Institute for Information Sciences Faculty and Students Represent KU at Annual Computer Security Conference

The Annual Computer Security Applications Conference (ACSAC) brings together leading researchers and practitioners, along with a diverse group of security professionals drawn from academia, industry, and government, gathered to present and discuss the latest cybersecurity results and topics. The 2024 ACSAC conference – held Dec. 9-13 in Honolulu, Hawaii – celebrated it’s 40th edition. This marks the conference as one of the oldest computer security conferences, second only to the Institute of Electrical and Electronics Engineers Symposium on Security and Privacy.
Remarkably, four papers from KU were accepted and presented at ACSAC 2024. Only Virginia Tech had more papers accepted, which had five. The KU cohort gave presentations that included the following members and topics:
- Yousif Dafalla, Dalton Brucker-Hahn, Drew Davidson, Alexandru G. Bardas. Web-Armour: Mitigating Reconnaissance and Vulnerability Scanning with Scan-Impeding Delays in Web Deployments
- Javaria Ahmad, Fengjun Li, Razvan Beuran, Bo Luo. Eunomia: A Real-time Privacy Compliance Monitor for Alexa Skills
- Dalton A. Brucker-Hahn, Wang Feng, Shanchao Li, Matthew Petillo, Alexandru G. Bardas, Drew Davidson, Yuede Ji. CloudCover: Enforcement of Multi-Hop Network Connections in Microservice Deployments
- Bailey Srimoungchanh, J. Garrett Morris, Drew Davidson. Assessing UAV Sensor Spoofing: More Than a GNSS Problem
Among these participants, two of them are former KU students: Dalton Brucker-Hahn, KU EECS PhD, is currently a researcher at Sandia National Lab; and Javaria Ahmad, KU EECS PhD, is currently a tenure-track assistant professor at the University of Central Missouri.
ACSAC is an internationally recognized forum where researchers, practitioners, and developers meet to learn and exchange practical ideas and experiences in computer and network security. In addition to peer-reviewed papers on novel applied research, they also welcome case studies on real-world applications, panels featuring world experts, and workshops consisting of 1-2 day sessions on hot cybersecurity and privacy topics.