HotSoS 2021 Program Agenda
TIMES ARE LISTED IN EDT 2021 (2022 Forthcoming) |
PRINT-FRIENDLY VERSIONS BY TIME ZONE: EDT | CDT | MDT | PDT | CEST | BST |
|||
MONDAY, APRIL 12 | ||||
1200 - 1800 | Check out the virtual platforms and test your settings |
|||
TUESDAY, APRIL 13 | ||||
0900 - 0930 | Networking, log into the platform and chat with other attendees |
|||
0930 - 1000 | Welcome and Opening Remarks General Chair: Adam Tagert (National Security Agency) Program Co-Chairs: Özgür Kafali (University of Kent), Ahmad Ridley (National Security Agency) |
|||
1000 - 1100 | KEYNOTE PRESENTATION Securing Data in Clouds: Making the Most of Trusted Hardware Nick Felts National Security Agency |
|||
1100 - 1115 | BREAK / NETWORKING ON GATHER |
|||
SESSION 1: Cloud Security | ||||
1115 - 1140 | Formal Foundations for Intel SGX Data Center Attestation Primitives Muhammed Usama Sardar, Rasha Faqeh, Christof Fetzer TU Dresden |
|||
1140 - 1205 | A Secure and Formally Verified Linux KVM Hypervisor Shih-Wei Li, Xupeng Li, Ronghui Gu, Jason Nieh, John Zhuang Hui Columbia University |
|||
1205 - 1250 | Work-In-Progress Discussion Session: JavaScript Attacks Ross Copeland and Drew Davidson University of Kansas WiP Discussant: Ahmad Ridley, National Security Agency |
|||
|
||||
1250 - 1400 | LUNCH & NETWORKING Preview posters in Gather |
|||
SESSION 2: To Err is to Be Human | ||||
1400 - 1445 | Work-In-Progress Discussion Session: Election Security *Natalie Scala, *Josh Dehlinger, **Paul L. Goethals *Towson University, **USMA WiP Discussant: Kami Vaniea, University of Edinburgh |
|||
1445 - 1530 | Work-In-Progress Discussion Session: Phishing *Dennis Roellke, *Salvatore Stolfo, *George Litvinov, **Shlomo Herschkopp, †Mark Seiden *Columbia University, **Allure Security, †Internet Archive WiP Discussant: Kimberly Ferguson-Walter, Department of Defense |
|||
|
||||
1530 - 1600 | BREAK |
|||
SESSION 3: Student Presentations | ||||
1600 - 1620 | Analysis of the Impact of Varying Statistical RF Fingerprint Features on IoT Device Classification Asia Mason Morgan State University |
|||
1620 - 1640 | MAZE: A Secure Cloud Storage Service Using Moving Target Defense and Secure Shell Protocol (SSH) Tunneling Vasco Xu and Sherif Khattab University of Pittsburgh |
|||
1640 - 1700 | Performance improvement of anomaly detection on IoT network Latha Suryavanshi Karakos and Jumoke Ladeji-Osias Morgan State University |
|||
1700 - 1720 | Uighurs and Facial Recognition Technology Camille Catania University of Kent |
|||
1720 - 1740 | Vulnerability Evaluation and Prioritization for Cyber Resilient Systems Omer Keskin, Nick Gannon, Brian Lopez, and Unal Tatar University at Albany |
|||
|
||||
1740 - 1900 | The Student Presentation Happy Hour Location: Gather Town |
|||
WEDNESDAY, APRIL 14 | ||||
0930 - 0935 | Welcome Adam Tagert National Security Agency |
|||
0935 - 1030 | KEYNOTE PRESENTATION Spectre Attacks: Exploiting Speculative Execution - and why the heck is the computer speculating anyway? Werner Haas Cyberus Technology |
|||
1030 - 1045 | BREAK |
|||
SESSION 4: Flanking the Defense | ||||
1045 - 1110 | Leveraging EM Side-Channel Information to Detect Rowhammer Attacks *Zhenkai Zhang, */**Zihao Zhan, **Daniel Balasubramanian, †Bo Li, **Peter Volgyesi, **Xenofon Koutsoukos *Texas Tech University, **Vanderbilt, University, †University of Illinois at Urbana-Champaign |
|||
1110 - 1135 | Counting Broken Links: A Quant's View of Software Supply Chain Security Dan Geer, Bentz Tozer, John Speed Meyers In-Q-Tel |
|||
