Information
2025 Agenda
2025 Registration Form
2025 Call for Posters / Talks
2025 Location and Logistics
Hosting Future MSWs
2025 Organizers / Contact

Last updated: Monday, September 22, 2025, 2:00pm

Below, please find the agenda for MSW 10 on Saturday, September 20th, 2025. All events will be held at Indiana University Bloomington, specifically at the Indiana Memorial Union (IMU, 900 E. 7th Street, Bloomington, IN 47405, Google Maps).

As the attending universities span two different time zones, please note that IU is on Eastern Time. Please plan to arrive between 10:15am and 11:00am (Eastern Time). Like past MSW events, the focus is on facilitating interaction and seeding new collaborations between security and privacy researchers. That is, rather than just presenting your past work, we want to help you find new collaborators for your future work and new friends for the rest of your career. At the event, we will provide lunch, as well as coffee and light snacks in both the morning and afternoon.

TIME (EASTERN)EVENTROOM
10:15am–11:00amArrival and Registration
Please aim to arrive on the early side of this window to pick up your badge from Tudor Room on the first floor at IMU. Coffee will be available in the same room.
Tudor Room
11:00am–11:10amWelcome and Overview [slides]
Cici Ling (IU),
Hyungsub Kim (IU), and the MSW 10 Organizers
Tudor Room (in-person) and Tree Suites Rooms (Zoom) based on which lightning talk track you plan to attend
11:15am–12:10pmLightning Talks
Senior Ph.D. students and postdocs will give short lightning talks. We will split into three tracks:

Artificial Intelligence and Machine Learning in Tudor Room (Moderator: Kaiwen Sun, IU)
Alicia Freel (IU): AI Design Choices, Trust, and Accountability
Sabid Bin Habib Pias (IU): Empowering Users: Improving Informed Decision-Making in Human-AI Interaction Through Linguistic and Paralinguistic Interventions of Conversational User Interface
Xinyao Ma (IU): Examining Human-AI Interactions in Security and Privacy
Yaman Yu (UIUC): Safeguarding Youth in the Age of Generative AI: Risks, Benchmarks, and Guardrails
Stuart Aldrich (WashU): Measuring Chatbot User Personalization Through Simulation
Arman Behnam (IIT): Measure-Theoretic Anti-Causal Representation Learning

Systems Security in Walnut (Moderator: Hyungsub Kim, IU)
Mohammad Al-Eiadeh (Purdue): Automated Forecasting of Security Resource Allocation in Cyber-Physical Systems Modeled as Attack Graphs
Tianyu Zhang (UIUC): FairZK: A Scalable System to Prove Machine Learning Fairness in Zero-Knowledge
Wenxuan Shi (Northwestern): Automating Bug Discovery and Patching: Insights from DARPA AIxCC
Jiwon Kim (Purdue): Securing Intent-Based Networking
Doguhan Yeke (Purdue): Automated Discovery of Semantic Attacks in Multi-Robot Navigation Systems
Siddique Abubakr Muntaka (UCincinnati): Resilience of Anonymous Networks: A Computational Analysis of I2P

Usable Security and Privacy in Oak (Moderator: Mary Jean Amon, IU)
Fares Alharbi (IU): CMPs in the Mobile Apps
Thomas Synaepa-Addison (UCincinnati): Privacy at Risk? Analyzing Permissions in Crisis Apps
Cristina Bosco (IU): Digital Technologies and Reproductice Care
Nick Abegg (IU): Sociotechnical Complexities of Privacy in the Home
Dalya Manatova (IU): Measuring and Manipulating Communities in Illicit Online Ecosystems
Lu Xian (UMich): Transparent personal data risk governance
Jennifer Vander Loop (DePaul): Debunk-It-Yourself: Health Professionals' Strategies for Responding to Misinformation on TikTok
Farnaz Asrari (IU): Evaluating the Trust in the Cyber Trust Mark
Tudor Room, Walnut, Oak
12:15pm–1:00pmBreakout Discussion Sessions
We will have different rooms, each representing a clustering around a research topic and with the discussion led by the moderator(s) listed below. We hope for these discussions to spread awareness about each other's research and especially to seed future collaborations.

