8:45–09:00 | Opening and Welcome |
09:00–10:00 | Keynote I (Chair: Lorenzo Cavallaro) |
Lessons from adversarially attacking commercial malware detectors Sadia Afroz |
|
10:00-11:30 | Session I (Chair: TBA) |
10:00: Innocent Until Proven Guilty (IUPG): Building Deep Learning Models with Embedded Robustness to Out-Of-Distribution Content
Brody Kutt (Palo Alto Networks), William Hewlett (Palo Alto Networks), Oleksii Starov (Palo Alto Networks), Yuchen Zhou (Palo Alto Networks) | |
10:30: SAFELearn: Secure Aggregation for private FEderated Learning
Hossein Fereidooni (TU Darmstadt), Samuel Marchal (Aalto University & F-Secure Corporation), Markus Miettinen (TU Darmstadt), Azalia Mirhoseini (Google Brain), Helen Moellering (TU Darmstadt), Thien Duc Nguyen (TU Darmstadt), Phillip Rieger (TU Darmstadt), Ahmad-Reza Sadeghi (TU Darmstadt), Thomas Schneider (TU Darmstadt), Hossein Yalame (TU Darmstadt), Shaza Zeitouni (TU Darmstadt) | |
11:00: Applying Deep Learning to Combat Mass Robocalls
Sharbani Pandit (Georgia Institute of Technology), Jienan Liu (University of Georgia), Roberto Perdisci (University of Georgia, Georgia Institute of Technology), Mustaque Ahamad (Georgia Institute of Technology) | |
11:30–12:30 | Lunch Break |
12:30–13:30 | Keynote II (Chair: Nicholas Carlini) |
Certification Against Adversarial Attacks Martin Vechev |
|
13:30-15:00 | Session II: (Chair: TBA) |
13:30: MMGuard: Automatically Protecting On-Device Deep Learning Models in Android Apps
Jiayi Hua (Beijing University of Posts and Telecommunications), Yuanchun Li (Microsoft Research), Haoyu Wang (Beijing University of Posts and Telecommunications) | |
14:00: BODMAS: An Open Dataset for Learning based Temporal Analysis of PE Malware
Limin Yang (University of Illinois at Urbana-Champaign), Arridhana Ciptadi (Blue Hexagon), Ihar Laziuk (Blue Hexagon), Ali Ahmadzadeh (Blue Hexagon), Gang Wang (University of Illinois at Urbana-Champaign) | |
14:30: Binary Black-Box Attacks Against Static Malware Detectors with Reinforcement Learning in Discrete Action Spaces
Mohammadreza Ebrahimi (University of Arizona), Jason Pacheco (University of Arizona), Weifeng Li (University of Georgia), James Lee Hu (University of Arizona), Hsinchun Chen (University of Arizona) | |
15:00–15:30 | Break |
15:30–16:30 | Privacy Pannel (Chair: Ram Shankar Siva Kumar) |
Beyond deep learning security, what is needed to make ML trustworthy? A pannel discussion with Anupam Datta, Seth Neel, Aleksandra Korolova, and Kamalika Chaudhuri |
|
16:30–16:35 | Closing remarks |
Deep learning and security have made remarkable progress in the last years. On the one hand, neural networks have been recognized as a promising tool for security in academia and industry. On the other hand, the security of deep learning has gained focus in research, the robustness of neural networks has recently been called into question.
This workshop strives for bringing these two complementary views together by (a) exploring deep learning as a tool for security as well as (b) investigating the security of deep learning.
DLS seeks contributions on all aspects of deep learning and security. Topics of interest include (but are not limited to):
Deep Learning
Computer Security
You are invited to submit papers of up to six pages, plus one page for references. To be considered, papers must be received by the submission deadline (see Important Dates). Submissions must be original work and may not be under submission to another venue at the time of review.
Papers must be formatted for US letter (not A4) size paper. The text must be formatted in a two-column layout, with columns no more than 9.5 in. tall and 3.5 in. wide. The text must be in Times font, 10-point or larger, with 11-point or larger line spacing. Authors are strongly recommended to use the latest IEEE conference proceedings templates. Failure to adhere to the page limit and formatting requirements are grounds for rejection without review. Submissions must be in English and properly anonymized.
All accepted submissions will be presented at the workshop and included in the IEEE workshop proceedings. Due to time constraints, accepted papers will be selected for presentation as either talk or poster based on their review score and novelty. Nonetheless, all accepted papers should be considered as having equal importance.
One author of each accepted paper is required to attend the (virtual) workshop and present the paper for it to be included in the proceedings.