Skip to content

Commit

Permalink
Updated Session chairs
Browse files Browse the repository at this point in the history
  • Loading branch information
gannimo committed Jul 16, 2024
1 parent 1290074 commit 234db50
Showing 1 changed file with 6 additions and 6 deletions.
12 changes: 6 additions & 6 deletions index.html
Original file line number Diff line number Diff line change
Expand Up @@ -199,7 +199,7 @@ <h4 class="session"><u>Keynote</u> Twenty-year-old Vulnerabilities are Back: Fir
<div class="col-sm-10"><h4>Coffee break</h4></div>
<div class="col-sm-2">10:30 to 12:30</div>
<div class="col-sm-10">
<h4 class="session">Session 1: Vulnerability Detection and Defense</h4>
<h4 class="session">Session 1: Vulnerability Detection and Defense (chair: Sven Dietrich)</h4>

<p><b>Exceptional Interprocedural Control Flow Graphs for x86-64 Binaries</b>
by Joshua Bockenek (Virginia Tech), Freek Verbeek (Open University of The Netherlands and Virginia Tech), and Binoy Ravindran (Virginia Tech)</p>
Expand All @@ -220,7 +220,7 @@ <h4 class="session">Session 1: Vulnerability Detection and Defense</h4>
<div class="col-sm-10"><h4>Lunch</h4></div>
<div class="col-sm-2">14:00 to 16:00</div>
<div class="col-sm-10">
<h4 class="session">Session 2: Malware and Threats</h4>
<h4 class="session">Session 2: Malware and Threats (chair: Stijn Voelckaert)</h4>

<p><b>Constructs of Deceit: Exploring Nuances in Modern Social Engineering Attacks</b> (no onsite talk)
by Mohammad Ali Tofighi (Florida International University), Behzad Ousat (Florida International University), Javad Zandi (Florida International University), Esteban Schafir (Florida International University), and Amin Kharraz (Florida International University)</p>
Expand All @@ -241,7 +241,7 @@ <h4 class="session">Session 2: Malware and Threats</h4>
<div class="col-sm-10"><h4>Coffee break</h4></div>
<div class="col-sm-2">16:30 to 18:30</div>
<div class="col-sm-10">
<h4 class="session">Session 3: Mobile and Web Application Security</h4>
<h4 class="session">Session 3: Mobile and Web Application Security (Marcel Busch)</h4>

<p><b>Bringing UFUs Back into the Air With FUEL: A Framework for Evaluating the Effectiveness of Unrestricted File Upload Vulnerability Scanners</b>
by Sebastian Neef (TU Berlin) and Maath Oudeh (TU Berlin)</p>
Expand Down Expand Up @@ -289,7 +289,7 @@ <h4 class="session"><u>Keynote</u> Wireless Physical-Layer Sensing: The Good, Th
<div class="col-sm-10"><h4>Coffee break</h4></div>
<div class="col-sm-2">10:30 to 12:30</div>
<div class="col-sm-10">
<h4 class="session">Session 4: AI for Security</h4>
<h4 class="session">Session 4: AI for Security (Manuel Egele)</h4>

<p><b>Approach for the Optimization of Machine Learning Models for Calculating Binary Function Similarity</b>
by Suguru Horimoto (National Police Agency of Japan), Keane Lucas (Carnegie Mellon University), and Lujo Bauer (Carnegie Mellon University)</p>
Expand All @@ -310,7 +310,7 @@ <h4 class="session">Session 4: AI for Security</h4>
<div class="col-sm-10"><h4>Lunch</h4></div>
<div class="col-sm-2">14:00 to 15:36</div>
<div class="col-sm-10">
<h4 class="session">Session 5: Hardware and Firmware Security</h4>
<h4 class="session">Session 5: Hardware and Firmware Security (Stefan Brunthaler)</h4>

<p><b>Seum Spread: Discerning Flaws in IoT Firmware Via Security-Relevant Call Sequence Semantics</b>
by Anis Lounis (Security Research Centre, Concordia University, Montreal, QC, Canada), Anthony Andreoli (Security Research Centre, Concordia University, Montreal, QC, Canada), Mourad Debbabi (Security Research Centre, Concordia University, Montreal, QC, Canada), and Aiman Hanna (Security Research Centre, Concordia University, Montreal, QC, Canada)</p>
Expand All @@ -328,7 +328,7 @@ <h4 class="session">Session 5: Hardware and Firmware Security</h4>
<div class="col-sm-10"><h4>Coffee break</h4></div>
<div class="col-sm-2">16:00 to 17:36</div>
<div class="col-sm-10">
<h4 class="session">Session 6: Cyber Physical Systems and IoT</h4>
<h4 class="session">Session 6: Cyber Physical Systems and IoT (Daniel Gruss)</h4>

<p><b>SecMonS: A Security Monitoring Framework for IEC 61850 Substations Based on Configuration Files and Logs</b>
by Onur Duman (Concordia University), Mengyuan Zhang (Vrije Universiteit), Lingyu Wang (Concordia University), and Mourad Debbabi (Concordia university)</p>
Expand Down

0 comments on commit 234db50

Please sign in to comment.