CAE-R CoP Research Symposium

The 2023 CAE-R CoP Research Symposium was held at Moraine Valley Community College on Friday, September 22, 2023 as part of the National Cybersecurity Education Colloquium. The goals of the symposium are to (1) further establish the CAE-R as a community of practice, (2) build a community that involves PhD students, and (3) showcase the excellent research done at CAE-R designated institutions. The symposium will be attended by representatives from CAE-R schools as well as invited government employees.

Program Co-Chairs

    William Enck, North Carolina State University
    Heather Lipford, University of North Carolina at Charlotte

Program Committee Members

    Kevin Butler, University of Florida
    Adam Doupé, Arizona State University
    L. Jean Camp, Indiana University Bloomington

CAE-R Symposium Program Elements

Research Dissertation Panels. The research dissertation panels will showcase  PhD students from the CAE-R institutions. Each panel will consist of 5-7 PhD students who will each give short pitches of their dissertation. A panel moderator will then lead a discussion of trends in research. PhD students generally spend four to six years becoming world experts in their topic areas, and the panels will provide a glimpse into a variety of cutting-edge research topics with an eye on future challenge areas. For CAE institutions, this provides an opportune time to start recruiting PhD students.

This year, we will have two panels. Each CAE-R school is encouraged to nominate strong students who are nearing completion of their PhD (but must not necessarily be in their last year). Most importantly, students should have some interest in pursuing a faculty position, though it is okay if they have not yet made up their mind. Post docs are eligible for nomination.  The program committee will select panelists with the goal of ensuring a diversity of research areas and representing a variety of CAE-R institutions.  Travel support is available for up to 10 panelists. Only panelists who are US Citizens are eligible for travel support. All other panelists are responsible for covering their own travel expenses.

PoCs and faculty members should nominate students by July 30, 2023 using this Google Form.


Research Highlights Posters. The poster session will showcase the wide variety of research being conducted at the CAE-R institutions. While only a small number of CAE-R schools can be represented in the research dissertation panels, we invite all PoCs to submit nominations for research highlights posters from their institutions. Posters should cover ~1 paper published in the last 1-2 years. Due to space constraint and limited number of easels, it might not be possible that all submissions will be accepted.  

It is expected that each CAE-R PoC or his/her alternate will be provided a travel stipend for the meeting. A limited number of additional faculty travel stipends may be available to US citizens. Ideally the poster will be presented by an author of the work. However, if needed the CAE-R PoC can present the poster.

PoCs and faculty members should nominate research highlight posters by July 30, 2023 using this Google Form.


Research Funding Agency Panel. We plan to have a panel of program managers from various funding agencies. Panelists will provide a brief presentation on the types of research they fund. The moderator will then open the discussion for audience questions. There will be time during breaks to meet with the program managers.


INSuRE+C Research Talks. We will have 4 talks from INSuRE+C funded projects. Talks will be 20 minutes each with questions.

CAE-R Symposium Agenda

Thursday, September 21st, 2023
3.15 – 4.30pm CT: CAE-R CoP Meeting
Dr. Agnes Chan - Northeastern University
Dr. Susanne Wetzel - Stevens Institute of Technology
Friday, September 22nd, 2023
7.00 – 8.00am CT: Registration and Breakfast
8.00 – 8.10am CT: Welcome
Dr. Tony Coulson - CSU San Bernardino
Dr. Agnes Chan - Northeastern University
Dr. Susanne Wetzel - Stevens Institute of Technology
8.10 – 8.30am CT: Role of CAE-R and the Importance of Research for the Agency and the Country
Neal Ziring - Technical Director for the Cybersecurity Directorate, NSA
Lynne Clark -
Deputy Chief, College of Cyber E3C, National Cryptologic University
8.30 – 8.45am CT: Introduction of Program Committee Co-Chairs
Dr. William Enck - North Carolina State University
Dr. Heather Lipford - UNC Charlotte
8.45 – 9.45am CT: Keynote - "Security Expert and the Advice Fiasco"
Dr. Michelle Mazurek - University of Maryland, College Park
9.45 – 10.30am CT: Research Funding Agency Panel
Dr. ChunSheng Xin - NSF
David Hogue - NSA Laboratory for Advanced Cybersecurity Research
Dr. Mark A. Tschopp - Army Research Lab
10.30 – 10.45am CT: Break
10.45 – 11.30am CT: Research Discussions: PhD Student Panel 1
11.30 – 11.55am CT: INSuRE+C Research Talk 1 - "Blueshift: Breaking Bluetooth Adaptive Frequency Hopping"
Tommy Chin & Noah Korzak - George Mason University
11.55 – 12.20pm CT: INSuRE+C Research Talk 2 - "REGARD: Rules of Engagement for Automated Cyber Defense to Aid in Intrusion Response"
William Anderson - Mississippi State University
12.20 – 1.45pm CT: Lunch & Research Highlights (Posters)
1.45 – 2.30pm CT: Research Discussions: PhD Student Panel 2
2.30 – 2.55pm CT: INSuRE+C Research Talk 3 - "Automatically Binding Cryptographic Context to Messages in Network Protocols Using Formal Methods"
Enis Golaszewski & Sophia Hammer - University of Mayland, Baltimore County
2.55 – 3.20pm CT: INSuRE+C Research Talk 4 - "Emergent (In)Security of Multi-Cloud Environments"
Morgan Reece - Mississippi State University & Rochester Institute of Technology
Mathhew Stoffolano - Rochester Institute of Technology
3.20 – 3.30pm CT: Closing Remarks
Dr. Agnes Chan - Northeastern University
Dr. Susanne Wetzel - Stevens Institute of Technology
3.30 – 3.45pm CT: Break
3.45 – 4.15pm CT: CAE-R Discussion and Reflection

