Hot Topics in the Science of Security (HotSoS)

to
332 people attending
HoTSoS is a research event centered on the Science of Security, which aims to address the fundamental problems of security in a principled manner. Registration is open at https://cps-vo.org/group/hotsos/registration

Proudly Supported By

Schedule

· Sessions
Opening Remarks & Morning Keynote Presentation: Access Control Verification for Everyone
Adam Tagert
Adam Tagert
· Networking
Break / Networking
What talk are you most looking forward to?
· Sessions
Paper Session 1: CPS and Industrial Control
Presentations from: Himanshu Neema, Ali Ozdagli, Jairo Giraldo, and Bradley Potteiger
Andrew Gacek Ali I Ozdagli Alvaro Cardenas Himanshu Neema Brad Potteiger
· Networking
Break / Networking
What topic needs more research?
· Sessions
Works in Progress (WiP) Session 1
WiP discussions with Sohaib Kiani and Michael Bechtel
Sohaib Kiani Michael Bechtel
· Networking
Break / Networking
What is a concrete suggestion to grow our community?
· Sessions
Poster Session: Lightning Presentations
Poster lightning presentations followed by breakout discussion groups
· Sessions
Keynote Presentation: Is Hardware Root of Trust hard to do, and Trustworthy?
Lyle Paczkowski
· Networking
Break / Networking
· Sessions
Paper Session 2: Modeling
Izzat Alsmadi Eric D. Vugrin Raunak Shakya Sarah Rajtmajer
· Networking
Break / Networking
· Sessions
Works in Progress (WiP) Session 2
WiP discussions with Hao Xue and Ryan Karl
Hao Xue Ryan Karl
· Networking
Break / Networking
· Sessions
Keynote Presentation: Trust Engineering with Cryptographic Protocols
Joshua Guttman
· Sessions
Keynote Presentation: Evaluating Fuzz Testing (and other technologies)
Michael Hicks
· Networking
Break / Networking
· Sessions
Paper Session 3: Systems
Sohaib Kiani Chandra Sharma Li Li
· Networking
Break / Networking
· Sessions
Works in Progress (WiP) Session 3
WiP discussions with Tsion Yimer and Sana Awan
Tsion Yimer Sana Awan
· Networking
Break / Networking
· Sessions
Announcement of Winners & Closing Remarks

Speakers

Sohaib Kiani
Sohaib Kiani

University of Kansas

Sana Awan
Sana Awan

University of Kansas

Tsion Yimer
Tsion Yimer

Morgan State University

Ryan Karl
Ryan Karl

University of Notre Dame

Michael Bechtel
Michael Bechtel

University of Kansas

Hao Xue
Hao Xue

University of Kansas

Himanshu Neema
Himanshu Neema

Vanderbilt

Perry Alexander
Perry Alexander

AT&T Foundation Distinguished Professor at The University of Kansas

Li Li
Li Li

Syracuse University

Chandra Sharma
Chandra Sharma

Kansas State University

Michael Hicks
Michael Hicks

University of Maryland / Correct Computation, Inc.

Joshua Guttman
Joshua Guttman

Worcester Polytechnic Institute / MITRE

Sarah Rajtmajer
Sarah Rajtmajer

The Pennsylvania State University

Raunak Shakya
Raunak Shakya

Tennessee Tech

Eric D. Vugrin
Eric D. Vugrin

Sandia

Izzat Alsmadi
Izzat Alsmadi

Texas A&M

Lyle Paczkowski
Lyle Paczkowski

Sprint

Alvaro Cardenas
Alvaro Cardenas

University of California, Santa Cruz

Xenofon Koutsoukos
Xenofon Koutsoukos

Vanderbilt

Ali I Ozdagli
Ali I Ozdagli

Vanderbilt

Andrew Gacek
Andrew Gacek

Amazon

Brad Potteiger
Brad Potteiger

Senior Professional Staff/Embedded Exploitation Researcher at JHU APL

Adam Tagert
Adam Tagert

Science of Security Technical Lead

Tickets

Hosted by

2020 HotSoS Symposium Organizers

We host academic conferences centered around cyber-physical systems, robotics, and the science of security.

