HotSoS 2023 Program Agenda

 

TIMES LISTED ARE CDT

PROGRAM AGENDA
 
MONDAY, APRIL 3

0900 - 1000

Networking, log into the platform and chat with other attendees

 
SESSION 1

1000 - 1015

Welcome and Opening Remarks

Adam Tagert (NSA) - General Chair

Nirav Ajmeri (University of Bristol) and Ryan Gabrys (Naval Information Warfare Center) - Program Co-Chairs

Dr. Rita Bush (NSA)

1015 - 1115

KEYNOTE: Sailing the Seas of the Science of Security

Yan Shoshitaishvili (Arizona State University)

1115 - 1130

BREAK

SESSION 2  

1130 - 1230

Best Cybersecurity Paper Competition Invited Talks



Winning Paper: Verifying Hyperproperties with Temporal Logic of Actions (TLA)

Leslie Lamport (Microsoft Research) and Fred B. Schneider (Cornell University)

Honorable Mention: Defensive Technology Use by Political Activists during the Sudanese Revolution

Alaa Daffalla (Cornell University), Lucy Simko (George Washington University), Tadayoshi Kohno (University of Washington), and Alexandru G. Bardas (University of Kansas)

1230 - 1330

 LUNCH & NETWORKING

SESSION 3    

1330 - 1445

Works-Already-Published Session (20 minute talks + 5 minutes Q&A)



Policy Impacts of Statistical Uncertainty and Privacy

Ryan Steed, Terrance Liu, Zhiwei Steven Wu and Alessandro Acquisti



How Does Usable Security (Not) End Up in Software Products? Results From a Qualitative Interview Study

Marco Gutfleisch, Jan H. Klemmer, Niklas Busch, Yasemin Acar, M. Angela Sasse and Sascha Fahl



Robust Deep Reinforcement Learning through Bootstrapped Opportunistic Curriculum

Junlin Wu and Yevgeniy Vorobeychik

1445 - 1530

PANEL: 10 Years of HotSoS / SoS

1530 - 1545

BREAK 

SESSION 4
1545 - 1715 Works-in-Progress Session (45 minute discussions)

WiP titles are not shown in full.




Certifying Safety in Reinforcement Learning under Adversarial Perturbation Attacks

Junlin Wu, Hussein Sibai and Yevgeniy Vorobeychik



Improvement and Evaluation of Resilience of Adaptive Cruise Control Against Spoofing Attacks

Using Intrusion Detection System


Mubark Jedh, Lotfi Ben Othmane and Arun Somani

1715 - 1730

NETWORKING

TUESDAY, APRIL 4

0900 - 1000

Networking, log into the platform and chat with other attendees

 
SESSION 5

1000 - 1115

Works-Already-Published Session (20 minute talks + 5 minutes Q&A)

Sigstore: Software Signing for Everybody

John Speed Meyers, Zack Newman and Santiago Torres-Arias

A Case for Remote Attestation in Programmable Dataplanes

Nik Sultana, Deborah Shands and Vinod Yegneswaran

Towards Practical Application-level Support for Privilege Separation

Nik Sultana, Henry Zhu, Ke Zhong, Zhilei Zheng, Ruijie Mao, Digvijaysinh Chauhan, Stephen Carrasquillo, Junyong Zhao, Lei Shi, Nikos Vasilakis and Boon Thau Loo

1115 - 1200

POSTER SESSION

1200 - 1300

LUNCH

 

SESSION 6  

1300 - 1400

KEYNOTE: Science of Composition is Vital for Science of Security

Neal Ziring (NSA)

1400 - 1445

PANEL: Future of Foundational Research

1445 - 1500

BREAK

 

SESSION 7

1500 - 1630

Works-in-Progress Session (45 minute discussions)

WiP titles are not shown in full.




Towards a Rigorous Approach for Zero Trust in the 5G Core

Marinos Vomvas, Norbert Ludant and Guevara Noubir

Sequential Graph Neural Networks for Source Code Vulnerability Identification

Ammar Ahmed, Anwar Said, Mudassir Shabbir and Xenofon Koutsoukos

1630 - 1645

NETWORKING

 

 

WEDNESDAY, APRIL 5

0900 - 1000

Networking, log into the platform and chat with other attendees

SESSION 8

1000 - 1100

KEYNOTE: The Science of Audio Deepfake Detection

Carrie Gates (Bank of America)

1100 - 1200

Concurrent Panels

Grad Student Panel | Undergraduate Panel

1200 - 1300

.LUNCH

SESSION 9  

1300 - 1415

Works-Already-Published Session (20 minute talks + 5 minutes Q&A)



Resiliency Metrics for Monitoring and Analysis of Cyber-Power Distribution System with IoTs

Partha S. Sarker, Sajan K. Sadanandan and Anurag K. Srivastava

Spatiotemporal G-code modeling for secure FDM-based 3D printing

Muhammad Haris Rais, Ye Li and Irfan Ahmed

Control Logic Forensics Framework using Built-in Decompiler of Engineering Software in Industrial Control Systems

Syed Ali Qasim, Jared Smith and Irfan Ahmed

1415 - 1430

Announcement of Winning Poster | Closing Remarks

 

SYMPOSIUM ADJOURNED