Research Highlights - Poster Session

*The poster covers work carried out in the context of the INSuRE program.

**The PhD student has also presented this work during the PhD panels.

Poster Title Authors (Presenters in Bold)
A Secure Reputation-based Consensus Scheme for Robust Decision-making in a Lightweight Machine-learning Framework for IoT Blockchain Networks Charles Rawlins (Missouri University of Science and Technology), Jagannathan Sarangapani (Missouri University of Science and Technology)
ACFA: Secure Runtime Auditing and Guaranteed Device Healing via Active Control Flow Attestation Adam Caulfield (Rochester Institute of Technology), Norrathep Rattanavipanon (Prince of Songkla University, Phuket Campus), Ivan De Oliveira Nunes (Rochester Institute of Technology)
AI-Guardian: Defeating Adversarial Attacks Using Backdoors Hong Zhu (SKLOIS, Institute of Information Engineering, Chinese Academy of Sciences), Shengzhi Zhang (Boston University), and Kai Chen (SKLOIS, Institute of Information Engineering, Chinese Academy of Sciences)
ARGUS: A Framework for Staged Static Taint Analysis of GitHub Workflows and Actions Siddharth Muralee, Igibek Koishybayev, Aleksandr Nahapetyan, Greg Tystahl, Brad Reaves, Antonio Bianchi, William Enck, Alexandros Kapravelos, and Aravind Machiry (North Carolina State University)
Attribute-Based Encryption Scheme for Secure Multi-Group Data Sharing in Cloud MD Azharul Islam, Sanjay K Madria (Missouri University of Science and Technology)
Auditable AI and Able-to-Audit Auditors: Making the AI Audit Work Yueqi Li (The State University of New York at Albany, Skidmore College), Sanjay Goel (The State University of New York at Albany)
Black-Box Entropy Estimation* Svettlira Van Jakovich, Danny Hernandez, Michael Silva, Samuel Jeon, Jake Leible, Damian Lall, Alexandre Robic, Drew Hamilton (Texas A&M University)
Blueshift: Breaking Bluetooth Adaptive Frequency Hopping* Noah Korzak, Kun Sun (George Mason University)
Creating an Explainable Intrusion Detection System Using Self Organizing Maps Jesse Ables, Thomas Kirby, William Anderson, Sudip Mittal, Shahram Rahimi, Ioana Banicescu, Maria Seale (Mississippi State University)
Detecting Intruders in a Host Computer Using a Behavioral Graph Approach Stephen Huang (University of Houston), Zechun Cao (Texas A&M University-San Antonio)
Discovering IoT Physical Channel Vulnerabilities** Muslum Ozgur Ozmen (Purdue University), Xuansong Li (Nanjing University Science and Technology), Andrew Chu (University of Chicago), Z. Berkay Celik (Purdue University), Bardh Hoxha (Toyota Research Institute North America), Xiangyu Zhang (Purdue University)
DISTDET: A Cost-Effective Distributed Cyber Threat Detection System Xusheng Xiao (Arizona State University)
Diving into Robocall Content with SnorCall Sathvik Prasad, Trevor Dunlap, Alexander Ross, Bradley Reaves (North Carolina State University)
Evaluating the Impact of Community Oversight on Mobile Privacy and Security Mamtaj Akter (Vanderbilt University), Madiha Tabassum and Nazmus Sakib Miazi (Northeastern University), Leena Alghamdi (University of Central Florida), Jess Kropczynski (University of Cincinnati), Pamela J. Wisniewski (Vanderbilt University), Heather Lipford (University of North Carolina, Charlotte)
