Workshop on Learning from Authoritative Security Experiment Results (LASER) 2023
The LASER workshop series focuses on learning from and improving cybersecurity experiment results. The workshop strives to provide a highly interactive, collegial environment for discussing and learning from experimental methodologies, execution, and results. Ultimately, the workshop seeks to foster a dramatic change in the experimental paradigm for cybersecurity research, improving the overall quality and reporting of practiced science.
The LASER workshop invites broad participation by the community, including (1) authors of accepted papers from major cybersecurity conferences to present and discuss the experimental aspects of their work, and (2) others interested in contributing to and learning from such discussions and interaction.
Conference papers all too often must focus on research results and contain limited discussion of the experimental aspects of the work (maybe a small section with a few paragraphs at the end of the paper). LASER provides an opportunity to focus on and explore the experimental approaches and methodologies used to obtain the research results.
The LASER workshop not only provides authors of accepted papers the opportunity to present and discuss the experimental aspects of their work with other workshop participants, but also the option to write new published papers that expand on the experimental aspects of their work.
Workshop Format
The workshop will be structured as a true “workshop” in the sense that it will focus on discussion and interaction around the topic of experimental methodologies, execution, and results with the goal of encouraging improvements in experimental science in cybersecurity research. Authors will lead the group in a discussion of the experimental aspects of their work.
Areas of interest include, but are not limited to, the following:
- Research questions and/or hypothesis
- Experimental methodologies used and/or developed
- Experiment design
- Use of simulation, emulation, virtualization, and/or physical testbeds
- Use of specialized hardware including CPS and IoT devices
- Modeling of human-behavior characteristics
- Software tools used and/or developed to perform experimentation
- Approaches to experiment validation, monitoring, and data collection
- Datasets used and/or developed to perform experimentation
- Measurements and metrics
- Analytical techniques used and/or developed to evaluate experimental results
As a group, participants will discuss these areas and answer interesting questions such as:
- Did you use experimentation artifacts borrowed from the community?
- Did you attempt to replicate or reproduce results of earlier research as part of your work?
- What can be learned from your methodology and your experience using your methodology?
- What did you try that did not succeed before getting to the results you presented?
- Did you produce any intermediate results including possible unsuccessful tests or experiments?
Workshop Agenda
Note: All times are in PDT (UTC-7). Location of all sessions still TBD.
Friday, 3 March
8:15 am – 8:30 am
Gathering
8:30 am – 9:00 am
Welcome, Introductions, Workshop Goals and Agenda
9:00 am – 10:30 am
Session 1: Paper Discussions
VICEROY: GDPR-/CCPA-compliant Enforcement of Verifiable Accountless Consumer Requests
Yoshimichi Nakatsuka (University of California, Irvine)
BinaryInferno: Experiment Design and Evaluation Considerations When Reverse Engineering Message Formats from Network Traces
Jared Chandler (Tufts University)
10:30 am – 11:00 am
Morning Break
11:00 am – 12:30 pm
Session 2: Paper Discussions
Human-Subject Research Strategies on Social Media Misinformation
Filipo Sharevski (DePaul University)
Investigating HbbTV Privacy Invasiveness Across European Countries
Carlotta Tagliaro (TU Wien)
12:30 pm – 2:00 pm
Workshop Lunch
2:00 pm – 3:00 pm
Session 3: Invited Talk
Keynote: Cybersecurity Experimentation of the Future
Jelena Mirkovic (USC Information Sciences Institute)
3:00 pm – 3:30 pm
Afternoon Break
3:30 pm – 5:00 pm
Session 4: Paper Discussions
Measuring Messengers: Analyzing Infrastructures and Message Timings to Extract User Locations in Instant Messengers
Theodor Schnitzler (Research Center Trustworthy Data Science and Security, TU Dortmund, and Ruhr-Universität Bochum)
Evaluating Wireless Attacks Against CCS Electric Vehicle Charging
Sebastian Köhler (University of Oxford)
5:00 pm – 5:15 pm
Wrap-up
Workshop Papers
Participants in the LASER Workshop are invited to write new papers on their experimental work. The papers will be published in post-workshop proceedings. The new papers will be driven and guided, in part, by the discussions and interactions, and possibly even new collaborations, forged at the workshop.
Draft papers will be due approximately two months after the workshop. The program committee will review papers and provide notifications and feedback one month after submission. Final camera-ready papers will be due approximately one month later.
Important Dates (tentative)
- LASER Workshop @ NDSS: 3 March 2023
- Draft Papers Submitted: 3 May 2023
- Paper Reviews and Feedback: 3 June 2023
- Final Papers Submitted: 3 August 2023
- Papers Published: 3 September 2023
Organizers
- David Balenson (USC Information Sciences Institute)
- Laura S. Tinnel (SRI International)
Further Information
Please see www.laser-workshop.org for more information about the LASER Workshop Series. Send questions to [email protected].