2022 Presentations

Ethan Rudd: Efficient Malware Analysis Using Metric Embeddings

Andre Nguyen: Minimizing Compute Costs: When When Should We Run More Expensive Malware Analysis?

Lindsey Lack: Webshell Detection Case Study

Tadesse Zemichael: Heterogenous Graph Embedding for Malicious Azure Sign-in Detection

Doug Sibley: Learning to Embed Byte Sequences with Convolutional Autoencoders

Rob Brandon: Detecting Homoglyph Domains with Character Image LSTMs

Matthew Berninger: ARNIE: Hasta La Vector, Baby! Towards Better Encoding and Vectorization of Cyber Artifacts

Subhabrata Majumdar: Network Security Modelling with Distributional Data

Rumman Chowdhury: Algorithmic Bias Bounty Competition

Francois Labreche: Threat Class Predictor: An Explainable Framework for Predicting Vulnerability Threat Using Topic and Threat Modeling

Kobra Khanmohammadi: Half-Day Vulnerabilities: A Study of the First Days of CVE Entries

Maeve Mulholland: Playing Cat and Mouse with the Attacker: Frequent Item Set Mining in the Registry

Bhavna Soman: Firenze: Model Evaluation Using Weak Signals

Myles Foley: Inroads in Autonomous Network Defence using Explained Reinforcement Learning

Andrew Hong: Temporal Attack Detection in Multimodal Cyber-Physical Systems with Sticky HDP-HMM

Becca Lynch: Enhancing 2FA with IP-based geolocation without blocking all your users

Michael Moran: Keys to the Digital Castle: Detecting Malicious MDA Device Enrollment at Scale

Paolo Di Prodi: OmnibusCyber: a schema-ready strongly typed database to model all cyber security objects

Kristian Robert Langholm: Building a Multi-Tenant Machine Learning Workflow Orchestration Platform