2023 CAE-R CoP Research Symposium

The 2023 CAE-R CoP Research Symposium was held at Moraine Valley Community College on Friday, September 22, 2023 as part of the National Cybersecurity Education Colloquium. The goals of the symposium are to (1) further establish the CAE-R as a community of practice, (2) build a community that involves PhD students, and (3) showcase the excellent research done at CAE-R designated institutions.

 

2023 Program Co-Chairs

    William Enck, North Carolina State University
    Heather Lipford, University of North Carolina at Charlotte

2023 Program Committee Members

    Kevin Butler, University of Florida
    Adam Doupé, Arizona State University
    L. Jean Camp, Indiana University Bloomington


2023 CAE-R Symposium Program Elements

Research Dissertation Panels. The program included two research dissertation panels showcasing PhD students from various CAE-R institutions. Each panel consisted of 5-7 PhD students nearing the completion of their degree, selected by the program committed with the goal of ensuring a diversity of research areas. Each PhD student gave short pitches of their dissertation during the panel, with the moderator subsequently leading a discussion of trends in research. PhD students generally spend four to six years becoming world experts in their topic areas, and the panels provided a glimpse into a variety of cutting-edge research topics with an eye on future challenge areas. For CAE institutions, this provided an opportune time to start recruiting PhD students.

Research Highlights Posters. The poster session showcased the wide variety of research being conducted at CAE-R institutions. While only a small number of CAE-R schools can be represented in the research dissertation panels, the program invited all PoCs to submit nominations for research highlights posters from their institutions.

Research Funding Agency Panel. The program included a panel of program managers from various funding agencies discussing funding opportunities.

INSuRE+C Research Talks. The program included 4 talks from INSuRE+C funded projects.


2023 CAE-R Symposium Agenda

Thursday, September 21st, 2023
3.15 – 4.30pm CT:CAE-R CoP Meeting
Dr. Agnes Chan - Northeastern University
Dr. Susanne Wetzel - Stevens Institute of Technology
Friday, September 22nd, 2023
7.00 – 8.00am CT:Registration and Breakfast
8.00 – 8.10am CT:Welcome
Dr. Tony Coulson - CSU San Bernardino
Dr. Agnes Chan - Northeastern University
Dr. Susanne Wetzel - Stevens Institute of Technology
8.10 – 8.30am CT:Role of CAE-R and the Importance of Research for the Agency and the Country
Neal Ziring - Technical Director for the Cybersecurity Directorate, NSA
Lynne Clark - Deputy Chief, College of Cyber E3C, National Cryptologic University
8.30 – 8.45am CT:Introduction of Program Committee Co-Chairs
Dr. William Enck - North Carolina State University
Dr. Heather Lipford - UNC Charlotte
8.45 – 9.45am CT:Keynote - "Security Expert and the Advice Fiasco"
Dr. Michelle Mazurek - University of Maryland, College Park
9.45 – 10.30am CT:Research Funding Agency Panel
Dr. ChunSheng Xin - NSF
David Hogue - NSA Laboratory for Advanced Cybersecurity Research
Dr. Mark A. Tschopp - Army Research Lab
10.30 – 10.45am CT:Break
10.45 – 11.30am CT:Research Discussions: PhD Student Panel 1
Sathvik N. Prasad - North Carolina State University
Sean Sanders - University at Buffalo
Daniel Davis - University of Alabama at Huntsville
Mingxuan Yao - Georgia Institute of Technology
Priyanka Ranada - University of Maryland, Baltimore County
11.30 – 11.55am CT:INSuRE+C Research Talk 1 - "Blueshift: Breaking Bluetooth Adaptive Frequency Hopping"
Tommy Chin & Noah Korzak - George Mason University
11.55 – 12.20pm CT:INSuRE+C Research Talk 2 - "REGARD: Rules of Engagement for Automated Cyber Defense to Aid in Intrusion Response"
William Anderson - Mississippi State University
12.20 – 1.45pm CT:Lunch & Research Highlights (Posters)
1.45 – 2.30pm CT:Research Discussions: PhD Student Panel 2
Ozgur Ozmen - Purdue University
Julie Germain - University of North Texas
Charles Rawlins - Missouri University of Science and Technology
Shaurya Purohit - Iowa State University
Adam Caulfield - Rochester Institute of Technology
2.30 – 2.55pm CT:INSuRE+C Research Talk 3 - "Automatically Binding Cryptographic Context to Messages in Network Protocols Using Formal Methods"
Enis Golaszewski & Sophia Hammer - University of Maryland, Baltimore County
2.55 – 3.20pm CT:INSuRE+C Research Talk 4 - "Emergent (In)Security of Multi-Cloud Environments"
Morgan Reece - Mississippi State University & Rochester Institute of Technology
Mathhew Stoffolano - Rochester Institute of Technology
3.20 – 3.30pm CT:Closing Remarks
Dr. Agnes Chan - Northeastern University
Dr. Susanne Wetzel - Stevens Institute of Technology
3.30 – 3.45pm CT:Break
3.45 – 4.15pm CT:CAE-R Discussion and Reflection

