Great Lakes Security Day 2020

Join us for cybersecurity talks and networking.
November 6, 2020, 1 pm – 5 pm. Online.

Schedule

Zoom Link

1:00-1:55           Distinguished Lecture: Gene Tsudik

2:00-2:50      Session 1

  • Danielle Gonzalez, RIT, “Architectural Security Weaknesses in Industrial Control Systems (ICS)”
  • MD Armanuzzaman, U. Buffalo, “BYOTee: Build Your Own Trusted Execution Environments on SoC FPGA”
  • Chen Yuan, U. Buffalo, “Improved Building Blocks for Secure Multi-Party Computation based on Secret Sharing with Honest Majority”

2:50-3:25      Poster Session

Return to Zoom: Zoom Link

3:30-4:15      Distinguished Lecture: Siwei Lyu

4:15-5:05      Session 2

  • H. B. Acharya, RIT, “Maginot Lines and Tourniquets”
  • Kai Li, Syracuse, “Cost-Effective Data Feeds to Blockchains via Workload-Adaptive Data Replication
  • Ryan Sheatsley, PSU, “Adversarial Examples in Constrained Domains”

GLSD 2020 Organizing Committee: Yuzhe Tang (Syracuse), Matthew Wright (RIT), Ping Yang (Binghamton), and Ziming Zhao (Buffalo). Contact matthew.wright@rit.edu for any questions or issues.

Distinguished Lecture: Gene Tsudik

Gene Tsudik Thermanator and AcuTherm: Thermal Residue Attacks on Keyboard Password Entry and Hybrid Attacks Combining Acoustic and Thermal Side-Channels

 

Co-sponsored by Rochester Joint Chapter of the IEEE Computer and Computational Intelligence Societies

Distinguished Lecture: Siwei Lyu

 Fighting AI-Synthesized Fake Media:Siwei Lyu  
 Recent years have witnessed an unexpected yet astonishing rise of AI-synthesized fake media, thanks to the rapid advancement of technology and omnipresence of   social media. Together with other forms of online disinformation, the AI-synthesized fake media are eroding our trust to online information, and have already caused real   damages. It is thus important to develop counter measures to limit the negative impacts of AI-synthesized fake media. In this video, I will highlight recent technical developments to fight AI-synthesized fake media, and discuss the future of AI-synthesized fake media and their counter technology.

Co-sponsored by Rochester Joint Chapter of the IEEE Computer and Computational Intelligence Societies

Poster Titles and Authors

  1. Devil is Virtual: Reversing Virtual Inheritance in C++ Binaries. Rukayat Ayomide Erinfolami (rerinfo1@binghamton.edu, Binghamton University), Aravind Prakash (aprakash@binghamton.edu, Binghamton University).
  2. FakeCatcher: Detection of Synthetic Portrait Videos using Biological Signals. Authors: Umur Ciftci (Binghamton U), Ilke Demir (Intel Corp.), and Lijun Yin (Binghamton U).
  3. How to Save Blockchain Cost: Retrofit Batching of Smart-Contract Invocations onto Ethereum. Authors: Qi Zhang  qzhang71@syr.edu Syracuse University, Yibo Wang  ywang349@syr.edu  Syracuse University, Kai Li  Kli111@syr.edu  Syracuse University, Yuzhe Tang  ytang100@syr.edu  Syracuse, Jiaqi Chen  jchen217@syr.edu Syracuse University, Xiapu Luo  csxluo@comp.polyu.edu.hk  Hong Kong Hong Kong Polytechnic University, Ting Chen  brokendragon@uestc.edu.cn  China University of Electronic Science and Technology of China.
  4. Anyone can Audit: Truly Scalable Log Auditing on Blockchains with Lightweight Fork Prevention. Authors: Yuzhe Tang ytang100@syr.edu Syracuse University, Kai Li kli111@syr.edu Syracuse University, Yibo Wang ywang349@syr.edu Syracuse University, Sencer Burak Somuncuoglu burak.somuncuoglu@chainalysis.com Chainalysis.
  5. Mockingbird: Defending Against Deep-Learning-Based Website Fingerprinting Attacks with Adversarial Traces. Authors: Mohammad Saidur Rahman, Mohsen Imani, Nate Mathews, Matthew Wright.
  6. SparkFHE - Distributed Dataflow Framework with Fully Homomorphic Encryption. Peizhao Hu (RIT), Asma Aloufi (RIT), Adam Caulfield (RIT), Kim Laine (Microsoft Research), and Kristin Lauter (Microsoft Research).
  7. Defeating the Website Fingerprinting Defense FRONT. Nate Mathews (RIT).
  8. Authenticating Video Feeds using Electric Network Frequency Estimation at the Edge. Deeraj Nagothu, Yu Chen (Binghamton).
  9. A cyber-resilient privacy framework for the smart grid with dynamic billing capabilities. Gaurav Wagh (RIT).
  10. Adversarial Activity Detection based on Keystroke Acoustics. Amin Fallahi, Vir V. Phoha (Syracuse).
  11. Decepticon: A Theoretical Framework to Counter Advanced Persistent Threats (APT). Rudra Prasad Baksi and Shambhu J. Upadhyaya (University at Buffalo).
  12. MLSNet: A Multilevel Security Framework for Software-Defined Networking. Authors: Quinn Burke (Penn State), Fidan Mehmeti (Penn State), Rahul George (Penn State), Trent Jaeger (Penn State), Thomas La Porta (Penn State), Patrick McDaniel (Penn State), Stefan Achleitner (Palo Alto Networks), Srikanth Krishnamurthy (UC Riverside).
  13. Static Instrumentation for Performant Binary Fuzzing. Authors: Eric Pauley (Penn State), Prof. Gang Tan (Penn State), Prof. Danfeng Zhang (Penn State), Prof. Patrick McDaniel (Penn State).