Day 2 – 22 February 2022

All times are in AEST (Brisbane local time)

Time  Item
08.30am – 09.00am Coffee and Tea on arrival
09.00am – 09.05am Opening

Ryan Ko, University of Queensland

09.05am – 09.45am Session chair: Omio Abedin


Sponsor’s address (Remote presentation)

Liming Zhu, CSIRO’s Data61

Helge Janicke, Cyber Security Collaborative Research Centre

09.45am – 10.45am Keynote address | Privacy in the Age of AI/ML (Remote presentation)


Prof James Joshi, University of Pittsburgh, United States

10.45am – 11.10am Morning Break
11.10am – 11.40am Session chair: Selasi Kwashie (Remote facilitation)


Security meets program analysis: Tools for vulnerability detection (Remote presentation)

Dr Paddy Krishnan, Oracle Labs

11.40am – 12.25pm Session 2: Cyber AI and Autonomy, Software and Database Security

11.40am – 11.55am On Inferring Training Data Attributes in Machine Learning Models (In-person presentation)

Benjamin Zhao, Hassan Jameel Asghar, Raghav Bhaskar and Mohamed Ali Kaafar

11.55am – 12.10pm Towards the Development of Robust Reinforcement Learning Algorithms in Cybersecurity Applications (Remote presentation)

Paul Montague, Tamas Abraham, Yi Han, Michael Pope, Olivier de Vel, Benjamin Rubinstein, Sarah Erfani, Tansu Alpcan and Christopher Leckie

12.10pm – 12.25pm Characterizing and Detecting Money Laundering Activities on the Bitcoin Network (Remote presentation)

Yining Hu, Suranga Seneviratne, Kanchanca Thilakarathna, Kensuke Fukuda and Aruna Seneviratne

 

12.25pm – 2.00pm Lunch + Poster Session

Session chair: Ikram Muhammad (In-person facilitation)

A brief video for all posters will be available on demand on the live streaming platform. Posters with an author present at the venue will be able to provide additional in-person context to their posters.


VRF-based Mining: How to Rule out Mining Pools from the Blockchain Ecosystem? (In-person author)

Runchao Han, Haoyu Lin and Jiangshan Yu 

Unacceptable Behavior: Robust PDF Malware Detection Using Abstract Interpretation 

Alexander Jordan, François Gauthier, Behnaz Hassanshahi and David Zhao 

Cyber Attack to AI systems: Targeted Attention-based Attacks to Road Sign Recognition Models

Xinghao Yang and Wei Liu 

Provenance for Secure Propagation of IoT Data (In-person author)

Fariha Jaigirdar, Carsten Rudolph and Chris Bain 

Robust Malware Classification Using GAN-based Adversarial Examples (In-person author)

Maryam Shahpasand, Len Hamey, Dali Kaafar and Dinusha Vatsalan 

Detection of Image Spam Emails Using Deep Learning 

Bedeuro Kim and Hyoungshick Kim

Scalable Static Analysis to Detect Security Vulnerabilities: Challenges and Solutions 

Nathan Keynes, François Gauthier, Nicholas Allen, Diane Corney, Padmanabhan Krishnan and Cristina Cifuentes

AI-enabled Design and Generation of Declarative API for Security Orchestration Platform 

Chadni Islam, M Ali Babar and Surya Nepal 

BiVulD: Wining the Cyber Vulnerability War 

Shigang Liu, Jun Zhang and Yang Xiang 

Rapid Situational Awareness Using Network Knowledge and AI Reasoning 

Markus Stumptner, Wolfgang Mayer, Georg Grossmann, Chadni Islam, Ali Babar, Aditya Ghose, Jonathan Davis, Dean Philp, Kevin Harman

Practical Fixed-Parameter Algorithms for Defending Active Directory Style Attack Graphs 

Mingyu Guo, Jialing Li, Aneta Neumann, Frank Neumann and Hung Nguyen 

Automated Vulnerability Research Using Variant Analysis of Source Code (In-person author)

Silvio Cesare, Kylie McDevitt and Jayden Rivers

2.00pm – 3.00pm Panel Session

Addressing the Cyber Skills Gap: From Cyber Graduates to Research Careers

Facilitator: Adrian Herrera (In-person facilitation)

Marie Boden, University of Queensland

Cristina Cifuentes, Oracle Labs Australia

Gareth Parker, Defence Science and Technology (DST) Group

Tony Hosking, Australian National University

3.00pm – 3.20pm Afternoon break
3.20pm – 4.35pm Session chair: Tina Wu (Remote facilitation)

Session 3: Networked Systems Security, Software Systems

3.20pm – 3.35pm Cyber Mission Assurance – Understanding Missions and their Cyber Dependencies (Remote presentation)

Ben Luo, Alex Rohl, Amy Stringfellow, Minh Tran and Alexander Chambers

3.35pm – 3.50pm Measuring and Analysing the Chain of Implicit Trust: A Study if Third-party Resources Loading (In-person presentation)

Muhammad Ikram, Rahat Masood, Gareth Tyson, Mohamed Ali Kaafar and Noha Loizon

3.50pm – 4.05pm A Framework for Military Wireless Body Area Networks Converged with Low Power Wide Area Networks (Remote presentation)

James Jin Kang, Wencheng Yang and Michael Johnstone

4.05pm – 4.20pm Spatial Privacy Leakage in 3D Mixed Reality Data (Remote presentation)

Jaybie de Guzman, Kanchana Thilakarathna and Aruna Seneviratne

4.20pm – 4.35pm Predicting Randon Numbers with Neural Networks (Remote presentation)

Jihyeon Ryu and Hyoungshick Kim

4.35pm – 4.45pm Closing Day 2

Ryan Ko, University of Queensland

Return to Past Events