From 2b65203af3d06c948f8ecfca4c02a2d3caddfb7a Mon Sep 17 00:00:00 2001 From: Mathias Payer Date: Mon, 29 Apr 2024 16:44:43 +0200 Subject: [PATCH] More space between talks --- index.html | 112 ++++++++++++++++++++++++++--------------------------- 1 file changed, 56 insertions(+), 56 deletions(-) diff --git a/index.html b/index.html index 46ab7c3..cf53045 100644 --- a/index.html +++ b/index.html @@ -197,20 +197,20 @@

Keynote 1: Twenty-year-old Vulnerabilities are Back: Firmwar

Session 1: Vulnerability Detection and Defense

- Exceptional Interprocedural Control Flow Graphs for x86-64 Binaries - by Joshua Bockenek (Virginia Tech), Freek Verbeek (Open University of The Netherlands and Virginia Tech), and Binoy Ravindran (Virginia Tech)
+

Exceptional Interprocedural Control Flow Graphs for x86-64 Binaries + by Joshua Bockenek (Virginia Tech), Freek Verbeek (Open University of The Netherlands and Virginia Tech), and Binoy Ravindran (Virginia Tech)

- S2malloc: Statistically Secure Allocator for Use-After-Free Protection And More - by Ruizhe Wang (University of Waterloo), Meng Xu (University of Waterloo), and N. Asokan (University of Waterloo)
+

S2malloc: Statistically Secure Allocator for Use-After-Free Protection And More + by Ruizhe Wang (University of Waterloo), Meng Xu (University of Waterloo), and N. Asokan (University of Waterloo)

- Acoustic Side-Channel Attacks on a Computer Mouse - by Gabriele Orazi (University of Padua), Marin Duroyon (Delft University of Technology), Mauro Conti (University of Padua), and Gene Tsudik (UCI)
+

Acoustic Side-Channel Attacks on a Computer Mouse + by Gabriele Orazi (University of Padua), Marin Duroyon (Delft University of Technology), Mauro Conti (University of Padua), and Gene Tsudik (UCI)

- Using Semgrep OSS to Find OWASP Top 10 Weaknesses in PHP Applications: A Case Study - by Lukas Kree (Fraunhofer FKIE), René Helmke (Fraunhofer FKIE), and Eugen Winter (Fraunhofer FKIE)
+

Using Semgrep OSS to Find OWASP Top 10 Weaknesses in PHP Applications: A Case Study + by Lukas Kree (Fraunhofer FKIE), René Helmke (Fraunhofer FKIE), and Eugen Winter (Fraunhofer FKIE)

- Modularized Directed Greybox Fuzzing for Binaries over Multiple CPU Architectures - by Sofiane Benahmed (Security Research Centre, Concordia University, Montreal, QC, Canada), Abdullah Qasem (Security Research Centre, Concordia University, Montreal, QC, Canada), Anis Lounis (Security Research Centre, Concordia University, Montreal, QC, Canada), and Mourad Debbabi (Security Research Centre, Concordia University, Quebec, Canada)

+

Modularized Directed Greybox Fuzzing for Binaries over Multiple CPU Architectures + by Sofiane Benahmed (Security Research Centre, Concordia University, Montreal, QC, Canada), Abdullah Qasem (Security Research Centre, Concordia University, Montreal, QC, Canada), Anis Lounis (Security Research Centre, Concordia University, Montreal, QC, Canada), and Mourad Debbabi (Security Research Centre, Concordia University, Quebec, Canada)

12:30 to 14:00

Lunch

@@ -218,20 +218,20 @@

Session 1: Vulnerability Detection and Defense

Session 2: Malware and Threats

- Constructs of Deceit: Exploring Nuances in Modern Social Engineering Attacks - by Mohammad Ali Tofighi (Florida International University), Behzad Ousat (Florida International University), Javad Zandi (Florida International University), Esteban Schafir (Florida International University), and Amin Kharraz (Florida International University)
+

Constructs of Deceit: Exploring Nuances in Modern Social Engineering Attacks + by Mohammad Ali Tofighi (Florida International University), Behzad Ousat (Florida International University), Javad Zandi (Florida International University), Esteban Schafir (Florida International University), and Amin Kharraz (Florida International University)

- Tarallo: Evading Behavioral Malware Detectors in the Problem Space - by Gabriele Digregorio (Politecnico di Milano), Salvatore Maccarrone (Politecnico di Milano), Mario D'Onghia (Politecnico di Milano), Luigi Gallo (Cyber Security Lab, Telecom Italia), Michele Carminati (Politecnico di Milano), Mario Polino (Politecnico di Milano), and Stefano Zanero (Politecnico di Milano)
+