Generative AI / Large Language Models in Tudor Room
   
 Mohammed Abuhamad (Loyola)
Machine Learning / Artificial Intelligence in Oak
   
 Binghui Wang (IIT)
 Zahra Ghodsi (Purdue)
Systems Security in Tudor Room
   
 Xiaoguang Wang (UIC)
Privacy-Enhancing Technologies / Usable Security / Human-computer interaction in Tudor Room
   
 Tatiana Ringenberg (Purdue)
 Renkai Ma (UCincinnati)
 Kaiwen Sun (IU)
Software Security in Persimmon
   
 Venkat Venkatakrishnan (UIC)

Network and Communications Security in Maple
   
 Mustafa Abdallah (Purdue)
 Nikita Borisov (UIUC)
Web Security in Sassafra
   
 Umar Iqbal (WashU)
 Sid Stamm (Rose-Hulman)
Mobile, Embedded Systems, and IoT Security in Walnut
   
 Luyi Xing (UIUC)
Cryptography and Blockchain in Redbud
   
 Alexander Block (UIC)
See per-session locations on the left
1:00pm–2:00pmLunch With Structured Meetings
Lunch (buffet) will be provided in Tudor Room. Faculty members have been pre-assigned to tables, each with various themes. Student attendees should choose a table for lunch based on the theme. See this sheet that describes the theme, faculty moderators, and table number.
Get food in Tudor Room and then head to a table based on your interest (students) or where you were assigned (faculty).
2:00pm–2:30pmPoster Session
A total of 26 students will present posters of their works.
Tudor Room
2:30pm–3:10pmKeynote: Lessons learned from two decades of social media abuse research – what lies ahead?
Gianluca Stringhini
Gianluca Stringhini, Boston University

Since their inception, online social networks have been fertile ground for abuse. In this talk, I revisit two decades of research by my group on these topics, providing an overview of our work in understanding and mitigating important problems like spam, influence campaigns, coordinated online harassment, and algorithmic interventions. Along the way, I will distill important lessons that I learned and that can help other researchers who start approaching the field. I will then talk about the challenges that lie ahead for the field of social network security.

Gianluca Stringhini is an Associate Professor in the Electrical and Computer Engineering Department at Boston University, holding affiliate appointments in the Computer Science Department and in the Faculty of Computing and Data Sciences. In his research Gianluca applies a data-driven approach to better understand malicious activity on the Internet. Through the collection and analysis of large-scale datasets, he develops novel and robust mitigation techniques to make the Internet a safer place. Over the years, Gianluca has worked on understanding and mitigating malicious activities like malware, online fraud, influence operations, and coordinated online harassment. He received multiple prizes including an NSF CAREER Award in 2020, and his research won multiple Best Paper Awards. Gianluca has published over 150 peer reviewed papers including several in top computer security conferences like IEEE Security and Privacy, CCS, NDSS, and USENIX Security, as well as top measurement, HCI, and Web conferences such as IMC, ICWSM, CHI, CSCW, and WWW.
Tudor Room (no livecast; come to the main room)
3:15pm–3:35pmCoffee Break
We will provide coffee and light snacks.
Tudor Room
3:40pm–4:30pmSpeed Advising
Our popular speed advising sessions enable students to meet for 10 minutes each with faculty and staff from other universities. Mentors will stay in place, and students will come to them. Speed advising assignments are now available (but are subject to change).
See the assignments and room locations. If you are not participating, please keep networking in the hallway.
4:35pm‐5:20pmPanel Discussion: Security Research in Academia vs. Real-World Security: The Tension between Novelty and Practicality
Tudor Room (no livecast; come to the main room)
5:25pm–6:00pmStudent/Postdoc AMA and MSW Faculty Town Hall
Current students and postdocs will have a no-faculty-allowed AMA ("ask-me-anything") session in Tudor Room while faculty and staff will convene separately in Oak Room for a town hall on the future of security and privacy research in the Midwest.

Albert Yu
Purdue

Doguhan Yeke
Purdue

Jiwon Kim
Purdue

Kaiyuan Zhang
Purdue

Ziqi Zhang
UIUC
Students/postdocs in Tudor Room; faculty/staff in Oak Room
6:00pm–6:10pmClosing Remarks [slides]
Cici Ling (IU),
Hyungsub Kim (IU), and the MSW 10 Organizing Committee
Tudor Room