HotSoS 2017 Program

DOWNLOAD AGENDA BOOKLETVIEW FULL-LENGTH PRESENTATIONS VIDEO

MONDAY, APRIL 3  
1830 - 2030 Evening Reception at The Hotel at Arundel Preserve
 
 
TUESDAY, APRIL 4  
0800 - 1730 Registration (open until 1730)
 
 
SESSION 1  
0830 - 0900 Welcome and Introduction
Symposium Co-Chairs

Opening Remarks Video - Opening Remarks
Dr. Deborah Frincke, National Security Agency
 

 
0900 - 1000 Keynote: Security of Cyber-Physical Systems: Challenges and Approaches Video - Security of Cyber-Physical Systems: Challenges and Approaches
Insup Lee, UPenn
 
 
1000 - 1030 Poster Session and Break
 
 
SESSION 2  
1030 - 1200 Paper: Leveraging Unique CPS Properties to Design Better Privacy-Enhancing Algorithms Video - Leveraging Unique CPS Properties to Design Better Privacy-Enhancing Algorithms
Jairo Giraldo, Alvaro A. Cárdenas, Murat Kantarcioglu
University of Texas at Dallas

Paper: Characterizing Scientific Reporting in Security Literature:
An Analysis of ACM CCS and IEEE S&P Papers Video - Characterizing Scientific Reporting in Security Literature: An Analysis of ACM CCS and IEEE S&P Papers
*Morgan Burcham, *Mahran Al-Zyoud, *Jeffrey C. Carver, Mohammed Alsaleh, **Hongying Du, Fida Gilani, Jun Jiang, **Akond Rahman, **Ozgur Kafali, Ehab Al-Shaer, **Laurie Williams
*University of Alabama, UNC Charlotte, **NC State University, UNC Chapel Hill

Paper: Optimal Security Investments in a Prevention and Detection Game Video -  Optimal Security Investments in a Prevention and Detection Game
Carlos Barreto, Alvaro A. Cárdenas, Alain Bensoussan
University of Texas at Dallas
 

 
1200 - 1330 Lunch (on your own)
 
 
SESSION 3  
1330 - 1430 Keynote: Navigating Privacy Issues in A Data Driven World Video - Navigating Privacy Issues in A Data Driven World
Jules Polonetsky, Future of Privacy Forum
 
 
1430 - 1530

Panel: Shifting the Balance in the Attack-Defend Cycle Video - Shifting the Balance in the Attack-Defend Cycle
Moderator: William L. Scherlis (CMU)

Panelists:

  • David Melski (GrammaTech)
  • Charles Nelson (USCC)
  • Sam Septembre (NAVY)
  • Yan Shoshitaishvili (UCSB)
 
1530 - 1600 Poster Session and Break  
SESSION 4  
1600 - 1730 Parallel Tutorial Session

The Bugs Framework (BF) "Hands-On"
Irena Bojanova and Paul E. Black
National Institute of Standards and Technology

System Monitoring for Security
Xusheng Xiao
Case Western Reserve University
 

 
1730 - 1800 Break
 
 
1800 Shuttle bus to American Visionary Art Museum. Meet in the hotel lobby. (Don't be late!)
 
 
1830 - 2100 Dinner at the American Visionary Art Museum  
WEDNESDAY, APRIL 5  
0800 - 1730 Registration (open until 1530)
 
 
SESSION 5  
0900 - 1000 Keynote: Differential Privacy and Data Analysis Video - Differential Privacy and Data Analysis
Aaron Roth, UPenn
 
 
1000 - 1030 Poster Session and Break  
SESSION 6  
1030 - 1200 Paper: Learning a Privacy Incidents Database Video - Learning a Privacy Incidents Database
*Pradeep K. Murukannaiah, Chinmaya Dabral, Karthik Sheshadri, Esha Sharma, Jessica Staddon
*Rochester Institute of Technology, NC State University

Paper: On the Tradeoff Between Privacy and Utility in Collaborative Intrusion Detection Systems-A Game Theoretical Approach Video - On the Tradeoff Between Privacy and Utility in Collaborative Intrusion Detection Systems-A Game Theoretical Approach
*Richeng Jin, Xiaofan He, *Huaiyu Dai
*NC State University, Lamar University

Paper: Use of Phishing Training to Improve Security Warning Compliance: Evidence From a Field Experiment Video - Use of Phishing Training to Improve Security Warning Compliance: Evidence From a Field Experiment
*Weining Yang, *Aiping Xiong, †Jing Chen, *Robert W. Proctor, *Ninghui Li
* Purdue University, New Mexico State University
 

 
     
1200 - 1330 Lunch (on your own)  
SESSION 7  
1330 - 1345 Best Poster Announcement Video - Best Poster Announcement

"Is the Guardian Capable? A Routine Activity Theory Approach to Cyber Intrusion on Honeypot Systems"
Michael H. Becker, Michel Cukier, David Maimon
University of Maryland

HoTSoS 2018
Laurie Williams, North Carolina State University

 
1345 - 1515 Paper: Global Variation in Attack Encounters and Hosting Video - Global Variation in Attack Encounters and Hosting
*Ghita Mezzour, Kathleen M. Carley, L. Richard Carley
*International University of Rabat, Carnegie Mellon University

Paper: An Approach to Incorporating Uncertainty in Network Security Analysis Video - An Approach to Incorporating Uncertainty in Network Security Analysis
Hoang Hai Nguyen, Kartik Palani, David M. Nicol
University of Illinois at Urbana-Champaign

Paper: Surveying Security Practice Adherence in Software Development Video - Surveying Security Practice Adherence in Software Development
Patrick Morrison, Laurie Williams
North Carolina State University
 

 
1515 - 1530 Closing remarks
 
 
SYMPOSIUM ADJOURNED