Tarallo: Evading Behavioral Malware Detectors in the Problem Space + by Gabriele Digregorio (Politecnico di Milano), Salvatore Maccarrone (Politecnico di Milano), Mario D'Onghia (Politecnico di Milano), Luigi Gallo (Cyber Security Lab, Telecom Italia), Michele Carminati (Politecnico di Milano), Mario Polino (Politecnico di Milano), and Stefano Zanero (Politecnico di Milano)

- Evading Userland API Hooking, Again: Novel Attacks and a Principled Defense Method - by Cristian Assaiante (Sapienza University of Rome), Simone Nicchi (Sapienza University of Rome), Daniele Cono D'Elia (Sapienza University of Rome), Leonardo Querzoni (Sapienza University of Rome)
+

Evading Userland API Hooking, Again: Novel Attacks and a Principled Defense Method + by Cristian Assaiante (Sapienza University of Rome), Simone Nicchi (Sapienza University of Rome), Daniele Cono D'Elia (Sapienza University of Rome), Leonardo Querzoni (Sapienza University of Rome)

- Extended Abstract: Evading Packing Detection:Breaking Heuristic-Based Static Detectors - by Alexandre D'Hondt (UCLouvain), Charles-Henry Bertrand Van Ouytsel (UCLouvain), and Axel Legay (UCLouvain)
+

Extended Abstract: Evading Packing Detection:Breaking Heuristic-Based Static Detectors + by Alexandre D'Hondt (UCLouvain), Charles-Henry Bertrand Van Ouytsel (UCLouvain), and Axel Legay (UCLouvain)

- Listening between the Bits: Privacy Leaks in Audio fingerprints - by Moritz Pfister (TU Braunschweig), Robert Michael (TU Braunschweig), Max Boll (TU Braunschweig), Konrad Rieck (TU Berlin), and Daniel Arp (TU Berlin)

+

Listening between the Bits: Privacy Leaks in Audio fingerprints + by Moritz Pfister (TU Braunschweig), Robert Michael (TU Braunschweig), Max Boll (TU Braunschweig), Konrad Rieck (TU Berlin), and Daniel Arp (TU Berlin)

16:00 to 16:30

Coffee break

@@ -239,20 +239,20 @@

Session 2: Malware and Threats

Session 3: Mobile and Web Application Security

- Bringing UFUs Back into the Air With FUEL: A Framework for Evaluating the Effectiveness of Unrestricted File Upload Vulnerability Scanners - by Sebastian Neef (TU Berlin) and Maath Oudeh (TU Berlin)
+

Bringing UFUs Back into the Air With FUEL: A Framework for Evaluating the Effectiveness of Unrestricted File Upload Vulnerability Scanners + by Sebastian Neef (TU Berlin) and Maath Oudeh (TU Berlin)

- SandPuppy: Deep-state fuzzing guided by automatic detection of state-representative variables - by Vivin Paliath (Arizona State University), Erik Trickel (Arizona State University), Tiffany Bao (Arizona State University), Ruoyu ""Fish"" Wang (Arizona State University), Adam Doupe (Arizona State University), and Yan Shoshitaishvili (Arizona State University)
+

SandPuppy: Deep-state fuzzing guided by automatic detection of state-representative variables + by Vivin Paliath (Arizona State University), Erik Trickel (Arizona State University), Tiffany Bao (Arizona State University), Ruoyu ""Fish"" Wang (Arizona State University), Adam Doupe (Arizona State University), and Yan Shoshitaishvili (Arizona State University)

- Extended Abstract: Tracking Manifests - Persistent Identifiers in Progressive Web Apps - by Dolière Francis Somé (Stanford University)
+

Extended Abstract: Tracking Manifests - Persistent Identifiers in Progressive Web Apps + by Dolière Francis Somé (Stanford University)

- PayRide: Secure Transport e-Ticketing with Untrusted Smartphone Location - by Michele Marazzi (ETH Zurich), Patrick Jattke (ETH Zurich), Jason Zibung (ETH Zurich), and Kaveh Razavi (ETH Zurich)
+

PayRide: Secure Transport e-Ticketing with Untrusted Smartphone Location + by Michele Marazzi (ETH Zurich), Patrick Jattke (ETH Zurich), Jason Zibung (ETH Zurich), and Kaveh Razavi (ETH Zurich)

- Knocking on Admin's Door: Protecting Critical Web Applications with Deception - by Billy Tsouvalas (Stony Brook University) and Nick Nikiforakis (Stony Brook University)

+

Knocking on Admin's Door: Protecting Critical Web Applications with Deception + by Billy Tsouvalas (Stony Brook University) and Nick Nikiforakis (Stony Brook University)

18:30 to 21:00
@@ -284,20 +284,20 @@

Veelasha Moonsamy (Ruhr University Bochum)