Explaining Machine Learning-Based Feature Selection of Intrusion Detection Systems with Gradient Boosting Methods Sesan Akintade, Dr. Seongtae Kim, Dr. Kaushik Roy (North Carolina A&T State University)
Eye Tracking Technologies to Analyze and Visualize the Behavior of Secure Coders** Daniel Davis, Dr. Feng Zhu (University of Alabama in Huntsville)
Geopolitical Cyber Conflict* Dr. Sanjay Goel, Prof. A.J. Rendo Jr., Emily Maniak, Leah Mandrova, Jyoti Chakma, Jamal Goddard (University at Albany, SUNY)
Hiding in Plain Sight: An Empirical Study of Web Application Abuse in Malware** Mingxuan Yao (Georgia Institute of Technology), Jonathan Fuller (United States Military Academy), Ranjita Pai Sridhar (Georgia Institute of Technology), Saumya Agarwal (Georgia Institute of Technology), Amit K. Sikder (Georgia Institute of Technology), Brendan Saltaformaggio (Georgia Institute of Technology)
Knowledge-Embedded Narrative Construction from Open Source Intelligence** Priyanka Ranade, Anupam Joshi (University of Maryland Baltimore County)
Lalaine: Measuring and Characterizing Non-Compliance of Apple Privacy Labels Yue Xiao, Zhengyi Li, Yue Qin (Indiana University); Xiaolong Bai (Orion Security Lab in Alibaba Group); Jiale Guan, Xiaojing Liao, Luyi Xing (Indiana University)
LoneNeuron: a Highly-effective Feature-domain Neural Trojan using Invisible and Polymorphic Watermarks Zeyan Liu (The University of Kansas), Fengjun Li (The University of Kansas), Zhu Li (University of Missouri-Kansas City,), Bo Luo (The University of Kansas)
MCoM: A Semi-Supervised Method for Imbalanced Tabular Security Data Mahmoud Zamani, Xiaodi Li, Latifur Khan, Kevin Hamlen (University of Texas at Dallas)
ML-based Anomaly Detection for Intra-Vehicular CAN-bus Networks** Shaurya Purohit, Manimaran Govindarasu (Iowa State University)
Mobile Malvertising Detection Research** Sean Sanders, Dr. Lukasz Ziarek (SUNY University at Buffalo)
Powerful and Efficient Stepping-Stone Detection with DeepCoFFEA Matthew Wright, Nicholas Hopper, Shanchieh Jay Yang, James Holland, Nate Mathews, Annika Clarke, Claire Fischer, Justin Kennedy, Thomas Stone (Rochester Institute of Technology)
Qubit Reset and Refresh:  A Game Changer for Random  Number Generation** Julie Germain, Dr. Ram Dantu (University of North Texas)
SHERLOC: Secure and Holistic Control-Flow Violation Detection on Embedded Systems Xi Tan, Ziming Zhao (University at Buffalo)
SYNTHDB: Synthesizing Database via Program Analysis for Security Testing of Web Applications An Chen (University of Georgia), JiHo Lee (University of Virginia), Basanta Chaulagain (University of Georgia), Yonghwi Kwon (University of Virginia), Kyu Hyung Lee (University of Georgia)
Systemic Risk & Vulnerability Analysis of Multi-Cloud Environments* Morgan Reece, Teddy Lander, Dr. Sudip Mittal (Mississippi State University); Matthew Stoffolano, Dr. Nidhi Rastogi (Rochester Institute of Technology); Dr. Josiah Dykstra; Dr. Andy Sampson; Dr. Matt Seligman (National Security Agency)
REGARD: Rules of EngaGement for Automated cybeR Defense to aid in Intrusion Response Damodar Panigrahi, William Anderson, Joshua Whitman, Sudip Mittal (Mississippi State University); Benjamin Blakely (Argonne National Laboratory)