration between CAE-R institutions and showcase the research to government representatives, we will also have a Research Highlights Poster Session to feature papers that have been recently published. The posters will ideally be presented by PhD students, but faculty poster presentations are also welcome. We encourage CAE-R PoCs to nominate up to three research papers in cybersecurity from their institution that have appeared (or will appear) in a 2023 or 2024 cybersecurity research conference.
CAE-R PoCs and faculty members should nominate research highlight posters by August 9, 2024, using this Qualtrics Form.
Research Highlights Posters and Authors
Poster Title | Poster Authors (Presenters in Bolded) |
---|---|
A Cybersecurity Summer Camp for High School Students Using Autonomous R/C Cars | Myounggyu Won, Luke Rivers Carrington, Douglas Manuel Espinoza, Mohd Hasan Ali, Dipankar Dasgupta (University of Memphis). |
*A Survey of ROV++: We May Need Another Napkin | Nathan Ferrell, Bryan Chan, Henry Schmidt, Arrianna Szymczak, Berk Gulmezoglu (Iowa State University). Government Problem Mentor Neal Ziring (National Security Agency). |
*Ain’t How You Deploy: An Analysis of BGP Security Policies Performance Against Various Attack Scenarios with Differing Deployment Strategies | Seth Barrett, Calvin Idom, German Zavala Villafuerte, Andrew Byers, Berk Gulmezoglu (Iowa State University). Government Problem Mentor Neal Ziring (National Security Agency). |
Bridging the Protection Gap: Innovative Approaches to Shield Older Adults from AI-Enhanced Scams | LD Herrera, London Van Sickle, Ashley Podhradsky (Dakota State University). |
CAV-AD: A Robust Framework for Detection of Anomalous Data and Malicious Sensors in CAV Networks | Md Sazedur Rahman, Mohamed Abdelsamee Elmahallawy, Sanjay Madria, Samuel Frimpong (Missouri University of Science and Technology). |
Classifying Malware Traffic Using Images and Deep Convolutional Neural Network | Roger Davis, Kaushik Roy, Jingsheng Xu (North Carolina Agricultural and Technical State University). |
Comparison of LSTM and MLP Trained Under Differential Privacy For Intrusion Detection | Daniel Machooka, Xiaohong Yuan, Kaushik Roy (North Carolina Agricultural and Technical State University), Guenvere Chen (University of Texas, San Antonio). |
DefWeb: Defending User Privacy against Cache-based Website Fingerprinting Attacks with Intelligent Noise Injection | Seonghun Son, Debopriya Roy Dipta, Berk Gulmezoglu (Iowa State University). |
**Detecting, Explaining, and Managing Anomalies in Industrial Control Systems | Clement Fung, Eric Zeng, Lujo Bauer (Carnegie Mellon University). |
Digital Forensics of Additive Manufacturing Systems | Daniel Bradford Miller, Jacob Gatlin (University of South Alabama), William Bradley Glisson (Sam Houston State University), Mark Yampolskiy, Jeffrey Todd McDonald (University of South Alabama). |
DISC: A Dataset for Information Security Classification | Elijah Bass, Massimiliano Albanese, Marcos Zampieri (George Mason University). |
**Dynamic Frequency-Based Fingerprinting Attacks against Modern Sandbox Environments | Debopriya Roy Dipta (Iowa State University), Thore Tiemann (University of Luebeck), Berk Gulmezoglu (Iowa State University), Eduard Marin (Telefonica Research), Thomas Eisenbarth (University of Luebeck). |
**End-to-End Encryption for Cyber-Physical Systems Using Fully Homomorphic Encryption | Robert Lois (University of Pittsburgh). |
**Enhancing IoT Security: Anomaly Detection using Deep Support Vector Data Description and Contractive Autoencoder | Sharmin Aktar, Abdullah Yasin Nur (University of New Orleans). |
*Estimating Intrinsic Dimension to Architect Compact Neural Networks | James Bonacci, Peyton Lutchkus, Reese Martin, Rob Pava, Ping Wang (Robert Morris University). Government Problem Mentor Bradford Kline (National Security Agency). |
From 5G Sniffing to Harvesting Leakages of Privacy-Preserving Messengers | Norbert Ludant (Northeastern University), Pieter Robyns (Hasselt University), Guevara Noubir (Northeastern University). |
FSPDE: A Full Stack Plausibly Deniable Encryption System for Mobile Devices | Jinghui Liao (Wayne State University), Niusen Chen (Michigan Technological University), Lichen Xia (University of Delaware), Bo Chen (Michigan Technological University), Weisong Shi (University of Delaware). |
Harnessing AI for Advanced Network Security: From Attacks on Privacy to Defensive Innovations | Nate Mathews (Rochester Institute of Technology), James K. Holland, Nicholas Hopper (University of Minnesota), Matthew Wright (Rochester Institute of Technology). |
Moderating Illicit Online Image Promotion for Unsafe User-Generated Content Games Using Large Vision-Language Models | Keyan Guo, Ayush Utkarsh, Wenbo Ding, Isabelle Ondracek (University at Buffalo), Ziming Zhao (Northeastern University), Guo Freeman (Clemnson University), Nishant Vishwamitra (University of Texas at San Antonio), Hongxin Hu (University at Buffalo). |
Overview of Intelligent Inverters and Associated Cybersecurity Issues for Grid-Connected Solar Photovoltaic System | Sai Nikhil Vodapally, Mohd Hasan Ali (University of Memphis). |
SMET: Semantic Mapping of CVE to ATT&CK and Its Application to Cybersecurity | Basel Abdeen (University of Texas at Dallas), Ehab Al-Shaer (Carnegie Mellon University), Anoop Singhal (National Institute of Standards and Technology), Latifur Khan, Kevin Hamlen (University of Texas at Dallas). |
UntrustIDE: Exploiting Weaknesses in VS Code Extensions | Elizabeth Lin, Igibek Koishybayev, Trevor Dunlap, William Enck, Alexandros Kapravelos (North Carolina State University). |
Unveiling IoT Security in Reality: A Firmware-Centric Journey | Nicolas Nino (University of Georgia), Ruibo Lu, Wei Zhou (Huazhong University of Science), Kyu Hyung Lee (University of Georgia), Ziming Zha (Northeastern University), Le Guan (University of Georgia). |
**VOGUES: Validation of Object Guise Using Estimated Components | Raymond Muller (Purdue University), Yanmao Man, Ming Li (University of Arizona), Ryan Gerdes (Virginia Tech), Johnathan Petit (Qualcomm), Z. Berkay Celik (Purdue University). |
**Who Comes Up with this Stuff? Interviewing Authors to Understand How They Produce Security Advice | Lorenzo Neil (North Carolina State University), Harshini Sri Ramulu (The George Washington University), Yasemin Acar (Paderborn University & The George Washington University), Bradley Reaves (North Carolina State University). |
ZCube: A Zero-Trust, Zero-Knowledge, and Zero-Memory Platform for Privacy and yet Secured Access | Vinh Quach, Ram Dantu, Sirisha Talapuru, Shakila Zaman, Apurba Pokharel (University of North Texas). |
*The poster covers work carried out in the context of the INSuRE program.
**The PhD student has also presented this work during the PhD panels.