Session 4: AI for Security

- Approach for the Optimization of Machine Learning Models for Calculating Binary Function Similarity - by Suguru Horimoto (National Police Agency of Japan), Keane Lucas (Carnegie Mellon University), and Lujo Bauer (Carnegie Mellon University)
+

Approach for the Optimization of Machine Learning Models for Calculating Binary Function Similarity + by Suguru Horimoto (National Police Agency of Japan), Keane Lucas (Carnegie Mellon University), and Lujo Bauer (Carnegie Mellon University)

- Inferring Recovery Steps from Cyber Threat Intelligence Reports - by Zsolt Levente Kucsván (University of Twente), Marco Caselli (Siemens AG), Andreas Peter (Carl von Ossietzky Universität Oldenburg), and Andrea Continella (University of Twente)
+

Inferring Recovery Steps from Cyber Threat Intelligence Reports + by Zsolt Levente Kucsván (University of Twente), Marco Caselli (Siemens AG), Andreas Peter (Carl von Ossietzky Universität Oldenburg), and Andrea Continella (University of Twente)

- Pairing Security Advisories with Vulnerable Functions Using Open-Source LLMs - by Trevor Dunlap (North Carolina State University), John Speed Meyers (Chainguard), Brad Reaves (North Carolina State University), and William Enck (North Carolina State University)
+

Pairing Security Advisories with Vulnerable Functions Using Open-Source LLMs + by Trevor Dunlap (North Carolina State University), John Speed Meyers (Chainguard), Brad Reaves (North Carolina State University), and William Enck (North Carolina State University)

- Extended Abstract: Assessing Language Models for Semantic Textual Similarity in Cybersecurity - by Arian Soltani (Université de Sherbrooke), DJeff Kanda Nkashama (Université de Sherbrooke), Jordan Felicien Masakuna (Université de Sherbrooke), Marc Frappier (Université de Sherbrooke), Pierre-Martin Tardif (Université de Sherbrooke), and Froduald Kabanza (Université de Sherbrooke)
+

Extended Abstract: Assessing Language Models for Semantic Textual Similarity in Cybersecurity + by Arian Soltani (Université de Sherbrooke), DJeff Kanda Nkashama (Université de Sherbrooke), Jordan Felicien Masakuna (Université de Sherbrooke), Marc Frappier (Université de Sherbrooke), Pierre-Martin Tardif (Université de Sherbrooke), and Froduald Kabanza (Université de Sherbrooke)

- Extended Abstract: A Transfer Learning-based Training Approach for DGA Classification - by Arthur Drichel (RWTH Aachen University), Benedikt von Querfurth (RWTH Aachen University), and Ulrike Meyer (RWTH Aachen University)"

+

Extended Abstract: A Transfer Learning-based Training Approach for DGA Classification + by Arthur Drichel (RWTH Aachen University), Benedikt von Querfurth (RWTH Aachen University), and Ulrike Meyer (RWTH Aachen University)"

12:30 to 14:00

Lunch

@@ -305,17 +305,17 @@

Session 4: AI for Security

Session 5: Hardware and Firmware Security

- Seum Spread: Discerning Flaws in IoT Firmware Via Security-Relevant Call Sequence Semantics - by Anis Lounis (Security Research Centre, Concordia University, Montreal, QC, Canada), Anthony Andreoli (Security Research Centre, Concordia University, Montreal, QC, Canada), Mourad Debbabi (Security Research Centre, Concordia University, Montreal, QC, Canada), and Aiman Hanna (Security Research Centre, Concordia University, Montreal, QC, Canada)
+

Seum Spread: Discerning Flaws in IoT Firmware Via Security-Relevant Call Sequence Semantics + by Anis Lounis (Security Research Centre, Concordia University, Montreal, QC, Canada), Anthony Andreoli (Security Research Centre, Concordia University, Montreal, QC, Canada), Mourad Debbabi (Security Research Centre, Concordia University, Montreal, QC, Canada), and Aiman Hanna (Security Research Centre, Concordia University, Montreal, QC, Canada)

- Gluezilla: Efficient and Scalable Software to Hardware Binding using Rowhammer - by Ruben Mechelinck (imec-DistriNet, KU Leuven), Daniel Dorfmeister (Software Competence Center Hagenberg), Bernhard Fischer (Software Competence Center Hagenberg), Stijn Volckaert (imec-DistriNet, KU Leuven), and Stefan Brunthaler (μCSRL, CODE Research Institute, University of the Bundeswehr Munich)
+

Gluezilla: Efficient and Scalable Software to Hardware Binding using Rowhammer + by Ruben Mechelinck (imec-DistriNet, KU Leuven), Daniel Dorfmeister (Software Competence Center Hagenberg), Bernhard Fischer (Software Competence Center Hagenberg), Stijn Volckaert (imec-DistriNet, KU Leuven), and Stefan Brunthaler (μCSRL, CODE Research Institute, University of the Bundeswehr Munich)

