HotSoS 2016
HotSoS 2016 proceedings are in the ACM Digital Library
TUESDAY, APRIL 19 | ||
6:00pm - 9:00pm |
Evening Reception at Phipps Conservatory |
|
WEDNESDAY, APRIL 20 | ||
8:00am - 9:00am |
Breakfast at Cohon University Center |
|
SESSION 1 | ||
9:00am - 10:30am | Welcome and Introduction Keynote: Lorrie Cranor Adventures in Usable Privacy and Security: From Empirical Studies to Public Policy Paper: Hui Lin, Homa Alemzadeh, Daniel Chen, Zbigniew Kalbararczyk, and Ravishankar Iyer Safety-critical Cyber-Physical Attacks: Analysis, Detection, and Mitigation |
|
10:30am - 11:00am | Break |
|
SESSION 2 | ||
11:00am - 12:30pm | Paper: Aron Laszka, Waseem Abbas, S. Shankar Sastry, Yevgeniy Vorobeychik, and Xenofon Koutsoukos Optimal Thresholds for Intrusion Detection Systems Paper: Atul Bohara, Uttam Thakore, and William Sanders Intrusion Detection in Enterprise Systems by Combining and Clustering Diverse Monitor Data Paper: Jeffrey Carver, Morgan Burcham, Sedef Akinli Kocak, Ayse Bener, Michael Felderer, Matthias Gander, Jason King, Jouni Markkula, Markku Oivo, Clemens Sauerwein, and Laurie Williams Establishing a Baseline for Mesauring Advancement in the Science of Security – an Analysis of the 2015 IEEE Security & Privacy Proceedings |
|
12:30pm - 2:00pm | Posters and Lunch |
|
SESSION 3 | ||
2:00pm - 3:00pm | Keynote: Greg Shannon Science Challenges in the Federal Cybersecurity R&D Strategic Plan |
|
3:00pm - 3:30pm | Posters and Break |
|
SESSION 4 | ||
3:30pm - 5:20pm | Paper: Bradley Potteiger, Goncalo Martins, and Xenofon Koutsoukos Software and Attack Centric Integrated Threat Modeling for Quantitative Risk Assessment Tutorial: Hanan Hibshi Systematic Analysis of Qualitative Data in Security |
|
5:30pm - 6:00pm | Break |
|
6:00pm - 9:00pm | Dinner at Carnegie Museum of Natural History |
|
THURSDAY, APRIL 21 | ||
8:00am - 9:00am |
Breakfast at Cohon University Center |
|
SESSION 5 | ||
9:00am - 10:30am | Keynote: Christos Faloutsos Anomaly Detection in Large Graphs Paper: Kevin Bush, Antonio Roque, and Christopher Degni Security is About Control: Insights from Cybernetics Paper: Zhenqi Huang, Yu Wang, Sayan Mitra, and Geir Dullerud Controller Synthesis for Linear Time-varying Systems with Adversaries |
|
10:30am - 11:00am | Break |
|
SESSION 6 | ||
11:00am - 12:20pm | Tutorial: Tao Xie, William Enck Text Analytics for Security |
|
12:20pm - 1:20pm | Lunch |
|
SESSION 7 | ||
1:20pm - 3:10pm | Keynote: Matt Briggs The Threat Environment Paper: Carl Pearson, Allaire Welk, William Boettcher, Roger Mayer, Sean Streck, Joseph Simons-Rudolph, and Christopher Mayhorn Difference in Trust Between Human and Automated Decision Aids Paper: Phuong Cao, Eric Badger, Zbigniew Kalbarczyk, Ravishankar Iyer A Framework for Generation, Replay and Analysis of Real-World Attack Variants |
|
3:10pm - 3:30pm | Ice Cream Social |