Skip to content

Hot Topics in the Science of Security (HotSoS)

Calendar icon to

Proudly supported by

Speakers

Adam Tagert

Science of Security Technical Lead

Brad Potteiger

Senior Professional Staff/Embedded Exploitation Researcher at JHU APL

Andrew Gacek

Amazon

Ali I Ozdagli

Vanderbilt

Xenofon Koutsoukos

Vanderbilt

Álvaro Cárdenas

University of California, Santa Cruz

Lyle Paczkowski

Sprint

Izzat Alsmadi

Texas A&M

Eric D. Vugrin

Sandia

Raunak Shakya

Tennessee Tech

Joshua Guttman

Worcester Polytechnic Institute / MITRE

Sarah Rajtmajer

The Pennsylvania State University

Chandra Sharma

Kansas State University

Michael Hicks

University of Maryland / Correct Computation, Inc.

Li Li

Syracuse University

Perry Alexander

AT&T Foundation Distinguished Professor at The University of Kansas

Hao Xue

University of Kansas

Tsion Yimer

Morgan State University

Ryan Karl

University of Notre Dame

Himanshu Neema

Vanderbilt

Michael Bechtel

University of Kansas

Sana Awan

University of Kansas

Sohaib Kiani

University of Kansas

The event is over

Hosted by

HoTSoS Organizers

Posters

Justin Murphy, Elias T. Brady, Shazibul Islam Shamim, and Akond Rahman

A Curated Dataset of Security Defects in Scientific Software Projects

Raunak Shakya and Akond Rahman

A Preliminary Taxonomy of Techniques Used in Software Fuzzing

Kaushik Ayinala, Baek-Young Choi, Sejun Song

Accelerating Block Propogation in PoW Blockchain Networks with Pipelining and Chunking (PiChu)

Adam Petz

An Infrastructure for Faithful Execution of Remote Attestation Protocols

Grant Jurgensen, Michael Neises, Perry Alexander

An seL4-based Architecture for Layered Attestation

Hoang Hai Nguyen

An Uncertain Graph-based Approach for Cyber-security Risk Assessment

Rebecca Labitt, Danielle Alexandre, Asher Rodriguez, Lauren E. Provost

Approaches to Ethical Hacking: Expanding Conceptual Frameworks for Research

Conor Gilsenan, Noura Alomar, Andrew Huang, Serge Egelman

Decentralized Backup and Recovery of TOTP Secrets

Md Rayhanur Rahman, William Enck, Laurie Williams

Do Configuration Management Tools Make Systems More Secure? An Empirical Research Plan

Michael Bechtel and Heechul Yun

Exploiting DRAM Bank Mapping and HugePages for Effective Denial-of-Service Attacks on Shared Cache in Multicore

Ryan Gabrys, Luis Martinez, Sunny Fugate

How to Swap Instructions Midstream: An Embedding Algorithm for Program Steganography

Khir Henderson and Kevin Kornegay

Improving Architectures for Automating Network Security Using Specification-Based Protocols

Jiani Li, Waseem Abbas, Mudassir Shabbir, Xenofon Koutsoukos

Resilient Multi-Robot Target Pursuit

Qais Tasali, Nikesh Gyawali, Eugene Y. Vasserman

Time Series Anomaly Detection in Medical Break-the-Glass

Nancy Mogire

Tokens of Interaction: Psycho-physiological Signals, A Potential Source of Evidence of Digital Incidents

Olufogorehan Tunde-Onadele, Yuhang Lin, Jingzhu He, Xiaohui Gu

Toward Just-in-Time Patching for Containerized Applications

Ryan Karl, Jonathan Takeshita, Taeho Jung

Using Intel SGX to Improve Private Neural Network Training and Inference

M S Raunak, Richard Kuhn, Richard Kogut, Raghu Kacker

Vulnerability Trends in Web Servers and Browsers