The 3rd AEGIS Symposium on Cyber Security
2024 (Online)
The Annual rEading Group in Information Security (AEGIS) Symposium is an annual symposium held online by a group of researchers of Privacy and Security in Computer Science.
In 2023, the 2nd AEGIS Symposium hosted 12 talks given by a variety of security researchers in security, covering a wide range of topics with a highlight on LLM security. The 2024 symposium will be the 3rd symposium of the AEGIS symposia series.
As usual, the 3rd AEGIS Symposium will be delivered virtually in Zoom. For any additional questions, please contact the organization committee.
Important News:
We have finalized the presenters this year, featuring 12 talks in four sessions. The topics of the presentation will be finalized in mid June. Looking forward to see you in AEGIS 2024!
Upcoming Event:
Abstract:
The need for efficient query processing arises from several factors: the rapid increase of data volume, and the growing demand for cost-effective solutions in business.
In these scenarios, existing data processing techniques that require substantial computational power, storage space, and time may no longer be feasible or justified.
In the prelim, I will explore two different resource constrained scenarios: 1) optimizing regular expression matching in log analysis with constraints on time and space; 2) without incurring the cost of provisioning a new hardware, predicting a database workload's performance.
Sessions:
- Session 1: Machine Learning and Large Language Model
- Session 2: Security Threat Analysis and Modelling
- Session 3: Network Security
- Session 4: Invited Keynotes from Database and Software Engineering
Presenters:
Shufan Zhang | A Private Talk: New Models, Results, and Systems for Privacy-Preserving Database Query Processing | University of Waterloo |
Xinyue Shen | Emerging Attacks in the Era of Generative AI | CISPA Helmholtz Center for Information Security |
Zhuo Zhang | TBD | Purdue University |
Ling Zhang | TBD | University of Wisconsin-Madison |
Yichen Li | Your Code Secret Belongs to Me: Neural Code Completion Tools Can Memorize Hard-Coded Credentials | Chinese University of Hong Kong |
Shixuan Zhao | Reusable Enclaves for Confidential Serverless Computing | The Ohio State University |
Limin Wang | Model-Driven Attack Detection Methods | Nanjing University |
Yan Long | How Sensors Leak Your Secrets: Protecting Security and Privacy of Sensing in Modern Computer Systems | University of Michigan |
Qifan Zhang | ResolverFuzz: Automated Discovery of DNS Resolver Vulnerabilities with Query-Response Fuzzing | University of California, Irvine |
Yunyi Zhang | Rethinking the Security Threats of Stale DNS Glue Records | Tsinghua University |
Linkai Zheng | TBD | Tsinghua University |
Organization Committee
Program Chair | Yuqing Yang | The Ohio State University |
Program Co-Chair | Xiang Li | Nankai University |