9th ACM Workshop on Artificial Intelligence and Security
with the 23nd ACM Conference on Computer and Communications (CCS)
October 28, 2016, Hofburg Palace, Vienna, Austria.

Navigation

  • About

Final Program:

Time       TitleAuthors
8:50 - 9:00Welcome RemarksDavid Mandell Freeman (LinkedIn Corporation, USA)
9:00 - 10:00Why is applying machine learning to anti-abuse so hard? (Keynote)Elie Bursztein (Google, Inc., USA)
Security Data Sets (Chair: TBD)
10:05 - 10:30SherLock vs Moriarty: A Smartphone Dataset for Cybersecurity ResearchYisroel Mirsky, Asaf Shabtai, Lior Rokach, Bracha Shapira and Yuval Elovici (Ben-Gurion University, Israel)
10:30 - 11:00Coffee Break
Machine Learning and Security in Practice (Chair: TBD)
11:00 - 11:25DeepDGA: Adversarially-Tuned Domain Generation and DetectionHyrum Anderson, Jonathan Woodbridge and Bobby Filar (Endgame, Inc., USA)
11:25 - 11:50Tracked Without a Trace: Linking Sessions of Users by Unsupervised Learning of Patterns in Their DNS TrafficMatthias Kirchler (Humboldt University of Berlin, Germany), Dominik Herrmann (University of Hamburg, Germany), Jens Lindemann (University of Hamburg, Germany), and Marius Kloft (Humboldt University of Berlin, Germany)
11:50 - 12:15Identifying Encrypted Malware Traffic with Contextual Flow DataBlake Anderson and David McGrew (Cisco Systems Inc., USA)
12:15 - 12:40Causality-based Sensemaking of Network Traffic for Android Application SecurityHao Zhang, Danfeng Yao and Naren Ramakrishnan (Virginia Tech, USA)
12:40 - 14:15Lunch Break
Foundations (Chair: TBD)
14:15 - 14:40Secure Kernel Machines against Evasion Attacks Paolo Russu, Ambra Demontis, Battista Biggio, Giorgio Fumera and Fabio Roli (University of Cagliari, Italy)
14:40 - 15:05Prescience: Probabilistic Guidance on the Retraining Conundrum for Malware DetectionAmit Deo, Santanu Dash, Guillermo Suarez-Tangil, Vladimir Vovk and Lorenzo Cavallaro (Royal Holloway, University of London, UK)
15:05 - 15:30Discriminative models for multi-instance problems with tree-structureTomas Pevny (Czech Technical University in Prague, Czech Republic) and Petr Somol (Cisco Systems, Inc., Czech Republic)
15:30 - 16:00Coffee Break
Privacy (Chair: TBD)
16:00 - 16:25True Friends Let You Down: Benchmarking Social Graph Anonymization SchemesKumar Sharad (University of Cambridge, UK)
16:25 - 16:50Change of Guard: The Next Generation of Social Graph De-anonymization AttacksKumar Sharad (University of Cambridge, UK)
16:50 - 17:15Differentially Private Online Active Learning with Applications to Anomaly DetectionMohsen Ghassemi, Anand Sarwate and Rebecca Wright (Rutgers, The State University of New Jersey, USA)
17:15 - 17:40A Dual Perturbation Approach for Differential Private ADMM-Based Distributed Empirical Risk MinimizationTao Zhang and Quanyan Zhu (New York University, USA)
17:40 - 17:45Conclusion