Workshop Schedule

July 22, 2022
Room 321-323

Link to the ICML Conference Virtual Page

(Registration Required to Access)

08:45 - 09:00

Welcome/Opening Remarks – Dr. Ahmad Ridley (NSA)

09:00 - 10:00

Adversarial Intelligence

Humans frequently compete with one another. They sometimes develop adversarial systems. And, they often cooperate to take on a common foe. My interest in Artificial Adversarial Intelligence has led me to cyber security where I employ an array of machine learning approaches. These allow cyber activity to be simulated and modeled. They also unlock text-based data sources that record, organize, and (partially) link cyber threats, targets, and threat mitigations. I will describe some of my projects in Artificial Adversarial Intelligence and present a roadmap for future research.

10:00 - 10:45

Invited Talk - Emilie Purvine, Pacific Northwest National Laboratories

Cyber 101 for Data Scientists and Mathematicians

10:45 - 11:00

Break

11:00 - 12:15

Contributed Papers

12:15 - 12:45

Spotlight Talks

12:45 - 13:45

Lunch

A Practitioner Perspective on ML for Cybersecurity

14:45 - 15:45

Contributed Papers

Detecting Anomalies in Encrypted EV Charging Control Protocol Using a Hybrid LSTM Autoencoder-OCSVM Model, Thomas E Carroll (Pacific Northwest National Laboratory)*; Kristine Arthur-Durett (Pacific Northwest National Laboratory); Grace McNally (Pacific Northwest National Laboratory)

Recognizing and Extracting Cybersecurity Entities from Text, Casey Hanks (UMBC)*; Michael Maiden (UMBC); Priyanka Ranade (UMBC); Tim Finin (UMBC); Anupam Joshi (UMBC)

15:45 - 16:00

Break

16:00 - 17:00

Panel Discussion: Benchmark Data Sets

Hyrum Anderson is Distinguished ML Engineer at Robust Intelligence. His career has focused at the intersection of machine learning and security at Microsoft, Elastic, Endgame, FireEye and Mandiant, and as a researcher at Sandia National Laboratories and MIT Lincoln Laboratory. He received his Ph.D. from the University of Washington in 2010.

Benoit Hamelin, after completing a Ph.D. in medical imaging, has pivoted to a career in cyber security and data science. He has worn many hats through 8 years in start-ups around Montreal, settling down in a research role as he joined the Canadian public service in 2019. He has been with the Tutte Institute for Mathematics and Computing since 2021, working on applications of statistics and machine learning to problems relevant to cyber threat detection, characterization and mitigation.

Jelena Mirkovic is research associate professor at University of Southern California and research team leader at USC Information Sciences Institute. Her career in cybersecurity spans 20 years and more than 80 peer reviewed publications. Jelena's research focuses on distributed denial-of-service attacks, malware analysis, privacy, experimentation for cybersecurity and cybersecurity education.

Jeff Nichols joined the ORNL as a post-doc in the ecology division in 2008 after completing his Ph.D. at the University of Tennessee in mathematics applying HPC techniques to individual-based, math ecology models. His postdoc work was on high-performance computation of bioenergy and climate models. He transitioned to the cybersecurity research group in 2012 and has recently became the group leader. His research focuses on high-fidelity cyber range modeling. He previously worked in industry as an IT professional for nearly 20 years including a stint as IT Director at Jewelry Television, a 24/7-nationwide shopping channel, based in Knoxville, TN.

Jamie Thorpe is a cybersecurity researcher at Sandia National Laboratories in Albuquerque, New Mexico, where she develops the tools needed to help build and analyze models of cyber-physical systems. Her research interests include cyber resilience metrics, system model development, data analysis for emulated environments, and emulation verification. Jamie received her master's degree in information security from Carnegie Mellon University.

17:00 - 17:30

Invited Talk – Joseph Ravichandran, MIT and Michael Wang, MIT

A Case Study of Real-World Kernel Exploitation

A walkthrough of the process security researchers go through to find modern kernel exploits, and a discussion of potential ways to improve bug finding and categorization with AI. We present CVE-2022-29968, an original Linux kernel exploit we developed, and discuss the current challenges researchers face with respect to exploit categorization and automated discovery.

17:30 - 18:15

Poster Session

18:15 - 18:30

Closing Remarks – Dr. Ahmad Ridley (NSA)