The 2023 CAE-R CoP Research Symposium was held at Moraine Valley Community College on Friday, September 22, 2023 as part of the National Cybersecurity Education Colloquium. The goals of the symposium are to (1) further establish the CAE-R as a community of practice, (2) build a community that involves PhD students, and (3) showcase the excellent research done at CAE-R designated institutions.
2023 Program Co-Chairs
William Enck, North Carolina State University
Heather Lipford, University of North Carolina at Charlotte
2023 Program Committee Members
Kevin Butler, University of Florida
Adam Doupé, Arizona State University
L. Jean Camp, Indiana University Bloomington
2023 CAE-R Symposium Program Elements
Research Dissertation Panels. The program included two research dissertation panels showcasing PhD students from various CAE-R institutions. Each panel consisted of 5-7 PhD students nearing the completion of their degree, selected by the program committed with the goal of ensuring a diversity of research areas. Each PhD student gave short pitches of their dissertation during the panel, with the moderator subsequently leading a discussion of trends in research. PhD students generally spend four to six years becoming world experts in their topic areas, and the panels provided a glimpse into a variety of cutting-edge research topics with an eye on future challenge areas. For CAE institutions, this provided an opportune time to start recruiting PhD students.
Research Highlights Posters. The poster session showcased the wide variety of research being conducted at CAE-R institutions. While only a small number of CAE-R schools can be represented in the research dissertation panels, the program invited all PoCs to submit nominations for research highlights posters from their institutions.
Research Funding Agency Panel. The program included a panel of program managers from various funding agencies discussing funding opportunities.
INSuRE+C Research Talks. The program included 4 talks from INSuRE+C funded projects. Talks were 20 minutes each with questions.
2023 CAE-R Symposium Agenda
Thursday, September 21st, 2023 | |
---|---|
3.15 – 4.30pm CT: | CAE-R CoP Meeting Dr. Agnes Chan - Northeastern University Dr. Susanne Wetzel - Stevens Institute of Technology |
Friday, September 22nd, 2023 | |
7.00 – 8.00am CT: | Registration and Breakfast |
8.00 – 8.10am CT: | Welcome Dr. Tony Coulson - CSU San Bernardino Dr. Agnes Chan - Northeastern University Dr. Susanne Wetzel - Stevens Institute of Technology |
8.10 – 8.30am CT: | Role of CAE-R and the Importance of Research for the Agency and the Country Neal Ziring - Technical Director for the Cybersecurity Directorate, NSA Lynne Clark - Deputy Chief, College of Cyber E3C, National Cryptologic University |
8.30 – 8.45am CT: | Introduction of Program Committee Co-Chairs Dr. William Enck - North Carolina State University Dr. Heather Lipford - UNC Charlotte |
8.45 – 9.45am CT: | Keynote - "Security Expert and the Advice Fiasco" Dr. Michelle Mazurek - University of Maryland, College Park |
9.45 – 10.30am CT: | Research Funding Agency Panel Dr. ChunSheng Xin - NSF David Hogue - NSA Laboratory for Advanced Cybersecurity Research Dr. Mark A. Tschopp - Army Research Lab |
10.30 – 10.45am CT: | Break |
10.45 – 11.30am CT: | Research Discussions: PhD Student Panel 1 |
11.30 – 11.55am CT: | INSuRE+C Research Talk 1 - "Blueshift: Breaking Bluetooth Adaptive Frequency Hopping" Tommy Chin & Noah Korzak - George Mason University |
11.55 – 12.20pm CT: | INSuRE+C Research Talk 2 - "REGARD: Rules of Engagement for Automated Cyber Defense to Aid in Intrusion Response" William Anderson - Mississippi State University |
12.20 – 1.45pm CT: | Lunch & Research Highlights (Posters) |
1.45 – 2.30pm CT: | Research Discussions: PhD Student Panel 2 |
2.30 – 2.55pm CT: | INSuRE+C Research Talk 3 - "Automatically Binding Cryptographic Context to Messages in Network Protocols Using Formal Methods" Enis Golaszewski & Sophia Hammer - University of Mayland, Baltimore County |
2.55 – 3.20pm CT: | INSuRE+C Research Talk 4 - "Emergent (In)Security of Multi-Cloud Environments" Morgan Reece - Mississippi State University & Rochester Institute of Technology Mathhew Stoffolano - Rochester Institute of Technology |
3.20 – 3.30pm CT: | Closing Remarks Dr. Agnes Chan - Northeastern University Dr. Susanne Wetzel - Stevens Institute of Technology |
3.30 – 3.45pm CT: | Break |
3.45 – 4.15pm CT: | CAE-R Discussion and Reflection |
2023 Research Highlights Poster Session
*The poster covers work carried out in the context of the INSuRE program.
