{"id":1012,"date":"2019-04-24T16:34:00","date_gmt":"2019-04-24T14:34:00","guid":{"rendered":"https:\/\/wp.portal.chalmers.se\/dimva2019\/?page_id=1012"},"modified":"2022-06-29T15:57:36","modified_gmt":"2022-06-29T13:57:36","slug":"program","status":"publish","type":"page","link":"https:\/\/sites.unica.it\/dimva2022\/program\/","title":{"rendered":"Program"},"content":{"rendered":"<h3><strong>DIMVA 2022 Programme<\/strong><\/h3>\r\n<strong>Wednesday, June 29<\/strong>\r\n\r\n8:45-9:30: <strong>Registration<\/strong>\r\n\r\n9:30-10:00: <strong>Opening and Welcome<\/strong>\r\n\r\n10:00-11:00: <a href=\"https:\/\/sites.unica.it\/dimva2022\/speakers\/\"><strong>Keynote 1: Open Hardware Security \u2013 A New Hope. <\/strong><strong>Kaveh Razavi,\u00a0ETH Zurich<\/strong><\/a>\r\n\r\n<strong>Chair<\/strong>: Daniel Gruss\r\n\r\n11:00-11:30: Coffee Break\r\n\r\n11:30-12:30: <strong>Session I: Program Analysis for Security\r\n<\/strong><strong>Chair<\/strong>: Michael Schwarz\r\n<ul>\r\n \t<li>11:30-12:00: Hybrid Pruning: Towards A Precise Static Analysis\r\nD. Das, P. Bose (University of California, Santa Barbara),\u00a0A. Machiry (Purdue University),\u00a0S. Mariani \u00a0 (VMware, Inc.),\u00a0Y. Shoshitaishvili (Arizona State University), C. Kruegel, G. Vigna (University of California, Santa Barbara)<\/li>\r\n \t<li>12:00-12:30: VANDALIR: Vulnerability Analyses based on Datalog and\u00a0LLVM-IR\r\nJ. Schilling (Friedrich-Alexander University of Erlangen-Nuremberg), T. Mu\u0308ller (Hof University of Applied Sciences)<\/li>\r\n<\/ul>\r\n12:30-13:30: Lunch Break\r\n\r\n13:30-15:00: <strong>Session II: Learning-based Approaches for Systems Security\r\n<\/strong><strong style=\"color: var(--global--color-primary);font-family: var(--global--font-secondary);font-size: var(--global--font-size-base)\">Chair<\/strong><span style=\"color: var(--global--color-primary);font-family: var(--global--font-secondary);font-size: var(--global--font-size-base);background-color: var(--global--color-background)\">:\u00a0Lorenzo Cavallaro<\/span>\r\n<ul>\r\n \t<li>13:30-14:00: Extended Abstract: Effective Call Graph Fingerprinting for\u00a0the Analysis and Classification of Windows Malware\r\nF. Meloni, A. Sanna, D. Maiorca, G. Giacinto (University of Cagliari)<\/li>\r\n \t<li>14:00-14:30: COBRA-GCN: Contrastive Learning to Optimize Binary\u00a0Representation Analysis with Graph Convolutional Networks\r\nM. Wang, A. Interrante-Grant, R. Whelan, T. Leek, (MIT Lincoln Laboratory)<\/li>\r\n \t<li>14:30-15:00: Establishing the Contaminating Effect of Metadata Feature\u00a0Inclusion in Machine-Learned Network Intrusion Detection Models\r\nL. D\u2019hooge, M. Verkerken, T. Wauters, B. Volckaert, F. De Turck (Department of Information Technology, IDLab-Imec, Ghent University)<\/li>\r\n<\/ul>\r\n15:00-15:30: Tea Break\r\n\r\n15:30-17:00: <strong>Panel:\u00a0Promises and Challenges of Technological Advances in Software Security\r\nChair: <\/strong>Daniel Gruss\r\n\r\n<strong>Panelists:\r\n<\/strong>Battista Biggio, University of Cagliari\r\nLeyla Bilge, Norton LifeLock\r\nBrendan Dolan Gavitt, NYU\r\nKaveh Razavi, ETH Zurich\r\n\r\n17:30-20:00: Social Activity: Tour in Castello\r\n\r\n&nbsp;\r\n\r\n<strong>Thursday,\u00a0June 30<\/strong>\r\n\r\n9:30-10:30: <a href=\"https:\/\/sites.unica.it\/dimva2022\/speakers\/\"><strong>Keynote 2: Journey to the Center of the Third-Party Tracking Ecosystem.\u00a0Leyla Bilge,\u00a0Norton LifeLock<\/strong><\/a>\r\n\r\n<strong>Chair<\/strong>:\u00a0Lorenzo Cavallaro\r\n\r\n10:30-11:00: Coffee Break\r\n\r\n11:00-12:00: <strong>Session III: Hardware (In)Security\r\n<\/strong><strong>Chair<\/strong>: Daniel Gruss\r\n<ul>\r\n \t<li>11:00-11:30: Branch Different &#8211; Spectre Attacks on Apple Silicon\r\nL. Hetterich, M. Schwarz, (CISPA Helmholtz Center for Information Security)<\/li>\r\n \t<li>11:30-12:00: MPKAlloc: Efficient Heap Meta-Data Integrity Through Hardware Memory Protection Keys\r\nW. Blair (Boston University), W. Robertson (Northeastern University), M. Egele (Boston University)<\/li>\r\n<\/ul>\r\n12:00-13:00: Lunch Break\r\n\r\n13:00-15:00: <strong>Session IV: Secure Systems Design and Network Security\r\nChair: <\/strong>Srdjan