Time |
Item |
08.30am – 09.00am |
Coffee and Tea on arrival |
09.00am – 09.05am |
Opening
Ryan Ko, University of Queensland |
09.05am – 09.45am |
Session chair: Omio Abedin
Sponsor’s address (Remote presentation)
Liming Zhu, CSIRO’s Data61
Helge Janicke, Cyber Security Collaborative Research Centre |
09.45am – 10.45am |
Keynote address | Privacy in the Age of AI/ML (Remote presentation)
Prof James Joshi, University of Pittsburgh, United States |
10.45am – 11.10am |
Morning Break |
11.10am – 11.40am |
Session chair: Selasi Kwashie (Remote facilitation)
Security meets program analysis: Tools for vulnerability detection (Remote presentation)
Dr Paddy Krishnan, Oracle Labs |
11.40am – 12.25pm |
Session 2: Cyber AI and Autonomy, Software and Database Security
11.40am – 11.55am |
On Inferring Training Data Attributes in Machine Learning Models (In-person presentation)
Benjamin Zhao, Hassan Jameel Asghar, Raghav Bhaskar and Mohamed Ali Kaafar |
11.55am – 12.10pm |
Towards the Development of Robust Reinforcement Learning Algorithms in Cybersecurity Applications (Remote presentation)
Paul Montague, Tamas Abraham, Yi Han, Michael Pope, Olivier de Vel, Benjamin Rubinstein, Sarah Erfani, Tansu Alpcan and Christopher Leckie |
12.10pm – 12.25pm |
Characterizing and Detecting Money Laundering Activities on the Bitcoin Network (Remote presentation)
Yining Hu, Suranga Seneviratne, Kanchanca Thilakarathna, Kensuke Fukuda and Aruna Seneviratne |
|
12.25pm – 2.00pm |
Lunch + Poster Session
Session chair: Ikram Muhammad (In-person facilitation)
A brief video for all posters will be available on demand on the live streaming platform. Posters with an author present at the venue will be able to provide additional in-person context to their posters.
VRF-based Mining: How to Rule out Mining Pools from the Blockchain Ecosystem? (In-person author)
Runchao Han, Haoyu Lin and Jiangshan Yu |
Unacceptable Behavior: Robust PDF Malware Detection Using Abstract Interpretation
Alexander Jordan, François Gauthier, Behnaz Hassanshahi and David Zhao |
Cyber Attack to AI systems: Targeted Attention-based Attacks to Road Sign Recognition Models
Xinghao Yang and Wei Liu |
Provenance for Secure Propagation of IoT Data (In-person author)
Fariha Jaigirdar, Carsten Rudolph and Chris Bain |
Robust Malware Classification Using GAN-based Adversarial Examples (In-person author)
Maryam Shahpasand, Len Hamey, Dali Kaafar and Dinusha Vatsalan |
Detection of Image Spam Emails Using Deep Learning
Bedeuro Kim and Hyoungshick Kim |
Scalable Static Analysis to Detect Security Vulnerabilities: Challenges and Solutions
Nathan Keynes, François Gauthier, Nicholas Allen, Diane Corney, Padmanabhan Krishnan and Cristina Cifuentes |
AI-enabled Design and Generation of Declarative API for Security Orchestration Platform
Chadni Islam, M Ali Babar and Surya Nepal |
BiVulD: Wining the Cyber Vulnerability War
Shigang Liu, Jun Zhang and Yang Xiang |
Rapid Situational Awareness Using Network Knowledge and AI Reasoning
Markus Stumptner, Wolfgang Mayer, Georg Grossmann, Chadni Islam, Ali Babar, Aditya Ghose, Jonathan Davis, Dean Philp, Kevin Harman |
Practical Fixed-Parameter Algorithms for Defending Active Directory Style Attack Graphs
Mingyu Guo, Jialing Li, Aneta Neumann, Frank Neumann and Hung Nguyen |
Automated Vulnerability Research Using Variant Analysis of Source Code (In-person author)
Silvio Cesare, Kylie McDevitt and Jayden Rivers |
|
2.00pm – 3.00pm |
Panel Session
Addressing the Cyber Skills Gap: From Cyber Graduates to Research Careers
Facilitator: Adrian Herrera (In-person facilitation)
Marie Boden, University of Queensland
Cristina Cifuentes, Oracle Labs Australia
Gareth Parker, Defence Science and Technology (DST) Group
Tony Hosking, Australian National University |
3.00pm – 3.20pm |
Afternoon break |
3.20pm – 4.35pm |
Session chair: Tina Wu (Remote facilitation)
Session 3: Networked Systems Security, Software Systems
3.20pm – 3.35pm |
Cyber Mission Assurance – Understanding Missions and their Cyber Dependencies (Remote presentation)
Ben Luo, Alex Rohl, Amy Stringfellow, Minh Tran and Alexander Chambers |
3.35pm – 3.50pm |
Measuring and Analysing the Chain of Implicit Trust: A Study if Third-party Resources Loading (In-person presentation)
Muhammad Ikram, Rahat Masood, Gareth Tyson, Mohamed Ali Kaafar and Noha Loizon |
3.50pm – 4.05pm |
A Framework for Military Wireless Body Area Networks Converged with Low Power Wide Area Networks (Remote presentation)
James Jin Kang, Wencheng Yang and Michael Johnstone |
4.05pm – 4.20pm |
Spatial Privacy Leakage in 3D Mixed Reality Data (Remote presentation)
Jaybie de Guzman, Kanchana Thilakarathna and Aruna Seneviratne |
4.20pm – 4.35pm |
Predicting Randon Numbers with Neural Networks (Remote presentation)
Jihyeon Ryu and Hyoungshick Kim |
|
4.35pm – 4.45pm |
Closing Day 2
Ryan Ko, University of Queensland |
|
|