7:30 am - 9:00 am
Morning Coffee
9:00 am - 9:05 am
Opening Remarks
9:05 am - 9:30 am
Keynote 1
9:30 am - 9:55 am
Keynote 2
9:55 am - 10:40 am
Morning Coffee/Break
Human-Centric Design in Security Analytics
10:40 am - 10:55 am
Ignoring Directionality Leads to Compromised Graph Neural Network Explanations (Short Paper)
Biometric Security and User Authentication Analysis
10:55 am - 11:10 am
Eye Movement Biometrics in Virtual Reality: A Comparison between VR Headset and High-End Eye-Tracker Collected Dataset (Short Paper)
Collaborative Security and Privacy Analytics
11:10 am - 11:30 am
Reliable KMDF instruction set generation for user queries based on endogenous generative LLMs
11:30 am - 11:50 am
An Interactive Framework for Implementing Privacy-Preserving Federated Learning: Experiments on Large Language Models
11:50 am - 1:00 pm
Lunch
Vulnerability Detection and Assessment
1:00 pm - 1:15 pm
A Rusty Link in the AI Supply Chain: Detecting Evil Configurations in Model Repositories (Short Paper)
1:15 pm - 1:30 pm
Generating Secure Artificial Intelligence Model Source Code: A Reinforcement Learning Approach (Short Paper)
Threat Analysis on AI-Generated Contents (Disinformation, Adversarial Attack)
1:30 pm - 1:45 pm
Continuous Embedding Attacks via Clipped Inputs in Jailbreaking Large Language Models (Short Paper)
1:45 pm - 2:00 pm
Good News for Script Kiddies? Evaluating Large Language Models for Automated Exploit Generation (Short Paper)
2:00 pm - 2:15 pm
Code Vulnerability Repair with Large Language Model using Context-Aware Prompt Tuning (Short Paper)
2:15 pm - 3:00 pm
Afternoon Coffee/Break
Threat Analysis on AI-Generated Contents (Disinformation, Adversarial Attack)
3:00 pm - 3:15 pm
Examine the Robustness of Machine Learning-based Phishing Website Detection: Action-Masked Reinforcement Learning for Automated Red Teaming (Short Paper)
Malware Detection
3:15 pm - 3:35 pm
LeoDroid: An LLM-based Few-Shot Multi-Label Detection for Android Malware
3:35 pm - 4:00 pm
Conlusion