Search this site
Embedded Files
 

CANSec CANSec 2021 Registration Cyber-Defense Competition Keynote Program Industry Panel CERI Center at Mizzouri

Program

Workshop Main Program (Nov. 13) – PDF

Opening Remarks 9:15 – 9:30 a.m. CT

Giovanna Guidoboni, Associate Dean for Research, College of Engineering, University of Missouri-Columbia.

Keynote Session 9:30 – 10:30 a.m. CT

Keynote Speech: Cross-Layer Security of Embedded and Cyber-Physical Systems, Mohammed Al Faruque, Associate Professor, University of California, Irvine.

Break 10:30 – 10:45 a.m. CT

Session 1: Research Presentations 10:45 a.m. – 12 p.m. CT

  • Session Chair: Khaza Anuarul Hoque, University of Missouri-Columbia

  • 10:45 – 11:10 a.m.: Exploring Containerization for Protecting Unmanned Robotic Vehicles, Chidera Okoro, Monowar Hasan, Wichita State University.

  • 11:10 – 11:35 a.m.: Detection of Message Injection Attacks onto the CAN Bus using Similarities of Successive Messages-Sequence Graphs, Mubark B Jedh, Lofti Ben Othmane, Iowa State University

  • 11:35 a.m. – 12 p.m.: Prioritized Content Determination and Dissemination using Reinforcement Learning in DTNs, Shudip Datta, Sanjay Madria, Missouri S&T

Lunch Break / Community Meeting 12 – 1:30 p.m. CT

Industry Panel 1:30 p.m. – 2:15 p.m. CT

  • Panel Discussion: Cybersecurity Industry Trends of Today and Tomorrow

    • Moderator: Prasad Calyam, University of Missouri-Columbia

    • Exemplar Topics to be discussed: Impact of AI/ML on cybersecurity, Next frontiers for data security, Case studies on recent cyber threats

  • Panelists:

    • Walid Rjaibi – IBM Distinguished Engineer and CTO for Data Security at IBM

    • Ramnath Venugopalan – Chief Architect / Senior Vice President, Product Architecture at CrowdStrike

    • Sven Krasser – Senior Vice President, Chief Scientist at CrowdStrike

    • Kathy Bellew – Cybersecurity Analyst at MOREnet

Coffee Break 2:15 – 2:30 p.m. CT

Session 2: Research Presentations 2:30 – 4:35 p.m. CT

  • Session Chair: Rohit Chadha, University of Missouri-Columbia

  • 2:30 – 2:55 p.m.: Power Consumption due to DoS attack on IoT network, Rajesh Palthya, Divya Katikaneni, Dr. Reshmi Mitra, Southeast Missouri State University

  • 2:55 – 3:20 p.m.: ClaimChain: Secure Blockchain Platform for Handling Insurance Claims Processing, Naga Ramya Bhamidipati, George Stafford, Roshan Neupane, Ernest Bonnah, Khaza Anuarul Hoque, Prasad Calyam, University of Missouri – Columbia

  • 3:20 – 3:45 p.m.: Your Eyes Show What Your Eyes See (Y-EYES): Challenge-Response Anti-Spoofing Method for Mobile Security Using Corneal Specular Reflections, Muhammad Mohzary, Khalid J. Almalki, Baek-Young Choi, Sejun Song , University of Missouri-Kansas City

  • 3:45 – 4:10 .pm.: You Are (not) Who Your Peers Are: Identification of Potentially Excessive Permission Requests in Android Apps, Prashanthi Mallojula, Javaria Ahmad, Fengjun Li, Bo Luo, University of Kansas

  • 4:10 – 4:35 p.m.: Defending against Poisoning Attacks in Federated Learning, Sana Awan, Bo Luo and Fengjun Li, University of Kansas

Session 3: Ph.D. Forum & Short Presentations 4:35 – 5:25 p.m. CT

  • Session Chair: Dan Lin, University of Missouri-Columbia

  • 4:35 – 4:45 p.m.: A New Facial Authentication Pitfall and Remedy in Web Services, Dalton Cole, Sara Newman, Dan Lin, University of Missouri – Columbia

  • 4:45 – 4:55 p.m.: Network-based Active Defense for Securing Cloud-based Healthcare Data Processing Pipelines, Mauro Lemus Alarcon, Prasad Calyam, University of Missouri – Columbia

  • 4:55 – 5:05 p.m.: An Automatic Detection for Buffer Overflow Vulnerabilities on ARM Processors Using Grammar Sets, Annie Watson, Ekincan Ufuktepe, University of Missouri – Columbia

  • 5:05 – 5:15 p.m.: VECTrust: Trusted Resource Allocation in Volunteer Edge-Cloud Computing Workflows, Ashish Pandey, Prasad Calyam, University of Missouri-Columbia.

  • 5:15 – 5:25 p.m.: Toward a Metric of Vulnerability in Legacy Systems Using the Microsoft Windows 7 Operating System,
    Polly Wainwright, Shengjie Xu, Dakota State University

Closing Remarks 5:25 – 5:30 p.m. CT

© Copyright The Central Area Networking and Security Workshop - All rights reserved.

Disclaimer: Any opinions, findings, and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of the National Science Foundation.

Google Sites
Report abuse
Page details
Page updated
Google Sites
Report abuse