Learning from Authoritative Security Experiment Results

Program
NOTE: All times EDT
9:45am – 10:00am : Gathering
10:00am – 10:15am : Welcome, Introductions, Workshop Goals & Agenda
10:15am – 11:45am : Session 1 - Paper Discussions
|
Under the Hood of MARVEL
|
|||
|
Methodological Challenges In Investigating the User Experience of Cyber Threat Intelligence Data Sharing Platforms
|
|||
11:45am – 12:00pm : Break
12:00pm – 1:00pm : Session 2 - Keynote Talk
|
Using Co-Simulation for Model Reuse and Experiment Reproducibility |
|||
1:00pm – 1:15pm : Break
1:15pm - 2:45pm : Session 3 - Paper Discussions
|
Dissecting ARID: Implementing and Evaluating Security Solutions on Open-Source Drones
|
|||
|
Evaluating Fast Speech Based Adversarial Audio Attack
|
|||
2:45pm - 3:00pm : Break
3:00pm – 4:30pm : Session 4 - Paper Discussions
|
A Proof of Concept for Usability and Efficacy Evaluations as a Component of IETF Standards Using MUD
|
|||
|
An Experimental Approach to Evaluate the Security of Mobile Autofill Frameworks on iOS and Android
|
|||