2023 Research Highlights Poster Session

*The poster covers work carried out in the context of the INSuRE program.

**The PhD student has also presented this work during the PhD panels.

Poster TitleAuthors (Presenters in Bold)
A Secure Reputation-based Consensus Scheme for Robust Decision-making in a Lightweight Machine-learning Framework for IoT Blockchain NetworksCharles Rawlins (Missouri University of Science and Technology), Jagannathan Sarangapani (Missouri University of Science and Technology)
ACFA: Secure Runtime Auditing and Guaranteed Device Healing via Active Control Flow AttestationAdam Caulfield (Rochester Institute of Technology), Norrathep Rattanavipanon (Prince of Songkla University, Phuket Campus), Ivan De Oliveira Nunes (Rochester Institute of Technology)
AI-Guardian: Defeating Adversarial Attacks Using BackdoorsHong Zhu (SKLOIS, Institute of Information Engineering, Chinese Academy of Sciences), Shengzhi Zhang (Boston University), and Kai Chen (SKLOIS, Institute of Information Engineering, Chinese Academy of Sciences)
ARGUS: A Framework for Staged Static Taint Analysis of GitHub Workflows and ActionsSiddharth Muralee, Igibek Koishybayev, Aleksandr Nahapetyan, Greg Tystahl, Brad Reaves, Antonio Bianchi, William Enck, Alexandros Kapravelos, and Aravind Machiry (North Carolina State University)
Attribute-Based Encryption Scheme for Secure Multi-Group Data Sharing in CloudMD Azharul Islam, Sanjay K Madria (Missouri University of Science and Technology)
Auditable AI and Able-to-Audit Auditors: Making the AI Audit WorkYueqi Li (The State University of New York at Albany, Skidmore College), Sanjay Goel (The State University of New York at Albany)
Black-Box Entropy Estimation*Svettlira Van Jakovich, Danny Hernandez, Michael Silva, Samuel Jeon, Jake Leible, Damian Lall, Alexandre Robic, Drew Hamilton (Texas A&M University)
Blueshift: Breaking Bluetooth Adaptive Frequency Hopping*Noah Korzak, Kun Sun (George Mason University)
Creating an Explainable Intrusion Detection System Using Self Organizing MapsJesse Ables, Thomas Kirby, William Anderson, Sudip Mittal, Shahram Rahimi, Ioana Banicescu, Maria Seale (Mississippi State University)
Detecting Intruders in a Host Computer Using a Behavioral Graph ApproachStephen Huang (University of Houston), Zechun Cao (Texas A&M University-San Antonio)
Discovering IoT Physical Channel Vulnerabilities**Muslum Ozgur Ozmen (Purdue University), Xuansong Li (Nanjing University Science and Technology), Andrew Chu (University of Chicago), Z. Berkay Celik (Purdue University), Bardh Hoxha (Toyota Research Institute North America), Xiangyu Zhang (Purdue University)
DISTDET: A Cost-Effective Distributed Cyber Threat Detection SystemXusheng Xiao (Arizona State University)
Diving into Robocall Content with SnorCallSathvik Prasad, Trevor Dunlap, Alexander Ross, Bradley Reaves (North Carolina State University)
Evaluating the Impact of Community Oversight on Mobile Privacy and SecurityMamtaj Akter (Vanderbilt University), Madiha Tabassum and Nazmus Sakib Miazi (Northeastern University), Leena Alghamdi (University of Central Florida), Jess Kropczynski (University of Cincinnati), Pamela J. Wisniewski (Vanderbilt University), Heather Lipford (University of North Carolina, Charlotte)