**The PhD student has also presented this work during the PhD panels.
Poster Title | Authors (Presenters in Bold) |
A Secure Reputation-based Consensus Scheme for Robust Decision-making in a Lightweight Machine-learning Framework for IoT Blockchain Networks | Charles Rawlins (Missouri University of Science and Technology), Jagannathan Sarangapani (Missouri University of Science and Technology) |
ACFA: Secure Runtime Auditing and Guaranteed Device Healing via Active Control Flow Attestation | Adam Caulfield (Rochester Institute of Technology), Norrathep Rattanavipanon (Prince of Songkla University, Phuket Campus), Ivan De Oliveira Nunes (Rochester Institute of Technology) |
AI-Guardian: Defeating Adversarial Attacks Using Backdoors | Hong Zhu (SKLOIS, Institute of Information Engineering, Chinese Academy of Sciences), Shengzhi Zhang (Boston University), and Kai Chen (SKLOIS, Institute of Information Engineering, Chinese Academy of Sciences) |
ARGUS: A Framework for Staged Static Taint Analysis of GitHub Workflows and Actions | Siddharth Muralee, Igibek Koishybayev, Aleksandr Nahapetyan, Greg Tystahl, Brad Reaves, Antonio Bianchi, William Enck, Alexandros Kapravelos, and Aravind Machiry (North Carolina State University) |
Attribute-Based Encryption Scheme for Secure Multi-Group Data Sharing in Cloud | MD Azharul Islam, Sanjay K Madria (Missouri University of Science and Technology) |
Auditable AI and Able-to-Audit Auditors: Making the AI Audit Work | Yueqi Li (The State University of New York at Albany, Skidmore College), Sanjay Goel (The State University of New York at Albany) |
Black-Box Entropy Estimation* | Svettlira Van Jakovich, Danny Hernandez, Michael Silva, Samuel Jeon, Jake Leible, Damian Lall, Alexandre Robic, Drew Hamilton (Texas A&M University) |
Blueshift: Breaking Bluetooth Adaptive Frequency Hopping* | Noah Korzak, Kun Sun (George Mason University) |
Creating an Explainable Intrusion Detection System Using Self Organizing Maps | Jesse Ables, Thomas Kirby, William Anderson, Sudip Mittal, Shahram Rahimi, Ioana Banicescu, Maria Seale (Mississippi State University) |
Detecting Intruders in a Host Computer Using a Behavioral Graph Approach | Stephen Huang (University of Houston), Zechun Cao (Texas A&M University-San Antonio) |
Discovering IoT Physical Channel Vulnerabilities** | Muslum Ozgur Ozmen (Purdue University), Xuansong Li (Nanjing University Science and Technology), Andrew Chu (University of Chicago), Z. Berkay Celik (Purdue University), Bardh Hoxha (Toyota Research Institute North America), Xiangyu Zhang (Purdue University) |
DISTDET: A Cost-Effective Distributed Cyber Threat Detection System | Xusheng Xiao (Arizona State University) |
Diving into Robocall Content with SnorCall | Sathvik Prasad, Trevor Dunlap, Alexander Ross, Bradley Reaves (North Carolina State University) |
Evaluating the Impact of Community Oversight on Mobile Privacy and Security | Mamtaj Akter (Vanderbilt University), Madiha Tabassum and Nazmus Sakib Miazi (Northeastern University), Leena Alghamdi (University of Central Florida), Jess Kropczynski (University of Cincinnati), Pamela J. Wisniewski (Vanderbilt University), Heather Lipford (University of North Carolina, Charlotte) |
