Last updated: Monday, September 22, 2025, 2:00pm
Below, please find the agenda for MSW 10 on Saturday, September 20th, 2025. All events will be held at Indiana University Bloomington, specifically at the Indiana Memorial Union (IMU, 900 E. 7th Street, Bloomington, IN 47405, Google Maps).
As the attending universities span two different time zones, please note that IU is on Eastern Time. Please plan to arrive between 10:15am and 11:00am (Eastern Time). Like past MSW events, the focus is on facilitating interaction and seeding new collaborations between security and privacy researchers. That is, rather than just presenting your past work, we want to help you find new collaborators for your future work and new friends for the rest of your career. At the event, we will provide lunch, as well as coffee and light snacks in both the morning and afternoon.
| TIME (EASTERN) | EVENT | ROOM |
|---|---|---|
| 10:15am–11:00am | Arrival and Registration Please aim to arrive on the early side of this window to pick up your badge from Tudor Room on the first floor at IMU. Coffee will be available in the same room. | Tudor Room |
| 11:00am–11:10am | Welcome and Overview [slides]![]() ![]() | Tudor Room (in-person) and Tree Suites Rooms (Zoom) based on which lightning talk track you plan to attend |
| 11:15am–12:10pm | Lightning Talks Senior Ph.D. students and postdocs will give short lightning talks. We will split into three tracks: Artificial Intelligence and Machine Learning in Tudor Room (Moderator: Kaiwen Sun, IU) • Alicia Freel (IU): AI Design Choices, Trust, and Accountability • Sabid Bin Habib Pias (IU): Empowering Users: Improving Informed Decision-Making in Human-AI Interaction Through Linguistic and Paralinguistic Interventions of Conversational User Interface • Xinyao Ma (IU): Examining Human-AI Interactions in Security and Privacy • Yaman Yu (UIUC): Safeguarding Youth in the Age of Generative AI: Risks, Benchmarks, and Guardrails • Stuart Aldrich (WashU): Measuring Chatbot User Personalization Through Simulation • Arman Behnam (IIT): Measure-Theoretic Anti-Causal Representation Learning Systems Security in Walnut (Moderator: Hyungsub Kim, IU) • Mohammad Al-Eiadeh (Purdue): Automated Forecasting of Security Resource Allocation in Cyber-Physical Systems Modeled as Attack Graphs • Tianyu Zhang (UIUC): FairZK: A Scalable System to Prove Machine Learning Fairness in Zero-Knowledge • Wenxuan Shi (Northwestern): Automating Bug Discovery and Patching: Insights from DARPA AIxCC • Jiwon Kim (Purdue): Securing Intent-Based Networking • Doguhan Yeke (Purdue): Automated Discovery of Semantic Attacks in Multi-Robot Navigation Systems • Siddique Abubakr Muntaka (UCincinnati): Resilience of Anonymous Networks: A Computational Analysis of I2P Usable Security and Privacy in Oak (Moderator: Mary Jean Amon, IU) • Fares Alharbi (IU): CMPs in the Mobile Apps • Thomas Synaepa-Addison (UCincinnati): Privacy at Risk? Analyzing Permissions in Crisis Apps • Cristina Bosco (IU): Digital Technologies and Reproductice Care • Nick Abegg (IU): Sociotechnical Complexities of Privacy in the Home • Dalya Manatova (IU): Measuring and Manipulating Communities in Illicit Online Ecosystems • Lu Xian (UMich): Transparent personal data risk governance • Jennifer Vander Loop (DePaul): Debunk-It-Yourself: Health Professionals' Strategies for Responding to Misinformation on TikTok • Farnaz Asrari (IU): Evaluating the Trust in the Cyber Trust Mark | Tudor Room, Walnut, Oak |
| 12:15pm–1:00pm | Breakout Discussion Sessions We will have different rooms, each representing a clustering around a research topic and with the discussion led by the moderator(s) listed below. We hope for these discussions to spread awareness about each other's research and especially to seed future collaborations. • Generative AI / Large Language Models in Tudor Room ![]() • Machine Learning / Artificial Intelligence in Oak ![]() ![]() • Systems Security in Tudor Room ![]() • Privacy-Enhancing Technologies / Usable Security / Human-computer interaction in Tudor Room ![]() ![]() • Software Security in Persimmon ![]() • Network and Communications Security in Maple ![]() ![]() • Web Security in Sassafra ![]() ![]() • Mobile, Embedded Systems, and IoT Security in Walnut ![]() • Cryptography and Blockchain in Redbud ![]() | See per-session locations on the left |
| 1:00pm–2:00pm | Lunch With Structured Meetings Lunch (buffet) will be provided in Tudor Room. Faculty members have been pre-assigned to tables, each with various themes. Student attendees should choose a table for lunch based on the theme. See this sheet that describes the theme, faculty moderators, and table number. | Get food in Tudor Room and then head to a table based on your interest (students) or where you were assigned (faculty). |
| 2:00pm–2:30pm | Poster Session A total of 26 students will present posters of their works. | Tudor Room |
| 2:30pm–3:10pm | Keynote: Lessons learned from two decades of social media abuse research – what lies ahead?
![]() Gianluca Stringhini, Boston University Since their inception, online social networks have been fertile ground for abuse. In this talk, I revisit two decades of research by my group on these topics, providing an overview of our work in understanding and mitigating important problems like spam, influence campaigns, coordinated online harassment, and algorithmic interventions. Along the way, I will distill important lessons that I learned and that can help other researchers who start approaching the field. I will then talk about the challenges that lie ahead for the field of social network security. Gianluca Stringhini is an Associate Professor in the Electrical and Computer Engineering Department at Boston University, holding affiliate appointments in the Computer Science Department and in the Faculty of Computing and Data Sciences. In his research Gianluca applies a data-driven approach to better understand malicious activity on the Internet. Through the collection and analysis of large-scale datasets, he develops novel and robust mitigation techniques to make the Internet a safer place. Over the years, Gianluca has worked on understanding and mitigating malicious activities like malware, online fraud, influence operations, and coordinated online harassment. He received multiple prizes including an NSF CAREER Award in 2020, and his research won multiple Best Paper Awards. Gianluca has published over 150 peer reviewed papers including several in top computer security conferences like IEEE Security and Privacy, CCS, NDSS, and USENIX Security, as well as top measurement, HCI, and Web conferences such as IMC, ICWSM, CHI, CSCW, and WWW. | Tudor Room (no livecast; come to the main room) |
| 3:15pm–3:35pm | Coffee Break We will provide coffee and light snacks. | Tudor Room |
| 3:40pm–4:30pm | Speed Advising Our popular speed advising sessions enable students to meet for 10 minutes each with faculty and staff from other universities. Mentors will stay in place, and students will come to them. Speed advising assignments are now available (but are subject to change). | See the assignments and room locations. If you are not participating, please keep networking in the hallway. |
| 4:35pm‐5:20pm | Panel Discussion: Security Research in Academia vs. Real-World Security: The Tension between Novelty and Practicality | Tudor Room (no livecast; come to the main room) |
| 5:25pm–6:00pm | Student/Postdoc AMA and MSW Faculty Town Hall Current students and postdocs will have a no-faculty-allowed AMA ("ask-me-anything") session in Tudor Room while faculty and staff will convene separately in Oak Room for a town hall on the future of security and privacy research in the Midwest. | Students/postdocs in Tudor Room; faculty/staff in Oak Room |
| 6:00pm–6:10pm | Closing Remarks [slides]![]() ![]() | Tudor Room |