Explaining Machine Learning-Based Feature Selection of Intrusion Detection Systems with Gradient Boosting MethodsSesan Akintade, Dr. Seongtae Kim, Dr. Kaushik Roy (North Carolina A&T State University)
Eye Tracking Technologies to Analyze and Visualize the Behavior of Secure Coders**Daniel Davis, Dr. Feng Zhu (University of Alabama in Huntsville)
Geopolitical Cyber Conflict*Dr. Sanjay Goel, Prof. A.J. Rendo Jr., Emily Maniak, Leah Mandrova, Jyoti Chakma, Jamal Goddard (University at Albany, SUNY)
Hiding in Plain Sight: An Empirical Study of Web Application Abuse in Malware**Mingxuan Yao (Georgia Institute of Technology), Jonathan Fuller (United States Military Academy), Ranjita Pai Sridhar (Georgia Institute of Technology), Saumya Agarwal (Georgia Institute of Technology), Amit K. Sikder (Georgia Institute of Technology), Brendan Saltaformaggio (Georgia Institute of Technology)
Knowledge-Embedded Narrative Construction from Open Source Intelligence**Priyanka Ranade, Anupam Joshi (University of Maryland Baltimore County)
Lalaine: Measuring and Characterizing Non-Compliance of Apple Privacy LabelsYue Xiao, Zhengyi Li, Yue Qin (Indiana University); Xiaolong Bai (Orion Security Lab in Alibaba Group); Jiale Guan, Xiaojing Liao, Luyi Xing (Indiana University)
LoneNeuron: a Highly-effective Feature-domain Neural Trojan using Invisible and Polymorphic WatermarksZeyan Liu (The University of Kansas), Fengjun Li (The University of Kansas), Zhu Li (University of Missouri-Kansas City,), Bo Luo (The University of Kansas)
MCoM: A Semi-Supervised Method for Imbalanced Tabular Security DataMahmoud Zamani, Xiaodi Li, Latifur Khan, Kevin Hamlen (University of Texas at Dallas)
ML-based Anomaly Detection for Intra-Vehicular CAN-bus Networks**Shaurya Purohit, Manimaran Govindarasu (Iowa State University)
Mobile Malvertising Detection Research**Sean Sanders, Dr. Lukasz Ziarek (SUNY University at Buffalo)
Powerful and Efficient Stepping-Stone Detection with DeepCoFFEAMatthew Wright, Nicholas Hopper, Shanchieh Jay Yang, James Holland, Nate Mathews, Annika Clarke, Claire Fischer, Justin Kennedy, Thomas Stone (Rochester Institute of Technology)
Qubit Reset and Refresh:  A Game Changer for Random  Number Generation**Julie Germain, Dr. Ram Dantu (University of North Texas)
SHERLOC: Secure and Holistic Control-Flow Violation Detection on Embedded SystemsXi Tan, Ziming Zhao (University at Buffalo)
SYNTHDB: Synthesizing Database via Program Analysis for Security Testing of Web ApplicationsAn Chen (University of Georgia), JiHo Lee (University of Virginia), Basanta Chaulagain (University of Georgia), Yonghwi Kwon (University of Virginia), Kyu Hyung Lee (University of Georgia)
Systemic Risk & Vulnerability Analysis of Multi-Cloud Environments*Morgan Reece, Teddy Lander, Dr. Sudip Mittal (Mississippi State University); Matthew Stoffolano, Dr. Nidhi Rastogi (Rochester Institute of Technology); Dr. Josiah Dykstra; Dr. Andy Sampson; Dr. Matt Seligman (National Security Agency)
REGARD: Rules of EngaGement for Automated cybeR Defense to aid in Intrusion ResponseDamodar Panigrahi, William Anderson, Joshua Whitman, Sudip Mittal (Mississippi State University); Benjamin Blakely (Argonne National Laboratory)

 

Updated: Dec 6, 2024