- SmmPack: Obfuscation for SMM Modules - by Kazuki Matsuo (Waseda University), Satoshi Tanda (Satoshi's System Programming Lab), Yuhei Kawakoya (NTT Security Japan KK), Kuniyasu Suzaki (Institute of Information Security), and Tatsuya Mori (Waseda University/NICT/RIKEN AIP)
+

SmmPack: Obfuscation for SMM Modules + by Kazuki Matsuo (Waseda University), Satoshi Tanda (Satoshi's System Programming Lab), Yuhei Kawakoya (NTT Security Japan KK), Kuniyasu Suzaki (Institute of Information Security), and Tatsuya Mori (Waseda University/NICT/RIKEN AIP)

- Presshammer: Rowhammer and Rowpress without Physical Address Information - by Jonas Juffinger (Graz University of Technology), Sudheendra Raghav Neela (Graz University of Technology), Martin Heckel (Hof Univeristy, University of Applied Sciences), Lukas Schwarz (Graz University of Technology), Florian Adamsky (Hof University of Applied Sciences, Institute of Information Systems (iisys)), and Daniel Gruss (Graz University of Technology)

+

Presshammer: Rowhammer and Rowpress without Physical Address Information + by Jonas Juffinger (Graz University of Technology), Sudheendra Raghav Neela (Graz University of Technology), Martin Heckel (Hof Univeristy, University of Applied Sciences), Lukas Schwarz (Graz University of Technology), Florian Adamsky (Hof University of Applied Sciences, Institute of Information Systems (iisys)), and Daniel Gruss (Graz University of Technology)

15:36 to 16:00

Coffee break

@@ -323,17 +323,17 @@

Session 5: Hardware and Firmware Security

Session 6: Cyber Physical Systems and IoT

- SecMonS: A Security Monitoring Framework for IEC 61850 Substations Based on Configuration Files and Logs - by Onur Duman (Concordia University), Mengyuan Zhang (Vrije Universiteit), Lingyu Wang (Concordia University), and Mourad Debbabi (Concordia university)
+

SecMonS: A Security Monitoring Framework for IEC 61850 Substations Based on Configuration Files and Logs + by Onur Duman (Concordia University), Mengyuan Zhang (Vrije Universiteit), Lingyu Wang (Concordia University), and Mourad Debbabi (Concordia university)

- FaultGuard: A Generative Approach to Resilient Fault Prediction in Smart Electrical Grids - by Emad Efatinasab (University of Padua), Francesco Marchiori (University of Padua), Alessandro Brighente (University of Padua), Mirco Rampazzo (University of Padua), and Mauro Conti (University of Padua & Delft University of Technology)
+

FaultGuard: A Generative Approach to Resilient Fault Prediction in Smart Electrical Grids + by Emad Efatinasab (University of Padua), Francesco Marchiori (University of Padua), Alessandro Brighente (University of Padua), Mirco Rampazzo (University of Padua), and Mauro Conti (University of Padua & Delft University of Technology)

- Wireless Modulation Identification: filling the gap in IoT networks security audit - by Florent Galtier (LAAS-CNRS), Guillaume Auriol (LAAS-CNRS), Vincent Nicomette (LAAS-CNRS), Paul L. R. Olivier (LAAS-CNRS), Romain Cayre (EURECOM), and Mohamed Kaâniche (CNRS, LAAS)
+

Wireless Modulation Identification: filling the gap in IoT networks security audit + by Florent Galtier (LAAS-CNRS), Guillaume Auriol (LAAS-CNRS), Vincent Nicomette (LAAS-CNRS), Paul L. R. Olivier (LAAS-CNRS), Romain Cayre (EURECOM), and Mohamed Kaâniche (CNRS, LAAS)

- Extended Abstract: Assessing GNSS Vulnerabilities in Smart Grids - by Sine Canbolat (Karlsruhe Institute of Technology (KIT)), Clemens Fruböse (Karlsruhe Institute of Technology (KIT)), Ghada Elbez (Karlsruhe Institute of Technology (KIT)), and Veit Hagenmeyer (Karlsruhe Institute of Technology (KIT))

+

Extended Abstract: Assessing GNSS Vulnerabilities in Smart Grids + by Sine Canbolat (Karlsruhe Institute of Technology (KIT)), Clemens Fruböse (Karlsruhe Institute of Technology (KIT)), Ghada Elbez (Karlsruhe Institute of Technology (KIT)), and Veit Hagenmeyer (Karlsruhe Institute of Technology (KIT))

17:36 to 17:40