Department of Computer Science
  and Engineering

Great Lakes Security Day 2019

The third Great Lakes Security Day (GLSD) will be held on Friday, Sep. 6th, 2019 at the University at Buffalo.

The goal of GLSD is to bring together premier practitioners, researchers, students, and funding partners in security, in and around Western and Upstate New York. GLSD serves as an opportunity to share the latest advances, debate roadmaps and future directions, create new collaborations, and seek new opportunities.

GLSD 2017 and 2018 were held at RIT and were great events with over 100 participants.

Key Dates

Aug. 16: Presentation abstracts are due
Aug. 23: Poster abstracts are due
Aug. 27: Decisions are announced
Aug. 30: Registration is due
Sep. 6: GLSD!

Call for Presentations and Posters

Presentations

We invite presentation proposals that concern research on information, computer and network security, broadly defined. GLSD is not a publication venue, and thus we can accept overviews of your group's most recent results, a talk covering an accepted or recently published paper, position talks, exciting early results, and more. If you would like to present at GLSD, please submit your application via email at greatlakessecday@gmail.com on or before August 16. Each submission should include a title, presenter, affiliation, and abstract. You could also include links to other materials (papers, project websites, etc.) if you like. Each submission is limited to one page and should be in the PDF format.

There will be 8 slots for presentations in the schedule. If we have more presentation proposals than slots, we will select presentations based on the diversity of the participants' talks and appeal to a broad audience. Each slot is 20 minutes long, including at least 4 minutes for questions.

Posters

We also invite poster submissions. Posters should concern security and can report on ongoing work. GLSD posters do not need to be about polished or complete results. Proposals for presentations of preliminary work, progress reports on ongoing projects, useful lessons from research that has failed, and tool demos are also welcomed at GLSD. Posters will be displayed during the poster session adjacent to the invited talk at the end of the program. We have limited space for posters, and we'll follow the same selection process that we have for presentations. If you would like to present a poster, please submit your application via email at greatlakessecday@gmail.com on or before August 23 with a title, list of authors and affiliations, and abstract (not the poster itself). Each submission is limited to one page and should be in the PDF format.

Program (tentative)

8:45am Registration and Continental Breakfast
9:15am Openning Remarks

Venugopal Govindaraju, University at Buffalo
Vice President for Research and Economic Development

9:25am Presentations 1-3

Yang Gao, University at Buffalo
EarEcho: Using Ear Canal Echo for Wearable Authentication

Jie Zhou, University of Rochester
Silhouette: Efficient Intra-Address Space Isolation for Protected Shadow Stacks on Embedded Systems

Peter VanNostrand, University at Buffalo
Confidential Deep Learning: Executing Proprietary Models on Untrusted Devices

10:25am Break
10:40am Presentations 4-5

Nate Mathews, Rochester Institute of Technology
Evaluating Security Metrics for Website Fingerprinting Defenses

Jun Zhuang, University at Buffalo
Tracking and Managing Misinformation on Social Media during Disasters

11:20am Break
11:35am Presentations 6-8

Kai Li, Syracuse University
Secure Consistency Verification for Untrusted Cloud Storage by Public Blockchain

Spyridoula Gravani, University of Rochester
skiOS: Lightweight Defense Against Kernel-Level Code-Reuse Attacks

Ethan Johnson, University of Rochester
Secure Guest Virtual Machine Support in Apparition

12:35pm Lunch <Registered Participants Only, Please>
1:45pm

Panel: Exciting New Research Directions in Cybersecurity

3:00pm Poster Session and Reception
4:00pm Distinguished Lecture by Michael Reiter

Michael Reiter, University of North Carolina at Chapel Hill
How to End Password Reuse on the Web

More information can be found here.

Registration

Registration is required for all attendees and is provided at no cost. It covers all sessions, continental breakfast, lunch, and coffee breaks.

Registration is now closed.

Venue

All sessions will be held at the Center for Tomorrow on the North campus of the University at Buffalo. There is sufficient parking in the adjacent parking lot for all attendees, and no parking permits are required. Campus map is available at the following link. Center for Tomorrow is building 40 (accessible from Flint Road) and its parking lot is immediately North of the building.

There are many hotels near campus. One commonly used option is the Double Tree Hotel across the road from campus.

Organizers

Program Co-chairs

Ziming Zhao, Rochester Institute of Technology
John Criswell, University of Rochester
Marina Blanton, University at Buffalo

Organizing Committee

Marina Blanton, University at Buffalo
Shambhu Upadhyaya, University at Buffalo
Michelle Neumaier, University at Buffalo

Our Sponsors

This event wouldn't be possible without generous support from our sponsors: