TIMES LISTED ARE CDT
PROGRAM AGENDA | ||||
MONDAY, APRIL 3 | ||||
0900 - 1000 |
Networking, log into the platform and chat with other attendees |
|||
SESSION 1 | ||||
1000 - 1015 |
Welcome and Opening Remarks |
|||
1015 - 1115 |
KEYNOTE: Sailing the Seas of the Science of Security |
|||
1115 - 1130 |
BREAK |
|||
SESSION 2 | ||||
1130 - 1230 |
Best Cybersecurity Paper Competition Invited Talks Honorable Mention: Defensive Technology Use by Political Activists during the Sudanese Revolution |
|||
1230 - 1330 |
LUNCH & NETWORKING |
|||
SESSION 3 | ||||
1330 - 1445 |
Works-Already-Published Session (20 minute talks + 5 minutes Q&A) |
|||
1445 - 1530 |
||||
1530 - 1545 |
BREAK |
|||
SESSION 4 | ||||
1545 - 1715 | Works-in-Progress Session (45 minute discussions) WiP titles are not shown in full. Certifying Safety in Reinforcement Learning under Adversarial Perturbation Attacks Junlin Wu, Hussein Sibai and Yevgeniy Vorobeychik Improvement and Evaluation of Resilience of Adaptive Cruise Control Against Spoofing Attacks Using Intrusion Detection System Mubark Jedh, Lotfi Ben Othmane and Arun Somani |
|||
1715 - 1730 |
NETWORKING |
|||
TUESDAY, APRIL 4 | ||||
0900 - 1000 |
Networking, log into the platform and chat with other attendees |
|||
SESSION 5 | ||||
1000 - 1115 |
Works-Already-Published Session (20 minute talks + 5 minutes Q&A) Sigstore: Software Signing for Everybody A Case for Remote Attestation in Programmable Dataplanes Towards Practical Application-level Support for Privilege Separation |
|||
1115 - 1200 |
||||
1200 - 1300 |
LUNCH |
|||
SESSION 6 | ||||
1300 - 1400 |
KEYNOTE: Science of Composition is Vital for Science of Security |
|||
1400 - 1445 |
||||
1445 - 1500 |
BREAK |
|||
SESSION 7 | ||||
1500 - 1630 |
Works-in-Progress Session (45 minute discussions) Sequential Graph Neural Networks for Source Code Vulnerability Identification |
|||
1630 - 1645 |
NETWORKING |
|||
|
|
|||
WEDNESDAY, APRIL 5 | ||||
0900 - 1000 |
Networking, log into the platform and chat with other attendees |
|||
SESSION 8 | ||||
1000 - 1100 |
KEYNOTE: The Science of Audio Deepfake Detection |
|||
1100 - 1200 |
Concurrent Panels |
|||
1200 - 1300 |
.LUNCH |
|||
SESSION 9 | ||||
1300 - 1415 |
Works-Already-Published Session (20 minute talks + 5 minutes Q&A) Spatiotemporal G-code modeling for secure FDM-based 3D printing Control Logic Forensics Framework using Built-in Decompiler of Engineering Software in Industrial Control Systems |
|||
1415 - 1430 |
Announcement of Winning Poster | Closing Remarks |
|||
SYMPOSIUM ADJOURNED |