2018 Hot Topics in the Science of Security (HoTSoS): Accepted Posters

The posters presented at HoTSoS 2018 are listed below. Posters relating to a specific Science of Security Hard Problem have the relevant icon following the title. Please see the legend to the right.

A COMPARATIVE ANALYSIS OF MANUAL METHODS FOR ANALYZING SECURITY REQUIREMENTS IN REGULATORY DOCUMENTS
Sarah Elder and Anna Mattapallil
North Carolina State University

AN EXPERT-BASED BIBLIOMETRIC FOR A SCIENCE OF SECURITY
Lindsey McGowen and Angela Stoica
North Carolina State University

CRYPTOGRAPHY IN A POST-QUANTUM WORLD
Katharine Ahrens
North Carolina State University

DETECTING MONITOR COMPROMISE USING EVIDENTIAL REASONING
Uttam Thakore
University of Illinois at Urbana–Champaign

ETHICS, VALUES AND PERSONAL AGENTS
Nirav Ajmeri
North Carolina State University

 

EXPLORING THE RASPBERRY PI FOR DATA SUMMARIZATION IN WIRELESS SENSOR NETWORKS
Andres Alejos, Matthew Ball, Conner Eckert, Michael Ma, Hayden Ward, Peter Hanlon, and Suzanne J. Matthews
USMA

HOURGLASS-SHAPED ARCHITECTURE FOR MODEL-BASED DEVELOPMENT OF SAFE AND SECURE CYBER-PHYSICAL SYSTEMS
Muhammad Umer Tariq and Marilyn Wolf
GATech

HOW BAD IS IT, REALLY? AN ANALYSIS OF SEVERITY SCORES FOR VULNERABILITIES
Christopher Theisen and Laurie Williams
North Carolina State University

INDIRECT CYBER ATTACKS BY PERTURBATION OF ENVIRONMENT CONTROL: A DATA-DRIVEN ATTACK MODEL
Keywhan Chung, Zbigniew T. Kalbarczyk, and Ravishankar K. Iyer
University of Illinois at Urbana–Champaign

INTEGRATING HISTORICAL AND REAL-TIME ANOMALY DETECTION TO CREATE A MORE RESILIENT SMART GRID ARCHITECTURE
Spencer Drakontaidis, Michael Stanchi, Gabriel Glazer, Madison Stark, Caleb Clay, Jason Hussey, Nick Barry, Aaron St. Leger, Suzanne J. Matthews
USMA

INVESTIGATING TENSORFLOW FOR AIRPORT FACIAL IDENTIFICATION
Nikolay Shopov, Mingu Jeong, Evin Rude, Brennan Nessaralla, Scott Hutchison, Alexander Mentis, and Suzanne J. Matthews
USMA

QUANTIFYING THE SECURITY EFFECTIVENESS OF NETWORK DIVERSITY
Huashan Chen and Shouhuai Xu
UT, San Antonio

QUANTITATIVE UNDERPINNINGS OF SECURE GRACEFUL DEGRADATION
Ryan Wagner, David Garlan, Matt Fredrikson
Carnegie Mellon University

RANSOMWARE RESEARCH FRAMEWORK
Dan Wolf and Don Goff
Cyber Pack Ventures, Inc.

 

TOWARD EXTRACTION OF SECURITY REQUIREMENTS FROM TEXT
*Hui Guo, †Özgür Kafali, ‡Anne-Liz Jeukeng, *Laurie Williams, *Munindar P. Singh
*North Carolina State University, †University of Kent, ‡University of Florida

UNDERSTANDING PRIVACY CONCERNS OF WHATSAPP USERS IN INDIA
Jayati Dev, Sanchari Das, and Dr. L. Jean Camp
Indiana University Bloomington

USING OBJECT CAPABILITIES AND EFFECTS TO BUILD AN AUTHORITY-SAFE MODULE SYSTEM
*Darya Melicher, *Yangqingwei Shi, †Valerie Zhao, ‡Alex Potanin, and *Jonathan Aldrich
*Carnegie Mellon University, †Wellesley College, ‡Victoria University of Wellingon

WHAT PROPORTION OF VULNERABILITIES CAN BE ATTRIBUTED TO ORDINARY CODING ERRORS?
*Rick Kuhn, †Mohammad Raunak, and *Raghu Kacker
*National Institute of Standards and Technology, †Loyola University