Hot Topics in the Science of Security (HotSoS)
Proudly supported by
Speakers
Senior Professional Staff/Embedded Exploitation Researcher at JHU APL
Amazon
Vanderbilt
Vanderbilt
Texas A&M
Sandia
Tennessee Tech
The Pennsylvania State University
Kansas State University
Syracuse University
University of Kansas
University of Notre Dame
University of Kansas
University of Kansas
University of Kansas
Posters
Justin Murphy, Elias T. Brady, Shazibul Islam Shamim, and Akond Rahman
A Curated Dataset of Security Defects in Scientific Software Projects
Raunak Shakya and Akond Rahman
A Preliminary Taxonomy of Techniques Used in Software Fuzzing
Kaushik Ayinala, Baek-Young Choi, Sejun Song
Accelerating Block Propogation in PoW Blockchain Networks with Pipelining and Chunking (PiChu)
Adam Petz
An Infrastructure for Faithful Execution of Remote Attestation Protocols
Grant Jurgensen, Michael Neises, Perry Alexander
An seL4-based Architecture for Layered Attestation
Hoang Hai Nguyen
An Uncertain Graph-based Approach for Cyber-security Risk Assessment
Rebecca Labitt, Danielle Alexandre, Asher Rodriguez, Lauren E. Provost
Approaches to Ethical Hacking: Expanding Conceptual Frameworks for Research
Conor Gilsenan, Noura Alomar, Andrew Huang, Serge Egelman
Decentralized Backup and Recovery of TOTP Secrets
Md Rayhanur Rahman, William Enck, Laurie Williams
Do Configuration Management Tools Make Systems More Secure? An Empirical Research Plan
Michael Bechtel and Heechul Yun
Exploiting DRAM Bank Mapping and HugePages for Effective Denial-of-Service Attacks on Shared Cache in Multicore
Ryan Gabrys, Luis Martinez, Sunny Fugate
How to Swap Instructions Midstream: An Embedding Algorithm for Program Steganography
Khir Henderson and Kevin Kornegay
Improving Architectures for Automating Network Security Using Specification-Based Protocols
Jiani Li, Waseem Abbas, Mudassir Shabbir, Xenofon Koutsoukos
Resilient Multi-Robot Target Pursuit
Qais Tasali, Nikesh Gyawali, Eugene Y. Vasserman
Time Series Anomaly Detection in Medical Break-the-Glass
Nancy Mogire
Tokens of Interaction: Psycho-physiological Signals, A Potential Source of Evidence of Digital Incidents
Olufogorehan Tunde-Onadele, Yuhang Lin, Jingzhu He, Xiaohui Gu
Toward Just-in-Time Patching for Containerized Applications
Ryan Karl, Jonathan Takeshita, Taeho Jung
Using Intel SGX to Improve Private Neural Network Training and Inference
M S Raunak, Richard Kuhn, Richard Kogut, Raghu Kacker
Vulnerability Trends in Web Servers and Browsers