Explaining Machine Learning-Based Feature Selection of Intrusion Detection Systems with Gradient Boosting Methods | Sesan Akintade, Dr. Seongtae Kim, Dr. Kaushik Roy (North Carolina A&T State University) |
Eye Tracking Technologies to Analyze and Visualize the Behavior of Secure Coders** | Daniel Davis, Dr. Feng Zhu (University of Alabama in Huntsville) |
Geopolitical Cyber Conflict* | Dr. Sanjay Goel, Prof. A.J. Rendo Jr., Emily Maniak, Leah Mandrova, Jyoti Chakma, Jamal Goddard (University at Albany, SUNY) |
Hiding in Plain Sight: An Empirical Study of Web Application Abuse in Malware** | Mingxuan Yao (Georgia Institute of Technology), Jonathan Fuller (United States Military Academy), Ranjita Pai Sridhar (Georgia Institute of Technology), Saumya Agarwal (Georgia Institute of Technology), Amit K. Sikder (Georgia Institute of Technology), Brendan Saltaformaggio (Georgia Institute of Technology) |
Knowledge-Embedded Narrative Construction from Open Source Intelligence** | Priyanka Ranade, Anupam Joshi (University of Maryland Baltimore County) |
Lalaine: Measuring and Characterizing Non-Compliance of Apple Privacy Labels | Yue Xiao, Zhengyi Li, Yue Qin (Indiana University); Xiaolong Bai (Orion Security Lab in Alibaba Group); Jiale Guan, Xiaojing Liao, Luyi Xing (Indiana University) |
LoneNeuron: a Highly-effective Feature-domain Neural Trojan using Invisible and Polymorphic Watermarks | Zeyan Liu (The University of Kansas), Fengjun Li (The University of Kansas), Zhu Li (University of Missouri-Kansas City,), Bo Luo (The University of Kansas) |
MCoM: A Semi-Supervised Method for Imbalanced Tabular Security Data | Mahmoud Zamani, Xiaodi Li, Latifur Khan, Kevin Hamlen (University of Texas at Dallas) |
ML-based Anomaly Detection for Intra-Vehicular CAN-bus Networks** | Shaurya Purohit, Manimaran Govindarasu (Iowa State University) |
Mobile Malvertising Detection Research** | Sean Sanders, Dr. Lukasz Ziarek (SUNY University at Buffalo) |
Powerful and Efficient Stepping-Stone Detection with DeepCoFFEA | Matthew Wright, Nicholas Hopper, Shanchieh Jay Yang, James Holland, Nate Mathews, Annika Clarke, Claire Fischer, Justin Kennedy, Thomas Stone (Rochester Institute of Technology) |
Qubit Reset and Refresh: A Game Changer for Random Number Generation** | Julie Germain, Dr. Ram Dantu (University of North Texas) |
SHERLOC: Secure and Holistic Control-Flow Violation Detection on Embedded Systems | Xi Tan, Ziming Zhao (University at Buffalo) |
SYNTHDB: Synthesizing Database via Program Analysis for Security Testing of Web Applications | An Chen (University of Georgia), JiHo Lee (University of Virginia), Basanta Chaulagain (University of Georgia), Yonghwi Kwon (University of Virginia), Kyu Hyung Lee (University of Georgia) |
Systemic Risk & Vulnerability Analysis of Multi-Cloud Environments* | Morgan Reece, Teddy Lander, Dr. Sudip Mittal (Mississippi State University); Matthew Stoffolano, Dr. Nidhi Rastogi (Rochester Institute of Technology); Dr. Josiah Dykstra; Dr. Andy Sampson; Dr. Matt Seligman (National Security Agency) |
REGARD: Rules of EngaGement for Automated cybeR Defense to aid in Intrusion Response | Damodar Panigrahi, William Anderson, Joshua Whitman, Sudip Mittal (Mississippi State University); Benjamin Blakely (Argonne National Laboratory) |