Posters

Justin Murphy, Elias T. Brady, Shazibul Islam Shamim, and Akond Rahman

Justin Murphy, Elias T. Brady, Shazibul Islam Shamim, and Akond Rahman

A Curated Dataset of Security Defects in Scientific Software Projects

Raunak Shakya and Akond Rahman

Raunak Shakya and Akond Rahman

A Preliminary Taxonomy of Techniques Used in Software Fuzzing

Kaushik Ayinala, Baek-Young Choi, Sejun Song

Kaushik Ayinala, Baek-Young Choi, Sejun Song

Accelerating Block Propogation in PoW Blockchain Networks with Pipelining and Chunking (PiChu)

Adam Petz

Adam Petz

An Infrastructure for Faithful Execution of Remote Attestation Protocols

Grant Jurgensen, Michael Neises, Perry Alexander

Grant Jurgensen, Michael Neises, Perry Alexander

An seL4-based Architecture for Layered Attestation

Hoang Hai Nguyen

Hoang Hai Nguyen

An Uncertain Graph-based Approach for Cyber-security Risk Assessment

Rebecca Labitt, Danielle Alexandre, Asher Rodriguez, Lauren E. Provost

Rebecca Labitt, Danielle Alexandre, Asher Rodriguez, Lauren E. Provost

Approaches to Ethical Hacking: Expanding Conceptual Frameworks for Research

Conor Gilsenan, Noura Alomar, Andrew Huang, Serge Egelman

Conor Gilsenan, Noura Alomar, Andrew Huang, Serge Egelman

Decentralized Backup and Recovery of TOTP Secrets

Md Rayhanur Rahman, William Enck, Laurie Williams

Md Rayhanur Rahman, William Enck, Laurie Williams

Do Configuration Management Tools Make Systems More Secure? An Empirical Research Plan

Michael Bechtel and Heechul Yun

Michael Bechtel and Heechul Yun

Exploiting DRAM Bank Mapping and HugePages for Effective Denial-of-Service Attacks on Shared Cache in Multicore

Ryan Gabrys, Luis Martinez, Sunny Fugate

Ryan Gabrys, Luis Martinez, Sunny Fugate

How to Swap Instructions Midstream: An Embedding Algorithm for Program Steganography

Khir Henderson and Kevin Kornegay

Khir Henderson and Kevin Kornegay

Improving Architectures for Automating Network Security Using Specification-Based Protocols

Jiani Li, Waseem Abbas, Mudassir Shabbir, Xenofon Koutsoukos

Jiani Li, Waseem Abbas, Mudassir Shabbir, Xenofon Koutsoukos

Resilient Multi-Robot Target Pursuit

Qais Tasali, Nikesh Gyawali, Eugene Y. Vasserman

Qais Tasali, Nikesh Gyawali, Eugene Y. Vasserman

Time Series Anomaly Detection in Medical Break-the-Glass

Nancy Mogire

Nancy Mogire

Tokens of Interaction: Psycho-physiological Signals, A Potential Source of Evidence of Digital Incidents

Olufogorehan Tunde-Onadele, Yuhang Lin, Jingzhu He, Xiaohui Gu

Olufogorehan Tunde-Onadele, Yuhang Lin, Jingzhu He, Xiaohui Gu

Toward Just-in-Time Patching for Containerized Applications

Ryan Karl, Jonathan Takeshita, Taeho Jung

Ryan Karl, Jonathan Takeshita, Taeho Jung

Using Intel SGX to Improve Private Neural Network Training and Inference

M S Raunak, Richard Kuhn, Richard Kogut, Raghu Kacker

M S Raunak, Richard Kuhn, Richard Kogut, Raghu Kacker

Vulnerability Trends in Web Servers and Browsers