HotSoS 2020 Program Agenda
  PRINT-FRIENDLY VERSION
| MONDAY, SEPTEMBER 21 | ||||
| 1730 - 1930 | Evening Reception at The Burge Union | 1565 Irving Hill Rd. Lawrence, KS | ||
| TUESDAY, SEPTEMBER 22 | ||||
| 0800 - 1730 | Registration | Continental Breakfast (until 0830) | |||
| 0830 - 0845 | Chair's Opening Remarks Symposium Chairs: Perry Alexander, Baek-Young Choi, and Drew Davidson NSA Opening Remarks | |||
| 0845 - 0945 | Keynote Presentation: Access Control Verification for Everyone Andrew Gacek, Amazon Web Services | |||
| 0945 - 1000 | BREAK | |||
| PAPER SESSION 1: CPS and Industrial Control (20 minutes per paper with 10 minutes of flex in the block) | ||||
| 1000 - 1130 | Simulation Testbed for Railway Infrastructure Security and Resilience Evaluation *Himanshu Neema, *Xenofon Koutsoukos, **Bradley Potteiger, and †Cheeyee Tang *Vanderbilt University, **Johns Hopkins Applied Physics Lab, †National Institute of Standards and Technology | |||
| @PAD: Adversarial Training of Power Systems Against Denial of Service Attacks Ali Ozdagli, Carlos Barreto, and Xenofon Koutsoukos Vanderbilt University | ||||
| The More the Merrier: Adding Hidden Measurements for Anomaly Detection and Mitigation in Industrial Control Systems *Jairo Giraldo, **David Urbina, †Cheeyee Tang, and ††Alvaro Cardenas *University of Utah, **University of Texas at Dallas, †National Institute of Standards and Technology, ††The University of California, Santa Cruz | ||||
| RUCKUS: A Cybersecurity Engine for Performing Autonomous Cyber-Physical System Vulnerability Discovery at Scale Bradley Potteiger, Jacob Mills, Daniel Cohen, and Paul Velez Johns Hopkins Applied Physics Lab | ||||
|  | ||||
| 1130 - 1300 | LUNCH | |||
| 1300 - 1400 | Keynote Presentation: Is Hardware Root of Trust hard to do, and Trustworthy? Lyle Paczkowski, Sprint | |||
| 1400 - 1415 | BREAK | |||
| WORKS IN PROGRESS (WiP) SESSION 1 | ||||
| 1415 - 1500 | *Hao Xue, *Qiaozhi Wang, *Bo Lou, **Chao Lan, *Fenjun Li *University of Kansas, **University of Wyoming | |||
| 1500 - 1545 | Jacob Fustos, Heechul Yun University of Kansas | |||
|  | ||||
| 1545 - 1600 | BREAK | |||
| PAPER SESSION 2: Modeling (20 minutes per paper with 10 minutes of flex in the block) | ||||
| 1600 - 1730 | Exploring Hackers Assets: Topics of Interest as Indicators of Compromise Mohammad Alramahi, Izzat Alsmadi, and Joshua Davenport Texas A&M, San Antonio | |||
| Cyber Threat Modeling and Validation: Port Scanning and Detection Eric Vugrin, Jerry Cruz, Christian Reedy, Thomas Tarman, and Ali Pinar Sandia National Laboratories | ||||
| Can We Use Software Bug Reports to Identify Software Vulnerability Strategies Farzana Ahamed Bhuiyan, Raunak Shakya, and Akond Rahman Tennessee Technological University | ||||
| Automated Influence and the Challenge of Cognitive Security Sarah Rajtmajer and Daniel Susser Pennsylvania State University | ||||
|  | ||||
| 1730 - 1900 | POSTER SESSION | |||
| WEDNESDAY, SEPTEMBER 23 | ||||
| 0800 - 1630 | Registration | Contintental Breakfast (until 0830) | |||
| 0830 - 0930 | Keynote Presentation: Trust Engineering with Cryptographic Protocols Joshua Guttman, WPI/MITRE | |||
| 0930 - 0945 | BREAK | |||
| WORKS IN PROGRESS (WiP) SESSION 2 | ||||
| 0945 - 1030 | *Sohaib Kiani, *Fengjun Li, **Chao Lan, and *Bo Luo *University of Kansas, **University of Wyoming | |||
| 1030 - 1115† - - 1222 | Ryan Karl, Jonathan Takeshita, and Taeho Jung University of Notre Dame | |||
|  | ||||
| 1115 - 1130 | BREAK | |||
| 1130 - 1230 | Keynote Presentation: Evaluating Fuzz Testing (and other technologies) Michael Hicks, University of Maryland | |||
| 1230 - 1400 | .LUNCH | |||
| WORKS IN PROGRESS (WiP) SESSION 3 | ||||
| 1400 - 1445 | Tsion Yimer, Md Tanvir Arafin, and Kevin Kornegay Morgan State University | |||
| 1445 - 1530 | Sana Awan, Fenjun Li, Bo Luo University of Kansas | |||
|  | ||||
| 1530 - 1545 | BREAK | |||
| PAPER SESSION 3: Systems | ||||
| 1545 - 1715 | Neutralizing Manipulation of Critical Data by Enforcing Data-Instruction Dependency Chandra Sharma, Nathan Miller, and George Amariucai Kansas State University | |||
| Ghostbusting: Mitigating Spectre with Intraprocess Memory Isolation Ira Jenkins, Prashant Anantharaman, Rebecca Shapiro, J Peter Brady, Sergey Bratus, and Sean Smith Dartmouth College | ||||
| WOLF: Automated Machine Learning Workflow Management Framework for Malware Detection and Other Applications Sohaib Kiani, Sana Awan, Fengjun Li, and Bo Luo University of Kansas | ||||
| A Formal Security Analysis of Zigbee *Li Li, **Proyash Podder, and *Endadul Hoque *Syracuse University, **Florida International University | ||||
|  | ||||
| 1715 - 1730 | Announcement of Winning Paper and Winning Poster Closing Remarks | |||
| SYMPOSIUM ADJOURNED | ||||
 
    