HotSoS 2020 Program Agenda

 

Symposium Timezone: Central Daylight Time (CDT) PRINT-FRIENDLY VERSION

Tuesday | Wednesday | Thursday

TUESDAY, SEPTEMBER 22
1000 - 1015 CDT Opening Remarks & Best Paper Announcement

Symposium Chairs:

Perry Alexander, The University of Kansas

Baek-Young Choi, University of Missouri – Kansas City

Drew Davidson, The University of Kansas



NSA Opening Remarks

 
1015 - 1115 Keynote Presentation: Access Control Verification for Everyone

Andrew Gacek, Amazon Web Services

 
1115 - 1130 BREAK

 
PAPER SESSION 1: CPS and Industrial Control

(20 minutes per paper with 10 minutes of flex in the block)
 
1130 - 1300 CDT Simulation Testbed for Railway Infrastructure Security and Resilience Evaluation

*Himanshu Neema, *Xenofon Koutsoukos, **Bradley Potteiger, CheeYee Tang, and Keith Stouffer

*Vanderbilt University, **Johns Hopkins Applied Physics Laboratory, National Institute of Standards and Technology

 
  @PAD: Adversarial Training of Power Systems Against Denial of Service Attacks

Ali I Ozdagli, Carlos Barreto, and Xenofon Koutsoukos

Vanderbilt University

 
  The More the Merrier: Adding Hidden Measurements for Anomaly Detection and Mitigation in Industrial Control Systems

*Jairo Giraldo, **David Urbina, CheeYee Tang, and ††Alvaro Cardenas

*University of Utah, **University of Texas at Dallas, National Institute of Standards and Technology, ††The University of California, Santa Cruz

 
  RUCKUS: A Cybersecurity Engine for Performing Autonomous Cyber-Physical System Vulnerability Discovery at Scale

Bradley Potteiger, Jacob Mills, Daniel Cohen, and Paul Velez

Johns Hopkins Applied Physics Laboratory

 
 1300 - 1400 BREAK

 
WORKS IN PROGRESS (WiP) SESSION 1  
1400 - 1530 CDT *Sohaib Kiani, *Fengjun Li, **Chao Lan, and *Bo Luo

*University of Kansas, **University of Wyoming
  Jacob Fustos, Michael Bechtel, Heechul Yun

University of Kansas
1530 - 1545 BREAK

 
1545 - 1715 POSTER SESSION

 
WEDNESDAY, SEPTEMBER 23
1000 - 1100 CDT Keynote Presentation: Is Hardware Root of Trust hard to do, and Trustworthy?

Lyle Paczkowski, Sprint

 
1100 - 1115 BREAK

 
PAPER SESSION 2: Modeling

(20 minutes per paper with 10 minutes of flex in the block)
 
1115 - 1245 CDT Exploring Hackers Assets: Topics of Interest as Indicators of Compromise

Mohammad Al-Ramahi, Izzat Alsmadi, and Joshua Davenport

Texas A&M, San Antonio

 
  Cyber Threat Modeling and Validation: Port Scanning and Detection

Eric Vugrin, Jerry Cruz, Christian Reedy, Thomas Tarman, and Ali Pinar

Sandia National Laboratories

 
  Can We Use Software Bug Reports to Identify Vulnerability Discovery Strategies?

Farzana Ahamed Bhuiyan, Raunak Shakya, and Akond Rahman

Tennessee Technological University

 
  Automated Influence and the Challenge of Cognitive Security

Sarah Rajtmajer and Daniel Susser

The Pennsylvania State University

 
1245 - 1345 BREAK

 
WORKS IN PROGRESS (WiP) SESSION 2  
1345 - 1515 CDT *Hao Xue, *Qiaozhi Wang, *Bo Luo, **Chao Lan, *Fengjun Li

*University of Kansas, **University of Wyoming
  Ryan Karl, Jonathan Takeshita, and Taeho Jung

University of Notre Dame
1515 - 1530 BREAK

 
 
1530 - 1630 Keynote Presentation: Trust Engineering via Cryptographic Protocols

Joshua Guttman, Worcester Polytechnic Institute/MITRE

 
THURSDAY, SEPTEMBER 24
1000 - 1100 CDT Keynote Presentation: Evaluating Fuzz Testing (and other technologies)

Michael Hicks, University of Maryland and Correct Computation Inc.

 
1100 - 1115 BREAK

 
PAPER SESSION 3: Systems  
1115 - 1245 CDT Neutralizing Manipulation of Critical Data by Enforcing Data-Instruction Dependency

Chandra Sharma, Nathan Miller, and George Amariucai

Kansas State University

 
  Ghostbusting: Mitigating Spectre with Intraprocess Memory Isolation

Ira Ray Jenkins, Prashant Anantharaman, Rebecca Shapiro, J. Peter Brady, Sergey Bratus, and Sean W. Smith

Dartmouth College

 
  WOLF: Automated Machine Learning Workflow Management for various Applications

*Sohaib Kiani, *Sana Awan, *Fengjun Li, *Bo Luo, and **Jun Huan

*University of Kansas, **StylingAI, Inc.

 
  A Formal Security Analysis of ZigBee (1.0 and 3.0)

*Li Li, **Proyash Podder, and *Endadul Hoque

*Syracuse University, **Florida International University

 
1245 - 1345 BREAK

 
 
WORKS IN PROGRESS (WiP) SESSION 3  
1345 - 1515 CDT Tsion Yimer, Md Tanvir Arafin, and Kevin Kornegay

Morgan State University

 
  Sana Awan, Fengjun Li, Bo Luo

University of Kansas

 
1515 - 1530 BREAK

 
1530 - 1545 Announcement of Winning Poster

Adam Tagert, National Security Agency



Closing Remarks

Perry Alexander

Baek-Young Choi

Drew Davidson

Adam Tagert

 
SYMPOSIUM ADJOURNED