HotSoS 2016

HotSoS 2016 proceedings are in the ACM Digital Library


TUESDAY, APRIL 19


6:00pm - 9:00pm


Evening Reception at Phipps Conservatory

 
WEDNESDAY, APRIL 20


8:00am - 9:00am


Breakfast at Cohon University Center

 
SESSION 1
9:00am - 10:30am Welcome and Introduction



Keynote: Lorrie Cranor

Adventures in Usable Privacy and Security: From Empirical Studies to Public Policy



Paper: Hui Lin, Homa Alemzadeh, Daniel Chen, Zbigniew Kalbararczyk, and Ravishankar Iyer

Safety-critical Cyber-Physical Attacks: Analysis, Detection, and Mitigation

 
10:30am - 11:00am Break

 
SESSION 2  
11:00am - 12:30pm Paper: Aron Laszka, Waseem Abbas, S. Shankar Sastry, Yevgeniy Vorobeychik, and Xenofon Koutsoukos

Optimal Thresholds for Intrusion Detection Systems



Paper: Atul Bohara, Uttam Thakore, and William Sanders

Intrusion Detection in Enterprise Systems by Combining and Clustering Diverse Monitor Data



Paper: Jeffrey Carver, Morgan Burcham, Sedef Akinli Kocak, Ayse Bener, Michael Felderer, Matthias Gander, Jason King, Jouni Markkula, Markku Oivo, Clemens Sauerwein, and Laurie Williams

Establishing a Baseline for Mesauring Advancement in the Science of Security – an Analysis of the 2015 IEEE Security & Privacy Proceedings

 
12:30pm - 2:00pm Posters and Lunch

 
SESSION 3  
2:00pm - 3:00pm Keynote: Greg Shannon

Science Challenges in the Federal Cybersecurity R&D Strategic Plan

 
3:00pm - 3:30pm Posters and Break

 
SESSION 4  
3:30pm - 5:20pm Paper: Bradley Potteiger, Goncalo Martins, and Xenofon Koutsoukos

Software and Attack Centric Integrated Threat Modeling for Quantitative Risk Assessment



Tutorial: Hanan Hibshi

Systematic Analysis of Qualitative Data in Security

 
5:30pm - 6:00pm Break

 
6:00pm - 9:00pm Dinner at Carnegie Museum of Natural History

 
THURSDAY, APRIL 21  


8:00am - 9:00am


Breakfast at Cohon University Center

 
SESSION 5  
9:00am - 10:30am Keynote: Christos Faloutsos

Anomaly Detection in Large Graphs



Paper: Kevin Bush, Antonio Roque, and Christopher Degni

Security is About Control: Insights from Cybernetics



Paper: Zhenqi Huang, Yu Wang, Sayan Mitra, and Geir Dullerud

Controller Synthesis for Linear Time-varying Systems with Adversaries

 
10:30am - 11:00am Break

 
SESSION 6  
11:00am - 12:20pm Tutorial: Tao Xie, William Enck

Text Analytics for Security

 
12:20pm - 1:20pm Lunch

 
SESSION 7  
1:20pm - 3:10pm Keynote: Matt Briggs

The Threat Environment



Paper: Carl Pearson, Allaire Welk, William Boettcher, Roger Mayer, Sean Streck, Joseph Simons-Rudolph, and Christopher Mayhorn

Difference in Trust Between Human and Automated Decision Aids



Paper: Phuong Cao, Eric Badger, Zbigniew Kalbarczyk, Ravishankar Iyer

A Framework for Generation, Replay and Analysis of Real-World Attack Variants
3:10pm - 3:30pm Ice Cream Social