Matic\r\n<ul>\r\n \t<li>13:00-13:30: Prioritizing Antivirus Alerts on Internal Enterprise Machines\r\nS. Sakazi, Y. Elovici, A. Shabtai, (Ben Gurion University of the Negev)<\/li>\r\n \t<li>13:30-14:00: A Human in Every APE: Delineating and Evaluating the Human Analysis Systems of Anti-Phishing Entities\r\nB. Acharya, P. Vadrevu (University of New Orleans)<\/li>\r\n \t<li>14:00-14:30: Amplification Chamber: Dissecting the Attack Infrastructure of Memcached DRDoS Attacks\r\nR. Tanabe, M. Kondo, N. Shintani, D. Makita, K. Yoshioka, T. Matsumoto (Yokohama National University)<\/li>\r\n \t<li>14:30-15:00: Consistency is All I Ask: Attacks and Countermeasures on the Network Context of Distributed Honeypots\r\nS. LIU, P. Feng (George Mason University), J. Cao (Tsinghua University), X. He, T. Chin, K. Sun (George Mason University), Q. Li (Tsinghua University)<\/li>\r\n<\/ul>\r\n15:00-15:30: Tea Break\r\n\r\n17:00-22:30: Trekking on the Devil&#8217;s Saddle and Social Dinner\r\n\r\n&nbsp;\r\n\r\n<strong>Friday, 1 July<\/strong>\r\n\r\n9:15 -9:45: Breakfast\r\n\r\n9:45-12:00: <strong>PhD Forum &amp; Virtual Talks in Person\r\nChair:\u00a0<\/strong>Daniel Gruss\r\n\r\n<span style=\"color: var(--global--color-primary);font-family: var(--global--font-secondary);font-size: var(--global--font-size-base);background-color: var(--global--color-background)\">09:45 Microsoft Office Malware Detection and Analysis (PhD Talk) &#8212; Alessandro Sanna<\/span>\r\n<div>\r\n<div>10:00 Fault Diagnosis of Discrete-Event Systems under external attacks (PhD Talk) &#8212; Tenglong Kang<br class=\"\" \/><br class=\"\" \/>10:15 Current-state Opacity by Using Petri Nets (PhD Talk) &#8212; Kun Peng<br class=\"\" \/><br class=\"\" \/>10:30 Distributed Heterogeneous N-Variant Execution (DIMVA 2020) &#8212; Alexios Voulimeneas<br class=\"\" \/><br class=\"\" \/>10:55 Putting Attacks in Context: A Building Automation Testbed for Impact Assessment from the Victim\u2019s Perspective (DIMVA 2020) &#8212; Herson Tobias Esquivel Vargas<br class=\"\" \/><br class=\"\" \/>11:20 Explaining Machine Learning DGA Detectors from DNS Traffic Data (ITASEC 2022) &#8212; Giorgio Piras<br class=\"\" \/><br class=\"\" \/>11:40 Robust Machine Learning for Malware Detection over Time (ITASEC 2022) &#8212; Daniele Angioni<\/div>\r\n<\/div>\r\n12:00:\u00a0<strong>Closing Remarks<\/strong>\r\n\r\n12:15-13:00: Lunch\r\n\r\n&nbsp;<!-- \/wp:post-content -->","protected":false},"excerpt":{"rendered":"<p>DIMVA 2022 Programme Wednesday, June 29 8:45-9:30: Registration 9:30-10:00: Opening and Welcome 10:00-11:00: Keynote 1: Open Hardware Security \u2013 A New Hope. Kaveh Razavi,\u00a0ETH Zurich Chair: Daniel Gruss 11:00-11:30: Coffee Break 11:30-12:30: Session I: Program Analysis for Security Chair: Michael Schwarz 11:30-12:00: Hybrid Pruning: Towards A Precise Static Analysis D. Das, P. Bose (University of&hellip; <a class=\"more-link\" href=\"https:\/\/sites.unica.it\/dimva2022\/program\/\">Continua a leggere <span class=\"screen-reader-text\">Program<\/span><\/a><\/p>\n","protected":false},"author":8998,"featured_media":1440,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-1012","page","type-page","status-publish","has-post-thumbnail","hentry","entry"],"_links":{"self":[{"href":"https:\/\/sites.unica.it\/dimva2022\/wp-json\/wp\/v2\/pages\/1012","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sites.unica.it\/dimva2022\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.unica.it\/dimva2022\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.unica.it\/dimva2022\/wp-json\/wp\/v2\/users\/8998"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.unica.it\/dimva2022\/wp-json\/wp\/v2\/comments?post=1012"}],"version-history":[{"count":45,"href":"https:\/\/sites.unica.it\/dimva2022\/wp-json\/wp\/v2\/pages\/1012\/revisions"}],"predecessor-version":[{"id":1474,"href":"https:\/\/sites.unica.it\/dimva2022\/wp-json\/wp\/v2\/pages\/1012\/revisions\/1474"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sites.unica.it\/dimva2022\/wp-json\/wp\/v2\/media\/1440"}],"wp:attachment":[{"href":"https:\/\/sites.unica.it\/dimva2022\/wp-json\/wp\/v2\/media?parent=1012"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}