Learning from Authoritative Security Experiment Results

Program
NOTE: All times EDT
9:45am – 10:00am : Gathering
10:00am – 10:15am : Welcome, Introductions, Workshop Goals & Agenda
![]() |
10:15am – 11:45am : Session 1 - Paper Discussions
Under the Hood of MARVEL
|
|||
Methodological Challenges In Investigating the User Experience of Cyber Threat Intelligence Data Sharing Platforms
|
11:45am – 12:00pm : Break
12:00pm – 1:00pm : Session 2 - Keynote Talk
Using Co-Simulation for Model Reuse and Experiment Reproducibility
|
1:00pm – 1:15pm : Break
1:15pm - 2:45pm : Session 3 - Paper Discussions
Dissecting ARID: Implementing and Evaluating Security Solutions on Open-Source Drones
|
|||
Evaluating Fast Speech Based Adversarial Audio Attack
|
2:45pm - 3:00pm : Break
3:00pm – 4:30pm : Session 4 - Paper Discussions
A Proof of Concept for Usability and Efficacy Evaluations as a Component of IETF Standards Using MUD
|
|||
An Experimental Approach to Evaluate the Security of Mobile Autofill Frameworks on iOS and Android
|
4:30pm - 4:45pm : Wrap-up
![]() |