Great Lakes Security Day 2020
Join us for cybersecurity talks and networking.
November 6, 2020, 1 pm – 5 pm. Online.
Schedule
1:00-1:55 Distinguished Lecture: Gene Tsudik
- Danielle Gonzalez, RIT, “Architectural Security Weaknesses in Industrial Control Systems (ICS)”
- MD Armanuzzaman, U. Buffalo, “BYOTee: Build Your Own Trusted Execution Environments on SoC FPGA”
- Chen Yuan, U. Buffalo, “Improved Building Blocks for Secure Multi-Party Computation based on Secret Sharing with Honest Majority”
2:50-3:25 Poster Session
- 13 posters, see titles and authors below
- Click here to join the Wonder room: https://www.wonder.me/r?id=ho8kgi-8rk71
- How to use Wonder (4 min. video): https://bit.ly/350D0d3
Return to Zoom: Zoom Link
3:30-4:15 Distinguished Lecture: Siwei Lyu
4:15-5:05 Session 2
- H. B. Acharya, RIT, “Maginot Lines and Tourniquets”
- Kai Li, Syracuse, “Cost-Effective Data Feeds to Blockchains via Workload-Adaptive Data Replication”
- Ryan Sheatsley, PSU, “Adversarial Examples in Constrained Domains”
GLSD 2020 Organizing Committee: Yuzhe Tang (Syracuse), Matthew Wright (RIT), Ping Yang (Binghamton), and Ziming Zhao (Buffalo). Contact matthew.wright@rit.edu for any questions or issues.
Distinguished Lecture: Siwei Lyu
Fighting AI-Synthesized Fake Media:
Recent years have witnessed an unexpected yet astonishing rise of AI-synthesized fake media, thanks to the rapid advancement of technology and omnipresence of social media. Together with other forms of online disinformation, the AI-synthesized fake media are eroding our trust to online information, and have already caused real damages. It is thus important to develop counter measures to limit the negative impacts of AI-synthesized fake media. In this video, I will highlight recent technical developments to fight AI-synthesized fake media, and discuss the future of AI-synthesized fake media and their counter technology.
Co-sponsored by Rochester Joint Chapter of the IEEE Computer and Computational Intelligence Societies
Poster Titles and Authors
- Devil is Virtual: Reversing Virtual Inheritance in C++ Binaries. Rukayat Ayomide Erinfolami (rerinfo1@binghamton.edu, Binghamton University), Aravind Prakash (aprakash@binghamton.edu, Binghamton University).
- FakeCatcher: Detection of Synthetic Portrait Videos using Biological Signals. Authors: Umur Ciftci (Binghamton U), Ilke Demir (Intel Corp.), and Lijun Yin (Binghamton U).
- How to Save Blockchain Cost: Retrofit Batching of Smart-Contract Invocations onto Ethereum. Authors: Qi Zhang qzhang71@syr.edu Syracuse University, Yibo Wang ywang349@syr.edu Syracuse University, Kai Li Kli111@syr.edu Syracuse University, Yuzhe Tang ytang100@syr.edu Syracuse, Jiaqi Chen jchen217@syr.edu Syracuse University, Xiapu Luo csxluo@comp.polyu.edu.hk Hong Kong Hong Kong Polytechnic University, Ting Chen brokendragon@uestc.edu.cn China University of Electronic Science and Technology of China.
- Anyone can Audit: Truly Scalable Log Auditing on Blockchains with Lightweight Fork Prevention. Authors: Yuzhe Tang ytang100@syr.edu Syracuse University, Kai Li kli111@syr.edu Syracuse University, Yibo Wang ywang349@syr.edu Syracuse University, Sencer Burak Somuncuoglu burak.somuncuoglu@chainalysis.com Chainalysis.
- Mockingbird: Defending Against Deep-Learning-Based Website Fingerprinting Attacks with Adversarial Traces. Authors: Mohammad Saidur Rahman, Mohsen Imani, Nate Mathews, Matthew Wright.
- SparkFHE - Distributed Dataflow Framework with Fully Homomorphic Encryption. Peizhao Hu (RIT), Asma Aloufi (RIT), Adam Caulfield (RIT), Kim Laine (Microsoft Research), and Kristin Lauter (Microsoft Research).
- Defeating the Website Fingerprinting Defense FRONT. Nate Mathews (RIT).
- Authenticating Video Feeds using Electric Network Frequency Estimation at the Edge. Deeraj Nagothu, Yu Chen (Binghamton).
- A cyber-resilient privacy framework for the smart grid with dynamic billing capabilities. Gaurav Wagh (RIT).
- Adversarial Activity Detection based on Keystroke Acoustics. Amin Fallahi, Vir V. Phoha (Syracuse).
- Decepticon: A Theoretical Framework to Counter Advanced Persistent Threats (APT). Rudra Prasad Baksi and Shambhu J. Upadhyaya (University at Buffalo).
- MLSNet: A Multilevel Security Framework for Software-Defined Networking. Authors: Quinn Burke (Penn State), Fidan Mehmeti (Penn State), Rahul George (Penn State), Trent Jaeger (Penn State), Thomas La Porta (Penn State), Patrick McDaniel (Penn State), Stefan Achleitner (Palo Alto Networks), Srikanth Krishnamurthy (UC Riverside).
- Static Instrumentation for Performant Binary Fuzzing. Authors: Eric Pauley (Penn State), Prof. Gang Tan (Penn State), Prof. Danfeng Zhang (Penn State), Prof. Patrick McDaniel (Penn State).