We are pleased to announce the 2017 CyLab Partners Conference!
Date: September 25-27, 2017
Place: Carnegie Mellon University, Pittsburgh, PA (Transportation | Walking Directions)
The conference agenda highlights the latest research in security and privacy with an interactive forum between faculty, students, and industry.
We've expanded the conference to three days with over 35 faculty and students presenting current research. This year we're excited to welcome several industry speaker slots presented by partners. All sessions will include brief presentations followed by active dialog with attendees.
Details on registration and lodging will be emailed directly to CyLab partners.
Not a CyLab partner? Learn how your company can benefit from becoming a CyLab partner. Contact Associate Director of Partnership Development, Michael Lisanti at mlisanti@cmu.edu or 412-268-1870.
Agenda
Monday, September 25, 2017: Cohon University Center Connan Room and Newell-Simon 3305 |
|
8:00am - 8:45 | Breakfast and Registration |
8:45 - 9:00 | Opening Remarks by David Brumley |
9:00 - 10:10 |
Session I: Network and Mobile Security Speakers: Peter Steenkiste, Sekhar Bhagavatula, Rashad Eletreby |
Making TLS and Middleboxes Play Together … Nicely |
|
Reliability of Wireless Sensor Networks under a Heterogeneous Key Predistribution Scheme |
|
10:10 - 10:40 | Break |
10:40 - 12:10pm | Session II: Machine Learning and Security Analytics
Speakers: Kyle Soska, Yang Cai, Mahmood Sharif, Dhivya Eswaran |
Physical-World Attacks on Machine Learning |
|
Cognitive Learning - Introduction of Instinctive Computing |
|
ZooBP: Belief Propagation for Heterogenous Networks |
|
12:10 - 1:20 | Lunch in Connan Room |
1:20 - 1:30 | Walk to Newell Simon Hall |
1:30 - 3:00 | Session III: Education and Recruiting
Speakers: Dena Haritos Tsamitis, Lorrie Cranor, Bill Scherlis, Daniel Tkacik |
INI Security Programs |
|
MSIT Program |
|
PicoCTF |
|
3:00 - 3:30 | Break |
3:30 - 5:00 | Session V: Usable Privacy and Security
Speakers: Lorrie Cranor, Alessandro Acquisti, Rahul Telang, Hana Habib, William Melicher |
Observing Passwords in Their Natural Habitat |
|
Online Distractions, Website Blockers, and Economic Productivity: A Randomized Field Experiment |
|
Human Behavior in Reaction to Password Security Policies |
|
Fast, Lean, and Accurate - Modeling Password Guessablility Using Neural Networks |
|
5:00 - 5:15 | Break |
5:15 - 6:00 | Industry Research Talks |
Adversarial Machine Learning: Implications for Security and Privacy |
|
Cyber Challenges, Trends and Complexities in Power Systems |
|
Model Driven Security: It’s Already Here |
|
6:00 - 6:15 | Closing Remarks |
6:15 - 6:30 | Transportation to small group dinners |
Tuesday, September 26, 2017: Gates-Hillman Center 6115 |
|
8:00am - 8:45 | Breakfast |
8:45 - 9:00 | Opening Remarks by Doug Sicker, Interim Director |
9:00 - 9:30 | Invited Talk: Cyber Security at the SEI by William Wilson, Deputy Director of CERT |
9:30 - 10:20pm | Session VI: Hardware and Systems Security
Speakers: Virgil Gligor, Ken Mai, Maverick Woo |
Symbolic Execution for Python-Progress & Challenges |
|
10:20 - 11:00 | Break |
11:00 - 12:10pm | Session VII: Software Security |
Speakers: Ivan Gotovchits, Jonathan Aldrich, Jan Hoffman, Tiffany Bao |
|
BAP Binary Analysis Platform |
|
Obsidian-Safely Programming Contracts on the Blockchain |
|
Software Security and Resource Usage |
|
Exploits |
|
12:10 - 1:45 | Lunch |
1:45 - 2:55 | Session VIII: IoT |
Speakers: Anthony Rowe, Jason Hong, Norman Sadeh, Vyas Sekar, Lujo Bauer |
|
PrivacyStreams: Enabling Transparency in Personal Data Processing for Mobile Apps |
|
Privacy in the Age of IoT |
|
Quantifying security & privacy flaws in end-user IoT programming |
|
2:55 - 3:20 | Break |
3:20 - 5:10 | Session IX: Formal Methods |
Speakers: Franz Franchetti, Matthew Fredrikson, Shayak Sen, Yifei Yuan, Bryan Parno, Ryan Wagner |
|
Accountable Information Use in Data-Driven Systems |
|
Safe and Efficient Test Scheduling for Ensembles of Network Policies |
|
Building Provably Secure Systems |
|
5:10 - 6:00 | Industry Panel: "Industry Engaging Academia: What companies really want in relationships with universities" Panelists: |
6:00 - 6:10 | Closing Remarks |
6:10 - 6:30 | Walk/Ride to Carnegie Museum for Dinner |
6:30 - 9:30 | Poster Session and Banquet Dinner |
Wednesday, September 27, 2017: Gates-Hillman Center 6115 and CIC 2101 |
|
8:30am - 9:00 | Breakfast |
9:00 - 11:30 | Workshops |
BAP - A Modern Toolkit for Binary Analysis and Reverse Engineering Location: Gates-Hillman Center 6115 Abstract: Program analysis is a fundamental technique in affording automated reasoning of program behavior. This ability is especially desirable when working with binary code, which often entails substantial manual reverse engineering effort to analyze. Moreover, much of today's commodity device software, as found in routers, webcams, or smart TVs, harbor vulnerabilities that can only be detected through the lens of binary analysis, due to the lack of source code availability. The Binary Analysis Platform (BAP) is an open source, state-of-the-art infrastructure for performing analysis tasks on binary code. In this talk, we will demonstrate BAP through a handful of bite-sized examples which we will apply to find bugs and vulnerabilities in binaries of commodity devices. Through this talk, security practitioners will gain valuable insight into the design decisions powering a state-of-the-art analysis platform for binaries, and gain practical exposure of the capabilities available to them for performing security-related tasks on binary code with BAP. |
|
Cyber Analytics Location: CIC Building 2101 Abstract: The day-to-day cyber security often involves data gathering, logging, filtering, analyzing, and responding. We often have too many numbers, but not enough insight. We need new approaches to discover the hidden patterns in cyber spaces. In this Workshop, a group of multidisciplinary researchers will introduce innovative methods for real-world cyber data analyses. The topics include tracking malware distribution networks, modeling dark webs, drone footage forensics, biologically-inspired algorithms, and visualization with augmented reality. Workshop Presentations:
|
|
11:30 - | Lunch |