Internetware 2025
Fri 20 - Sun 22 June 2025 Trondheim, Norway
co-located with FSE 2025

Satellite-based cloud computing cybersecurity threats have long posed significant challenges, particularly for satellite-based cloud infrastructure operators. While prior research has partially addressed these issues by mitigating threats and enhancing human response efficiency, this paper proposes a novel AI-Driven Threat Analysis and Response (TAR) framework. The study progresses in three main phases: (1) redefining urgent threats through a novel formula; (2) implementing a triage and analysis framework using augmented Large Language Models (LLMs); and (3) automating incident response via a Security Orchestration, Automation, and Response (SOAR) platform. Our prototype, tested in a simulated public cloud environments using real production threats, demonstrated a 17% improvement in handling low- and medium-urgency threats. Experimental results show our approach achieves 97.8% coverage in automatic threat classification, significantly outperforming traditional manual methods, which achieve 77.8% coverage. With high recall and precision in managing low- and medium-urgency threats, our method enhances manual efficiency through SOAR-enabled automation. Furthermore, our augmented method surpasses the state-of-the-art GPT-4 Turbo model in addressing security threats containing Chinese characters.

Fri 20 Jun

Displayed time zone: Amsterdam, Berlin, Bern, Rome, Stockholm, Vienna change

11:00 - 13:00
Keynote & Session1: Software Vulnerability and Security IResearch Track / Plenary Events at Cosmos 3A
Chair(s): William Chu Tunghai University
11:00
60m
Keynote
Keynote 2: Coding with the Machine: Promises and Perils in AI-Driven Software Engineering
Plenary Events
Leon Moonen Simula Research Laboratory
12:00
15m
Talk
Towards understanding the security issues of Python programs
Research Track
Hongcheng Fan Nanjing University, di liu Jiangsu Police Institute, Jielun Wu Nanjing University, Yang Feng Nanjing University, Qingkai Shi Nanjing University, Baowen Xu Nanjing University
12:15
15m
Talk
A Novel LLM Approach of Cybersecurity Threat Analysis and Response
Research Track
TIAN HU Institute of Information Engineering, Chinese Academy of Sciences;School of Cyber Security, University of Chinese Academy of Sciences, Shangyuan Zhuang Institute of Information Engineering, Chinese Academy of Sciences;School of Cyber Security, University of Chinese Academy of Sciences, zhaorui Guo Institute of Information Engineering, Chinese Academy of Sciences;School of Cyber Security, University of Chinese Academy of Sciences, Jiyan Sun Institute of Information Engineering, Chinese Academy of Sciences,School of Cyber Security, University of Chinese Academy of Sciences, Yinlong Liu Institute of Information Engineering, Chinese Academy of Sciences,School of Cyber Security, University of Chinese Academy of Sciences, Wei Ma Institute of Information Engineering, Chinese Academy of Sciences;School of Cyber Security, University of Chinese Academy of Sciences, Hongchao Wang Institute of Information Engineering, Chinese Academy of Sciences;School of Cyber Security, University of Chinese Academy of Sciences, zhaolingfeng Innovation Academy for Microsatellites of Chinese Academy of Science, zhangxiaojie Innovation Academy for Microsatellites of Chinese Academy of Science
12:30
15m
Talk
Measuring and Explaining the Effects of Android App Transformations in Online Malware Detection
Research Track
Guozhu Meng Institute of Information Engineering, Chinese Academy of Sciences, Zhixiu Guo Institute of Information Engineering, Chinese Academy of Sciences, China, Xiaodong Zhang University of Chinese Academy of Science, Haoyu Wang Huazhong University of Science and Technology, Kai Chen Institute of Information Engineering at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Yang Liu Nanyang Technological University
Pre-print
12:45
15m
Talk
Leveraging Visible Widget Sizes for Detecting Repackaged Android Apps
Research Track
Jun Ma Nanjing University, Weixiang Huang Nanjing University, Chun Cao Nanjing University
Pre-print

Information for Participants
Fri 20 Jun 2025 11:00 - 13:00 at Cosmos 3A - Keynote & Session1: Software Vulnerability and Security I Chair(s): William Chu
Info for room Cosmos 3A:

Cosmos 3A is the first room in the Cosmos 3 wing.

When facing the main Cosmos Hall, access to the Cosmos 3 wing is on the left, close to the stairs. The area is accessed through a large door with the number “3”, which will stay open during the event.