The posters presented at HoTSoS 2018 are listed below. Posters relating to a specific Science of Security Hard Problem have the relevant icon following the title. Please see the legend to the right.
A COMPARATIVE ANALYSIS OF MANUAL METHODS FOR ANALYZING SECURITY REQUIREMENTS IN REGULATORY DOCUMENTS
Sarah Elder and Anna Mattapallil
North Carolina State University
AN EXPERT-BASED BIBLIOMETRIC FOR A SCIENCE OF SECURITY
Lindsey McGowen and Angela Stoica
North Carolina State University
CRYPTOGRAPHY IN A POST-QUANTUM WORLD
Katharine Ahrens
North Carolina State University
DETECTING MONITOR COMPROMISE USING EVIDENTIAL REASONING
Uttam Thakore
University of Illinois at Urbana–Champaign
ETHICS, VALUES AND PERSONAL AGENTS
Nirav Ajmeri
North Carolina State University
EXPLORING THE RASPBERRY PI FOR DATA SUMMARIZATION IN WIRELESS SENSOR NETWORKS
Andres Alejos, Matthew Ball, Conner Eckert, Michael Ma, Hayden Ward, Peter Hanlon, and Suzanne J. Matthews
USMA
HOURGLASS-SHAPED ARCHITECTURE FOR MODEL-BASED DEVELOPMENT OF SAFE AND SECURE CYBER-PHYSICAL SYSTEMS
Muhammad Umer Tariq and Marilyn Wolf
GATech
HOW BAD IS IT, REALLY? AN ANALYSIS OF SEVERITY SCORES FOR VULNERABILITIES
Christopher Theisen and Laurie Williams
North Carolina State University
INDIRECT CYBER ATTACKS BY PERTURBATION OF ENVIRONMENT CONTROL: A DATA-DRIVEN ATTACK MODEL
Keywhan Chung, Zbigniew T. Kalbarczyk, and Ravishankar K. Iyer
University of Illinois at Urbana–Champaign
INTEGRATING HISTORICAL AND REAL-TIME ANOMALY DETECTION TO CREATE A MORE RESILIENT SMART GRID ARCHITECTURE
Spencer Drakontaidis, Michael Stanchi, Gabriel Glazer, Madison Stark, Caleb Clay, Jason Hussey, Nick Barry, Aaron St. Leger, Suzanne J. Matthews
USMA
INVESTIGATING TENSORFLOW FOR AIRPORT FACIAL IDENTIFICATION
Nikolay Shopov, Mingu Jeong, Evin Rude, Brennan Nessaralla, Scott Hutchison, Alexander Mentis, and Suzanne J. Matthews
USMA
QUANTIFYING THE SECURITY EFFECTIVENESS OF NETWORK DIVERSITY
Huashan Chen and Shouhuai Xu
UT, San Antonio
QUANTITATIVE UNDERPINNINGS OF SECURE GRACEFUL DEGRADATION
Ryan Wagner, David Garlan, Matt Fredrikson
Carnegie Mellon University
RANSOMWARE RESEARCH FRAMEWORK
Dan Wolf and Don Goff
Cyber Pack Ventures, Inc.
TOWARD EXTRACTION OF SECURITY REQUIREMENTS FROM TEXT
*Hui Guo, †Özgür Kafali, ‡Anne-Liz Jeukeng, *Laurie Williams, *Munindar P. Singh
*North Carolina State University, †University of Kent, ‡University of Florida
UNDERSTANDING PRIVACY CONCERNS OF WHATSAPP USERS IN INDIA
Jayati Dev, Sanchari Das, and Dr. L. Jean Camp
Indiana University Bloomington
USING OBJECT CAPABILITIES AND EFFECTS TO BUILD AN AUTHORITY-SAFE MODULE SYSTEM
*Darya Melicher, *Yangqingwei Shi, †Valerie Zhao, ‡Alex Potanin, and *Jonathan Aldrich
*Carnegie Mellon University, †Wellesley College, ‡Victoria University of Wellingon
WHAT PROPORTION OF VULNERABILITIES CAN BE ATTRIBUTED TO ORDINARY CODING ERRORS?
*Rick Kuhn, †Mohammad Raunak, and *Raghu Kacker
*National Institute of Standards and Technology, †Loyola University