Learning from Authoritative Security Experiment Results
Program
Agenda
09:45 am - 10:00 am : Gathering
10:00 am – 10:15 am : Welcome, Workshop Goals / Organization
10:15 am – 11:45 am : Session 1 - Paper Discussions
Guide Me to Exploit: Assisted ROP Exploit Generation for ActionScript Virtual Machine |
|
A Process Cycle View on Utilizing Security and Privacy Research to Realize Novel Forms of Industrial Applications and Collaboration [ACSAC Paper (ACM DL)] [ACSAC Slides] [ACSAC Video] [Experiment Artifacts] |
11:45 am – 11:55 am : Break
11:55 am – 01:10 pm : Session 2 - Invited Talk
Invited Talk: Experiments, Methods, Measurements, Instruments -- A Few Details
Roy Maxion, Research Professor, Carnegie Mellon University
01:10 pm – 01:20 pm : Break
01:20 pm – 02:50 pm : Session 3 - Paper Discussions
On the Feasibility of Automating Stock Market Manipulation [ACSAC Paper (ACM DL)] [ACSAC Slides] [ACSAC Video] [Experiment Artifacts] |
|
Analyzing IoT Malware |
02:50 pm – 03:00 pm : Break
03:00 pm – 03:45 pm : Session 4 - Paper Discussions
Session Key Distribution Made Practical for CAN and CAN-FD Message Authentication
Yang Xiao (speaker); Shanghao Shi; Ning Zhang; Wenjing Lou; Y. Thomas Hou
[ACSAC Paper (ACM DL)] [ACSAC Slides] [ACSAC Video] [Experiment Artifacts]