We are pleased to announce the 2024 CyLab Partners Conference!

All main events and presentations will be held on the Carnegie Mellon University Campus in the Tepper School of Business. Speakers will be presenting in Simmons Auditorium A (first floor). Poster sessions will be held in the PNC Foundation Room (second floor).

The CyLab Annual Partners Conference highlights the latest research in security and privacy with an interactive forum between faculty, students, and industry. We are excited to welcome our guests back to campus for this year’s three-day event, which will include more than 30 faculty and student presentations. All sessions will consist of brief talks, followed by active dialogue with our attendees.

Attendance is limited to invited guests, representatives of CyLab's partners, and CMU CyLab faculty, staff, and students. We will provide additional information in the coming weeks.

If you have any questions regarding the 2024 CyLab Partners Conference, please contact Isabelle Glassmith at iglassmi@andrew.cmu.edu.

For information on hotels and transportation please see our "Visiting CyLab" page.

Not a CyLab partner? Learn how your company can benefit from becoming one. Contact the Senior Director of Partnerships, Michael Lisanti, at mlisanti@cmu.edu or 412-268-1870.

Agenda

This agenda is subject to change.

Day 1: Tuesday, September 24, 2024 (EDT)

8:00 a.m. - 9:00 a.m. - Breakfast and Registration

9:00 a.m. - 9:15 a.m. – Welcome and Opening Remarks

9:15 a.m. - 10:11 a.m. – Session I: Partnerships and Initiatives

10:11 a.m. - 10:30 a.m. – Break

10:30 a.m. - 11:15 a.m. – Session II: Software Security (Part 1)

11:15 a.m. - 12:00 p.m. – Session III: Software Security (Part 2)

  • Matt Davis: Usable software fuzz testing
  • Limin Jia: Code injection vulnerability detection and confirmation
  • Rohan Padhye: Strengthening Date and Time Logic in Software Systems

12:00 p.m. - 1:30 p.m. – Lunch and Student Poster Session

1:30 p.m. - 2:35 p.m. – Session IV: Privacy

  • Alessandro Aquisti: Privacy Regulation and Behavioral Advertising
  • Shuli Jiang: Differentially Private Incremental Gradient (IG) Methods with Public Data
  • Hank Lee: Privacy in the age of AI: What has changed and what should we do about it?
  • Norman Sadeh: Users First: A User-Centric Privacy Threat Modeling Framework for Notice and Choice | PDF; Update on the Privacy Engineering Initiative | PDF

2:35 p.m. - 3:35 p.m. – Session V: Human Factors and Usability

  • Rahul Telang: Merchants of Vulnerabilities: How Bug Bounty Programs Benefit Software Vendors | PDF
  • Elijah Bouma-Sims: The Kids Are All Right: Investigating the Susceptibility of Teens and Adults to YouTube Giveaway Scams | PDF
  • McKenna McCall: "Trust me bro your medical records are totally safe": Explaining Trusted Execution Environments
  • Omer Akgul: A Decade of Privacy-Relevant Android App Reviews: Large Scale Trends

3:35 p.m. - 3:50 p.m. – Break

3:50 p.m. -5:02 p.m. – Session VI: Generative AI and ML (Part 1)

  • Lujo Bauer: Toward better definitions and metrics for threats against ML systems
  • Marios Savvides: S.H.I.E.L.D. AI Surveillance Hub for Intelligent Edge Processing Of Large Foundational Models for Defense AI Applications
  • Giulia Fanti: Machine learning from private data in the age of LLMs
  • Qi Pang: Attacks on LLM watermarking schemes
  • Virginia Smith: Rethinking Approaches for LLM Safety

5:02 p.m. - 5:05 p.m. – End-of-day remarks

5:30 p.m. - 8:30 p.m. – Dinner at Carnegie Museum

Day 2: Wednesday, September 25, 2024 (EDT)

8:00 a.m. - 9:00 a.m.– Breakfast and Registration

9:00 a.m. - 9:05 a.m. – Opening remarks

9:05 a.m. - 9:30 a.m. – CyLab Distinguished Alumni Award Presentation

9:30 a.m. - 10:42 a.m. – Session VII: Generative AI and ML (Part 2)

  • Swarun Kumar: Generative AI for Wireless Security
  • Kathleen Carley: GenAI and Scenario Creation and Synthetic Data for Training and Planning
  • Mark Sherman: Advances in Using LLMs for Securing Software | PDF
  • Lei Li: Detecting Copyrighted Content in Language Model's Training Data | PDF
  • Lauren McIlvenny: Lessons learned 6 months after standing up an AI Security and Incident Response Team

10:42 a.m. - 11:00 a.m.– Break

11:00 a.m. - 12:00 p.m. – Session VIII: Crypto and Blockchain (Part 1)

12:00 p.m. - 1:30 p.m. – Lunch and Student Poster Session

1:30 p.m. - 2:15 p.m. – Session IX: Crypto and Blockchain (Part 2)

  • Elaine Shi: A New Paradigm Shift for Private Information Retrieval
  • Benny Jiang: CoBBl: Dynamic R1CS Constraints over Basic Blocks
  • Taro Tsuchiya: Blockchain Amplification Attack

2:15 p.m. - 3:00 p.m. – Session X: System and Hardware Security (Part 1)

3:00 p.m. - 3:15 p.m. - Break

3:15 p.m. - 4:00 p.m. - Session XI: System and Hardware Security (Part 2)

  • Riccardo Paccagnella: Timing Attacks on Constant-Time Code
  • Haozhe Zhou: Bring Privacy To The Table: Interactive Negotiation for Privacy Settings of Shared Sensing Devices
  • Yorie NakahiraEnsuring Safety and Resilience of Autonomous System | PDF

4:00 p.m. - 4:05 p.m. – Closing remarks

4:05 p.m. - 5:35 p.m. – Social Reception

Special thanks to our program committee: Lorrie Cranor, Lujo Bauer, Mark Sherman, Osman Yagan, Michael Lisanti, Isabelle Glassmith, Beth Bucher, Michael Cunningham, Ashley Bon, and Danyel Kusbit.