Home
Annual Symposium
2022 Symposium Posters
Posters
> 2022
Artificial Intelligence
Anomaly Detection Against GPS Spoofing Attacks on Connected and Autonomous Vehicles Using IRL
[1DA-114]
Are My Deep Learning Systems Fair? An Empirical Study of Fixed Seed Training
[A15-F9A]
GAN-inspired Defense Against Backdoor Attack on Federated Learning Systems
[D60-104]
Interpretable Privacy Preservation of Text Representations Using Vector Steganography
[BD9-FF9]
Non-Parametric Dimensionality Reduction using Entropy via NEST algorithm
[3D2-D0D]
On the Multi-User Security of Short Schnorr Signatures with Preprocessing
[4B4-845]
Unfair AI: It Isn't Just the Data
[31A-A43]
Assured Identity and Privacy
Investigating Anti-Censorship Technologies
[5EF-FEB]
End System Security
A Preliminary Study on the Characteristic and Detectability of Vulnerabilities in Real-Time Operating Systems
[617-3A8]
CheckCBox: Automated and Zero Cost Spatial Memory Safety
[141-645]
Filetsar Plus An Elastic Network Forensic Toolkit for Law Enforcement
[B67-A19]
GC-Lite: Hiding Software, Data & Computed Values Using Lightweight Primitives
[6FE-C7C]
Griller – A Framework for Under-Constrained Fuzzing
[95C-2BE]
Human Centric Security
Plan for an Evaluation of Government Cyber Threat Hunting Processes
[580-DC3]
Sustained Space and Cumulative Complexity Trade-offs for Data-Dependent Memory-Hard Functions
[5C4-5D6]
Network Security
On the Analysis and Observability of a Networked Competitive Multi-Virus SIR Model
[8AC-7C7]
Security Analysis of Bluetooth Low Energy in Smartwatch
[8D9-DD2]
Policy, Law and Management
Curriculum Guidance for Industrial Control System Security
[B4D-82D]
Prevention, Detection and Response
Cloud-native Application Performance Metrics for Resource Monitoring
[2AA-DEA]
Using Red & Blue Team Exercises to Highlight Challenges, Gaps and Deficiencies in Defense Systems Capabilities Against Emerging Air Threats
[845-371]