1135 - 1220† - - 1222 | Work-In-Progress Discussion Session: Device Profiling *Tushar Jois, **Claudia Moncaliano, †Khir Henderson, *Aviel D. Rubin *Johns Hopkins University, **JHU APL, †Morgan State University WiP Discussant: Stephanie Polczynski, Laboratory for Advanced Cybersecurity Research, Research Directorate |
|||
|
||||
1220 - 1300 | LUNCH & NETWORKING |
|||
1300 - 1400 | KEYNOTE PRESENTATION Why rigorous underpinnings for cyber security education and training matter? Experiences from CyBOK: the Cyber Security Body of Knowledge Awais Rashid University of Bristol |
|||
1400 - 1415 | .BREAK |
|||
SESSION 5: Humans aren't only Users | ||||
1415 - 1440 | Can Advanced Type Systems Be Usable? An Empirical Study of Ownership, Assets, and Typestate in Obsidian *Michael Coblenz, **Jonathan Aldrich, **Brad Myers, **Joshua Sunshine *University of Maryland, **Carnegie Mellon University |
|||
1440 - 1505 | Adversarial Thinking - Teaching Students to Think Like a Hacker Frank Katz Georgia Southern University |
|||
1505 - 1550 | Work-In-Progress Discussion Session: Practices in Software Development *Leysan Nurgalieva, **Alisa Frik, *Gavin Doherty *Trinity College Dublin, Ireland, **UC Berkeley WiP Discussant: Daniel Votipka, Tufts University |
|||
|
||||
1550 - 1730 | POSTER SESSION ON GATHER |
|||
2000 - 2130 | SPECIAL SESSION: Hard Problems Discussions |
|||
THURSDAY, APRIL 15 | ||||
0930 - 0935 | Welcome Adam Tagert National Security Agency |
|||
0935 - 1030 | KEYNOTE PRESENTATION Working with academia at the UK National Cyber Security Centre Paul Waller GCHQ |
|||
1030 - 1045 | .BREAK | |||
SESSION 6: Saving the Physical World from Cyber | ||||
1045 - 1110 | Verified Hardware/Software Co-Assurance: Enhancing Safety and Security for Critical Systems David Hardin Collins |
|||
1110 - 1135 | überSpark: Practical, Provable, End-to-End Guarantees on Commodity Heterogenous Interconnected Computing Platforms *Amit Vasudevan, **Petros Maniatis, †Ruben Martins, *Anton Dimov Hristozov, *Bruce Krogh, *†Raffaele Romagnoli *SEI, CMU; **Google Research; †CSD, CMU; *†ECE, CMU |
|||
1135 - 1220 | Work-In-Progress Discussion Session: Railway Infrastructure *Himanshu Neema, **Leqiang Wang, *Xenofon Koutsoukos, **CheeYee Tang, **Keith Stouffer *Vanderbilt University, **NIST WiP Discussant: Martín Barrère, Imperial College London |
|||
|
||||
1220 - 1320 | LUNCH & NETWORKING |
|||
SESSION 7: Go Where I Send Thee | ||||
1320 - 1405 | Work-In-Progress Discussion Session: Studying App Reviews *Vaibhav Garg, *Hui Guo,**Nirav Ajmeri, *Munindar P. Singh *NCSU, **University of Bristol WiP Discussant: Jianwei Niu, University of Texas, San Antonio |
|||
1405 - 1430 | ZeRØ: Zero-Overhead Resilient Operation Under Pointer Integrity Attacks *Mohamed Tarek, *Miguel Arroyo, *Evgeny Manzhosov, */**Simha Sethumadhavan *Columbia University, **Chip Scan |
|||
1430 - 1455 | Insights for Systems Security Engineering from Multilayer Network Models Adam Williams, Gabriel C. Birch, Susan Caskey, Elizabeth Fleming, Thushara Gunda, Thomas Adams, Jamie Wingo Sandia |
|||
1455 - 1525 | BREAK |
|||
SESSION 8: Potpourri for 1,000 | ||||
1525 - 1550 | AI-Powered Ransomware Detection Framework Subash Poudyal and Dipankar Dasgupta University of Memphis |
|||
1550 - 1615 | On Managing Vulnerabilities in AI/ML Systems *Jonathan Spring, *April Galyardt, *Allen Householder, **Nathan M. VanHoudnos *CERT/CC, SEI, CMU, **SEI, CMU |
|||
1615 - 1700 | Work-In-Progress Discussion Session: Attestation and Game Theory *Shanto Roy, *Salah Uddin Kadir, **Yevgeniy Vorobeychik, *Aron Laszka *University of Houston, **Washington University in St. Louis WiP Discussant: Ryan Gabrys, Naval Information Warfare Center |
|||
|
||||
1700 - 1715 | Wrap Up |
|||
SYMPOSIUM ADJOURNED |