diff --git a/index.html b/index.html index 22e792b..2ab0bf4 100644 --- a/index.html +++ b/index.html @@ -199,7 +199,7 @@

Keynote Twenty-year-old Vulnerabilities are Back: Fir

Coffee break

10:30 to 12:30
-

Session 1: Vulnerability Detection and Defense

+

Session 1: Vulnerability Detection and Defense (chair: Sven Dietrich)

Exceptional Interprocedural Control Flow Graphs for x86-64 Binaries by Joshua Bockenek (Virginia Tech), Freek Verbeek (Open University of The Netherlands and Virginia Tech), and Binoy Ravindran (Virginia Tech)

@@ -220,7 +220,7 @@

Session 1: Vulnerability Detection and Defense

Lunch

14:00 to 16:00
-

Session 2: Malware and Threats

+

Session 2: Malware and Threats (chair: Stijn Voelckaert)

Constructs of Deceit: Exploring Nuances in Modern Social Engineering Attacks (no onsite talk) by Mohammad Ali Tofighi (Florida International University), Behzad Ousat (Florida International University), Javad Zandi (Florida International University), Esteban Schafir (Florida International University), and Amin Kharraz (Florida International University)

@@ -241,7 +241,7 @@

Session 2: Malware and Threats

Coffee break

16:30 to 18:30
-

Session 3: Mobile and Web Application Security

+

Session 3: Mobile and Web Application Security (Marcel Busch)

Bringing UFUs Back into the Air With FUEL: A Framework for Evaluating the Effectiveness of Unrestricted File Upload Vulnerability Scanners by Sebastian Neef (TU Berlin) and Maath Oudeh (TU Berlin)

@@ -289,7 +289,7 @@

Keynote Wireless Physical-Layer Sensing: The Good, Th

Coffee break

10:30 to 12:30
-

Session 4: AI for Security

+

Session 4: AI for Security (Manuel Egele)

Approach for the Optimization of Machine Learning Models for Calculating Binary Function Similarity by Suguru Horimoto (National Police Agency of Japan), Keane Lucas (Carnegie Mellon University), and Lujo Bauer (Carnegie Mellon University)

@@ -310,7 +310,7 @@

Session 4: AI for Security

Lunch

14:00 to 15:36
-

Session 5: Hardware and Firmware Security

+

Session 5: Hardware and Firmware Security (Stefan Brunthaler)

Seum Spread: Discerning Flaws in IoT Firmware Via Security-Relevant Call Sequence Semantics by Anis Lounis (Security Research Centre, Concordia University, Montreal, QC, Canada), Anthony Andreoli (Security Research Centre, Concordia University, Montreal, QC, Canada), Mourad Debbabi (Security Research Centre, Concordia University, Montreal, QC, Canada), and Aiman Hanna (Security Research Centre, Concordia University, Montreal, QC, Canada)

@@ -328,7 +328,7 @@

Session 5: Hardware and Firmware Security

Coffee break

16:00 to 17:36
-

Session 6: Cyber Physical Systems and IoT

+

Session 6: Cyber Physical Systems and IoT (Daniel Gruss)

SecMonS: A Security Monitoring Framework for IEC 61850 Substations Based on Configuration Files and Logs by Onur Duman (Concordia University), Mengyuan Zhang (Vrije Universiteit), Lingyu Wang (Concordia University), and Mourad Debbabi (Concordia university)