Workshop Main Program (Nov. 13) – PDF

Opening Remarks

Giovanna Guidoboni, Associate Dean for Research, College of Engineering, University of Missouri-Columbia.

9:15 – 9:30 a.m. CT
Keynote Session

Keynote Speech: Cross-Layer Security of Embedded and Cyber-Physical Systems, Mohammed Al Faruque, Associate Professor, University of California, Irvine

9:30 – 10:30 a.m. CT
Break 10:30 – 10:45 a.m. CT
Session 1: Research Presentations

  • Session Chair: Khaza Anuarul Hoque, University of Missouri-Columbia
10:45 a.m. – 12 p.m. CT
  • 10:45 – 11:10 a.m.: Exploring Containerization for Protecting Unmanned Robotic Vehicles, Chidera Okoro, Monowar Hasan, Wichita State University.
  • 11:10 – 11:35 a.m.: Detection of Message Injection Attacks onto the CAN Bus using Similarities of Successive Messages-Sequence Graphs, Mubark B Jedh, Lofti Ben Othmane, Iowa State University
  • 11:35 a.m. – 12 p.m.: Prioritized Content Determination and Dissemination using Reinforcement Learning in DTNs, Shudip Datta, Sanjay Madria, Missouri S&T
Lunch Break / Community Meeting  12 – 1:30 p.m. CT
Industry Panel  1:30 p.m. – 2:15 p.m. CT
  • Panel Discussion: Cybersecurity Industry Trends of Today and Tomorrow
    • Moderator: Prasad Calyam, University of Missouri-Columbia
    • Exemplar Topics to be discussed: Impact of AI/ML on cybersecurity, Next frontiers for data security, Case studies on recent cyber threats
  • Panelists:
    • Walid Rjaibi – IBM Distinguished Engineer and CTO for Data Security at IBM
    • Ramnath Venugopalan – Chief Architect / Senior Vice President, Product Architecture at CrowdStrike
    • Sven Krasser – Senior Vice President, Chief Scientist at CrowdStrike
    • Kathy Bellew – Cybersecurity Analyst at MOREnet
Coffee Break  2:15 – 2:30 p.m. CT  
Session 2: Research Presentations 

  • Session Chair: Rohit Chadha, University of Missouri-Columbia
2:30 – 4:35 p.m. CT
  • 2:30 – 2:55 p.m.: Power Consumption due to DoS attack on IoT network, Rajesh Palthya, Divya Katikaneni, Dr. Reshmi Mitra, Southeast Missouri State University
  • 2:55 – 3:20 p.m.: ClaimChain: Secure Blockchain Platform for Handling Insurance Claims Processing, Naga Ramya Bhamidipati, George Stafford, Roshan Neupane, Ernest Bonnah, Khaza Anuarul Hoque, Prasad Calyam, University of Missouri – Columbia
  • 3:20 – 3:45 p.m.: Your Eyes Show What Your Eyes See (Y-EYES): Challenge-Response  Anti-Spoofing Method for Mobile Security Using Corneal Specular Reflections, Muhammad Mohzary, Khalid J. Almalki,  Baek-Young Choi, Sejun Song , University of Missouri-Kansas City
  • 3:45 – 4:10 .pm.: You Are (not) Who Your Peers Are: Identification of Potentially Excessive Permission Requests in Android Apps, Prashanthi Mallojula, Javaria Ahmad, Fengjun Li, Bo Luo, University of Kansas
  • 4:10 – 4:35 p.m.: Defending against Poisoning Attacks in Federated Learning, Sana Awan, Bo Luo and Fengjun Li, University of Kansas
Session 3: Ph.D. Forum & Short Presentations

  • Session Chair: Dan Lin, University of Missouri-Columbia
    4:35 – 5:25 p.m. CT
  • 4:35 – 4:45 p.m.: A New Facial Authentication Pitfall and Remedy in Web Services, Dalton Cole, Sara Newman, Dan Lin, University of Missouri – Columbia
  • 4:45 – 4:55 p.m.: Network-based Active Defense for Securing Cloud-based Healthcare Data Processing Pipelines, Mauro Lemus Alarcon, Prasad Calyam, University of Missouri – Columbia
  • 4:55 – 5:05 p.m.: An Automatic Detection for Buffer Overflow Vulnerabilities on ARM Processors Using Grammar Sets, Annie Watson, Ekincan Ufuktepe, University of Missouri – Columbia
  • 5:05 – 5:15 p.m.: VECTrust: Trusted Resource Allocation in Volunteer Edge-Cloud Computing Workflows, Ashish Pandey, Prasad Calyam, University of Missouri-Columbia.
  • 5:15 – 5:25 p.m.: Toward a Metric of Vulnerability in Legacy Systems Using the Microsoft Windows 7 Operating System,
    Polly Wainwright, Shengjie Xu, Dakota State University
 Closing Remarks     5:25 – 5:30 p.m. CT

Enter your keyword