HotSoS 2025 Program Agenda
Times are listed in U.S. Eastern Time
TUESDAY, APRIL 1
SESSION 1
  Networking, log into the platform and chat with other attendees
10:00 - 10:15

Welcome and Opening Remarks 

Adam Doupe (ASU) and Kevin Leach (VU)
Adam Tagert (NSA)
Dave Hogue (Chief, Laboratory for Advanced Cybersecurity Research)

10:15 - 11:15

Keynote: Burning questions in AI security

Joshua Saxe (Meta)

11:15 - 11:30 BREAK
SESSION 2
11:30 - 12:30

Best Cybersecurity Paper Competition Honorable Mention

I Have the (Developer) Power! Supporting Sample Size Estimation, Effect Size Interpretation and Statistical Reporting in Usable Security and Privacy Studies

Anna-Marie Ortloff and Christian Tiefenau (University of Bonn)
Matthew Smith (University of Bonn and Fraunhofer FKIE)

12:30 - 13:30 LUNCH
SESSION 3
13:30 - 14:15

Panel: Future of Foundational Research

Neal Ziring (NSA), Evan Austin (Independent Researcher), Jeff Dickerson (NSA), Bob Kimball (Army) 

14:15 - 14:30 BREAK
14:30 - 15:15

WIP: Assessing the Effects of Source Language on Binary Similarity Tools

Landen Doty and Prasad Kulkarni (The University of Kansas)

Discussant: Fish Wang (ASU)

15:15 - 16:00

WIP: K-ASTRO: Structure-Aware Adaptation of LLMs for Code Vulnerability Detection

Yifan Zhang, Michael Sandborn, Stefan Larson, Yu Huang and Kevin Leach (Vanderbilt University)

Discussant: Alex Kapravelos (NCSU)

SESSION 4
16:00 - 16:10 BREAK
16:10 - 16:35

Concept-ROT: Poisoning Concepts in Large Language Models with Model Editing

Keltin Grimes, Marco Christiani, David Shriver and Marissa Connor (Carnegie Melon University)

16:35 - 17:00

PBP: Post-training Backdoor Purification for Malware Classifiers

Dung Thuy Nguyen, Ngoc Tran, Taylor Johnson, and Kevin Leach (Vanderbilt University)

WEDNESDAY, APRIL 2
SESSION 5
10:00 - 11:00

Keynote: The Complex Science of Cybersecurity

Stephanie Forrest (ASU)

11:00 - 11:15 BREAK
SESSION 6
11:15 - 12:00

Roundtable: Life After Graduate School

Westley Weimer (University of Michigan), Adam Oest (PentaxForums), Jonathan Lacson (NSA), Gaelin Shupe (Battelle)

12:00 - 13:45 POSTER SESSION / LUNCH
SESSION 7
13:45 - 14:30

WIP: An Investigation of Large Language Models and Their Vulnerabilities in Spam Detection

Xiangyang Li and Qiyao Tang (Johns Hopkins University)

Discussant: Arun Viswanath

14:30 - 15:15

WIP: A Human Study of Cognitive Biases in CTF Challenges

Yuwei Yang, Skyler Grandel, Daniel Balasubramanian, Yu Huang and Kevin Leach (Vanderbilt University)

Discussant:  Maverick Woo (CMU)

15:15 - 15:30 BREAK
SESSION 8
15:30 - 16:30

Best Cybersecurity Paper Competition Honorable Mention

Ethical Frameworks and Computer Security Trolley Problems: Foundations for Conversations

Tadayoshi Kohno (University of Washington), Yasemin Acar (Paderborn University and George Washington University), Wulf Loh (Universität Tübingen)

16:30 - 16:40 BREAK
16:40 - 17:05

Assessing AI vs Human-Authored Spear Phishing SMS Attacks: An Empirical Study

Jerson Francia, Derek Hansen, Ben Schooley, Matthew Taylor, Shydra Murray, and Greg Snow (Brigham Young University)

17:05 - 17:30

Interdisciplinary Approaches to Cybervulnerability Impact Assessment for Energy Critical Infrastructure

Andrea Gallardo, Lujo Bauer, and Lorrie Cranor (Carnegie Melon University) 
Robert Erbes and Katya LeBlanc (Idaho National Laboratory)

THURSDAY, APRIL 3
SESSION 9
10:00 - 11:00

Keynote: Solving Real-World Problems is Hard

Chad Spensky (Allthenticate)

11:00 - 11:30

2025 Best Cybersecurity Paper Competition

Welcome by Shavon Donnell (NSA)

Remarks by Dave Hogue (Chief, Laboratory for Advanced Cybersecurity Research)
Remarks by Gil Herrera (Chief of Research)

11:30 - 12:45

Best Cybersecurity Paper Competition Winner

Decoding Trust: Comprehensive Assessment of Trustworthiness in GPT Models

Boxin Wang (NVIDIA), Sanmi Koyejo (Stanford University), Dawn Song (University of California, Berkeley)

12:45 - 13:45 LUNCH
SESSION 10
13:45 - 14:30

WIP: Steerability of Autonomous Cyber-Defense Agents by Meta-Attackers

Luis Burbano and Alvaro Cardenas (U.C. Santa Cruz)
Hampei Sasahara (Institute of Science Tokyo)

Discussant: Daniel Balasubramanian (VU)

14:30 - 15:15

WIP: BareSlice: Extending Arm CCA to Support Bare-Metal Confidential Virtual Machines

Yuxin Hu and Kevin Leach (Vanderbilt University)
Fengwei Zhang (Southern University of Science and Technology)

Discussant: Manuel Egele (Boston University)

15:15 - 15:30 BREAK
SESSION 11
15:30 - 15:55

Post-Quantum Cryptography (PQC) Network Instrument: Measuring PQC Adoption Rates and Identifying Migration Pathways

Phuong Cao (UIUC)

15:55 - 16:20

Deanonymizing Device Identities via Side-channel Attacks in Exclusive-use IoTs & Mitigation

Christopher Ellis, Mohit Kumar Jangid, Shixuan Zhao, and Zhiqiang Lin (The Ohio State University)
Yue Zhang (Drexel University)

16:20 - 16:45

A Grammar-Based Behavioral Distance Measure between Ransomware Variants

H. Van Dyke Parunak (Parallax Advanced Research)

16:45 - 17:15

BinSub: The Simple Essence of Polymorphic Type Inference for Machine Code

Ian Smith (Trail of Bits)

17:15 - 17:30

Announcement of Winning Poster / Closing remarks

Adam Tagert (NSA)

SYMPOSIUM ADJOURNED

 

HoTSoS features a unique session type, the Works in Progress (WIP). This session assists authors in writing high quality research papers by having a community discussion on the research early in the research process. This early feedback enables researchers to adjust on-going research to respond to concerns traditionally raised after the research and paper are completed and it is being peer-reviewed for conferences and journals. This early presentation promotes faster and easier publication.

WIP at HoTSoS